Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe

Overview

General Information

Sample name:SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Analysis ID:1431466
MD5:dda215e4c93c5bcd1626d798a9114052
SHA1:686205c045db9236cb7a76cc48a4759f3a775bed
SHA256:786c781885708a2dd6f66a997cda19fa13f06542a1c5f35c50619494d45d2cb9
Tags:exe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample is not signed and drops a device driver
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to load drivers
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the system directory
Creates or modifies windows services
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables driver privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Spawns drivers

Classification

  • System is w10x64
  • SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe (PID: 2444 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe" MD5: DDA215E4C93C5BCD1626D798A9114052)
    • conhost.exe (PID: 4548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • bugado.exe (PID: 5060 cmdline: "C:\Windows\SoftwareDistribution\Download\bugado.exe" C:\Windows\SoftwareDistribution\Download\bugado.sys MD5: 34CFBE3FF70461820CCC31A1AFEEC0B3)
      • conhost.exe (PID: 5028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5372 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeReversingLabs: Detection: 62%
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeVirustotal: Detection: 67%Perma Link
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeReversingLabs: Detection: 39%
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeVirustotal: Detection: 48%Perma Link
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\ESP Valorant C++\Cheat Valorant ESP - Private Store\x64\Release\YARREAK PROJE.pdb source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: Binary string: D:\XD\kdmapper-master\kdmapper-master\x64\Release\kdmapper.pdb11 source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr
Source: Binary string: eD:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\ESP Valorant C++\Cheat Valorant ESP - Private Store\x64\Release\YARREAK PROJE.pdb3,,GCTL source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: Binary string: C:\Users\textx\source\repos\democ_free\kernelmod\x64\Release\drv.pdb source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.sys.0.dr
Source: Binary string: D:\XD\kdmapper-master\kdmapper-master\x64\Release\kdmapper.pdb source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr, uKPwkwKUWlbmzgNfgIh.3.dr
Source: Binary string: PwC:\Users\textx\source\repos\democ_free\kernelmod\x64\Release\drv.pdb source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.sys.0.dr
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr, uKPwkwKUWlbmzgNfgIh.3.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr, uKPwkwKUWlbmzgNfgIh.3.drString found in binary or memory: http://ocsp.thawte.com0
Source: bugado.exe, 00000003.00000002.2096634574.0000013A43F3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.veH
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr, uKPwkwKUWlbmzgNfgIh.3.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr, uKPwkwKUWlbmzgNfgIh.3.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr, uKPwkwKUWlbmzgNfgIh.3.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725803F10 OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF725803F10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725803F10 OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF725803F10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725803CC0 free,OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,malloc,memmove,free,GlobalUnlock,CloseClipboard,0_2_00007FF725803CC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258340A0 SleepEx,SleepEx,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,GetAsyncKeyState,AllocConsole,FindWindowA,ShowWindow,MessageBoxA,Sleep,0_2_00007FF7258340A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725832D90 GetClientRect,QueryPerformanceCounter,GetKeyState,GetKeyState,GetKeyState,ClientToScreen,SetCursorPos,GetActiveWindow,GetCursorPos,ScreenToClient,GetAsyncKeyState,0_2_00007FF725832D90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeProcess Stats: CPU usage > 49%
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF61758D520 RegCreateKeyW,RegSetKeyValueW,RegCloseKey,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,RegSetKeyValueW,RegCloseKey,RegCloseKey,GetModuleHandleA,GetProcAddress,GetProcAddress,RtlAdjustPrivilege,RtlInitUnicodeString,NtLoadDriver,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,3_2_00007FF61758D520
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF617582A90 NtQuerySystemInformation,VirtualFree,VirtualAlloc,NtQuerySystemInformation,GetCurrentProcessId,VirtualFree,DeviceIoControl,DeviceIoControl,DeviceIoControl,DeviceIoControl,memset,DeviceIoControl,DeviceIoControl,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,VirtualFree,3_2_00007FF617582A90
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF61758DF00 NtQuerySystemInformation,VirtualFree,VirtualAlloc,NtQuerySystemInformation,VirtualFree,_stricmp,VirtualFree,VirtualFree,_invalid_parameter_noinfo_noreturn,3_2_00007FF61758DF00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725834EC0: DeviceIoControl,0_2_00007FF725834EC0
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF61758D520 RegCreateKeyW,RegSetKeyValueW,RegCloseKey,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,RegSetKeyValueW,RegCloseKey,RegCloseKey,GetModuleHandleA,GetProcAddress,GetProcAddress,RtlAdjustPrivilege,RtlInitUnicodeString,NtLoadDriver,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,3_2_00007FF61758D520
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile created: C:\Windows\SoftwareDistribution\Download\bugado.sysJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile created: C:\Windows\SoftwareDistribution\Download\bugado.sysJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile created: C:\Windows\SoftwareDistribution\Download\bugado.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258016C00_2_00007FF7258016C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258202E00_2_00007FF7258202E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258082E00_2_00007FF7258082E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72580AAE00_2_00007FF72580AAE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72580EA300_2_00007FF72580EA30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258116500_2_00007FF725811650
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72582CA400_2_00007FF72582CA40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72580B6600_2_00007FF72580B660
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725828DB00_2_00007FF725828DB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7257FF1D00_2_00007FF7257FF1D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258262100_2_00007FF725826210
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7257FC6150_2_00007FF7257FC615
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258072100_2_00007FF725807210
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258181200_2_00007FF725818120
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7257F2D700_2_00007FF7257F2D70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258241600_2_00007FF725824160
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725809D600_2_00007FF725809D60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725832D900_2_00007FF725832D90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72580A5800_2_00007FF72580A580
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258174D00_2_00007FF7258174D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72580B8F00_2_00007FF72580B8F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258360500_2_00007FF725836050
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725801C500_2_00007FF725801C50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258128700_2_00007FF725812870
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258283E00_2_00007FF7258283E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725827B300_2_00007FF725827B30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258097300_2_00007FF725809730
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725818F200_2_00007FF725818F20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72580DB500_2_00007FF72580DB50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725814B500_2_00007FF725814B50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725805B500_2_00007FF725805B50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258133400_2_00007FF725813340
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72581CB700_2_00007FF72581CB70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725827F600_2_00007FF725827F60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258217600_2_00007FF725821760
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72580BB800_2_00007FF72580BB80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72580BF800_2_00007FF72580BF80
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF6175817803_2_00007FF617581780
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF617582A903_2_00007FF617582A90
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\uKPwkwKUWlbmzgNfgIh 4429F32DB1CC70567919D7D47B844A91CF1329A6CD116F582305F3B7B60CD60B
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeProcess token adjusted: Load DriverJump to behavior
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: String function: 00007FF617585EE0 appears 80 times
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, 00000000.00000002.4517630062.0000023F9BA64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, 00000000.00000003.2394822838.0000023F9BA54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, 00000000.00000003.2394565534.0000023F9BA54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, 00000000.00000000.2074111889.00007FF7258AD000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, 00000000.00000003.2394918831.0000023F9BA63000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, 00000000.00000003.2394884952.0000023F9BA5F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeDriver loaded: \Registry\Machine\System\CurrentControlSet\Services\uKPwkwKUWlbmzgNfgIhJump to behavior
Source: bugado.exe.0.drBinary string: Unknown exceptionbad array new lengthstring too longbad cast\\\.\Nal[-] \Device\Nal is already in use.[<] Loading vulnerable driver, Name: [-] Can't find TEMP folder[-] Failed to create vulnerable driver file[-] Failed to register and start service for the vulnerable driver[-] Failed to load driver iqvw64e.sysntoskrnl.exe[-] Failed to get ntoskrnl.exe[-] Failed to ClearPiDDBCacheTable[-] Failed to ClearKernelHashBucketList[!] Failed to ClearMmUnloadedDrivers[<] Unloading vulnerable driver[!] Error dumping shit inside the disk[+] Vul driver data destroyed before unlink[-] Failed to translate virtual address 0x[-] Failed to map IO space of 0x[!] Failed to unmap IO space of physical address 0xMmAllocatePagesForMdl[!] Failed to find MmAlocatePagesForMdlMmMapLockedPagesSpecifyCache[!] Failed to find MmMapLockedPagesSpecifyCacheMmProtectMdlSystemAddress[!] Failed to find MmProtectMdlSystemAddressMmUnmapLockedPages[!] Failed to find MmUnmapLockedPagesMmFreePagesFromMdl[!] Failed to find MmFreePagesFromMdlExAllocatePoolWithTag[!] Failed to find ExAllocatePoolExFreePool[!] Failed to find device_object[!] Failed to find driver_object[!] Failed to find driver_section[!] Failed to find driver name[!] Failed to read driver name[!] Failed to write driver name length[+] MmUnloadedDrivers Cleaned: ExAcquireResourceExclusiveLite[!] Failed to find ExAcquireResourceExclusiveLiteExReleaseResourceLite[!] Failed to find ExReleaseResourceLiteRtlDeleteElementGenericTableAvl[!] Failed to find RtlDeleteElementGenericTableAvlRtlLookupElementGenericTableAvl[!] Failed to find RtlLookupElementGenericTableAvlxxxxxx????xxxxx????xxx????xxxxx????x????xx?x
Source: uKPwkwKUWlbmzgNfgIh.3.drBinary string: \Device\Nal
Source: bugado.sys.0.drBinary string: \Device\VGK_G091H
Source: classification engineClassification label: mal72.evad.winEXE@7/5@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF72582A410 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,Process32NextW,CloseHandle,CloseHandle,0_2_00007FF72582A410
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5028:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4548:120:WilError_03
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeFile created: C:\Users\user\AppData\Local\Temp\uKPwkwKUWlbmzgNfgIhJump to behavior
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeReversingLabs: Detection: 39%
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeVirustotal: Detection: 48%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeProcess created: C:\Windows\SoftwareDistribution\Download\bugado.exe "C:\Windows\SoftwareDistribution\Download\bugado.exe" C:\Windows\SoftwareDistribution\Download\bugado.sys
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c cls
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeProcess created: C:\Windows\SoftwareDistribution\Download\bugado.exe "C:\Windows\SoftwareDistribution\Download\bugado.exe" C:\Windows\SoftwareDistribution\Download\bugado.sysJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: twext.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: cscui.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: workfoldersshell.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: starttiledata.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: usermgrproxy.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: acppage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: aepic.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\ESP Valorant C++\Cheat Valorant ESP - Private Store\x64\Release\YARREAK PROJE.pdb source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: Binary string: D:\XD\kdmapper-master\kdmapper-master\x64\Release\kdmapper.pdb11 source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr
Source: Binary string: eD:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\ESP Valorant C++\Cheat Valorant ESP - Private Store\x64\Release\YARREAK PROJE.pdb3,,GCTL source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
Source: Binary string: C:\Users\textx\source\repos\democ_free\kernelmod\x64\Release\drv.pdb source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.sys.0.dr
Source: Binary string: D:\XD\kdmapper-master\kdmapper-master\x64\Release\kdmapper.pdb source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr, uKPwkwKUWlbmzgNfgIh.3.dr
Source: Binary string: PwC:\Users\textx\source\repos\democ_free\kernelmod\x64\Release\drv.pdb source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.sys.0.dr
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeExecutable created and started: C:\Windows\SoftwareDistribution\Download\bugado.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile created: C:\Windows\SoftwareDistribution\Download\bugado.sysJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile created: C:\Windows\SoftwareDistribution\Download\bugado.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile created: C:\Windows\SoftwareDistribution\Download\bugado.sysJump to dropped file
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeFile created: C:\Users\user\AppData\Local\Temp\uKPwkwKUWlbmzgNfgIhJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile created: C:\Windows\SoftwareDistribution\Download\bugado.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile created: C:\Windows\SoftwareDistribution\Download\bugado.sysJump to dropped file
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeFile created: C:\Users\user\AppData\Local\Temp\uKPwkwKUWlbmzgNfgIhJump to dropped file
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\uKPwkwKUWlbmzgNfgIhJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF617582A90 NtQuerySystemInformation,VirtualFree,VirtualAlloc,NtQuerySystemInformation,GetCurrentProcessId,VirtualFree,DeviceIoControl,DeviceIoControl,DeviceIoControl,DeviceIoControl,memset,DeviceIoControl,DeviceIoControl,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,VirtualFree,3_2_00007FF617582A90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeDropped PE file which has not been started: C:\Windows\SoftwareDistribution\Download\bugado.sysJump to dropped file
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\uKPwkwKUWlbmzgNfgIhJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeAPI coverage: 1.8 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725836D18 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF725836D18
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF61758EAC4 GetLastError,IsDebuggerPresent,OutputDebugStringW,3_2_00007FF61758EAC4
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF617582A90 NtQuerySystemInformation,VirtualFree,VirtualAlloc,NtQuerySystemInformation,GetCurrentProcessId,VirtualFree,DeviceIoControl,DeviceIoControl,DeviceIoControl,DeviceIoControl,memset,DeviceIoControl,DeviceIoControl,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,VirtualFree,3_2_00007FF617582A90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725833B70 system,system,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,Sleep,exit,GetModuleHandleA,GetProcAddress,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,GetProcessHeap,HeapReAlloc,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,system,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,Sleep,exit,0_2_00007FF725833B70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725836EC0 SetUnhandledExceptionFilter,0_2_00007FF725836EC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF7258371F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7258371F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725836D18 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF725836D18
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF617589D10 SetUnhandledExceptionFilter,_wcsicmp,_wcsicmp,_wcsicmp,_wcsicmp,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,memcmp,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,3_2_00007FF617589D10
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF61758F884 SetUnhandledExceptionFilter,3_2_00007FF61758F884
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF61758F6D8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FF61758F6D8
Source: C:\Windows\SoftwareDistribution\Download\bugado.exeCode function: 3_2_00007FF61758F140 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FF61758F140
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeProcess created: C:\Windows\SoftwareDistribution\Download\bugado.exe "C:\Windows\SoftwareDistribution\Download\bugado.exe" C:\Windows\SoftwareDistribution\Download\bugado.sysJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exeCode function: 0_2_00007FF725836F74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF725836F74
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
Windows Service
2
Windows Service
13
Masquerading
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job2
LSASS Driver
11
Process Injection
11
Process Injection
LSASS Memory14
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
2
LSASS Driver
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Obfuscated Files or Information
NTDS2
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe39%ReversingLabsWin64.Trojan.Doina
SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe49%VirustotalBrowse
SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Windows\SoftwareDistribution\Download\bugado.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\uKPwkwKUWlbmzgNfgIh0%ReversingLabs
C:\Users\user\AppData\Local\Temp\uKPwkwKUWlbmzgNfgIh0%VirustotalBrowse
C:\Windows\SoftwareDistribution\Download\bugado.exe62%ReversingLabsWin64.PUA.GameHack
C:\Windows\SoftwareDistribution\Download\bugado.exe68%VirustotalBrowse
C:\Windows\SoftwareDistribution\Download\bugado.sys0%ReversingLabs
C:\Windows\SoftwareDistribution\Download\bugado.sys3%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.thawte.com00%URL Reputationsafe
http://ocsp.veH0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.thawte.com/ThawteTimestampingCA.crl0SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr, uKPwkwKUWlbmzgNfgIh.3.drfalse
    high
    http://ocsp.thawte.com0SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe, bugado.exe.0.dr, uKPwkwKUWlbmzgNfgIh.3.drfalse
    • URL Reputation: safe
    unknown
    http://ocsp.veHbugado.exe, 00000003.00000002.2096634574.0000013A43F3C000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1431466
    Start date and time:2024-04-25 08:24:07 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 0s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:10
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
    Detection:MAL
    Classification:mal72.evad.winEXE@7/5@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 21
    • Number of non-executed functions: 147
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\uKPwkwKUWlbmzgNfgIhSecuriteInfo.com.Win64.TrojanX-gen.7904.11956.exeGet hashmaliciousUnknownBrowse
      SecuriteInfo.com.Trojan.PWS.Siggen3.25256.942.20710.exeGet hashmaliciousExela Stealer, XmrigBrowse
        ZO8e0mOW67.exeGet hashmaliciousUnknownBrowse
          SecuriteInfo.com.Win64.CrypterX-gen.7296.19136.exeGet hashmaliciousUnknownBrowse
            SecuriteInfo.com.Win64.Trojan.Agent.3OT2P9.21817.2775.exeGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.Win64.Trojan.Agent.3OT2P9.21817.2775.exeGet hashmaliciousUnknownBrowse
                6e.exeGet hashmaliciousXWormBrowse
                  ShellExperienceHost.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.Variant.Lazy.257709.2840.8582.exeGet hashmaliciousUnknownBrowse
                      client.exeGet hashmaliciousUnknownBrowse
                        Process:C:\Windows\SoftwareDistribution\Download\bugado.exe
                        File Type:PE32+ executable (native) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):34568
                        Entropy (8bit):6.458050812199268
                        Encrypted:false
                        SSDEEP:384:gxdNvW7C8naMYCjizSO/YWwhtSgvNR0m1us7pfBMRKr+PLDRfvgXifBMRg6PWNTj:gHNwmJ/7UtSwR317uPPlvgXiu/6Tbf
                        MD5:1898CEDA3247213C084F43637EF163B3
                        SHA1:D04E5DB5B6C848A29732BFD52029001F23C3DA75
                        SHA-256:4429F32DB1CC70567919D7D47B844A91CF1329A6CD116F582305F3B7B60CD60B
                        SHA-512:84C3CCC657F83725B24A20F83B87577603F580993920CC42D6DA58648C6888D950FD19FBB8B404CE51A3EAB674066C5CEFE275763FBDB32E1AE1BA98097AB377
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        • Antivirus: Virustotal, Detection: 0%, Browse
                        Joe Sandbox View:
                        • Filename: SecuriteInfo.com.Win64.TrojanX-gen.7904.11956.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.Trojan.PWS.Siggen3.25256.942.20710.exe, Detection: malicious, Browse
                        • Filename: ZO8e0mOW67.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.Win64.CrypterX-gen.7296.19136.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.Win64.Trojan.Agent.3OT2P9.21817.2775.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.Win64.Trojan.Agent.3OT2P9.21817.2775.exe, Detection: malicious, Browse
                        • Filename: 6e.exe, Detection: malicious, Browse
                        • Filename: ShellExperienceHost.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.Variant.Lazy.257709.2840.8582.exe, Detection: malicious, Browse
                        • Filename: client.exe, Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G..............$..uy.....uy.....uy............uy.....Rich...................PE..d.....R.........."......P....\......"]......................................@].....*2......................................................."].<....0].......]......h..............Pa...............................................`..H............................text....F.......H.................. ..h.rdata.......`.......L..............@..H.data.....\..p.......T..............@....pdata........]......V..............@..HINIT......... ]......\.............. ....rsrc........0]......d..............@..B........................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
                        File Type:PE32+ executable (console) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):137728
                        Entropy (8bit):6.140567886686446
                        Encrypted:false
                        SSDEEP:3072:rOUDtpXnRNEvhxNyatnKl9rGmJTQSaMm5/6TYfEBjgQ:rOUDDXnRNEv7wEo9WlTfYjg
                        MD5:34CFBE3FF70461820CCC31A1AFEEC0B3
                        SHA1:5D32E91C039C9A6F723BA3C04C1179D02E6A0CE9
                        SHA-256:6EBCC6896B243C761DA4FC28A26249B0C146AE17AFF7697C09BC447008E831DF
                        SHA-512:1CA4661BE645E7E954D89C83F1FD126A5E936533052D4E330C9FACCB83BB5942D28265375CEE743E468B1625A0C1F10888E7957FE88C718E8501A86A78CDC06E
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 62%
                        • Antivirus: Virustotal, Detection: 68%, Browse
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......H.qE....................^.......^.......^...-...^...............................................Rich............PE..d...a..b.........."..........&......<..........@.............................`............`.....................................................@....@.......0...............P..........p.......................(...P...8............................................text............................... ..`.rdata..v...........................@..@.data........ ......................@....pdata.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
                        File Type:PE32+ executable (native) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):7680
                        Entropy (8bit):4.182795808297679
                        Encrypted:false
                        SSDEEP:96:UqxuHKt7sSeDUWtASg/SHWj7kxDPiNO+R0yV:UmuHKt7ZiUWtAlYcIPoI
                        MD5:CC8345CC34491CB11C1E0167B87B97E1
                        SHA1:0E80DA0B3E6131A65EE381F6920264AFDC9C9D3C
                        SHA-256:0168C3E04491B63E71D1FE4B5882F255B7711050FD79C00F1E86D042BE0A221C
                        SHA-512:B5C651433D7422BA4FFE559AAA0FAAE09B6BDCA123B77AEEE941574EBE2198C5D10C84EA3690F8D7884A99E561A8C180DE219FAD748D5EEDC362FEBD76D5D1FB
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        • Antivirus: Virustotal, Detection: 3%, Browse
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........@V.w...w...w..../..w...w/..w....-..w....*..w..c.+..w..c.,..w..Rich.w..........PE..d.....e.........."............................@.............................p...........`A.................................................P..(............@...............`....... ..8............................ ............... ..x............................text............................... ..h.rdata..\.... ......................@..H.data...0....0......................@....pdata.......@......................@..HINIT.........P...................... ..b.reloc.......`......................@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SoftwareDistribution\Download\bugado.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):162
                        Entropy (8bit):4.887021118820729
                        Encrypted:false
                        SSDEEP:3:m4FkwF40XGA7cqQ9FUOdwyjes6v+pfh2DaG/dv4FBOBFRecWgFmWErXTMGGMFU2x:m4Gw4uX7cFXyHCYDaiv4FBK3WgFmDrXn
                        MD5:7A676D29958CB647591BEE2046756C5B
                        SHA1:45EFB36F106E4DF9E936CF0B7946C1AA09611FB6
                        SHA-256:EB005EB16FD6683D017C1826A35FB865CD44A67F7624F2BB574D7514E6E47303
                        SHA-512:51E0F1D28451AD23F6D99A2D8793B5D76DF8A523B0BE0AFD6CBC0DA42666A0A0801D40CDF8444730E7DDAED9A412C0F84E29E3BA5B3A8AEC814F3A1AB79FC83A
                        Malicious:false
                        Reputation:low
                        Preview:[<] Loading vulnerable driver, Name: uKPwkwKUWlbmzgNfgIh..[+] NtLoadDriver Status 0xc0000001..[-] Failed to register and start service for the vulnerable driver..
                        File type:PE32+ executable (console) x86-64, for MS Windows
                        Entropy (8bit):6.9333901239069
                        TrID:
                        • Win64 Executable Console (202006/5) 92.65%
                        • Win64 Executable (generic) (12005/4) 5.51%
                        • Generic Win/DOS Executable (2004/3) 0.92%
                        • DOS Executable Generic (2002/1) 0.92%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
                        File size:925'696 bytes
                        MD5:dda215e4c93c5bcd1626d798a9114052
                        SHA1:686205c045db9236cb7a76cc48a4759f3a775bed
                        SHA256:786c781885708a2dd6f66a997cda19fa13f06542a1c5f35c50619494d45d2cb9
                        SHA512:e92305408df77d52e506aa4b4a40f0dcb7c77cd54ba6201d98c210db6ec1df61dc4fd5193f6cbd59c1ce83f6da771c0f97facf976d99b79473148f32424c55ca
                        SSDEEP:24576:qEI9/9HoYVM+ptl7ho60OegX7AoCnhIaXnMvQoT:K/9DPdf0ErvCnhI
                        TLSH:5F15DF46B2E900E9EF77A1389455A707E6713C48072097CF23D584AA1FB3BE05EBE752
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........}GV...V...V..._...D....W..P....W..t....W..\....W..R.......Y...V...a....T..Q....T..W....T..W...RichV...................PE..d..
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x140046b3c
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows cui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x66037DF6 [Wed Mar 27 02:01:26 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:571a41d92490b89061d9804d7222266a
                        Instruction
                        dec eax
                        sub esp, 28h
                        call 00007FBE255D6244h
                        dec eax
                        add esp, 28h
                        jmp 00007FBE255D5C87h
                        int3
                        int3
                        dec eax
                        mov dword ptr [esp+10h], ebx
                        dec eax
                        mov dword ptr [esp+18h], esi
                        push edi
                        dec eax
                        sub esp, 10h
                        xor eax, eax
                        xor ecx, ecx
                        cpuid
                        inc esp
                        mov eax, ecx
                        inc ebp
                        xor ebx, ebx
                        inc esp
                        mov edx, edx
                        inc ecx
                        xor eax, 6C65746Eh
                        inc ecx
                        xor edx, 49656E69h
                        inc esp
                        mov ecx, ebx
                        mov esi, eax
                        xor ecx, ecx
                        inc ecx
                        lea eax, dword ptr [ebx+01h]
                        inc ebp
                        or edx, eax
                        cpuid
                        inc ecx
                        xor ecx, 756E6547h
                        mov dword ptr [esp], eax
                        inc ebp
                        or edx, ecx
                        mov dword ptr [esp+04h], ebx
                        mov edi, ecx
                        mov dword ptr [esp+08h], ecx
                        mov dword ptr [esp+0Ch], edx
                        jne 00007FBE255D5E6Dh
                        dec eax
                        or dword ptr [00076467h], FFFFFFFFh
                        and eax, 0FFF3FF0h
                        dec eax
                        mov dword ptr [0007644Fh], 00008000h
                        cmp eax, 000106C0h
                        je 00007FBE255D5E3Ah
                        cmp eax, 00020660h
                        je 00007FBE255D5E33h
                        cmp eax, 00020670h
                        je 00007FBE255D5E2Ch
                        add eax, FFFCF9B0h
                        cmp eax, 20h
                        jnbe 00007FBE255D5E36h
                        dec eax
                        mov ecx, 00010001h
                        add dword ptr [eax], eax
                        add byte ptr [eax], al
                        dec eax
                        bt ecx, eax
                        jnc 00007FBE255D5E26h
                        inc esp
                        mov eax, dword ptr [0009A4E5h]
                        inc ecx
                        or eax, 01h
                        inc esp
                        mov dword ptr [0009A4DAh], eax
                        jmp 00007FBE255D5E19h
                        Programming Language:
                        • [IMP] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xbae8c0x168.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xe50000x1e8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0xe20000x2d60.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xe60000xe4.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb47e00x70.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0xb48800x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb46a00x140.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x490000x5f8.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x471230x47200d36dd11f7417941ce412fc600f6cb7b9False0.5297740004393673data6.477224967043687IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x490000x734700x736009a6d9a1e61c59e849ab38d9cc04b31e0False0.7894624356717227data6.98058169062055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xbd0000x24e600x24200d264e26b42e3ef881f70c53c4f01f8c4False0.44513678633217996data6.010620594232772IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0xe20000x2d600x2e00c0bee1d0700a23ea7be099d12d174f8aFalse0.4639945652173913data5.67495349291415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0xe50000x1e80x2004c46b148bb4aea911ab5b483ffbdedf6False0.5390625data4.766656762050388IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xe60000xe40x20098ee10e811a52ccadcb1e3ab68eb02f0False0.36328125data2.586338644996031IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_MANIFEST0xe50600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                        DLLImport
                        KERNEL32.dllQueryPerformanceFrequency, QueryPerformanceCounter, GetCurrentProcess, WriteFile, DeviceIoControl, CreateFileW, GetModuleHandleA, CreateToolhelp32Snapshot, Sleep, GetLastError, Process32NextW, Process32FirstW, HeapReAlloc, CloseHandle, CreateThread, HeapAlloc, GetWindowsDirectoryW, GetProcAddress, GetProcessHeap, GetModuleHandleW, lstrcmpiW, AllocConsole, IsDebuggerPresent, AcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, GlobalUnlock, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, GlobalLock, GlobalFree, GetCurrentProcessId, GlobalAlloc, ReleaseSRWLockExclusive
                        USER32.dllCloseClipboard, OpenClipboard, GetCursorPos, EmptyClipboard, GetClipboardData, SetCursorPos, ReleaseCapture, GetClientRect, SetCursor, SetClipboardData, LoadCursorW, ClientToScreen, GetCapture, GetActiveWindow, ScreenToClient, GetKeyState, UpdateWindow, RegisterClassExA, FindWindowA, PostQuitMessage, SetCapture, SetWindowLongW, GetWindowLongW, DefWindowProcW, GetWindow, GetWindowRect, DestroyWindow, SetWindowPos, CreateWindowExW, GetSystemMetrics, UnregisterClassW, ShowWindow, IsWindow, GetAsyncKeyState, DispatchMessageW, PeekMessageW, MessageBoxA, GetForegroundWindow, MoveWindow, SetLayeredWindowAttributes, TranslateMessage, LoadIconW
                        SHELL32.dllShellExecuteW
                        IMM32.dllImmReleaseContext, ImmSetCompositionWindow, ImmGetContext
                        MSVCP140.dll?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Random_device@std@@YAIXZ, ?_Xlength_error@std@@YAXPEBD@Z, _Query_perf_counter, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, _Query_perf_frequency
                        dwmapi.dllDwmExtendFrameIntoClientArea
                        d3d9.dllDirect3DCreate9Ex
                        VCRUNTIME140_1.dll__CxxFrameHandler4
                        VCRUNTIME140.dllmemmove, memcmp, _CxxThrowException, memset, __C_specific_handler, __current_exception_context, __current_exception, __std_exception_copy, __std_exception_destroy, strstr, __std_terminate, memchr, memcpy
                        api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsscanf, fread, __stdio_common_vsprintf, _wfopen, fwrite, _set_fmode, __stdio_common_vsprintf_s, fseek, fclose, fflush, __acrt_iob_func, ftell, __p__commode, __stdio_common_vfprintf
                        api-ms-win-crt-string-l1-1-0.dllstrncpy, isprint, strcmp
                        api-ms-win-crt-utility-l1-1-0.dllqsort
                        api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _callnewh, _set_new_mode
                        api-ms-win-crt-convert-l1-1-0.dllatof
                        api-ms-win-crt-runtime-l1-1-0.dll_configure_narrow_argv, _invalid_parameter_noinfo_noreturn, _initialize_narrow_environment, _initialize_onexit_table, _initterm_e, terminate, _exit, _initterm, _get_initial_narrow_environment, _register_thread_local_exe_atexit_callback, system, _c_exit, _set_app_type, _seh_filter_exe, _cexit, __p___argv, _crt_atexit, exit, __p___argc, _register_onexit_function
                        api-ms-win-crt-math-l1-1-0.dll__setusermatherr, asinf, sin, powf, pow, sinf, sqrtf, atan2f, fmodf, atanf, ceilf, floorf, cos, cosf, tanf
                        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:08:24:54
                        Start date:25/04/2024
                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Doina.72984.2628.5521.exe"
                        Imagebase:0x7ff7257f0000
                        File size:925'696 bytes
                        MD5 hash:DDA215E4C93C5BCD1626D798A9114052
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Target ID:1
                        Start time:08:24:54
                        Start date:25/04/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:3
                        Start time:08:24:56
                        Start date:25/04/2024
                        Path:C:\Windows\SoftwareDistribution\Download\bugado.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\SoftwareDistribution\Download\bugado.exe" C:\Windows\SoftwareDistribution\Download\bugado.sys
                        Imagebase:0x7ff617580000
                        File size:137'728 bytes
                        MD5 hash:34CFBE3FF70461820CCC31A1AFEEC0B3
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 62%, ReversingLabs
                        • Detection: 68%, Virustotal, Browse
                        Reputation:low
                        Has exited:true

                        Target ID:4
                        Start time:08:24:56
                        Start date:25/04/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:08:24:56
                        Start date:25/04/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c cls
                        Imagebase:0x7ff670020000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:0.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:10.1%
                          Total number of Nodes:592
                          Total number of Limit Nodes:13
                          execution_graph 15256 7ff7257f11a0 15259 7ff7257f11c2 15256->15259 15258 7ff7257f134c GetSystemMetrics 15261 7ff7257f11fa 15259->15261 15262 7ff7257f1346 15259->15262 15263 7ff7257f12b3 15259->15263 15264 7ff7257f1280 15259->15264 15261->15261 15283 7ff725829a50 15261->15283 15271 7ff725829af0 ?_Xlength_error@std@@YAXPEBD 15262->15271 15263->15261 15266 7ff7257f12b8 15263->15266 15272 7ff725836874 15264->15272 15268 7ff725836874 4 API calls 15266->15268 15267 7ff7257f1288 15269 7ff7257f1290 15267->15269 15270 7ff7257f12ac _invalid_parameter_noinfo_noreturn 15267->15270 15268->15269 15269->15261 15270->15263 15273 7ff72583688e malloc 15272->15273 15274 7ff725836898 15273->15274 15275 7ff72583687f 15273->15275 15274->15267 15275->15273 15277 7ff72583689e 15275->15277 15276 7ff7258368a9 15279 7ff725829a50 Concurrency::cancel_current_task __std_exception_copy 15276->15279 15277->15276 15286 7ff725836f54 15277->15286 15280 7ff7258368af 15279->15280 15281 7ff7258368d2 15280->15281 15289 7ff7258367fc 15280->15289 15281->15267 15284 7ff725829a5e Concurrency::cancel_current_task 15283->15284 15285 7ff725829a6f __std_exception_copy 15284->15285 15285->15262 15292 7ff725836f34 15286->15292 15288 7ff725836f62 _CxxThrowException 15290 7ff725836f2c free 15289->15290 15292->15288 15333 7ff7258369c0 15334 7ff7258369d9 15333->15334 15335 7ff725836b17 15334->15335 15336 7ff7258369e1 __scrt_acquire_startup_lock 15334->15336 15372 7ff725836d18 IsProcessorFeaturePresent 15335->15372 15338 7ff725836b21 15336->15338 15341 7ff7258369ff __scrt_release_startup_lock 15336->15341 15339 7ff725836d18 9 API calls 15338->15339 15340 7ff725836b2c 15339->15340 15343 7ff725836b34 _exit 15340->15343 15342 7ff725836a24 15341->15342 15344 7ff725836aaa _get_initial_narrow_environment __p___argv __p___argc 15341->15344 15347 7ff725836aa2 _register_thread_local_exe_atexit_callback 15341->15347 15353 7ff7258340a0 SleepEx 15344->15353 15347->15344 15350 7ff725836ad7 15351 7ff725836adc _cexit 15350->15351 15352 7ff725836ae1 15350->15352 15351->15352 15352->15342 15378 7ff72582a360 15353->15378 15356 7ff7258340ce 15357 7ff7258340e4 system 15356->15357 15385 7ff725834a70 15357->15385 15359 7ff7258340d9 SleepEx 15359->15357 15361 7ff725834104 15362 7ff72583410b GetAsyncKeyState 15361->15362 15363 7ff72583411f AllocConsole FindWindowA ShowWindow 15361->15363 15362->15361 15365 7ff72583411b 15362->15365 15397 7ff72582a410 CreateToolhelp32Snapshot Process32FirstW 15363->15397 15365->15363 15366 7ff725834152 15367 7ff725834187 15366->15367 15368 7ff72583415b MessageBoxA Sleep 15366->15368 15370 7ff725836e6c GetModuleHandleW 15367->15370 15403 7ff725833b70 15368->15403 15371 7ff725836ad3 15370->15371 15371->15340 15371->15350 15373 7ff725836d3e 15372->15373 15374 7ff725836d4c memset RtlCaptureContext RtlLookupFunctionEntry 15373->15374 15375 7ff725836dc2 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15374->15375 15376 7ff725836d86 RtlVirtualUnwind 15374->15376 15377 7ff725836e42 15375->15377 15376->15375 15377->15338 15379 7ff72582a3b0 15378->15379 15379->15379 15380 7ff72582a3c1 CreateFileW 15379->15380 15381 7ff72582a3fb 15380->15381 15381->15356 15382 7ff72582a0d0 15381->15382 15445 7ff7258356d0 15382->15445 15384 7ff72582a109 15386 7ff725834aa0 15385->15386 15387 7ff725834b00 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 15386->15387 15390 7ff725834aed 15386->15390 15387->15390 15388 7ff725834bdd ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 15391 7ff725834bfd ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 15388->15391 15396 7ff725834c07 15388->15396 15389 7ff725834b6c ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 15393 7ff725834b24 15389->15393 15395 7ff725834b89 15389->15395 15390->15389 15392 7ff725834b46 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 15390->15392 15390->15393 15391->15396 15392->15390 15392->15393 15393->15388 15394 7ff725834b95 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 15394->15393 15394->15395 15395->15393 15395->15394 15396->15361 15398 7ff72582a448 15397->15398 15399 7ff72582a474 CloseHandle 15397->15399 15400 7ff72582a450 lstrcmpiW 15398->15400 15399->15366 15401 7ff72582a465 Process32NextW 15400->15401 15402 7ff72582a494 CloseHandle 15400->15402 15401->15399 15401->15400 15402->15366 15464 7ff7258345a0 15403->15464 15406 7ff7258345a0 8 API calls 15407 7ff725833ba0 15406->15407 15408 7ff7258345a0 8 API calls 15407->15408 15409 7ff725833bb5 15408->15409 15410 7ff72582a360 CreateFileW 15409->15410 15411 7ff725833bbb 15410->15411 15412 7ff725833bc2 system 15411->15412 15413 7ff725833bd4 system system 15411->15413 15414 7ff725833c9e 15412->15414 15434 7ff725833c0b 15413->15434 15415 7ff72582a410 6 API calls 15414->15415 15416 7ff725833caa 15415->15416 15417 7ff725833f97 system system 15416->15417 15418 7ff725833cb2 15416->15418 15432 7ff725833fce 15417->15432 15419 7ff725833d15 GetProcessHeap HeapAlloc GetProcessHeap HeapReAlloc 15418->15419 15420 7ff725836474 3 API calls 15418->15420 15424 7ff725833d90 GetProcessHeap HeapReAlloc 15419->15424 15422 7ff725833cdc 15420->15422 15421 7ff725833c8b Sleep exit 15421->15414 15422->15419 15425 7ff725833ce5 GetModuleHandleA GetProcAddress 15422->15425 15431 7ff725833e0a system 15424->15431 15489 7ff725836408 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 15425->15489 15427 7ff72583404e Sleep exit 15442 7ff725833f8d 15427->15442 15429 7ff725835340 7 API calls 15429->15432 15437 7ff725833f0d 15431->15437 15432->15427 15432->15429 15438 7ff725834d00 3 API calls 15432->15438 15434->15421 15468 7ff725835340 15434->15468 15481 7ff725834d00 15434->15481 15436 7ff725834400 2 API calls 15439 7ff72583407d 15436->15439 15441 7ff725835340 7 API calls 15437->15441 15437->15442 15444 7ff725834d00 3 API calls 15437->15444 15438->15432 15440 7ff725834400 2 API calls 15439->15440 15443 7ff72583408b 15440->15443 15441->15437 15490 7ff725834400 15442->15490 15443->15367 15444->15437 15446 7ff7258356f9 15445->15446 15447 7ff7258357f4 15445->15447 15448 7ff725835728 15446->15448 15449 7ff725835704 memmove 15446->15449 15463 7ff725829af0 ?_Xlength_error@std@@YAXPEBD 15447->15463 15452 7ff7258357f9 15448->15452 15453 7ff7258357a9 15448->15453 15454 7ff725835787 15448->15454 15451 7ff7258357e1 15449->15451 15451->15384 15455 7ff725829a50 Concurrency::cancel_current_task __std_exception_copy 15452->15455 15456 7ff725835794 memmove 15453->15456 15459 7ff725836874 4 API calls 15453->15459 15457 7ff725836874 4 API calls 15454->15457 15458 7ff7258357ff 15455->15458 15456->15451 15461 7ff72583578f 15457->15461 15459->15456 15461->15456 15462 7ff7258357a2 _invalid_parameter_noinfo_noreturn 15461->15462 15462->15453 15465 7ff7258345c0 15464->15465 15465->15465 15496 7ff7258358c0 15465->15496 15469 7ff72583537c 15468->15469 15470 7ff7258353a4 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 15469->15470 15472 7ff725835391 15469->15472 15470->15472 15471 7ff725835494 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 15474 7ff7258354ce 15471->15474 15475 7ff7258354c4 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 15471->15475 15472->15471 15473 7ff725835430 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 15472->15473 15476 7ff72583544e 15472->15476 15477 7ff72583542d 15472->15477 15478 7ff725835403 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 15472->15478 15473->15476 15474->15434 15475->15474 15479 7ff725835484 15476->15479 15480 7ff72583545e ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 15476->15480 15477->15473 15478->15472 15479->15471 15480->15476 15515 7ff725829870 _Query_perf_frequency _Query_perf_counter 15481->15515 15484 7ff725829870 2 API calls 15485 7ff725834d51 15484->15485 15486 7ff725834dab Sleep 15485->15486 15488 7ff725834dc4 15485->15488 15487 7ff725829870 2 API calls 15486->15487 15487->15485 15488->15434 15491 7ff72583406f 15490->15491 15493 7ff725834413 15490->15493 15491->15436 15492 7ff725834437 15495 7ff7258367fc free 15492->15495 15493->15492 15494 7ff725834458 _invalid_parameter_noinfo_noreturn 15493->15494 15495->15491 15497 7ff7258358f1 15496->15497 15498 7ff7258359c3 15496->15498 15499 7ff7258358f7 memmove 15497->15499 15502 7ff725835912 15497->15502 15514 7ff725829af0 ?_Xlength_error@std@@YAXPEBD 15498->15514 15501 7ff725833b8b 15499->15501 15501->15406 15503 7ff725835923 15502->15503 15504 7ff7258359c8 15502->15504 15505 7ff72583597a 15502->15505 15507 7ff725836874 4 API calls 15503->15507 15508 7ff725829a50 Concurrency::cancel_current_task __std_exception_copy 15504->15508 15506 7ff72583593e memmove 15505->15506 15510 7ff725836874 4 API calls 15505->15510 15506->15501 15512 7ff725835939 15507->15512 15509 7ff7258359ce 15508->15509 15510->15506 15512->15506 15513 7ff725835973 _invalid_parameter_noinfo_noreturn 15512->15513 15513->15505 15516 7ff725829898 15515->15516 15516->15484 17803 7ff7257f10e0 17804 7ff7257f1110 17803->17804 17804->17804 17805 7ff7258358c0 8 API calls 17804->17805 17806 7ff7257f1124 17805->17806 17813 7ff725834930 17806->17813 17808 7ff7257f1170 17810 7ff7257f116b 17811 7ff7258367fc free 17810->17811 17811->17808 17812 7ff7257f1164 _invalid_parameter_noinfo_noreturn 17812->17810 17814 7ff725834960 memmove memmove memmove 17813->17814 17815 7ff725834a03 17813->17815 17818 7ff7257f112f 17814->17818 17819 7ff725835ec0 17815->17819 17818->17808 17818->17810 17818->17812 17820 7ff725835ee9 17819->17820 17821 7ff725836024 17819->17821 17824 7ff725835f37 17820->17824 17827 7ff725835f44 17820->17827 17829 7ff725835f70 17820->17829 17839 7ff725829af0 ?_Xlength_error@std@@YAXPEBD 17821->17839 17823 7ff725836029 17826 7ff725829a50 Concurrency::cancel_current_task __std_exception_copy 17823->17826 17824->17823 17824->17827 17825 7ff725836874 4 API calls 17828 7ff725835f59 17825->17828 17831 7ff72583602f 17826->17831 17827->17825 17832 7ff725835feb _invalid_parameter_noinfo_noreturn 17828->17832 17833 7ff725835ff2 memmove memmove 17828->17833 17834 7ff725835fa5 memmove memmove 17828->17834 17829->17828 17830 7ff725836874 4 API calls 17829->17830 17830->17828 17832->17833 17837 7ff725835fe9 17833->17837 17835 7ff725835fc9 17834->17835 17836 7ff725835fde 17834->17836 17835->17832 17835->17836 17838 7ff7258367fc free 17836->17838 17837->17818 17838->17837 17840 7ff72582cef0 18069 7ff72582b940 17840->18069 17845 7ff72582b940 10 API calls 17846 7ff72582d065 17845->17846 17847 7ff72582bcf0 8 API calls 17846->17847 17848 7ff72582d077 17847->17848 17849 7ff72582b940 10 API calls 17848->17849 17850 7ff72582d095 17849->17850 17851 7ff72582bcf0 8 API calls 17850->17851 17852 7ff72582d0a7 17851->17852 17853 7ff72582d0c2 17852->17853 17854 7ff72582d2f3 17852->17854 17855 7ff72582b940 10 API calls 17853->17855 17856 7ff72582d54a 17854->17856 17857 7ff72582d2fc 17854->17857 17858 7ff72582d0d1 17855->17858 17860 7ff72582b940 10 API calls 17856->17860 18046 7ff72582d535 17856->18046 17859 7ff72582b940 10 API calls 17857->17859 17861 7ff72582bcf0 8 API calls 17858->17861 17862 7ff72582d30b 17859->17862 17863 7ff72582d562 17860->17863 17865 7ff72582d0e3 17861->17865 17866 7ff72582bcf0 8 API calls 17862->17866 17867 7ff72582bcf0 8 API calls 17863->17867 17869 7ff72582b940 10 API calls 17865->17869 17870 7ff72582d31d 17866->17870 17871 7ff72582d574 17867->17871 17868 7ff72582d84f 17872 7ff72582ba20 6 API calls 17868->17872 17873 7ff72582d0f9 17869->17873 17874 7ff72582b940 10 API calls 17870->17874 17875 7ff72582b940 10 API calls 17871->17875 17876 7ff72582d873 17872->17876 17877 7ff72582bcf0 8 API calls 17873->17877 17878 7ff72582d333 17874->17878 17879 7ff72582d58a 17875->17879 17880 7ff72582ba20 6 API calls 17876->17880 17881 7ff72582d10b 17877->17881 17882 7ff72582bcf0 8 API calls 17878->17882 17884 7ff72582bcf0 8 API calls 17879->17884 17885 7ff72582d899 17880->17885 17886 7ff72582b940 10 API calls 17881->17886 17883 7ff72582d345 17882->17883 17887 7ff72582b940 10 API calls 17883->17887 17888 7ff72582d59c 17884->17888 17889 7ff72582ba20 6 API calls 17885->17889 17890 7ff72582d122 17886->17890 17891 7ff72582d35c 17887->17891 17892 7ff72582b940 10 API calls 17888->17892 17893 7ff72582d8cc 17889->17893 17894 7ff72582bcf0 8 API calls 17890->17894 17896 7ff72582bcf0 8 API calls 17891->17896 17897 7ff72582d5b3 17892->17897 17898 7ff72582ba20 6 API calls 17893->17898 17895 7ff72582d134 17894->17895 17899 7ff72582b940 10 API calls 17895->17899 17900 7ff72582d36e 17896->17900 17901 7ff72582bcf0 8 API calls 17897->17901 17902 7ff72582d8f6 17898->17902 17903 7ff72582d14c 17899->17903 17904 7ff72582b940 10 API calls 17900->17904 17905 7ff72582d5c5 17901->17905 17906 7ff72582ba20 6 API calls 17902->17906 17908 7ff72582bcf0 8 API calls 17903->17908 17909 7ff72582d386 17904->17909 17910 7ff72582b940 10 API calls 17905->17910 17907 7ff72582d91a 17906->17907 17911 7ff72582ba20 6 API calls 17907->17911 17912 7ff72582d15e 17908->17912 17913 7ff72582bcf0 8 API calls 17909->17913 17914 7ff72582d5dd 17910->17914 17915 7ff72582d93e 17911->17915 17916 7ff72582b940 10 API calls 17912->17916 17917 7ff72582d398 17913->17917 17918 7ff72582bcf0 8 API calls 17914->17918 17919 7ff72582ba20 6 API calls 17915->17919 17920 7ff72582d176 17916->17920 17921 7ff72582b940 10 API calls 17917->17921 17922 7ff72582d5ef 17918->17922 17924 7ff72582d969 17919->17924 17925 7ff72582bcf0 8 API calls 17920->17925 17926 7ff72582d3b0 17921->17926 17923 7ff72582b940 10 API calls 17922->17923 17927 7ff72582d607 17923->17927 17928 7ff72582ba20 6 API calls 17924->17928 17929 7ff72582d188 17925->17929 17930 7ff72582bcf0 8 API calls 17926->17930 17931 7ff72582bcf0 8 API calls 17927->17931 17932 7ff72582d989 17928->17932 17933 7ff72582b940 10 API calls 17929->17933 17934 7ff72582d3c2 17930->17934 17935 7ff72582d619 17931->17935 17936 7ff72582ba20 6 API calls 17932->17936 17937 7ff72582d1a0 17933->17937 17938 7ff72582b940 10 API calls 17934->17938 17939 7ff72582b940 10 API calls 17935->17939 17940 7ff72582d9ae 17936->17940 17941 7ff72582bcf0 8 API calls 17937->17941 17942 7ff72582d3da 17938->17942 17943 7ff72582d631 17939->17943 17944 7ff72582ba20 6 API calls 17940->17944 17945 7ff72582d1b2 17941->17945 17946 7ff72582bcf0 8 API calls 17942->17946 17948 7ff72582bcf0 8 API calls 17943->17948 17949 7ff72582d9d0 17944->17949 17950 7ff72582b940 10 API calls 17945->17950 17947 7ff72582d3ec 17946->17947 17951 7ff72582b940 10 API calls 17947->17951 17952 7ff72582d643 17948->17952 17953 7ff72582ba20 6 API calls 17949->17953 17954 7ff72582d1ca 17950->17954 17955 7ff72582d404 17951->17955 17956 7ff72582b940 10 API calls 17952->17956 17957 7ff72582d9fb 17953->17957 17958 7ff72582bcf0 8 API calls 17954->17958 17960 7ff72582bcf0 8 API calls 17955->17960 17961 7ff72582d65b 17956->17961 17962 7ff72582ba20 6 API calls 17957->17962 17959 7ff72582d1dc 17958->17959 17963 7ff72582b940 10 API calls 17959->17963 17964 7ff72582d416 17960->17964 17965 7ff72582bcf0 8 API calls 17961->17965 17966 7ff72582da26 17962->17966 17967 7ff72582d1f9 17963->17967 17968 7ff72582b940 10 API calls 17964->17968 17969 7ff72582d66d 17965->17969 17970 7ff72582ba20 6 API calls 17966->17970 17972 7ff72582bcf0 8 API calls 17967->17972 17973 7ff72582d433 17968->17973 17974 7ff72582b940 10 API calls 17969->17974 17971 7ff72582da58 17970->17971 17975 7ff72582ba20 6 API calls 17971->17975 17976 7ff72582d20b 17972->17976 17977 7ff72582bcf0 8 API calls 17973->17977 17978 7ff72582d68a 17974->17978 17979 7ff72582da7f 17975->17979 17980 7ff72582b940 10 API calls 17976->17980 17981 7ff72582d445 17977->17981 17982 7ff72582bcf0 8 API calls 17978->17982 17983 7ff72582ba20 6 API calls 17979->17983 17984 7ff72582d225 17980->17984 17985 7ff72582b940 10 API calls 17981->17985 17986 7ff72582d69c 17982->17986 17988 7ff72582daa5 17983->17988 17989 7ff72582bcf0 8 API calls 17984->17989 17990 7ff72582d45f 17985->17990 17987 7ff72582b940 10 API calls 17986->17987 17991 7ff72582d6b6 17987->17991 17998 7ff72580f7d0 15 API calls 17988->17998 17992 7ff72582d237 17989->17992 17993 7ff72582bcf0 8 API calls 17990->17993 17994 7ff72582bcf0 8 API calls 17991->17994 17995 7ff72582b940 10 API calls 17992->17995 17996 7ff72582d471 17993->17996 17997 7ff72582d6c8 17994->17997 17999 7ff72582d256 17995->17999 18000 7ff72582b940 10 API calls 17996->18000 18001 7ff72582b940 10 API calls 17997->18001 18002 7ff72582db5e 17998->18002 18003 7ff72582bcf0 8 API calls 17999->18003 18004 7ff72582d490 18000->18004 18005 7ff72582d6e7 18001->18005 18013 7ff72580f7d0 15 API calls 18002->18013 18006 7ff72582d268 18003->18006 18007 7ff72582bcf0 8 API calls 18004->18007 18009 7ff72582bcf0 8 API calls 18005->18009 18010 7ff72582b940 10 API calls 18006->18010 18008 7ff72582d4a2 18007->18008 18011 7ff72582b940 10 API calls 18008->18011 18012 7ff72582d6f9 18009->18012 18014 7ff72582d287 18010->18014 18015 7ff72582d4c1 18011->18015 18016 7ff72582b940 10 API calls 18012->18016 18017 7ff72582dbfe 18013->18017 18018 7ff72582bcf0 8 API calls 18014->18018 18020 7ff72582bcf0 8 API calls 18015->18020 18021 7ff72582d718 18016->18021 18028 7ff72580f7d0 15 API calls 18017->18028 18019 7ff72582d299 18018->18019 18022 7ff72582b940 10 API calls 18019->18022 18023 7ff72582d4d3 18020->18023 18024 7ff72582bcf0 8 API calls 18021->18024 18025 7ff72582d2b8 18022->18025 18026 7ff72582b940 10 API calls 18023->18026 18027 7ff72582d72a 18024->18027 18030 7ff72582bcf0 8 API calls 18025->18030 18031 7ff72582d4f2 18026->18031 18032 7ff72582b940 10 API calls 18027->18032 18029 7ff72582dca7 18028->18029 18039 7ff72580f7d0 15 API calls 18029->18039 18033 7ff72582d2ca 18030->18033 18034 7ff72582bcf0 8 API calls 18031->18034 18035 7ff72582d749 18032->18035 18036 7ff72582b940 10 API calls 18033->18036 18037 7ff72582d504 18034->18037 18038 7ff72582bcf0 8 API calls 18035->18038 18040 7ff72582d2e9 18036->18040 18041 7ff72582b940 10 API calls 18037->18041 18042 7ff72582d75b 18038->18042 18044 7ff72582dd3b 18039->18044 18045 7ff72582bcf0 8 API calls 18040->18045 18041->18040 18043 7ff72582b940 10 API calls 18042->18043 18043->18046 18047 7ff72580f7d0 15 API calls 18044->18047 18045->18046 18084 7ff72582ba20 6 API calls 18046->18084 18048 7ff72582ddd5 18047->18048 18049 7ff72580f7d0 15 API calls 18048->18049 18050 7ff72582de63 18049->18050 18051 7ff72580f7d0 15 API calls 18050->18051 18052 7ff72582df08 18051->18052 18053 7ff72580f7d0 15 API calls 18052->18053 18054 7ff72582df9d 18053->18054 18055 7ff72580f7d0 15 API calls 18054->18055 18056 7ff72582e028 18055->18056 18057 7ff72580f7d0 15 API calls 18056->18057 18058 7ff72582e0bf 18057->18058 18059 7ff72580f7d0 15 API calls 18058->18059 18060 7ff72582e14b 18059->18060 18061 7ff72580f7d0 15 API calls 18060->18061 18062 7ff72582e1d6 18061->18062 18063 7ff72580f7d0 15 API calls 18062->18063 18064 7ff72582e266 18063->18064 18065 7ff72580f7d0 15 API calls 18064->18065 18066 7ff72582e2f1 18065->18066 18067 7ff72580f7d0 15 API calls 18066->18067 18068 7ff72582e374 18067->18068 18086 7ff7258345e0 18069->18086 18071 7ff72582b9a4 18072 7ff7258345e0 10 API calls 18071->18072 18073 7ff72582b9b2 18072->18073 18074 7ff7258345e0 10 API calls 18073->18074 18075 7ff72582b9c6 18074->18075 18076 7ff72582bcf0 18075->18076 18124 7ff725834de0 IsWindow 18076->18124 18078 7ff72582bd40 IsWindow 18079 7ff72582bd90 DeviceIoControl 18078->18079 18080 7ff72582bd86 exit 18078->18080 18081 7ff72582be1f 18079->18081 18080->18079 18127 7ff72582b830 18081->18127 18085 7ff72582bbbc 18084->18085 18085->17868 18087 7ff725834616 18086->18087 18088 7ff7258346ed 18087->18088 18093 7ff72583462c 18087->18093 18122 7ff725829af0 ?_Xlength_error@std@@YAXPEBD 18088->18122 18089 7ff725834632 18089->18071 18091 7ff725834656 18095 7ff725836874 4 API calls 18091->18095 18092 7ff7258346f2 18096 7ff725829a50 Concurrency::cancel_current_task __std_exception_copy 18092->18096 18093->18089 18093->18091 18093->18092 18094 7ff7258346b0 18093->18094 18097 7ff7258346ba memmove 18094->18097 18100 7ff725836874 4 API calls 18094->18100 18098 7ff72583466c 18095->18098 18099 7ff7258346f8 18096->18099 18097->18089 18101 7ff7258346a9 _invalid_parameter_noinfo_noreturn 18098->18101 18102 7ff725834674 18098->18102 18103 7ff725834724 memmove 18099->18103 18108 7ff725834745 18099->18108 18100->18097 18101->18094 18102->18097 18118 7ff725834830 18103->18118 18105 7ff725834855 18123 7ff725829af0 ?_Xlength_error@std@@YAXPEBD 18105->18123 18107 7ff72583485a 18112 7ff725829a50 Concurrency::cancel_current_task __std_exception_copy 18107->18112 18108->18105 18111 7ff7258347cd 18108->18111 18113 7ff725834794 18108->18113 18109 7ff725836874 4 API calls 18110 7ff7258347b6 18109->18110 18114 7ff72583484e _invalid_parameter_noinfo_noreturn 18110->18114 18117 7ff7258347e2 memmove 18110->18117 18111->18110 18115 7ff725836874 4 API calls 18111->18115 18116 7ff725834860 18112->18116 18113->18107 18113->18109 18114->18105 18115->18110 18117->18118 18119 7ff725834803 18117->18119 18118->18071 18119->18114 18120 7ff725834828 18119->18120 18121 7ff7258367fc free 18120->18121 18121->18118 18125 7ff725834e18 exit 18124->18125 18126 7ff725834e22 DeviceIoControl 18124->18126 18125->18126 18126->18078 18128 7ff72582b846 18127->18128 18132 7ff72582b87a 18127->18132 18130 7ff72582b933 _invalid_parameter_noinfo_noreturn 18128->18130 18131 7ff7258367fc free 18128->18131 18129 7ff72582b919 18129->17845 18131->18132 18132->18130 18133 7ff7258367fc free 18132->18133 18134 7ff72582b8ce 18132->18134 18133->18134 18134->18129 18134->18130 18135 7ff72582b911 18134->18135 18136 7ff7258367fc free 18135->18136 18136->18129 18688 7ff7258343e0 18689 7ff7258343f0 18688->18689 18689->18689 18690 7ff725834724 memmove 18689->18690 18695 7ff725834745 18689->18695 18705 7ff725834830 18690->18705 18692 7ff725834855 18709 7ff725829af0 ?_Xlength_error@std@@YAXPEBD 18692->18709 18694 7ff72583485a 18700 7ff725829a50 Concurrency::cancel_current_task __std_exception_copy 18694->18700 18695->18692 18696 7ff7258347cd 18695->18696 18697 7ff725834794 18695->18697 18699 7ff7258347b6 18696->18699 18702 7ff725836874 4 API calls 18696->18702 18697->18694 18698 7ff725836874 4 API calls 18697->18698 18698->18699 18701 7ff72583484e _invalid_parameter_noinfo_noreturn 18699->18701 18704 7ff7258347e2 memmove 18699->18704 18703 7ff725834860 18700->18703 18701->18692 18702->18699 18704->18705 18706 7ff725834803 18704->18706 18706->18701 18707 7ff725834828 18706->18707 18708 7ff7258367fc free 18707->18708 18708->18705 15293 7ff7257f1180 15296 7ff72582b000 15293->15296 15295 7ff7257f1189 15297 7ff72582b0d6 15296->15297 15298 7ff72582b046 15296->15298 15299 7ff72582b0e7 ?_Random_device@std@ 15297->15299 15300 7ff72582b110 15297->15300 15309 7ff725836474 AcquireSRWLockExclusive 15298->15309 15299->15300 15314 7ff725834460 15300->15314 15308 7ff72582b169 15308->15295 15310 7ff72583648a 15309->15310 15311 7ff72583648f ReleaseSRWLockExclusive 15310->15311 15313 7ff725836494 SleepConditionVariableSRW 15310->15313 15313->15310 15315 7ff725834495 15314->15315 15316 7ff725834586 15314->15316 15318 7ff7258344ac memset 15315->15318 15320 7ff7258344d4 15315->15320 15332 7ff725829af0 ?_Xlength_error@std@@YAXPEBD 15316->15332 15319 7ff72583456e 15318->15319 15319->15308 15321 7ff7258344e0 15320->15321 15322 7ff72583458b 15320->15322 15323 7ff725834537 15320->15323 15324 7ff725836874 4 API calls 15321->15324 15325 7ff725829a50 Concurrency::cancel_current_task __std_exception_copy 15322->15325 15326 7ff7258344fb memset 15323->15326 15329 7ff725836874 4 API calls 15323->15329 15327 7ff7258344f6 15324->15327 15328 7ff725834591 15325->15328 15326->15319 15327->15326 15331 7ff725834530 _invalid_parameter_noinfo_noreturn 15327->15331 15329->15326 15331->15323 18944 7ff725834190 18945 7ff7258341ac memmove 18944->18945 18946 7ff7258341ef 18944->18946 18950 7ff725835500 18946->18950 18951 7ff7258356bc 18950->18951 18955 7ff72583552e 18950->18955 18970 7ff725829af0 ?_Xlength_error@std@@YAXPEBD 18951->18970 18953 7ff725835559 18954 7ff7258356c1 18953->18954 18956 7ff7258355c8 18953->18956 18958 7ff725829a50 Concurrency::cancel_current_task __std_exception_copy 18954->18958 18955->18953 18955->18954 18960 7ff7258355e7 18955->18960 18957 7ff725836874 4 API calls 18956->18957 18959 7ff7258355d0 18957->18959 18961 7ff7258356c7 18958->18961 18962 7ff725835674 _invalid_parameter_noinfo_noreturn 18959->18962 18964 7ff72583567b memmove memmove 18959->18964 18965 7ff725835622 memmove memmove 18959->18965 18960->18959 18963 7ff725836874 4 API calls 18960->18963 18962->18964 18963->18959 18966 7ff725834202 18964->18966 18967 7ff725835667 18965->18967 18968 7ff725835652 18965->18968 18969 7ff7258367fc free 18967->18969 18968->18962 18968->18967 18969->18966 18426 7ff725834280 18427 7ff7258342b5 18426->18427 18428 7ff7258343a4 18427->18428 18432 7ff7258342cb 18427->18432 18443 7ff725829af0 ?_Xlength_error@std@@YAXPEBD 18428->18443 18429 7ff7258342d1 18431 7ff7258343a9 18433 7ff725829a50 Concurrency::cancel_current_task __std_exception_copy 18431->18433 18432->18429 18432->18431 18434 7ff725834364 18432->18434 18435 7ff72583433f 18432->18435 18437 7ff7258343af 18433->18437 18436 7ff72583436e memmove 18434->18436 18439 7ff725836874 4 API calls 18434->18439 18438 7ff725836874 4 API calls 18435->18438 18436->18429 18440 7ff725834347 18438->18440 18439->18436 18441 7ff72583435d _invalid_parameter_noinfo_noreturn 18440->18441 18442 7ff72583434f 18440->18442 18441->18434 18442->18436

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Sleep$Window$AllocAsyncConsoleCreateFileFindMessageShowStatesystem
                          • String ID: Open V4L0R4NT and Press F5 in Lobby..$BR: Se a overlay nao aparecer ou freezar.. Abra novamente o Valorant Plus para atualizar!$ConsoleWindowClass$VALORANT-Win64-Shipping.exe$WARNING$cls
                          • API String ID: 3156907467-1264740257
                          • Opcode ID: 851dd180a4fb86d398cec0d5cae248a78a59facbf0162c4da6377f3ed410247c
                          • Instruction ID: 823aa617417c5601fd29501dec49eeb5e979ccf53e5fc864d1ba9fcfadeaf1d5
                          • Opcode Fuzzy Hash: 851dd180a4fb86d398cec0d5cae248a78a59facbf0162c4da6377f3ed410247c
                          • Instruction Fuzzy Hash: B621C520A08A43A2EA10BF61EC591B9A265FF94F04FC04076D94E431B1DFBCA565CA20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@Window$?setstate@?$basic_ios@?uncaught_exception@std@@AllocAsyncConsoleFindMessageOsfx@?$basic_ostream@ShowSleepStatesystem
                          • String ID: Open V4L0R4NT and Press F5 in Lobby..$BR: Se a overlay nao aparecer ou freezar.. Abra novamente o Valorant Plus para atualizar!$ConsoleWindowClass$VALORANT-Win64-Shipping.exe$WARNING$cls
                          • API String ID: 3947835035-1264740257
                          • Opcode ID: 0f2b5671dc612fe58e2e59567f21a5b4665937db13cad5d97fa41acf74cc0bbe
                          • Instruction ID: 9bdfe08d32a0cc9ab0360f41e4064e83718d365b683c1f24662894508b3d4094
                          • Opcode Fuzzy Hash: 0f2b5671dc612fe58e2e59567f21a5b4665937db13cad5d97fa41acf74cc0bbe
                          • Instruction Fuzzy Hash: 69119224A08943A2FA14BF61EC591B8A261EF94F44FC14572D91E832B1DFBCE569CA30
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@Window$?setstate@?$basic_ios@?uncaught_exception@std@@AllocAsyncConsoleFindMessageOsfx@?$basic_ostream@ShowSleepStatesystem
                          • String ID: Open V4L0R4NT and Press F5 in Lobby..$BR: Se a overlay nao aparecer ou freezar.. Abra novamente o Valorant Plus para atualizar!$ConsoleWindowClass$VALORANT-Win64-Shipping.exe$WARNING$cls
                          • API String ID: 3947835035-1264740257
                          • Opcode ID: c9ee154cc69a6af5b94c7a7764e17bb8b2c22c4079e7b67912b6d860e4983b9c
                          • Instruction ID: 9bdfe08d32a0cc9ab0360f41e4064e83718d365b683c1f24662894508b3d4094
                          • Opcode Fuzzy Hash: c9ee154cc69a6af5b94c7a7764e17bb8b2c22c4079e7b67912b6d860e4983b9c
                          • Instruction Fuzzy Hash: 69119224A08943A2FA14BF61EC591B8A261EF94F44FC14572D91E832B1DFBCE569CA30
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                          • String ID:
                          • API String ID: 1133592946-0
                          • Opcode ID: c3187bb4b08aba025ff43725fd7a4df55c48c25b9f12eada5a1107f155774f80
                          • Instruction ID: 63d106b8dbb9bf9a2113eba359ccc3b4d650cde980953abc9ac4d6b917d47732
                          • Opcode Fuzzy Hash: c3187bb4b08aba025ff43725fd7a4df55c48c25b9f12eada5a1107f155774f80
                          • Instruction Fuzzy Hash: B3316C22A08142A1FB00BF2ADC113B9A691EF45F84FD44034DA4E472D7DEFDE9258E70
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 96 7ff725834a70-7ff725834a99 97 7ff725834aa0-7ff725834aa7 96->97 97->97 98 7ff725834aa9-7ff725834ab8 97->98 99 7ff725834aba-7ff725834abd 98->99 100 7ff725834ac4 98->100 99->100 101 7ff725834abf-7ff725834ac2 99->101 102 7ff725834ac6-7ff725834ad6 100->102 101->102 103 7ff725834ad8-7ff725834ade 102->103 104 7ff725834adf-7ff725834aeb 102->104 103->104 105 7ff725834aed-7ff725834aef 104->105 106 7ff725834af1-7ff725834af9 104->106 108 7ff725834b1c-7ff725834b22 105->108 109 7ff725834b1a 106->109 110 7ff725834afb-7ff725834afe 106->110 112 7ff725834b2e-7ff725834b3f 108->112 113 7ff725834b24-7ff725834b29 108->113 109->108 110->109 111 7ff725834b00-7ff725834b18 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ 110->111 111->108 115 7ff725834b6c-7ff725834b87 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 112->115 116 7ff725834b41-7ff725834b44 112->116 114 7ff725834bdd-7ff725834bfb ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 113->114 117 7ff725834c07-7ff725834c17 114->117 118 7ff725834bfd-7ff725834c06 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 114->118 120 7ff725834b89 115->120 121 7ff725834bb6 115->121 116->115 119 7ff725834b46-7ff725834b60 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 116->119 124 7ff725834c19-7ff725834c1f 117->124 125 7ff725834c20-7ff725834c34 117->125 118->117 126 7ff725834b67-7ff725834b6a 119->126 127 7ff725834b62-7ff725834b65 119->127 122 7ff725834b90-7ff725834b93 120->122 123 7ff725834bb9 121->123 128 7ff725834bbd-7ff725834bcd 122->128 129 7ff725834b95-7ff725834baf ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 122->129 123->128 124->125 126->116 127->123 128->114 129->121 130 7ff725834bb1-7ff725834bb4 129->130 130->122
                          APIs
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF725834104), ref: 00007FF725834B03
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF725834104), ref: 00007FF725834B57
                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,00007FF725834104), ref: 00007FF725834B7E
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF725834104), ref: 00007FF725834BA6
                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF725834104), ref: 00007FF725834BEC
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF725834104), ref: 00007FF725834BF3
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF725834104), ref: 00007FF725834C00
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                          • String ID:
                          • API String ID: 1492985063-0
                          • Opcode ID: ea4e65ff608239eaf6f194e3838368642b22e1e7e49dc36cda5a9e5d3bcc73db
                          • Instruction ID: 3fcc2f288c12310cbafbfb776467a88341261dc8403c9fc9155945a69080a772
                          • Opcode Fuzzy Hash: ea4e65ff608239eaf6f194e3838368642b22e1e7e49dc36cda5a9e5d3bcc73db
                          • Instruction Fuzzy Hash: 9251743260964191EB209F59E898338E7A0EB85F95F95C531CE5E437B0CFBED4568B10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 132 7ff725829af0-7ff725829b01 ?_Xlength_error@std@@YAXPEBD@Z
                          APIs
                          • ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF7258359C8,?,?,?,00007FF7257F1124), ref: 00007FF725829AFB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Xlength_error@std@@
                          • String ID: bugado.exe$bugado.sys$runas$string too long
                          • API String ID: 1004598685-637167626
                          • Opcode ID: f3167c0f0a00b8d65023d420fcc30cb801589142a364e1eb650c629c50f21d9a
                          • Instruction ID: 952b00572b4349a07d991db00cd23c52681145066bdfcebbf002e084e0e92709
                          • Opcode Fuzzy Hash: f3167c0f0a00b8d65023d420fcc30cb801589142a364e1eb650c629c50f21d9a
                          • Instruction Fuzzy Hash: 54B00220A15545F1E514FF15DC950645234EB54B55FD00435D50D915605E6C5576CB50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_taskMetricsSystem_invalid_parameter_noinfo_noreturnmalloc
                          • String ID:
                          • API String ID: 3795263346-0
                          • Opcode ID: 0aead9b5c721c736af0a6a840bf36e2827e88eb0625254b7d215d3d584e69765
                          • Instruction ID: bb12a286a41b4717f49e2058e3d39df99f501b43fa1dc484d37d08d1c38567fb
                          • Opcode Fuzzy Hash: 0aead9b5c721c736af0a6a840bf36e2827e88eb0625254b7d215d3d584e69765
                          • Instruction Fuzzy Hash: FD414D21F4AB4685EA14FFA5EC41178A2D0EF0DFA0FD40235C96D43BE4DEACE0618B20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • ?_Random_device@std@@YAIXZ.MSVCP140(?,?,?,?,?,00007FF7257F1189), ref: 00007FF72582B0F2
                            • Part of subcall function 00007FF725836474: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF72582B052,?,?,?,?,?,00007FF7257F1189), ref: 00007FF725836484
                            • Part of subcall function 00007FF725836874: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7257F1094), ref: 00007FF72583688E
                            • Part of subcall function 00007FF725836408: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF72582B0D6,?,?,?,?,?,00007FF7257F1189), ref: 00007FF725836418
                            • Part of subcall function 00007FF725836408: ReleaseSRWLockExclusive.KERNEL32(?,?,?,00007FF72582B0D6,?,?,?,?,?,00007FF7257F1189), ref: 00007FF725836458
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ExclusiveLock$Acquire$Random_device@std@@Releasemalloc
                          • String ID:
                          • API String ID: 1166360053-0
                          • Opcode ID: 7dda9ca11bc13e7847d9e161f85455b04ea8e112be199c7175721f2e87fc04dd
                          • Instruction ID: 8ad61178f2e6ce2ff739cb785a66da240993c444b8a94f1c18b243b5d14966eb
                          • Opcode Fuzzy Hash: 7dda9ca11bc13e7847d9e161f85455b04ea8e112be199c7175721f2e87fc04dd
                          • Instruction Fuzzy Hash: F071A232A0968286E704EF25ED51279B7A1FF49B44F944235CA4E87291DFBCE465CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 206 7ff72582a360-7ff72582a3a7 207 7ff72582a3b0-7ff72582a3bf 206->207 207->207 208 7ff72582a3c1-7ff72582a3f9 CreateFileW 207->208 209 7ff72582a407-7ff72582a40b 208->209 210 7ff72582a3fb-7ff72582a406 208->210
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 9285b5128434c80968dceaabb5c3f1d532285e032ccb3e5c142f71da5084b2ab
                          • Instruction ID: 7b93c439af6cd1e410febf92d3bcfb54fa46364fc64cb8a1663eb11f8ba50eb1
                          • Opcode Fuzzy Hash: 9285b5128434c80968dceaabb5c3f1d532285e032ccb3e5c142f71da5084b2ab
                          • Instruction Fuzzy Hash: 1F01E13A6157908BE710AF54E40925D7BA0F785B24FD40214D76A277A0C77EC252CF10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 214 7ff725832d90-7ff725832da2 215 7ff725832da9-7ff725832e86 GetClientRect QueryPerformanceCounter GetKeyState * 3 214->215 216 7ff725832da4 call 7ff725815430 214->216 218 7ff725832e88-7ff725832eb6 ClientToScreen SetCursorPos 215->218 219 7ff725832ebc-7ff725832ed6 GetActiveWindow 215->219 216->215 218->219 220 7ff725832f18-7ff725832f1f 219->220 221 7ff725832ed8-7ff725832ee5 GetCursorPos 219->221 223 7ff725832f28-7ff725832f2f 220->223 224 7ff725832f21-7ff725832f26 220->224 221->220 222 7ff725832ee7-7ff725832efb ScreenToClient 221->222 222->220 225 7ff725832efd-7ff725832f13 222->225 226 7ff725832f35-7ff725832f3b 223->226 224->226 225->220 227 7ff725832f48-7ff725832f5a call 7ff7257f6b80 GetAsyncKeyState 226->227 228 7ff725832f3d-7ff725832f43 call 7ff725815580 226->228 232 7ff725832f6e 227->232 233 7ff725832f5c-7ff725832f6c 227->233 228->227 234 7ff725832f75-7ff725832f83 call 7ff72582a570 232->234 233->234 237 7ff725832fae 234->237 238 7ff725832f85-7ff725832fa0 call 7ff7257fa340 234->238 240 7ff725832fb5-7ff725833043 call 7ff72582eff0 237->240 243 7ff725832fa7-7ff725832fac call 7ff7257fd260 238->243 244 7ff725832fa2 call 7ff72582ac00 238->244 254 7ff725833045-7ff72583306b call 7ff7257f8170 call 7ff725814b50 240->254 255 7ff725833074-7ff725833096 240->255 243->240 244->243 254->255 259 7ff72583309c-7ff7258330ae 255->259 260 7ff725833136-7ff725833140 255->260 259->260 264 7ff7258330b4-7ff7258330bb 259->264 265 7ff72583311a-7ff725833131 call 7ff725815430 264->265 266 7ff7258330bd-7ff7258330c7 264->266 265->260 267 7ff7258330c9-7ff7258330cf 266->267 268 7ff7258330d6-7ff7258330e0 266->268 267->268 270 7ff7258330e2-7ff7258330e8 268->270 271 7ff7258330ef-7ff725833100 268->271 270->271 274 7ff725833108-7ff725833116 271->274 275 7ff725833102 271->275 274->265 275->274
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: State$Client$CursorScreen$ActiveAsyncCounterPerformanceQueryRectWindowmemmove
                          • String ID: $333?$<"$AggroBot$Astra$Bot$BountyHunter$Breach$Brimstone$C:WindowsFontsCalibri.ttf$Cable$Chamber$Clay$Cypher$Deadeye$Deadlock$Deadlock$Gekko$Grenadier$Guide$Gumshoe$Harbor$Hunter_PC_C$Kay/O$Killjoy$Mage$Neon$None$Omen$Pandemic$Phoenix$Private Script$Raze$Reyna$Rift$Sarge$Sprinter$Stealth$Thorne$TrainingBot$Vampire$Viper$Wraith$Wushu$[ %.fm ]
                          • API String ID: 2031384599-2635236292
                          • Opcode ID: aeed4f906d71522da0908baff7fd5f8eb16c0e1059c737abc94525402b9b49ee
                          • Instruction ID: 897acff441504cb80d3a6f6d4a5df41e8d32a72af09f63db734ef3e3b588b6c8
                          • Opcode Fuzzy Hash: aeed4f906d71522da0908baff7fd5f8eb16c0e1059c737abc94525402b9b49ee
                          • Instruction Fuzzy Hash: 62B12B32A19A8696E710EF35EC40279B7A0FF89F84F844131DA4D476A1CFBDE465CB21
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 277 7ff725833b70-7ff725833bc0 call 7ff7258345a0 * 3 call 7ff72582a360 286 7ff725833bc2-7ff725833bcf system 277->286 287 7ff725833bd4-7ff725833c25 system * 2 call 7ff7258343d0 call 7ff7258343b0 277->287 288 7ff725833c9e-7ff725833cac call 7ff72582a410 286->288 299 7ff725833c34-7ff725833c41 287->299 294 7ff725833f97-7ff725833fe8 system * 2 call 7ff7258343d0 call 7ff7258343b0 288->294 295 7ff725833cb2-7ff725833cce 288->295 315 7ff725833ff7-7ff725834004 294->315 297 7ff725833cd0-7ff725833ce3 call 7ff725836474 295->297 298 7ff725833d15-7ff725833e27 GetProcessHeap HeapAlloc GetProcessHeap HeapReAlloc GetProcessHeap HeapReAlloc 295->298 297->298 309 7ff725833ce5-7ff725833d10 GetModuleHandleA GetProcAddress call 7ff725836408 297->309 319 7ff725833ec9-7ff725833f27 system call 7ff7258343d0 call 7ff7258343b0 298->319 320 7ff725833e2d-7ff725833e40 298->320 302 7ff725833c8b-7ff725833c98 Sleep exit 299->302 303 7ff725833c43-7ff725833c89 call 7ff725835340 call 7ff725834cf0 call 7ff725834d00 299->303 302->288 303->299 309->298 316 7ff72583404e-7ff725834061 Sleep exit 315->316 317 7ff725834006-7ff72583404c call 7ff725835340 call 7ff725834cf0 call 7ff725834d00 315->317 323 7ff725834062-7ff725834092 call 7ff725834400 * 3 316->323 317->315 345 7ff725833f36-7ff725833f43 319->345 321 7ff725833e4c-7ff725833e54 320->321 321->319 326 7ff725833e56-7ff725833e90 321->326 332 7ff725833e92-7ff725833e9f 326->332 333 7ff725833ec4 326->333 332->333 337 7ff725833ea1-7ff725833ea7 332->337 333->321 337->333 342 7ff725833ea9-7ff725833eb5 337->342 342->333 346 7ff725833eb7-7ff725833ebf 342->346 349 7ff725833f8d-7ff725833f92 call 7ff725833950 345->349 350 7ff725833f45-7ff725833f8b call 7ff725835340 call 7ff725834cf0 call 7ff725834d00 345->350 346->333 349->323 350->345
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Heapsystem$AllocProcess$Sleepexit$AddressCreateFileHandleModuleProc
                          • String ID: 2$2$2$2$*($:($?$ConT$NtQuerySystemInformation$Private Script$Private Script$VALORANT-Win64-Shipping.exe$[-] Driver Error. Restart Your Computer..$cls$color c$ntdll.dll
                          • API String ID: 1315585560-226998937
                          • Opcode ID: 8ef4994f394f6ac0cba7e61b40c5860b9973d16a0de5411edd625d31e09c9e1c
                          • Instruction ID: b41eedabe4db8b89633d1bd53822412dcd47fa1d79d54a09025fd623df0ed79f
                          • Opcode Fuzzy Hash: 8ef4994f394f6ac0cba7e61b40c5860b9973d16a0de5411edd625d31e09c9e1c
                          • Instruction Fuzzy Hash: DED10E3250DA8695EA60EF15F8443AAF3A0FB84B40F900135EA8E43BA5DFBCD565CF10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: ##ColorButton$##Text$##W$##X$##Y$##Z$##picker$#%02X%02X%02X$#%02X%02X%02X%02X$%0.3f$%02X%02X%02X$%02X%02X%02X%02X$%3d$A:%0.3f$A:%3d$B:%0.3f$B:%3d$G:%0.3f$G:%3d$H:%0.3f$H:%3d$M:0.000$M:000$R:%0.3f$R:%3d$S:%0.3f$S:%3d$V:%0.3f$V:%3d$_COL3F$_COL4F$picker
                          • API String ID: 0-595615364
                          • Opcode ID: 4ae867652407ff36cfa77cfda984b183e7003ad4facbbc15f9233da66fe65fe6
                          • Instruction ID: 3b90200de24188bc19765c2d0411b21afd617cc21b3845ab178a7b717569aa55
                          • Opcode Fuzzy Hash: 4ae867652407ff36cfa77cfda984b183e7003ad4facbbc15f9233da66fe65fe6
                          • Instruction Fuzzy Hash: FE82B232A18B858AE711DF26D8402F9F7A0FF59B44F944332DA4C536A9DF78E0A58F10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: cosfmemmovesinf$atan2ffreemallocmemcmp
                          • String ID: ##current$##hex$##hsv$##original$##rgb$Current$Original$alpha$hsv$hue
                          • API String ID: 141762661-1396814860
                          • Opcode ID: 6c723c5ad3708c166068bfdc829d59c0c7bd673ba0a4118511b47adf195c362e
                          • Instruction ID: 3e8d17b3c088ea7343a3441530cc2d0d7c7b18cf7fda1a9e96a5371459ae2d97
                          • Opcode Fuzzy Hash: 6c723c5ad3708c166068bfdc829d59c0c7bd673ba0a4118511b47adf195c362e
                          • Instruction Fuzzy Hash: 17030A32E14B8986E311DE3788411B9F760FF6E784F589722EE44766B5DB78B0A19F00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$memset
                          • String ID:
                          • API String ID: 1620901979-0
                          • Opcode ID: 49ee521f678a7fdf1028608e11429ee34c70b3994334c854cdf0c26ba8b51331
                          • Instruction ID: e2b9401e16f2bf7bc691746715432f4a7fb31755c801b9010c5ca417165d27e0
                          • Opcode Fuzzy Hash: 49ee521f678a7fdf1028608e11429ee34c70b3994334c854cdf0c26ba8b51331
                          • Instruction Fuzzy Hash: CBB2E232A047858AE754EF26E8407BDB7A0FB48F84F449236DE4A57794DF78E4A4CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemmovesqrtf
                          • String ID:
                          • API String ID: 2108133213-0
                          • Opcode ID: fddacb188991418583df7353fbd41f9969c4525992eebd235984d25f53a3e0a3
                          • Instruction ID: 0618e20870c6d3c4016be6709d276c026af4471f9ec1ee8bbca734724f0b2197
                          • Opcode Fuzzy Hash: fddacb188991418583df7353fbd41f9969c4525992eebd235984d25f53a3e0a3
                          • Instruction Fuzzy Hash: 5972AD13E28BE845D3139B36544227AA7D1EF6EB84F1DD722FD44A26B2DB3CE4518B10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ClipboardLock$Exclusive$AcquireCloseGlobalfree$DataOpenReleaseUnlockmallocmemmove
                          • String ID:
                          • API String ID: 4281195603-0
                          • Opcode ID: c629b6c38c3ed04116a5d93c5700eb0801db02279bb3a7913be814a7ae599146
                          • Instruction ID: 52ae4d502ae4a2bf30f94f905172cd581d33d22b1a8fcaf19e44531983cf47a1
                          • Opcode Fuzzy Hash: c629b6c38c3ed04116a5d93c5700eb0801db02279bb3a7913be814a7ae599146
                          • Instruction Fuzzy Hash: B2515C31E1DA0286EB54BF25EC50679A2E0EF48F81FD44135D99E477A0DEFCE5A18B20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fmodffreemallocmemmovestrncpy
                          • String ID: #SCROLLY
                          • API String ID: 3140659168-1064663049
                          • Opcode ID: f78ac07a314803901bf56fa351b9290d5f923cad6e6cb3c5d81f26fa20a51f1c
                          • Instruction ID: 67fb65629f8be1dcb7dde99110cc38e4b7a6047c7fdd6fecd47b407900822dc6
                          • Opcode Fuzzy Hash: f78ac07a314803901bf56fa351b9290d5f923cad6e6cb3c5d81f26fa20a51f1c
                          • Instruction Fuzzy Hash: 38733733E0968686E711AE3698403B9B7A0EF19B84F85A731DE4D67691DFB8F450CF10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: (%.3ff, %.3ff, %.3ff, %.3ff)$(%d,%d,%d,%d)$0..255$0.00..1.00$0x%02X%02X%02X$0x%02X%02X%02X%02X$Copy$HEX$HSV$RGB$context
                          • API String ID: 0-3068764630
                          • Opcode ID: 1f05e0131807f71ce9cb2c8d3de8fca25cee2f149b733ef8265400c29124e4f5
                          • Instruction ID: 91e6996a1e2872548ddf60d8896954fb0575b2d0f1c31fe47e7dd389d59d1d93
                          • Opcode Fuzzy Hash: 1f05e0131807f71ce9cb2c8d3de8fca25cee2f149b733ef8265400c29124e4f5
                          • Instruction Fuzzy Hash: 61B12632D186C242E620EF26A8403FAA351EF99B40F948332DA4D672A5EF7CD455CF20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 313767242-0
                          • Opcode ID: e13a130302212cf3c31a68f3b9d4d4c207aef9ca537039a68ac79f7ffd9fd17b
                          • Instruction ID: aae40df482cad84560ba477ffce09ecc189e22fd0ea86ab93e667f698468eaaa
                          • Opcode Fuzzy Hash: e13a130302212cf3c31a68f3b9d4d4c207aef9ca537039a68ac79f7ffd9fd17b
                          • Instruction Fuzzy Hash: F2315372604B8195EB60AF65E8903FD7364FB84B44F44443ADA4E47B94EFBCD558CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: sqrtf
                          • String ID:
                          • API String ID: 321154650-0
                          • Opcode ID: db6d56e9b95cda2c96d0dcd2988d5407ce8a5b877bba5a3fc8440e20077ac045
                          • Instruction ID: 19e5a4397cedeef085e6c71e367b5879aac55cc2dc5c80d07bd03158c7c8d198
                          • Opcode Fuzzy Hash: db6d56e9b95cda2c96d0dcd2988d5407ce8a5b877bba5a3fc8440e20077ac045
                          • Instruction Fuzzy Hash: EAB1A522E28BCC41E223AA3754821F5E250EF7F7C5F2DDB23FD84756B2AB6461D15A10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ClipboardGlobal$AllocCloseDataEmptyFreeLockOpenUnlock
                          • String ID:
                          • API String ID: 453615576-0
                          • Opcode ID: 75c3d5495a23fcc16b2952edc665c2ffec0825b35b98fab2fd0664649ad1b3cc
                          • Instruction ID: e63f7e902ac86eb1627d3ac144a199397ad8deaa7d079e8fbb4928c317ad8d98
                          • Opcode Fuzzy Hash: 75c3d5495a23fcc16b2952edc665c2ffec0825b35b98fab2fd0664649ad1b3cc
                          • Instruction Fuzzy Hash: 26318221A1CA4286EA20BF15EC5427AE3E0FF49F94F884531DE4E577A4DEBCE461CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: sqrtf
                          • String ID:
                          • API String ID: 321154650-0
                          • Opcode ID: 93feb957332540da03a289b80d6e79e3a6ec25620199289d93aeb76f5a3b56a7
                          • Instruction ID: 683e268a009756274b2929e2d9fae2babd96a5c4fd8d9d72e390f4e77054205a
                          • Opcode Fuzzy Hash: 93feb957332540da03a289b80d6e79e3a6ec25620199289d93aeb76f5a3b56a7
                          • Instruction Fuzzy Hash: 17924E33920B889AD712CF37C4810A9B7A0FF6DB84719D716EA4927761EB34F1A5DB00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: sqrtf
                          • String ID: (
                          • API String ID: 321154650-3887548279
                          • Opcode ID: 0e42f2ef0a12c85dfbdd18b851c832a13042b35b7c969f8bc351eaeb522b7173
                          • Instruction ID: 93bb13a8994e174008fe01f9dede6d70bb859218c9b34ee3d7541702c99022f5
                          • Opcode Fuzzy Hash: 0e42f2ef0a12c85dfbdd18b851c832a13042b35b7c969f8bc351eaeb522b7173
                          • Instruction Fuzzy Hash: 4302A433D24BC886D312DF3A94421ADB7A1FF6EB84B19D712EA4533665DB34B1A1DB00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32lstrcmpi
                          • String ID:
                          • API String ID: 3122021977-0
                          • Opcode ID: 74fb313f3834dca26190e467b8e3a4f91e94579d80462521eeb9ab80d5e4f230
                          • Instruction ID: b8fd1fa03deea127f869707b418f1c014ec227974decfe08970d9ef0773daf1e
                          • Opcode Fuzzy Hash: 74fb313f3834dca26190e467b8e3a4f91e94579d80462521eeb9ab80d5e4f230
                          • Instruction Fuzzy Hash: 4111FE21A0C64297EA20AF21FC9836AB7A0FF88F94F884130DD5D47654DEBCD559CF10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memset$malloc
                          • String ID:
                          • API String ID: 1671641884-0
                          • Opcode ID: 2304efacfb66030efa92118b162fd8c91160b8911844af8e0da4140438277a77
                          • Instruction ID: 05684028d1ec032ee068cfda99725b024887353ca126f7303f00a51931b65aaf
                          • Opcode Fuzzy Hash: 2304efacfb66030efa92118b162fd8c91160b8911844af8e0da4140438277a77
                          • Instruction Fuzzy Hash: AEF1F132908BC886D7229F36D4412A9F3A4FF98F84F58D332DA4867665DF38E195CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memchr
                          • String ID: %*s%.*s$ %.*s$#COLLAPSE
                          • API String ID: 3297308162-3042388618
                          • Opcode ID: 8ecba5b22682bc55eba7fd5183d0e39aa42485bfeb8d73b32063b864d12f01ed
                          • Instruction ID: f893f7ba10101cd65e12f2cb5f226cb7eef3859449ef6370c133496343189b4e
                          • Opcode Fuzzy Hash: 8ecba5b22682bc55eba7fd5183d0e39aa42485bfeb8d73b32063b864d12f01ed
                          • Instruction Fuzzy Hash: 9B72D432A18B859BE719DF3699402E9B3A0FF5D744F488735DB59676A1DB38B0A0CF00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: powf
                          • String ID:
                          • API String ID: 3445610689-0
                          • Opcode ID: 32f68d4f23e0ea9a0e35285ba80386010ded920abd405b2431b40f676bc14e6b
                          • Instruction ID: c5aedf21562dc0e73a0288226338d3b716b24e24900fb82828b44c325c6fe980
                          • Opcode Fuzzy Hash: 32f68d4f23e0ea9a0e35285ba80386010ded920abd405b2431b40f676bc14e6b
                          • Instruction Fuzzy Hash: C7E12922D187C946EE12AE3649062B8E750EF59FD0F5C8732DD0D766A1EFAC74918E20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: powf
                          • String ID:
                          • API String ID: 3445610689-0
                          • Opcode ID: 5eb19d377a5b4fc6bbe31d5ff74df7366d8e8f476b34fd5322c45523f07ac6c7
                          • Instruction ID: cf280c2f26f4f6c2d2564c4082372b230d20974cf23945f64de63664691945a7
                          • Opcode Fuzzy Hash: 5eb19d377a5b4fc6bbe31d5ff74df7366d8e8f476b34fd5322c45523f07ac6c7
                          • Instruction Fuzzy Hash: BDC11C22D087C986EA22BF3788051B5E750EF6DF94F5D8732DD48722A1DFB875918E20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: powf
                          • String ID:
                          • API String ID: 3445610689-0
                          • Opcode ID: e75d448b6089e15ed219ae4b06a159b59fdf6194989a8d32ee92472e4999567d
                          • Instruction ID: 8da551117ccbf9e671f5e0d73698d83e5147e481a8b1f9cd2006751658615f84
                          • Opcode Fuzzy Hash: e75d448b6089e15ed219ae4b06a159b59fdf6194989a8d32ee92472e4999567d
                          • Instruction Fuzzy Hash: 00C10D22D0CBCD46E713BE3648052F9E754EF6AB84F498332ED49761A1DF6875D28E20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: powf
                          • String ID:
                          • API String ID: 3445610689-0
                          • Opcode ID: 2a62d11f0253fd91c7ebeae8a049c76eae081bd281ec4fd7ce34070a07ba7336
                          • Instruction ID: 1b953dc85c7b6e9080f81555d00a90382a6e8e82b9ea8dcaf9fa7d805dfaab6a
                          • Opcode Fuzzy Hash: 2a62d11f0253fd91c7ebeae8a049c76eae081bd281ec4fd7ce34070a07ba7336
                          • Instruction Fuzzy Hash: AEB12B22D086C942E722AE3788411B9F790EF59F44F9D9732DD48F2265DFB879918F20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ceilffloorf
                          • String ID:
                          • API String ID: 300201839-0
                          • Opcode ID: ec08f01372ff2b6156a78224279b82304fe471b6beda03a9781318a68798c0ba
                          • Instruction ID: 083ff63990f5a333996a8d5eafdd553b2d8e03e8ff901310e662200dd6b41be6
                          • Opcode Fuzzy Hash: ec08f01372ff2b6156a78224279b82304fe471b6beda03a9781318a68798c0ba
                          • Instruction Fuzzy Hash: 30A11533A186D486D325DF36A0416AEBBE1FB9D781F058326FAC867615EB3CD5908F10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: c118f615d7e4324cea1baf1ea6d6862d0f9c0868f9f4a5a8e662f3125cd93aa8
                          • Instruction ID: 9df84cde9d32d2000167bfb25d8ce14e616a52008d0ba3aa54fc65c541d01230
                          • Opcode Fuzzy Hash: c118f615d7e4324cea1baf1ea6d6862d0f9c0868f9f4a5a8e662f3125cd93aa8
                          • Instruction Fuzzy Hash: 17111C26B15B018AEB00AF60EC542A873A4F759B68F840A31DE6D877A4EFBCD1658750
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: floorf
                          • String ID:
                          • API String ID: 2864407545-0
                          • Opcode ID: 132935ed6feb203989319a6457cc423e8e5ce13b9ec1052478f3c63450df463f
                          • Instruction ID: 4b0c32cf012ceef96be8e6bba4ecfb707f240789eaca8bfef6f8c991ffedda20
                          • Opcode Fuzzy Hash: 132935ed6feb203989319a6457cc423e8e5ce13b9ec1052478f3c63450df463f
                          • Instruction Fuzzy Hash: 34022332A186D486D321CF35A4417BAF7A0FF9D785F158326EB8893A55EB3CE590CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocmemmove
                          • String ID: ( )$(x)
                          • API String ID: 2537350866-370779237
                          • Opcode ID: b1119f696214d8ba7f90e4ee1f65465eada2cf94fb5f2e8ac11ef52d2bee0a01
                          • Instruction ID: 4df5f2d5f7fb3b0dc9cbaa1721d9c986b15aa9d42a2c595769f4788d3a5d1fcc
                          • Opcode Fuzzy Hash: b1119f696214d8ba7f90e4ee1f65465eada2cf94fb5f2e8ac11ef52d2bee0a01
                          • Instruction Fuzzy Hash: 2F12E833914B8586E302EF3698412BAF350FF5AB94F589731EE58561A5EF78E094CF00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: #SCROLLX$#SCROLLY
                          • API String ID: 0-350977493
                          • Opcode ID: 3a2ae1fc35a0c6b3663d58866bedec34cd2ff3f5de896a73a96108c1447e6ee8
                          • Instruction ID: 56d0e0b3e9f75e6f20663e9352b967fb41de348687e98405e6ae50f13cc1ce04
                          • Opcode Fuzzy Hash: 3a2ae1fc35a0c6b3663d58866bedec34cd2ff3f5de896a73a96108c1447e6ee8
                          • Instruction Fuzzy Hash: CF120833D18BCD85E212DA3784421B9F350EF7E784F18EB26FE45755A2DB65B0A18B10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: VUUU$VUUU
                          • API String ID: 0-3149182767
                          • Opcode ID: 77fe9609ecf96d010ca7fe66fbe2b1cb7a2d5a82249d9e7db7ce310d1313f0df
                          • Instruction ID: 6674982d3d916944c37c2e397288a2f36c7a550914d4ecec18e1e593f22a6e3e
                          • Opcode Fuzzy Hash: 77fe9609ecf96d010ca7fe66fbe2b1cb7a2d5a82249d9e7db7ce310d1313f0df
                          • Instruction Fuzzy Hash: 57C1B833E10B889AE301CF3AD4415F9B7A1FF6A7C4754A322FA48736A5DF649261DB40
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID:
                          • API String ID: 3061335427-0
                          • Opcode ID: 0597a6ec58ed58cb5a0342289e735cd12eaeefe31cfe579b4eba10ff15c6e56a
                          • Instruction ID: 636b766119796e4920a1b51dc283756b1e9f109dc8cadf4bd1fff4d24a9592ed
                          • Opcode Fuzzy Hash: 0597a6ec58ed58cb5a0342289e735cd12eaeefe31cfe579b4eba10ff15c6e56a
                          • Instruction Fuzzy Hash: 3391F132A1468586EB12DF3AD8017B9B7A0FF9AB85F45C321DE4963652EF78E051CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: %.*s
                          • API String ID: 0-572262228
                          • Opcode ID: 33a06cb920a39f5a557a12a0f0f166561f8347c84cec613d82a699375ccd5b91
                          • Instruction ID: dfa1a543186f31df886081de52c999a2862fb77591eacab062aa6d1783ec3c66
                          • Opcode Fuzzy Hash: 33a06cb920a39f5a557a12a0f0f166561f8347c84cec613d82a699375ccd5b91
                          • Instruction Fuzzy Hash: 1D521533A086C587D711DF3698402B9BBA0FF59B58F988335DA4893694DF78E8A1CF50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocmemchrmemmove
                          • String ID: ##Combo_%02d
                          • API String ID: 837623554-4250768120
                          • Opcode ID: 51b8da0754e16ca6ed49bf9c87b0fd8769c69bdc800e2bfdbb1ec51f5f5386f6
                          • Instruction ID: e5b7b528807090d2b7b710165b1314c21aa4f0846cd00d843d94e8417f76c214
                          • Opcode Fuzzy Hash: 51b8da0754e16ca6ed49bf9c87b0fd8769c69bdc800e2bfdbb1ec51f5f5386f6
                          • Instruction Fuzzy Hash: 8C420432918B858AD711EF3698401E9F360FF9AB84F58D331EA49276A5DF78E094DF10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memmove
                          • String ID:
                          • API String ID: 2162964266-0
                          • Opcode ID: 4f7b991185b24b0044dabcd9d2ac8435f03da6b8d3c902986f39145ea064c1be
                          • Instruction ID: 45ea276a15b7473466b224455ca267504f4d60c351cfbb3e5207fbd2bc8c87ff
                          • Opcode Fuzzy Hash: 4f7b991185b24b0044dabcd9d2ac8435f03da6b8d3c902986f39145ea064c1be
                          • Instruction Fuzzy Hash: 6C424C72A05A8586EB10DF26D8806ADB7B0FF88F88F958232CE4D57724CF79D595CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          • ..- -XXXXXXX- X - X -XXXXXXX - XXXXXXX- XX ..- -X.....X- X.X - X.X -X.....X - X.....X- X..X --- -XXX.XXX- X...X - X..., xrefs: 00007FF7258128A9
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: ..- -XXXXXXX- X - X -XXXXXXX - XXXXXXX- XX ..- -X.....X- X.X - X.X -X.....X - X.....X- X..X --- -XXX.XXX- X...X - X...
                          • API String ID: 0-3803095028
                          • Opcode ID: 8a98b12613531deda3b84b58c7e419c2258ca7ce1f358669c1412f3d1e814cf7
                          • Instruction ID: a7d442d3fc0afa2ca4216e1f801d106cb39c31f8b00a6b4383dffe53180b668e
                          • Opcode Fuzzy Hash: 8a98b12613531deda3b84b58c7e419c2258ca7ce1f358669c1412f3d1e814cf7
                          • Instruction Fuzzy Hash: A4D101733046C886C750CF29DCC5A38BBA6F754B41B4AC566DF89823A1EB7EC45AD320
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ControlDevice
                          • String ID:
                          • API String ID: 2352790924-0
                          • Opcode ID: 5e436c7c618ddcfe97ff41b77af070d133200f19ece2451dcbd7cd84b46f0d70
                          • Instruction ID: f69ebf8d36af5672cbeaddc64ab8f806866f44779b88c5ea3ee77e8907c78e4a
                          • Opcode Fuzzy Hash: 5e436c7c618ddcfe97ff41b77af070d133200f19ece2451dcbd7cd84b46f0d70
                          • Instruction Fuzzy Hash: 13011736619B8087D310CF69F98426DBBB0FB8CB94F244129EB8883B14CB38D465CB04
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: cbbaf6f8103f988b8a2f8752187f6acc28d0778a0d3fe7ff94d03d80fdf94d1d
                          • Instruction ID: 9f3b377b5ab6901c1efc8a29abe9bafae50939604ea2d7506eb875b8bd474e4e
                          • Opcode Fuzzy Hash: cbbaf6f8103f988b8a2f8752187f6acc28d0778a0d3fe7ff94d03d80fdf94d1d
                          • Instruction Fuzzy Hash: AB6168A362C2E243E3561F3CA85127DEED0F789749F5C8234FA8AD2B45D97CD9248B10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: d135fd24004c43d1fb0230425f54a06654401e16d90db16fab0938014d8dc6ce
                          • Instruction ID: 21c763602625313cf4b17e042888413d5899e943f7be6378c2cbb8f2ef230c02
                          • Opcode Fuzzy Hash: d135fd24004c43d1fb0230425f54a06654401e16d90db16fab0938014d8dc6ce
                          • Instruction Fuzzy Hash: D8614673B1C2E086C3258F38E805A7DEFE4E799749F598235DA8CC3A44EA6ED410CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5b2594f820eb28785e23387fe864b4c02fcd850b120597eeb9d51f46ad65e422
                          • Instruction ID: 0ea49d957bfecf82f1a5e801712ae5f16c7e79160aa587af246ab399ac9e8a74
                          • Opcode Fuzzy Hash: 5b2594f820eb28785e23387fe864b4c02fcd850b120597eeb9d51f46ad65e422
                          • Instruction Fuzzy Hash: 6612B732E0868596E759AE3689412B9F3D0FF19B90F888635DB1D23291DFB8F475CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 550d7f578fa8efb45d7f98265d205a47acfded40ff4a96133db6c246f7fdd91b
                          • Instruction ID: 5341e378836d8bc68335f300558d99d1e1e264b431e7a272bd10fa59de262bf4
                          • Opcode Fuzzy Hash: 550d7f578fa8efb45d7f98265d205a47acfded40ff4a96133db6c246f7fdd91b
                          • Instruction Fuzzy Hash: E5F11A33D28BCD45E222AA3358420B5F290EFBF7D4F5DD722FD44365B2DB6861A19A10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f21849b542d8a0108faffead637cc1a935a3f276cdb88bf78b4e29129fabc95a
                          • Instruction ID: 2c2342a2bf6463cc60a1102077d5b6560cc9a5ae550bb698f337610550eda8ff
                          • Opcode Fuzzy Hash: f21849b542d8a0108faffead637cc1a935a3f276cdb88bf78b4e29129fabc95a
                          • Instruction Fuzzy Hash: E2E1A733C4968D85E662FE3748420B8F390EF6EB45F59DB22E948322B1DF2971959F10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 76961cf7cffd913bb521c43d859a2335e75f083cfe3d3ab8d471a8f6c6ff1668
                          • Instruction ID: 95ee839d3e90b647534d5183010f28b893d6097d924c46457b42264f5b3f2af1
                          • Opcode Fuzzy Hash: 76961cf7cffd913bb521c43d859a2335e75f083cfe3d3ab8d471a8f6c6ff1668
                          • Instruction Fuzzy Hash: DBA1C573D0A24A46E75BAD775C423B8A6C0EF2AB94F9CDB36DD0832491DB6970A44F10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 52bfadc6915836f72785b6658091fa76f3fedbd38edd15623934350950cd77d3
                          • Instruction ID: a8317bca81c2d98615dd14f5386fd3deb8f040facc15c00a3bd91dd8b407c6a4
                          • Opcode Fuzzy Hash: 52bfadc6915836f72785b6658091fa76f3fedbd38edd15623934350950cd77d3
                          • Instruction Fuzzy Hash: 70A1FE32A18AD48EE701DF7A84412BCBBB0FB59749F119324DE4533AA5DB786091CF10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 512c292fdddac8fadd8bee25fcce6216da02647fedf7223a0dbb6b8c96daeb65
                          • Instruction ID: 3350b3fd5268165f38e93f62d6810d563dc4b4e23492a6b989eea2332d87af0e
                          • Opcode Fuzzy Hash: 512c292fdddac8fadd8bee25fcce6216da02647fedf7223a0dbb6b8c96daeb65
                          • Instruction Fuzzy Hash: 285117A6B244B147DA109F2AD8816BC77D0E346B43FD48476D65882F91C22DD51ADF30
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 093c0c678c141f69f859ee4ef7a97c1dc76639bf51f05c946f3d20ac964eea79
                          • Instruction ID: c8182bb51b9872a6ac867f3661d91dd510a7fd4b2a555937be762aa956424e21
                          • Opcode Fuzzy Hash: 093c0c678c141f69f859ee4ef7a97c1dc76639bf51f05c946f3d20ac964eea79
                          • Instruction Fuzzy Hash: 9241E321A1D35982ED22A923594017DE652EFBAF80F98D732ED4C23B84DF78F4918B00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d406a45ebeab2dfcb8c903a12aa031135c655f79b932f30f18ed0330c4a30bac
                          • Instruction ID: 5fde2e12a29efb3e057783fb8cb6f8f36104f1d6776de7066628519585306cf1
                          • Opcode Fuzzy Hash: d406a45ebeab2dfcb8c903a12aa031135c655f79b932f30f18ed0330c4a30bac
                          • Instruction Fuzzy Hash: C041A433B1154087E78CCE3EC812AAE33A2F398704F95C23DEA0A83385DA399915CB44
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 091be399d95281020affa886c1377be96a6907edf27ad6ee2b04243e67ba980f
                          • Instruction ID: 9e6c1e2561c8a52542e5cf9526fe7db943f1ac497e96affd8b23ecc437e46e9f
                          • Opcode Fuzzy Hash: 091be399d95281020affa886c1377be96a6907edf27ad6ee2b04243e67ba980f
                          • Instruction Fuzzy Hash: 1C313637774A5643EB48CA34ED22B7866D1E359700FC9A139EE5AC66C2DB2CC0108B00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f26d8b1ed958d255f5b50142b9c7250c8a25a72d51ba9b926ad44f182f9a5740
                          • Instruction ID: 27494bbbfdac9d2333be27a37eb1e55fe3b43e6f931a6aa3069775592c99debc
                          • Opcode Fuzzy Hash: f26d8b1ed958d255f5b50142b9c7250c8a25a72d51ba9b926ad44f182f9a5740
                          • Instruction Fuzzy Hash: 52A00121918812F4E644AF46EC55024A321FB50B01B940831D45D520A0AEFDA428CA20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 933 7ff7257f7420-7ff7257f743c 934 7ff7257f7476-7ff7257f7482 933->934 935 7ff7257f743e-7ff7257f7442 933->935 936 7ff7257f7964-7ff7257f7973 934->936 937 7ff7257f7488-7ff7257f748f 934->937 935->934 938 7ff7257f7444-7ff7257f7451 935->938 939 7ff7257f74b4-7ff7257f74c1 937->939 940 7ff7257f7491-7ff7257f7498 937->940 938->934 941 7ff7257f7453-7ff7257f7465 call 7ff725810730 938->941 943 7ff7257f74c3-7ff7257f74c6 939->943 944 7ff7257f74ee-7ff7257f74f8 939->944 940->939 942 7ff7257f749a-7ff7257f74a1 940->942 951 7ff7257f746d-7ff7257f7470 free 941->951 952 7ff7257f7467 941->952 946 7ff7257f74a8 call 7ff725803800 942->946 947 7ff7257f74d0-7ff7257f74ec call 7ff725804c50 943->947 948 7ff7257f7520-7ff7257f752a 944->948 949 7ff7257f74fa-7ff7257f750b 944->949 955 7ff7257f74ad 946->955 947->944 953 7ff7257f7552-7ff7257f755c 948->953 954 7ff7257f752c-7ff7257f753d 948->954 957 7ff7257f7513-7ff7257f7519 free 949->957 958 7ff7257f750d 949->958 951->934 952->951 961 7ff7257f7584-7ff7257f7595 953->961 962 7ff7257f755e-7ff7257f756f 953->962 959 7ff7257f7545-7ff7257f754b free 954->959 960 7ff7257f753f 954->960 955->939 957->948 958->957 959->953 960->959 966 7ff7257f75bd-7ff7257f75c7 961->966 967 7ff7257f7597-7ff7257f75a8 961->967 964 7ff7257f7571 962->964 965 7ff7257f7577-7ff7257f757d free 962->965 964->965 965->961 970 7ff7257f75ef-7ff7257f7623 966->970 971 7ff7257f75c9-7ff7257f75da 966->971 968 7ff7257f75b0-7ff7257f75b6 free 967->968 969 7ff7257f75aa 967->969 968->966 969->968 972 7ff7257f7625-7ff7257f7636 970->972 973 7ff7257f764b-7ff7257f7655 970->973 974 7ff7257f75e2-7ff7257f75e8 free 971->974 975 7ff7257f75dc 971->975 976 7ff7257f763e-7ff7257f7644 free 972->976 977 7ff7257f7638 972->977 978 7ff7257f767d-7ff7257f7687 973->978 979 7ff7257f7657-7ff7257f7668 973->979 974->970 975->974 976->973 977->976 982 7ff7257f76af-7ff7257f76b9 978->982 983 7ff7257f7689-7ff7257f769a 978->983 980 7ff7257f7670-7ff7257f7676 free 979->980 981 7ff7257f766a 979->981 980->978 981->980 986 7ff7257f76e1-7ff7257f76eb 982->986 987 7ff7257f76bb-7ff7257f76cc 982->987 984 7ff7257f76a2-7ff7257f76a8 free 983->984 985 7ff7257f769c 983->985 984->982 985->984 988 7ff7257f7713-7ff7257f771d 986->988 989 7ff7257f76ed-7ff7257f76fe 986->989 990 7ff7257f76d4-7ff7257f76da free 987->990 991 7ff7257f76ce 987->991 994 7ff7257f7745-7ff7257f774f 988->994 995 7ff7257f771f-7ff7257f7730 988->995 992 7ff7257f7706-7ff7257f770c free 989->992 993 7ff7257f7700 989->993 990->986 991->990 992->988 993->992 998 7ff7257f7751-7ff7257f7762 994->998 999 7ff7257f7777-7ff7257f778d call 7ff72580d080 994->999 996 7ff7257f7732 995->996 997 7ff7257f7738-7ff7257f773e free 995->997 996->997 997->994 1000 7ff7257f7764 998->1000 1001 7ff7257f776a-7ff7257f7770 free 998->1001 1004 7ff7257f77b5-7ff7257f77bf 999->1004 1005 7ff7257f778f-7ff7257f77a0 999->1005 1000->1001 1001->999 1008 7ff7257f77c1-7ff7257f77d2 1004->1008 1009 7ff7257f77e7-7ff7257f77f1 1004->1009 1006 7ff7257f77a2 1005->1006 1007 7ff7257f77a8-7ff7257f77ae free 1005->1007 1006->1007 1007->1004 1010 7ff7257f77d4 1008->1010 1011 7ff7257f77da-7ff7257f77e0 free 1008->1011 1012 7ff7257f77f3-7ff7257f7804 1009->1012 1013 7ff7257f7819-7ff7257f7823 1009->1013 1010->1011 1011->1009 1014 7ff7257f7806 1012->1014 1015 7ff7257f780c-7ff7257f7812 free 1012->1015 1016 7ff7257f7825-7ff7257f7836 1013->1016 1017 7ff7257f784b-7ff7257f7853 1013->1017 1014->1015 1015->1013 1020 7ff7257f783e-7ff7257f7844 free 1016->1020 1021 7ff7257f7838 1016->1021 1018 7ff7257f7855-7ff7257f7858 1017->1018 1019 7ff7257f7896-7ff7257f78a5 1017->1019 1022 7ff7257f7860-7ff7257f786e 1018->1022 1023 7ff7257f78cd-7ff7257f78d7 1019->1023 1024 7ff7257f78a7-7ff7257f78b8 1019->1024 1020->1017 1021->1020 1025 7ff7257f7870-7ff7257f787a 1022->1025 1026 7ff7257f7888-7ff7257f7894 1022->1026 1029 7ff7257f78ff-7ff7257f7906 1023->1029 1030 7ff7257f78d9-7ff7257f78ea 1023->1030 1027 7ff7257f78c0-7ff7257f78c6 free 1024->1027 1028 7ff7257f78ba 1024->1028 1031 7ff7257f7882 free 1025->1031 1032 7ff7257f787c 1025->1032 1026->1019 1026->1022 1027->1023 1028->1027 1035 7ff7257f792f-7ff7257f7939 1029->1035 1036 7ff7257f7908-7ff7257f791d __acrt_iob_func 1029->1036 1033 7ff7257f78f2-7ff7257f78f8 free 1030->1033 1034 7ff7257f78ec 1030->1034 1031->1026 1032->1031 1033->1029 1034->1033 1038 7ff7257f7961 1035->1038 1039 7ff7257f793b-7ff7257f794c 1035->1039 1036->1035 1037 7ff7257f791f-7ff7257f7928 fclose 1036->1037 1037->1035 1038->936 1040 7ff7257f7954-7ff7257f795a free 1039->1040 1041 7ff7257f794e 1039->1041 1040->1038 1041->1040
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$__acrt_iob_funcfclose
                          • String ID:
                          • API String ID: 3697265371-0
                          • Opcode ID: 43ec6e63a853d254b7b4aff2c9c062fccf9c698fb2bc5de468a399685ae43d26
                          • Instruction ID: e224f6c3308458a7c9b07e6eef6c1e5ba70744052d05ec1ae35bff3c01795d12
                          • Opcode Fuzzy Hash: 43ec6e63a853d254b7b4aff2c9c062fccf9c698fb2bc5de468a399685ae43d26
                          • Instruction Fuzzy Hash: D1E1B435B4AB819AEA59EF61E9506B9B3A4FF48F80F881135DA5D43350CF78B470CB60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 19660c5b489cd096f097490d703b0e605f09ba65900ec6d3a909f0ef045690e4
                          • Instruction ID: 56942e867eaaabb6ef96cb1e9b58111cbbf660b7ce6394e8944dd95823f31337
                          • Opcode Fuzzy Hash: 19660c5b489cd096f097490d703b0e605f09ba65900ec6d3a909f0ef045690e4
                          • Instruction Fuzzy Hash: E2B1E431A0B64289FF55AF61DC50AB9A2E4FF45F81F885439DD0D472A0CFADA924CB70
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$Message$Client$AsyncCursorDispatchForegroundPeekRectScreenStateTranslatefree
                          • String ID:
                          • API String ID: 1463819654-0
                          • Opcode ID: a56c3874527efeb2de7a250c9825dd2426064401e171e679e3a9e71128564070
                          • Instruction ID: 262d612f29f1f62a381351021040c3dd024ab1c3afab0974e253985b8694c3d4
                          • Opcode Fuzzy Hash: a56c3874527efeb2de7a250c9825dd2426064401e171e679e3a9e71128564070
                          • Instruction Fuzzy Hash: 43A11331A1AA4296EB51AF35EC40179B7E0FF99F84F884235D94D43664DFBDA4A0CF20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fclose$fseekmalloc$freadfreeftell
                          • String ID: %s, %.0fpx
                          • API String ID: 3453272378-112515932
                          • Opcode ID: 9ca4947cfa8ba13f6af44724934afc32011fd36ca3fa7351e5989f059c92cda5
                          • Instruction ID: a8157f03e252b86bed4b908062212a8fe689840693e5c8732f86f9e48f5e4f01
                          • Opcode Fuzzy Hash: 9ca4947cfa8ba13f6af44724934afc32011fd36ca3fa7351e5989f059c92cda5
                          • Instruction Fuzzy Hash: 8991C521D08AC085F7129F69AC012F9B3B4FF98B59F44A324EF8913664EF79D295CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CreatePerformanceQueryThread$ClassCounterCreate9Direct3FrequencyUnregister
                          • String ID: $Private Script$imgui_impl_dx9$imgui_impl_win32
                          • API String ID: 1602193124-1029701554
                          • Opcode ID: f4c6d41233951808160fe26b78f58b500ef76acde7880c0ae152761ad606fa5f
                          • Instruction ID: 673fe7234fc9b71a7793bcd6d71b9e0c244e022c798066cbca9c384b25db8773
                          • Opcode Fuzzy Hash: f4c6d41233951808160fe26b78f58b500ef76acde7880c0ae152761ad606fa5f
                          • Instruction Fuzzy Hash: DE71B471A09B4296E750AF61ED44269BBE0FB88F84F858135CA4D47764DFBDA068CF20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Sleep$ControlDeviceWindowexitfseekmalloc$fclosefreadfreeftell
                          • String ID: C:\Windows\Fonts\tahoma.ttf
                          • API String ID: 1017462924-1519395923
                          • Opcode ID: c7fec5a8a563a6466874f5cc60e09391b11d4392dd0a5c4f19accd3ad67db567
                          • Instruction ID: 1a76d32e116a822e12caa426cafcc9d927ab7e9ac7e01a557eb1bfdc0dd9690b
                          • Opcode Fuzzy Hash: c7fec5a8a563a6466874f5cc60e09391b11d4392dd0a5c4f19accd3ad67db567
                          • Instruction Fuzzy Hash: 85227031A09B8286E711EF65EC503B9B7E0FF48B48F844635DA4D577A5DFBCA1608B20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$FindLongMoveRectSleep
                          • String ID: 2$*($:($?$LM
                          • API String ID: 2523682760-3119022787
                          • Opcode ID: 2f22dbca51cf78f6df468f2e333d91f5735e6a1a29b4bc314ff1357fd56a9cc4
                          • Instruction ID: d92e8345cc3813fcfe2df7829dcbc66e1de472e1dc96a3461fb56ec6141faa4a
                          • Opcode Fuzzy Hash: 2f22dbca51cf78f6df468f2e333d91f5735e6a1a29b4bc314ff1357fd56a9cc4
                          • Instruction Fuzzy Hash: 5A119A31A2974086E750EF20E94012AB761FB89B40F945238EE4A07AA8DFBCE460CF10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fclose$fseek$freadfreeftellmalloc
                          • String ID:
                          • API String ID: 3246642831-0
                          • Opcode ID: 3d3d642e99e549a710537ff65f137bae60e13888980c79d0a0497c08e71d4a2a
                          • Instruction ID: 2eb0b5526a91c5c7db552c7cc94e2025fb4c6675a192f9b1b86bc839a57e6370
                          • Opcode Fuzzy Hash: 3d3d642e99e549a710537ff65f137bae60e13888980c79d0a0497c08e71d4a2a
                          • Instruction Fuzzy Hash: BB314F21B6AB4291FA54FF26AC44279A3A4EF48FD0FC81034DE0E43795DE7CE4958B20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memmove.VCRUNTIME140(00000000,?,?,00007FF725834A17,?,?,?,?,?,?,?,?,00007FF7257F112F), ref: 00007FF725835FA8
                          • memmove.VCRUNTIME140(00000000,?,?,00007FF725834A17,?,?,?,?,?,?,?,?,00007FF7257F112F), ref: 00007FF725835FB7
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,00007FF725834A17,?,?,?,?,?,?,?,?,00007FF7257F112F), ref: 00007FF725835FEB
                          • memmove.VCRUNTIME140(?,?,00007FF725834A17,?,?,?,?,?,?,?,?,00007FF7257F112F), ref: 00007FF725835FF2
                          • memmove.VCRUNTIME140(?,?,00007FF725834A17,?,?,?,?,?,?,?,?,00007FF7257F112F), ref: 00007FF725836001
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF72583602A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID: C:\PrivateScript\
                          • API String ID: 2016347663-2017767010
                          • Opcode ID: edb98895bafe28664e16e0ca35aa64053a06fc17c9fca28eaf6cc120599b75e8
                          • Instruction ID: 078c3040af13eb3e6354e90444495497fa44e244232bd68486acd5424e493cc0
                          • Opcode Fuzzy Hash: edb98895bafe28664e16e0ca35aa64053a06fc17c9fca28eaf6cc120599b75e8
                          • Instruction Fuzzy Hash: D541A062B08A82A5EA10BF16D9442A8E3A5EB04FD0FD44631DE5D0B7D5DFFCE960C720
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 4dd49a6edfcdd14641959296d4c90662a24f7a3e0b280b9e12673426ac5c1a2d
                          • Instruction ID: 247713598b7207362145608f8f3ec49e8edf23095fa4fab1709b3f12f995d250
                          • Opcode Fuzzy Hash: 4dd49a6edfcdd14641959296d4c90662a24f7a3e0b280b9e12673426ac5c1a2d
                          • Instruction Fuzzy Hash: 75513736A0AB4186EB45AF61E840279B3E4FF48F84F885935CE4D07754DFB9E4A1CB20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF72582B9A4), ref: 00007FF7258346A9
                          • memmove.VCRUNTIME140(?,?,?,00007FF72582B9A4), ref: 00007FF7258346CF
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7258346F3
                          • memmove.VCRUNTIME140(?,?,?,?,?,?,?,00007FF72582B9A4), ref: 00007FF725834737
                          • memmove.VCRUNTIME140(?,?,?,?,?,?,?,00007FF72582B9A4), ref: 00007FF7258347F3
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF72582B9A4), ref: 00007FF72583484E
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF72583485B
                            • Part of subcall function 00007FF725836874: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7257F1094), ref: 00007FF72583688E
                            • Part of subcall function 00007FF725836874: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7258368A4
                            • Part of subcall function 00007FF725836874: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7258368AA
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_task$memmove$_invalid_parameter_noinfo_noreturn$malloc
                          • String ID:
                          • API String ID: 2127020159-0
                          • Opcode ID: 6938d0d352403924ae09eea454a35fc79d0112454c1ea2bf79053e00af08e7f5
                          • Instruction ID: 4127664d52f322423b624b33d3e230bd1ccbc463b4a1a476fe51a20ac01dd486
                          • Opcode Fuzzy Hash: 6938d0d352403924ae09eea454a35fc79d0112454c1ea2bf79053e00af08e7f5
                          • Instruction Fuzzy Hash: 9B610322B09B86A1FA14FF11D944378A691EB04FD4FA44631DA6D07BE5EFBCE4A1C710
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memchr$freemallocmemmove
                          • String ID: Window$]
                          • API String ID: 3276875001-2892678728
                          • Opcode ID: 36a43f774c389e1964aeb66b70d05709343e8fc554d0b0892a314921ea69cd3a
                          • Instruction ID: 67ce2d61df043a338b0576271fed28e055979625d64fb4cdfb0190be29ede33a
                          • Opcode Fuzzy Hash: 36a43f774c389e1964aeb66b70d05709343e8fc554d0b0892a314921ea69cd3a
                          • Instruction Fuzzy Hash: 4451EF65B2D68685EB21AF1699042BAE7D1EF45FD0FC84132DE5D07784DFACE412CB20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF72583402A), ref: 00007FF7258353A7
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF72583402A), ref: 00007FF725835414
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF72583402A), ref: 00007FF72583543D
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,00007FF72583402A), ref: 00007FF72583546F
                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF72583402A), ref: 00007FF7258354B3
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF72583402A), ref: 00007FF7258354BA
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF72583402A), ref: 00007FF7258354C7
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                          • String ID:
                          • API String ID: 2331969452-0
                          • Opcode ID: 28e860d9f5d491b4904d64f60eec2e330c5eb6688bafd401299a477ee1dda245
                          • Instruction ID: 7ff10bcedc1cf03ca78890ae5c004f514ada25d71700c749154b159a895ae723
                          • Opcode Fuzzy Hash: 28e860d9f5d491b4904d64f60eec2e330c5eb6688bafd401299a477ee1dda245
                          • Instruction Fuzzy Hash: F9518172608A4196EF209F1AE89023DE7A0FB85F96F558531CE4E477A0CFBDD856CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$memmove
                          • String ID:
                          • API String ID: 3069178222-0
                          • Opcode ID: a01212a12e93b461892dcbc4a2c47a001e8e9eb5ae372f1af2016ce4d73f44e4
                          • Instruction ID: 12230427222ad3aa9317a6f272efed515e0c49e0f7666a218ed21b5b22d052ac
                          • Opcode Fuzzy Hash: a01212a12e93b461892dcbc4a2c47a001e8e9eb5ae372f1af2016ce4d73f44e4
                          • Instruction Fuzzy Hash: 78717E32A05B4586EB159F25E940278B3A4FB48F84F88A239CF8D57351DFB8F4A1CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memmove
                          • String ID: ##dummypicker$##selectable$Alpha Bar$context
                          • API String ID: 2162964266-2275185138
                          • Opcode ID: dbf433d62967385d54af551ace85a84a12f5211c27b7b76b9de4335464779db7
                          • Instruction ID: a009768c2bca0fada8f5f7dba9102b2dfd8b542d6514d2349f447a7ad0cdd379
                          • Opcode Fuzzy Hash: dbf433d62967385d54af551ace85a84a12f5211c27b7b76b9de4335464779db7
                          • Instruction Fuzzy Hash: 20A1D732A196C586E750EF26D8413E9B7A0FB89F44F898235DE4C572A1CF79D055CF20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: cosfsinf
                          • String ID:
                          • API String ID: 3160392742-0
                          • Opcode ID: e87c462fb1772389619be87597759744536cc58cddb125c380d88cf1605a5b41
                          • Instruction ID: 8d428975f2f64554545bcfecb4fcdb345316164744e1b9458e21a42e611bb3ce
                          • Opcode Fuzzy Hash: e87c462fb1772389619be87597759744536cc58cddb125c380d88cf1605a5b41
                          • Instruction Fuzzy Hash: 2D61C512D297CC45E213AB3B64421F8F350AFBE255F5DDB23F94431672EB6931D19A10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memmove.VCRUNTIME140(?,00000000,7FFFFFFFFFFFFFFF,?,00007FF725834202,?,?,?,?,?,00007FF725829BA2), ref: 00007FF725835628
                          • memmove.VCRUNTIME140(?,00000000,7FFFFFFFFFFFFFFF,?,00007FF725834202,?,?,?,?,?,00007FF725829BA2), ref: 00007FF725835636
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,7FFFFFFFFFFFFFFF,?,00007FF725834202,?,?,?,?,?,00007FF725829BA2), ref: 00007FF725835674
                          • memmove.VCRUNTIME140(?,00000000,7FFFFFFFFFFFFFFF,?,00007FF725834202,?,?,?,?,?,00007FF725829BA2), ref: 00007FF72583567E
                          • memmove.VCRUNTIME140(?,00000000,7FFFFFFFFFFFFFFF,?,00007FF725834202,?,?,?,?,?,00007FF725829BA2), ref: 00007FF72583568C
                            • Part of subcall function 00007FF725836874: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7257F1094), ref: 00007FF72583688E
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7258356C2
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                          • String ID:
                          • API String ID: 2075926362-0
                          • Opcode ID: d1d6e56a386061e3a1846aa7b6f356b59ebc27dedbae6fc0a0a23eab99130c08
                          • Instruction ID: 0449c2c9634a6474d4c3e63573b04fd36b277200835a68daf9e018241e7af489
                          • Opcode Fuzzy Hash: d1d6e56a386061e3a1846aa7b6f356b59ebc27dedbae6fc0a0a23eab99130c08
                          • Instruction Fuzzy Hash: F541B061B09A81A1EA10AF16A9441ADA3A2EB04FF0F940731DE7D47BD5EFBCE461C710
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strstr
                          • String ID: ###$Collapsed=%d$Pos=%d,%d$Size=%d,%d$[%s][%s]
                          • API String ID: 1392478783-2972057365
                          • Opcode ID: a96fffceb183e2ab814f49bf69236778a3983fbab84bfe7730877a63bb0d1e9b
                          • Instruction ID: 4914038cd60790dba51ba7579b1c7f97c67a704bae3d88cb5a32b760d3e52e88
                          • Opcode Fuzzy Hash: a96fffceb183e2ab814f49bf69236778a3983fbab84bfe7730877a63bb0d1e9b
                          • Instruction Fuzzy Hash: 8A51C232A28A9296EB15EF1198454B8B7A0FB88F84F858136DE4D07794DF7CE461CB20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00007FF7258108A0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF725810752,?,?,?,00007FF7257F745B), ref: 00007FF7258108F6
                            • Part of subcall function 00007FF7258108A0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF725810752,?,?,?,00007FF7257F745B), ref: 00007FF725810999
                            • Part of subcall function 00007FF7258108A0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF725810752,?,?,?,00007FF7257F745B), ref: 00007FF7258109C2
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7257F745B), ref: 00007FF72581076D
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7257F745B), ref: 00007FF72581078E
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7257F745B), ref: 00007FF7258107DA
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7257F745B), ref: 00007FF72581080A
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7257F745B), ref: 00007FF72581082F
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7257F745B), ref: 00007FF725810851
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7257F745B), ref: 00007FF725810873
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: e9eac0b18ffbd57bdd49c075846d1cfaa7fe4c0867a31a70b911318509141c36
                          • Instruction ID: 260e11a8790f9b9eb0fbcaf8b9716fea401ff146465f0a149b9a49047c09442c
                          • Opcode Fuzzy Hash: e9eac0b18ffbd57bdd49c075846d1cfaa7fe4c0867a31a70b911318509141c36
                          • Instruction Fuzzy Hash: F0411631A0A641C6EA55AF51EC50239B3A4FF48F80F88A439DE4D13754CFBDE461CBA0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF72583800D
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF72583807D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: 8653421970$Mar 27 2024$gtnmklafghc
                          • API String ID: 3668304517-1909873347
                          • Opcode ID: c0d225b0fb7652a1e91058801a40812ceff8308adfcacf505b6972bd11a21737
                          • Instruction ID: b1b2d94426348c0c5e28d7c93fd1df807e12458d0d4b388a3be2f554e91e8e9c
                          • Opcode Fuzzy Hash: c0d225b0fb7652a1e91058801a40812ceff8308adfcacf505b6972bd11a21737
                          • Instruction Fuzzy Hash: A41160A1E1A58690EA04BF29EC5437CA361EF45F84FC00131D58C06562EFFE65B48F24
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00007FF72580D080: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF7257F182E), ref: 00007FF72580D0B1
                            • Part of subcall function 00007FF72580D080: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF7257F182E), ref: 00007FF72580D0DA
                            • Part of subcall function 00007FF72580D080: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF7257F182E), ref: 00007FF72580D103
                            • Part of subcall function 00007FF72580D080: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF7257F182E), ref: 00007FF72580D138
                            • Part of subcall function 00007FF72580D080: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF7257F182E), ref: 00007FF72580D161
                            • Part of subcall function 00007FF72580D080: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF7257F182E), ref: 00007FF72580D190
                            • Part of subcall function 00007FF72580D080: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF72580D214
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7257F184D
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7257F1872
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7257F1894
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7257F18B6
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7257F18D8
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7257F18FA
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7257F191C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 9cf4df31f3cf7e12b30510dffd57f4ba4a6e9bf9f85409581bd15c4f8d6470ee
                          • Instruction ID: 35e6a369134d802e9d14d5068c8b7c092641c7dd6c6853010fb27388ca88fdc3
                          • Opcode Fuzzy Hash: 9cf4df31f3cf7e12b30510dffd57f4ba4a6e9bf9f85409581bd15c4f8d6470ee
                          • Instruction Fuzzy Hash: 4F311820A0B64289FE55EF62EC50675A3A4FF49F90FC85039C80D033A0CFADA954CB60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strncpy$freemallocmemmove
                          • String ID: Color$_COL3F$_COL4F
                          • API String ID: 1522325491-432181853
                          • Opcode ID: a9fc3b4aca7670a6152800f58cb9b245c5d8b8e4e0d9987ec1c6e5bcd2afad4b
                          • Instruction ID: 13e40e88ac63cd9983fcab4b45b3a659ccd40acdb949515fa0bd683f3bd9c2a6
                          • Opcode Fuzzy Hash: a9fc3b4aca7670a6152800f58cb9b245c5d8b8e4e0d9987ec1c6e5bcd2afad4b
                          • Instruction Fuzzy Hash: 0E12D332D18AC986E311DF3698412FAF760EFA9784F449332EA88565A5DF78E094DF10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memset$free$malloc
                          • String ID: ##Overlay
                          • API String ID: 1393892039-3248624929
                          • Opcode ID: 3da823ba7cc932c641245592aaa1ca3649de3811267b230c418dc4b70a743042
                          • Instruction ID: b0d095f6d3ffe225eb2c064b66be88b34dd4cd6b964fee00ff554d3e34de1e42
                          • Opcode Fuzzy Hash: 3da823ba7cc932c641245592aaa1ca3649de3811267b230c418dc4b70a743042
                          • Instruction Fuzzy Hash: D132D572505BC189D310DF29E8445C87BE9F745F68FAC433AEAA40B398DF74A461CB68
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 235f98bb549ca0a3c5d7200139b36820fb87847903ebce0eedb6b01f229909e5
                          • Instruction ID: b1444f19c4b7fa6025ccba1bf7badb5ee7fbd5a26429e0eef4c90c62d578f088
                          • Opcode Fuzzy Hash: 235f98bb549ca0a3c5d7200139b36820fb87847903ebce0eedb6b01f229909e5
                          • Instruction Fuzzy Hash: 50311831A4B64186EE95AF52E850279A3A4FF88F80F885435DD0D433A4CFBDE961CB20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ControlDeviceWindowexit
                          • String ID: 0
                          • API String ID: 767674996-4108050209
                          • Opcode ID: 21c54c9de52530badc731f4db1b74821d7298d96c69e7c935026dba2ee18bb3f
                          • Instruction ID: b047a7360a7d29ae70c5e50fd44455507dbddfde7b7ceb94176af7276d035d65
                          • Opcode Fuzzy Hash: 21c54c9de52530badc731f4db1b74821d7298d96c69e7c935026dba2ee18bb3f
                          • Instruction Fuzzy Hash: 7F513E22918BC586E7019F78E9411E9B7B0FFA8748F04A325EB8C13626EF74E6D5C700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ControlDeviceWindowexit
                          • String ID: 0
                          • API String ID: 767674996-4108050209
                          • Opcode ID: 7c87e550739d189e2264dc05cd52a6de62360eda03a5b097619e68091e6de3cd
                          • Instruction ID: c15ec0732528185778c491427d60732499807b6d0c2f5e04b953f554f99c49a6
                          • Opcode Fuzzy Hash: 7c87e550739d189e2264dc05cd52a6de62360eda03a5b097619e68091e6de3cd
                          • Instruction Fuzzy Hash: EB210E3291DB8482D711DF25F940369B7A0FB99B94F545229EBCC43A25DF78E1E4CB00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Context$CompositionReleaseWindow
                          • String ID:
                          • API String ID: 244372355-3916222277
                          • Opcode ID: 2755660fbc6d1d6f6bb6a8f0b2e933e89d72c006eda80e84d0a862eedb3f2575
                          • Instruction ID: a13bdedef8d656c33ba975643eb9fc517cf71a4a5d3d4b545d8f2a68f9b7a3ad
                          • Opcode Fuzzy Hash: 2755660fbc6d1d6f6bb6a8f0b2e933e89d72c006eda80e84d0a862eedb3f2575
                          • Instruction Fuzzy Hash: 66F0FB76A09B4186DA50AF06B94416AF7A0FB88FD0F4C0575EE8D03B18DFBCD5648B10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: __current_exception__current_exception_contextterminate
                          • String ID: csm
                          • API String ID: 2542180945-1018135373
                          • Opcode ID: 48c6614e9414d6450eed7e58c8f94c090f7f682faa98693d8b2e6b0d344e0b21
                          • Instruction ID: 2387ab93b6f94a2fdf69398a4d64c43c62fe0e0e7402a73eff7f2e0859823362
                          • Opcode Fuzzy Hash: 48c6614e9414d6450eed7e58c8f94c090f7f682faa98693d8b2e6b0d344e0b21
                          • Instruction Fuzzy Hash: F0F01737609B45CAD715AF21EC805AC3374F74CB88B895135FA4E87755CF78D9A08B50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memchr
                          • String ID: ...
                          • API String ID: 3297308162-440645147
                          • Opcode ID: 2e70a7bbbedc58492fabde33a40111deef45b0c5c6e980140d5333ec8b4f81c9
                          • Instruction ID: c192632a566e108305dbf5b687a1915b5dd0d33f6e7596f965fdca3c1e60d2d1
                          • Opcode Fuzzy Hash: 2e70a7bbbedc58492fabde33a40111deef45b0c5c6e980140d5333ec8b4f81c9
                          • Instruction Fuzzy Hash: BF02E732D04BC985E252AF3694412F9F390EF6DB84F58D732EE88365A2DF74A5918F10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: mallocmemmove$free
                          • String ID:
                          • API String ID: 4023028716-0
                          • Opcode ID: d285b11d3e60afd22528784e3b2e48b8c577cde26f2d8c3f813b462d0fe2696d
                          • Instruction ID: a98a9c5a30c0ef37223ddf4843b7a636774e733daba5de7df5c4610c1d2f6915
                          • Opcode Fuzzy Hash: d285b11d3e60afd22528784e3b2e48b8c577cde26f2d8c3f813b462d0fe2696d
                          • Instruction Fuzzy Hash: 9C41D432A19B8286DB50DF25E8401B8B3A0FB88F95F984136DE4D87395DFBCE450CB20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 1e589f064deab7ac9202539d0ac458520ceb654adc399a32657c1ccef59d91b7
                          • Instruction ID: a0bae26d14e6314e322c519e9a8acff3bebd3851047255ae0012b289efac0714
                          • Opcode Fuzzy Hash: 1e589f064deab7ac9202539d0ac458520ceb654adc399a32657c1ccef59d91b7
                          • Instruction Fuzzy Hash: B3110721A4B64289FE65AF65EC50778A2A4FF48F81F885439CD0D173A0CFADA915CB30
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memchr
                          • String ID: %*s%.*s$ %.*s$--------------------------------
                          • API String ID: 3297308162-2326682469
                          • Opcode ID: 69a9e6b4a3605c8d2613ee8575e227afdc2b909768a0bb065499ee4a2f011fe4
                          • Instruction ID: bf60420699da940068cafe3c805259531d5d81899ea2a154b549fd384b5e5585
                          • Opcode Fuzzy Hash: 69a9e6b4a3605c8d2613ee8575e227afdc2b909768a0bb065499ee4a2f011fe4
                          • Instruction Fuzzy Hash: A7E10532A04A8685E751DF35D8053F8B3A0FF69B98F899332DE4C27295DF78A095CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: powf
                          • String ID:
                          • API String ID: 3445610689-0
                          • Opcode ID: 7e3667c006b786619326fa28bd4575b9f9dc849fb53dd47ae7159d56618c8c65
                          • Instruction ID: b7429691b0cd8f731e729e9439395a61187faa0d78316db50cbf8d0af506a6d7
                          • Opcode Fuzzy Hash: 7e3667c006b786619326fa28bd4575b9f9dc849fb53dd47ae7159d56618c8c65
                          • Instruction Fuzzy Hash: CAB13C32E186C946E722BE3788411B9F790EF59B44F499732DD49F21A1DFB87590CE20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: powf
                          • String ID:
                          • API String ID: 3445610689-0
                          • Opcode ID: aad5436f182b33bfa7bcaed47e6ee7c03bf8bfe89bade9873feb061160b71d4b
                          • Instruction ID: a0f3e2d0739e2264f220322d47580abd6f866e84066c625c98df4d8dbdad8abe
                          • Opcode Fuzzy Hash: aad5436f182b33bfa7bcaed47e6ee7c03bf8bfe89bade9873feb061160b71d4b
                          • Instruction Fuzzy Hash: EEC11A22D087CD46FB62BE3648012B9F750EF6DB54F4C8732ED48B61A1DFA875958D20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: floorffree
                          • String ID:
                          • API String ID: 3454259225-0
                          • Opcode ID: a2597b17afbbbc8f1061583e7a3378dfaba5c0ff2765dc5a4381bd46670caea4
                          • Instruction ID: 4ce91ba44dfd1271898cc0d853eab53835ca68ce667780e68216ebd8c1a80e96
                          • Opcode Fuzzy Hash: a2597b17afbbbc8f1061583e7a3378dfaba5c0ff2765dc5a4381bd46670caea4
                          • Instruction Fuzzy Hash: 66719332908BC486D6619F22A4403EAF7A4FF99B81F544225EE8823765DF7CE560CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memset
                          • String ID: imgui.ini$imgui_log.txt
                          • API String ID: 2221118986-3179804127
                          • Opcode ID: 601d6870312cc3118d53c3604b0d7f90176c3be372efbc744b09003940824b54
                          • Instruction ID: e3761480dca1ccf015d96e7193258f8eea134e0f4269fdcb48280ef26822960b
                          • Opcode Fuzzy Hash: 601d6870312cc3118d53c3604b0d7f90176c3be372efbc744b09003940824b54
                          • Instruction Fuzzy Hash: 87A1D8B2405BC18AC750EF3899603D977A4F765B28F684339DBB80F2E9DB314199CB64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocmemmove
                          • String ID:
                          • API String ID: 2537350866-3916222277
                          • Opcode ID: 62424ea3d4816debadbad0c1619d99ba518c3be65a5d34ad0d1c8a69992f2c6f
                          • Instruction ID: a38f9f4afdce48fc8dd4ec6b95da453899ee3525e14d8ef9c5b570c1a919ba9b
                          • Opcode Fuzzy Hash: 62424ea3d4816debadbad0c1619d99ba518c3be65a5d34ad0d1c8a69992f2c6f
                          • Instruction Fuzzy Hash: DC61C073A157818BD700DF26D8800BCB7A0FB88B88F495235EE5957699DF78E891CF10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.VCRUNTIME140(?,?,00000018,00007FF72582B169,?,?,?,?,?,00007FF7257F1189), ref: 00007FF7258344C6
                          • memset.VCRUNTIME140(?,?,00000018,00007FF72582B169,?,?,?,?,?,00007FF7257F1189), ref: 00007FF725834565
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF72583458C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memset$Concurrency::cancel_current_task
                          • String ID:
                          • API String ID: 3006004123-0
                          • Opcode ID: aa756f49405c172095da7c7e257afb4e5fce8982574c07d6fcab2819975981d0
                          • Instruction ID: 0758c6e35ad3830fa5f35800a2413dd19c50995a4d5c88085e1a849d2580ed64
                          • Opcode Fuzzy Hash: aa756f49405c172095da7c7e257afb4e5fce8982574c07d6fcab2819975981d0
                          • Instruction Fuzzy Hash: 52319221E0978651EA14FF61A9453799291EF49FD0F940634D96D07BE6DEFCA0608B20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memmove$Concurrency::cancel_current_task
                          • String ID:
                          • API String ID: 1247048853-0
                          • Opcode ID: 89eb4108f071e0619cd2c65ad21e0074e86183586a7f4d57a115aca4f2c6c1e5
                          • Instruction ID: 560202b671cd322fb3197d163243d49fa2e60760ecc00bc05896b5aa070a759c
                          • Opcode Fuzzy Hash: 89eb4108f071e0619cd2c65ad21e0074e86183586a7f4d57a115aca4f2c6c1e5
                          • Instruction Fuzzy Hash: 8131C421B09741E1EA14AF55A980278A7A4EB04FF0FA40730DE7E077D6DEBCE8618710
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memmove
                          • String ID: C:\PrivateScript\
                          • API String ID: 2162964266-2017767010
                          • Opcode ID: 8c4f86710293f25bb4bc5e03f5e313b93c3e7b9517c4e148c60cbecf44845de7
                          • Instruction ID: 218737eaf89c6fcd6a46738fb6204a0647ca32251a763a24cefbe7067a2598be
                          • Opcode Fuzzy Hash: 8c4f86710293f25bb4bc5e03f5e313b93c3e7b9517c4e148c60cbecf44845de7
                          • Instruction Fuzzy Hash: 38319222E097C596E600BF21ED05278A3A5FB44FC0F944235DE8C17B66EFBCE5A58B10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memmove$Concurrency::cancel_current_task
                          • String ID:
                          • API String ID: 1247048853-0
                          • Opcode ID: 5e9cd49211db3afa63012d1057e359778613412ec36aaf383ca3d8ecda74472f
                          • Instruction ID: 7c9d9e0cd98c1ae5b6e130171bca610e6abfd1aea847da093c5d9e987deb871c
                          • Opcode Fuzzy Hash: 5e9cd49211db3afa63012d1057e359778613412ec36aaf383ca3d8ecda74472f
                          • Instruction Fuzzy Hash: 7F21A521A0979595EA14BF41A84037DA3A4EB44FE0F940631DFAD07BC6EFBCE8618B50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: __acrt_iob_func__stdio_common_vfprintffclosefflushfree
                          • String ID:
                          • API String ID: 2759974054-0
                          • Opcode ID: 4807863bc683db5bae73428bdb6a797a4b599005619588b6b3fc80361d811d7c
                          • Instruction ID: 7f5103cb2f321396bfc458df6c3a082068d3ed3ea0fde30f6d47d8e36a607355
                          • Opcode Fuzzy Hash: 4807863bc683db5bae73428bdb6a797a4b599005619588b6b3fc80361d811d7c
                          • Instruction Fuzzy Hash: 0D21422191DA8281EB55AF21EC841BCA3E0FF54F84FC91036CD0D5B654DFB898A0CB30
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID:
                          • API String ID: 3061335427-0
                          • Opcode ID: fc3121723675708bebead792d6c7cf9aacec310986fc211d0fea0d240cee4fa1
                          • Instruction ID: f377034cfd885ea98e8558050ca4c7557a43fe994142b11b2df957f503b105c6
                          • Opcode Fuzzy Hash: fc3121723675708bebead792d6c7cf9aacec310986fc211d0fea0d240cee4fa1
                          • Instruction Fuzzy Hash: 44A1F522E14B8586E321DF3594442BEF7E4FF99F85F449332EE8512654EB78E492CB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4517877622.00007FF7257F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7257F0000, based on PE: true
                          • Associated: 00000000.00000002.4517863555.00007FF7257F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF725839000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517910217.00007FF7258A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517969079.00007FF7258AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4517982925.00007FF7258AE000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518011747.00007FF7258D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4518025943.00007FF7258D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7257f0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memmove$freemalloc
                          • String ID:
                          • API String ID: 1763039611-0
                          • Opcode ID: ba81548fa1518a19d0dc2e080028a8c5b0682fd3939d13a6de9beed13b20eaec
                          • Instruction ID: 89e28e170306c74df17c3edaa51088f0de1ac57b540397b60ef0b34cda7171a7
                          • Opcode Fuzzy Hash: ba81548fa1518a19d0dc2e080028a8c5b0682fd3939d13a6de9beed13b20eaec
                          • Instruction Fuzzy Hash: 0731C272B05AC186EA04AF56E9411A8A3A0FB48FC0B888836DF5D57760DF7CE5A1CB50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:10.1%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:4.5%
                          Total number of Nodes:1955
                          Total number of Limit Nodes:8
                          execution_graph 6424 7ff61759071e ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA 6426 7ff61758c620 6427 7ff61758c690 17 API calls 6426->6427 6428 7ff61758c632 6427->6428 6429 7ff61758c660 6428->6429 6430 7ff61758c681 _invalid_parameter_noinfo_noreturn 6428->6430 6431 7ff617590620 6432 7ff61759063a 6431->6432 6437 7ff61758beb0 6432->6437 6439 7ff61758bec4 _invalid_parameter_noinfo_noreturn 6437->6439 6287 7ff61758f4a4 6291 7ff61758f884 SetUnhandledExceptionFilter 6287->6291 6440 7ff617585320 6441 7ff61758534d 6440->6441 6445 7ff617585346 6440->6445 6442 7ff617585378 6441->6442 6444 7ff617585368 ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6441->6444 6442->6445 6447 7ff6175853e6 ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 6442->6447 6448 7ff6175853c4 fputc 6442->6448 6443 7ff61758ebc0 8 API calls 6446 7ff6175854af 6443->6446 6444->6445 6445->6443 6449 7ff61758542b 6447->6449 6450 7ff617585455 6447->6450 6448->6445 6449->6450 6451 7ff617585430 6449->6451 6450->6445 6452 7ff617585464 fwrite 6450->6452 6451->6445 6453 7ff617585435 fputc 6451->6453 6452->6445 6453->6445 6454 7ff617584f20 6455 7ff617584f52 6454->6455 6457 7ff617584fcd fgetc 6455->6457 6463 7ff617584f62 6455->6463 6464 7ff617584fe9 6455->6464 6456 7ff61758ebc0 8 API calls 6459 7ff6175851b6 6456->6459 6457->6463 6458 7ff617584ffe fgetc 6462 7ff6175850ff 6458->6462 6458->6464 6460 7ff61758504a ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 6460->6464 6461 7ff6175883f0 7 API calls 6461->6460 6462->6463 6465 7ff61758519c _invalid_parameter_noinfo_noreturn 6462->6465 6463->6456 6464->6458 6464->6460 6464->6461 6464->6462 6466 7ff6175850b6 memcpy 6464->6466 6468 7ff617585117 6464->6468 6465->6463 6466->6458 6467 7ff617585140 ungetc 6467->6462 6467->6468 6468->6462 6468->6467 6469 7ff617585820 6470 7ff617581f20 15 API calls 6469->6470 6471 7ff61758583b 6470->6471 6293 7ff617588fb0 ?_Syserror_map@std@@YAPEBDH 6294 7ff617588fe0 6293->6294 6294->6294 6295 7ff617585d50 7 API calls 6294->6295 6296 7ff617588ff4 6295->6296 6472 7ff61758e130 6473 7ff61758de30 15 API calls 6472->6473 6474 7ff61758e14b 6473->6474 6480 7ff617581030 __std_exception_copy 6297 7ff61759007e ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA 6298 7ff617590480 6299 7ff6175904a0 6298->6299 6300 7ff617590493 6298->6300 6302 7ff6175856f0 6300->6302 6303 7ff617585703 6302->6303 6305 7ff617585727 6302->6305 6304 7ff617585748 _invalid_parameter_noinfo_noreturn 6303->6304 6303->6305 6305->6299 6306 7ff617585680 6307 7ff617585693 6306->6307 6309 7ff6175856bc 6306->6309 6308 7ff6175856db _invalid_parameter_noinfo_noreturn 6307->6308 6307->6309 6481 7ff617585500 6482 7ff61758551d 6481->6482 6483 7ff61758555a ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 6482->6483 6484 7ff617585a50 12 API calls 6482->6484 6484->6483 6485 7ff61758100c 6488 7ff61758eac4 6485->6488 6487 7ff61758101c shared_ptr 6489 7ff61758eadf 6488->6489 6490 7ff61758eb25 GetLastError 6489->6490 6491 7ff61758eb54 6489->6491 6490->6491 6492 7ff61758eb3d IsDebuggerPresent 6490->6492 6491->6487 6492->6491 6493 7ff61758eb47 OutputDebugStringW 6492->6493 6493->6491 6310 7ff617590090 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 6311 7ff617590390 6312 7ff6175903b0 6311->6312 6313 7ff6175903a3 6311->6313 6314 7ff6175856f0 _invalid_parameter_noinfo_noreturn 6313->6314 6314->6312 6317 7ff617581090 __std_exception_destroy 6318 7ff6175810b8 6317->6318 6319 7ff617584a90 6320 7ff617584aa1 6319->6320 6321 7ff617584abb setvbuf 6320->6321 6322 7ff617584ae1 6320->6322 6321->6322 6323 7ff617584ac5 6321->6323 6324 7ff617585990 10 API calls 6323->6324 6325 7ff617584ad8 6324->6325 6326 7ff617585790 6327 7ff6175857b3 6326->6327 6328 7ff6175857ee ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 6327->6328 6329 7ff617585a50 12 API calls 6327->6329 6330 7ff6175857fe 6328->6330 6329->6328 6494 7ff6175890e0 ?_Winerror_map@std@@YAHH 6495 7ff6175890fd 6494->6495 6496 7ff61758ece0 EnterCriticalSection LeaveCriticalSection 6497 7ff61758edd8 SetEvent ResetEvent 6496->6497 6499 7ff6175900d8 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 6275 7ff617584ce0 6276 7ff617584d00 ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J 6275->6276 6278 7ff617584d17 6275->6278 6276->6278 6277 7ff617584d93 6278->6277 6279 7ff617584d46 memcpy 6278->6279 6280 7ff617584d73 6278->6280 6279->6277 6279->6280 6280->6277 6281 7ff617584d7f fwrite 6280->6281 6281->6277 6332 7ff617585860 ?uncaught_exception@std@ 6333 7ff61758587d 6332->6333 6334 7ff617585873 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 6332->6334 6334->6333 6500 7ff6175854e0 6501 7ff6175854ec _lock_file 6500->6501 6502 7ff6175854f3 6500->6502 6501->6502 6503 7ff6175810e0 __std_exception_destroy 6504 7ff61758f3dc 6505 7ff61758f3ec 6504->6505 6517 7ff61758ef44 6505->6517 6507 7ff61758f6d8 9 API calls 6508 7ff61758f491 6507->6508 6509 7ff61758f410 _RTC_Initialize 6515 7ff61758f473 6509->6515 6525 7ff61758fb9c InitializeSListHead 6509->6525 6515->6507 6516 7ff61758f481 6515->6516 6518 7ff61758ef55 6517->6518 6519 7ff61758ef87 6517->6519 6520 7ff61758efc4 6518->6520 6523 7ff61758ef5a __scrt_release_startup_lock 6518->6523 6519->6509 6521 7ff61758f6d8 9 API calls 6520->6521 6522 7ff61758efce 6521->6522 6523->6519 6524 7ff61758ef77 _initialize_onexit_table 6523->6524 6524->6519 6526 7ff61758f5ee 6527 7ff61758f830 __scrt_is_managed_app GetModuleHandleW 6526->6527 6528 7ff61758f5f5 6527->6528 6529 7ff61758f634 _exit 6528->6529 6530 7ff61758f5f9 6528->6530 6335 7ff617588570 6336 7ff617588612 6335->6336 6337 7ff6175885b9 6335->6337 6338 7ff617588675 6336->6338 6339 7ff61758861a memcpy 6336->6339 6337->6336 6340 7ff6175885be memcpy 6337->6340 6343 7ff617588773 6338->6343 6350 7ff61758868e 6338->6350 6341 7ff61758865e memcpy 6339->6341 6342 7ff61758865b 6339->6342 6345 7ff61758875b 6340->6345 6341->6345 6342->6341 6361 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 6343->6361 6347 7ff617588778 6348 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 6347->6348 6351 7ff61758877e 6348->6351 6349 7ff617588709 6352 7ff6175886f4 memcpy 6349->6352 6354 7ff61758ee80 std::_Facet_Register 3 API calls 6349->6354 6350->6347 6350->6349 6353 7ff6175886e7 6350->6353 6357 7ff617588744 6352->6357 6358 7ff617588747 memcpy 6352->6358 6356 7ff61758ee80 std::_Facet_Register 3 API calls 6353->6356 6354->6352 6359 7ff6175886ef 6356->6359 6357->6358 6358->6345 6359->6352 6360 7ff617588702 _invalid_parameter_noinfo_noreturn 6359->6360 6360->6349 6531 7ff6175902f0 ??1_Lockit@std@@QEAA 6362 7ff617590772 _seh_filter_exe 6535 7ff61758ebe8 InitializeCriticalSectionAndSpinCount GetModuleHandleW 6536 7ff61758ec2e GetProcAddress GetProcAddress 6535->6536 6537 7ff61758ec19 GetModuleHandleW 6535->6537 6539 7ff61758ec56 6536->6539 6540 7ff61758ec6b CreateEventW 6536->6540 6537->6536 6538 7ff61758ec90 6537->6538 6541 7ff61758f6d8 9 API calls 6538->6541 6547 7ff61758ec94 6538->6547 6539->6540 6542 7ff61758ec5b 6539->6542 6540->6538 6540->6542 6543 7ff61758ecb7 DeleteCriticalSection 6541->6543 6544 7ff61758ef44 10 API calls 6542->6544 6545 7ff61758ecd5 CloseHandle 6543->6545 6546 7ff61758ecdb 6543->6546 6544->6538 6545->6546 6548 7ff617584af0 6549 7ff617584b26 6548->6549 6555 7ff617584b45 6548->6555 6550 7ff6175858a0 10 API calls 6549->6550 6552 7ff617584b2b 6550->6552 6551 7ff61758ebc0 8 API calls 6553 7ff617584bbb 6551->6553 6554 7ff617584b2f fsetpos 6552->6554 6552->6555 6554->6555 6555->6551 6556 7ff6175849f0 6557 7ff617587ee0 18 API calls 6556->6557 6558 7ff617584a05 ?always_noconv@codecvt_base@std@ 6557->6558 6559 7ff617584a28 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6558->6559 6560 7ff617584a15 6558->6560 6369 7ff61758eb6c DeleteCriticalSection 6370 7ff61758eb88 6369->6370 4367 7ff61758f4c0 4368 7ff61758f4d9 __scrt_initialize_crt 4367->4368 4369 7ff61758f4e1 __scrt_acquire_startup_lock 4368->4369 4370 7ff61758f617 4368->4370 4372 7ff61758f621 4369->4372 4373 7ff61758f4ff __scrt_release_startup_lock 4369->4373 4463 7ff61758f6d8 IsProcessorFeaturePresent 4370->4463 4374 7ff61758f6d8 9 API calls 4372->4374 4377 7ff61758f524 4373->4377 4378 7ff61758f5aa _get_initial_wide_environment __p___wargv __p___argc 4373->4378 4381 7ff61758f5a2 _register_thread_local_exe_atexit_callback 4373->4381 4375 7ff61758f62c 4374->4375 4376 7ff61758f634 _exit 4375->4376 4387 7ff617589d10 SetUnhandledExceptionFilter 4378->4387 4380 7ff61758f5cc 4461 7ff61758f830 GetModuleHandleW 4380->4461 4381->4378 4384 7ff61758f5d7 4385 7ff61758f5e1 4384->4385 4386 7ff61758f5dc _cexit 4384->4386 4385->4377 4386->4385 4388 7ff617589e08 4387->4388 4391 7ff617589d68 4387->4391 4607 7ff617589be0 4388->4607 4390 7ff617589ed4 4393 7ff617589f07 4390->4393 4612 7ff617585ee0 4390->4612 4391->4388 4392 7ff617589d90 _wcsicmp 4391->4392 4394 7ff61758a048 4391->4394 4397 7ff617589dd0 _wcsicmp 4391->4397 4392->4391 4396 7ff617589f2f 4393->4396 4400 7ff617585ee0 7 API calls 4393->4400 4398 7ff617589be0 2 API calls 4394->4398 4404 7ff617585ee0 7 API calls 4396->4404 4417 7ff617589f56 4396->4417 4397->4391 4403 7ff617589e1f 4398->4403 4402 7ff617589f1f ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4400->4402 4401 7ff617589e60 _wcsicmp 4401->4403 4402->4396 4403->4390 4403->4401 4408 7ff617589ea0 _wcsicmp 4403->4408 4406 7ff617589f46 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4404->4406 4405 7ff61758a200 4407 7ff617585ee0 7 API calls 4405->4407 4406->4417 4409 7ff61758a213 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4407->4409 4408->4403 4410 7ff617585ee0 7 API calls 4409->4410 4411 7ff61758a236 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4410->4411 4443 7ff61758a246 4411->4443 4412 7ff617585bd0 7 API calls 4412->4417 4417->4405 4417->4412 4418 7ff61758a278 _invalid_parameter_noinfo_noreturn 4417->4418 4419 7ff61758a27f _invalid_parameter_noinfo_noreturn 4417->4419 4420 7ff61758a28d 4417->4420 4421 7ff61758a286 _invalid_parameter_noinfo_noreturn 4417->4421 4469 7ff61758a8a0 4417->4469 4418->4419 4419->4421 4420->4405 4422 7ff61758a296 4420->4422 4421->4420 4489 7ff617585bd0 4422->4489 4424 7ff61758a2d4 4425 7ff617585bd0 7 API calls 4424->4425 4426 7ff61758a309 4425->4426 4509 7ff61758e7d8 4426->4509 4428 7ff61758a6c2 4772 7ff617589ad0 4428->4772 4429 7ff61758a330 4429->4428 4430 7ff61758a3f1 4429->4430 4433 7ff61758a3de _invalid_parameter_noinfo_noreturn 4429->4433 4436 7ff617585ee0 7 API calls 4430->4436 4438 7ff61758a44b 4430->4438 4433->4429 4435 7ff61758a716 4435->4380 4437 7ff61758a411 4436->4437 4634 7ff6175888c0 4437->4634 4438->4443 4445 7ff61758a48e _invalid_parameter_noinfo_noreturn 4438->4445 4459 7ff61758a4a7 4438->4459 4544 7ff617581780 _time64 GetCurrentThreadId srand CreateFileW 4438->4544 4439 7ff61758a731 _invalid_parameter_noinfo_noreturn 4625 7ff61758ebc0 4443->4625 4444 7ff617585ee0 7 API calls 4447 7ff61758a43a ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4444->4447 4445->4438 4447->4438 4448 7ff617585ee0 7 API calls 4448->4459 4450 7ff61758a565 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4741 7ff617581c90 4450->4741 4452 7ff617581c90 95 API calls 4452->4459 4453 7ff6175888c0 7 API calls 4453->4450 4454 7ff617585ee0 7 API calls 4456 7ff61758a5f4 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4454->4456 4455 7ff617585ee0 7 API calls 4457 7ff61758a617 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4455->4457 4456->4459 4457->4459 4458 7ff61758a659 _invalid_parameter_noinfo_noreturn 4458->4459 4459->4438 4459->4445 4459->4448 4459->4450 4459->4452 4459->4453 4459->4454 4459->4455 4459->4458 4460 7ff61758a6ac 4459->4460 4647 7ff61758ee80 4459->4647 4656 7ff61758dc20 memset 4459->4656 4673 7ff61758b4e0 4459->4673 4460->4443 4462 7ff61758f5d3 4461->4462 4462->4375 4462->4384 4464 7ff61758f6fe 4463->4464 4465 7ff61758f70c memset RtlCaptureContext RtlLookupFunctionEntry 4464->4465 4466 7ff61758f782 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 4465->4466 4467 7ff61758f746 RtlVirtualUnwind 4465->4467 4468 7ff61758f806 4466->4468 4467->4466 4468->4372 4470 7ff61758a8d2 4469->4470 4789 7ff61758e5c0 ___lc_codepage_func 4470->4789 4473 7ff61758a0c3 memcmp 4473->4417 4474 7ff61758a9e7 4824 7ff617588ea0 4474->4824 4478 7ff61758a9ed 4479 7ff617589160 28 API calls 4478->4479 4480 7ff61758a9f5 4479->4480 4481 7ff61758a98e 4802 7ff61758aca0 4481->4802 4482 7ff61758a967 memset 4485 7ff61758a940 4482->4485 4486 7ff61758e5e8 __std_fs_convert_wide_to_narrow 5 API calls 4485->4486 4487 7ff61758a9bb 4486->4487 4487->4473 4820 7ff617589160 4487->4820 4490 7ff617585bf1 memcpy 4489->4490 4494 7ff617585c2a 4489->4494 4490->4424 4491 7ff617585d3c 4915 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 4491->4915 4494->4491 4495 7ff617585d41 4494->4495 4496 7ff617585c9d 4494->4496 4497 7ff617585cc5 4494->4497 4498 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 4495->4498 4496->4495 4499 7ff617585caa 4496->4499 4500 7ff617585cca 4497->4500 4501 7ff617585cd4 4497->4501 4502 7ff617585d47 4498->4502 4503 7ff61758ee80 std::_Facet_Register 3 API calls 4499->4503 4504 7ff61758ee80 std::_Facet_Register 3 API calls 4500->4504 4505 7ff617585cd7 memcpy 4501->4505 4506 7ff617585cb2 4503->4506 4504->4506 4508 7ff617585cfc 4505->4508 4506->4505 4507 7ff617585d35 _invalid_parameter_noinfo_noreturn 4506->4507 4507->4491 4508->4507 4511 7ff61758e80f 4509->4511 4510 7ff61758e818 4513 7ff61758ebc0 8 API calls 4510->4513 4511->4510 4512 7ff61758e8ba 4511->4512 4514 7ff61758e868 GetFileAttributesExW 4511->4514 4916 7ff61758ea6c CreateFileW 4512->4916 4515 7ff61758ea34 4513->4515 4517 7ff61758e87b GetLastError 4514->4517 4519 7ff61758e886 4514->4519 4515->4429 4517->4510 4519->4510 4519->4512 4520 7ff61758e901 4522 7ff61758e952 4520->4522 4526 7ff61758e910 GetFileInformationByHandleEx 4520->4526 4521 7ff61758e8e2 4523 7ff61758e8fa 4521->4523 4524 7ff61758e8ec CloseHandle 4521->4524 4527 7ff61758e9a5 4522->4527 4528 7ff61758e968 GetFileInformationByHandleEx 4522->4528 4523->4510 4524->4523 4525 7ff61758ea5c terminate 4524->4525 4525->4523 4526->4522 4531 7ff61758e929 GetLastError 4526->4531 4529 7ff61758e9fe 4527->4529 4530 7ff61758e9bf GetFileInformationByHandleEx 4527->4530 4528->4527 4532 7ff61758e983 GetLastError 4528->4532 4535 7ff61758ea13 4529->4535 4536 7ff61758ea49 4529->4536 4530->4529 4533 7ff61758e9d4 GetLastError 4530->4533 4531->4523 4534 7ff61758e937 CloseHandle 4531->4534 4532->4523 4537 7ff61758e991 CloseHandle 4532->4537 4533->4523 4538 7ff61758e9e6 CloseHandle 4533->4538 4534->4523 4539 7ff61758e944 terminate 4534->4539 4535->4510 4540 7ff61758ea19 CloseHandle 4535->4540 4536->4523 4541 7ff61758ea4f CloseHandle 4536->4541 4537->4523 4542 7ff61758e99e terminate 4537->4542 4538->4523 4543 7ff61758e9f7 terminate 4538->4543 4539->4523 4540->4510 4540->4525 4541->4523 4541->4525 4542->4527 4543->4529 4545 7ff61758183c rand 4544->4545 4546 7ff617581807 CloseHandle 4544->4546 4548 7ff6175818e6 4545->4548 4549 7ff6175818a1 4545->4549 4547 7ff617585ee0 7 API calls 4546->4547 4550 7ff617581823 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4547->4550 4552 7ff617585ee0 7 API calls 4548->4552 4551 7ff6175818b5 rand 4549->4551 4581 7ff617581c5a 4550->4581 4551->4548 4551->4551 4553 7ff6175818f9 4552->4553 4919 7ff6175812e0 4553->4919 4554 7ff61758ebc0 8 API calls 4556 7ff617581c71 4554->4556 4556->4438 4558 7ff6175888c0 7 API calls 4559 7ff617581920 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4558->4559 4560 7ff61758193c 4559->4560 4561 7ff617581971 4559->4561 4560->4561 4562 7ff61758196a _invalid_parameter_noinfo_noreturn 4560->4562 4563 7ff617581989 4561->4563 4564 7ff6175819b1 _wremove memset 4561->4564 4562->4561 4567 7ff617585ee0 7 API calls 4563->4567 4931 7ff617585570 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 4564->4931 4568 7ff61758199c ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4567->4568 4582 7ff617581c13 4568->4582 4569 7ff617581a1d 4936 7ff617585a50 4569->4936 4570 7ff617581a59 4572 7ff617585a50 12 API calls 4570->4572 4574 7ff617581a5e 4572->4574 4573 7ff617581a22 4575 7ff617581a27 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 4573->4575 4576 7ff617581a44 4573->4576 4577 7ff617581a63 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 4574->4577 4578 7ff617581a80 4574->4578 4575->4576 4942 7ff617581f20 4576->4942 4577->4578 4579 7ff617581f20 15 API calls 4578->4579 4583 7ff617581a89 4579->4583 4581->4554 4582->4581 4584 7ff617581c53 _invalid_parameter_noinfo_noreturn 4582->4584 4946 7ff61758d520 4583->4946 4584->4581 4587 7ff617581a97 4589 7ff617585ee0 7 API calls 4587->4589 4588 7ff617581ad6 CreateFileW 4590 7ff617581b13 4588->4590 4606 7ff617581ba0 4588->4606 4591 7ff617581aaa ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z _wremove 4589->4591 4592 7ff617585d50 7 API calls 4590->4592 4591->4582 4594 7ff617581b42 4592->4594 4593 7ff617585ee0 7 API calls 4595 7ff617581bfb ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4593->4595 4983 7ff61758df00 NtQuerySystemInformation 4594->4983 4597 7ff617581c90 95 API calls 4595->4597 4597->4582 4599 7ff617581b8f 4599->4606 5000 7ff6175834d0 4599->5000 4601 7ff617581b88 _invalid_parameter_noinfo_noreturn 4601->4599 4606->4582 4606->4593 4610 7ff617589c00 4607->4610 4608 7ff617589cb6 4608->4403 4609 7ff617589c4f _wcsicmp 4609->4610 4610->4608 4610->4609 4611 7ff617589c86 _wcsicmp 4610->4611 4611->4610 4613 7ff617585f10 4612->4613 4614 7ff617585f79 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 4613->4614 4617 7ff617585f66 4613->4617 4614->4617 4616 7ff617585fed ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 4620 7ff617586007 4616->4620 4621 7ff617585fa0 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 4616->4621 4617->4616 4618 7ff617585fea 4617->4618 4619 7ff617585fc8 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 4617->4619 4617->4621 4618->4616 4619->4617 4619->4621 4620->4621 4624 7ff61758600c ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 4620->4624 4622 7ff617586077 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 4621->4622 4623 7ff617586081 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4621->4623 4622->4623 4623->4393 4624->4620 4624->4621 4626 7ff61758ebc9 4625->4626 4627 7ff61758f174 IsProcessorFeaturePresent 4626->4627 4628 7ff61758a257 4626->4628 4629 7ff61758f18c 4627->4629 4628->4380 5601 7ff61758f368 RtlCaptureContext 4629->5601 4635 7ff6175888fc 4634->4635 4636 7ff61758894a ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 4635->4636 4639 7ff617588937 4635->4639 4636->4639 4638 7ff617588a03 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 4640 7ff6175889b6 4638->4640 4641 7ff617588971 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 4638->4641 4639->4638 4639->4641 4644 7ff617588a00 4639->4644 4645 7ff617588999 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 4639->4645 4640->4641 4646 7ff6175889c5 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 4640->4646 4642 7ff617588a61 4641->4642 4643 7ff617588a57 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 4641->4643 4642->4444 4643->4642 4644->4638 4645->4639 4645->4640 4646->4640 4646->4641 4648 7ff61758ee9a malloc 4647->4648 4649 7ff61758eea4 4648->4649 4650 7ff61758ee8b 4648->4650 4649->4459 4650->4648 4651 7ff61758eeaa 4650->4651 4652 7ff61758eeb5 4651->4652 5606 7ff61758f910 4651->5606 4653 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 4652->4653 4655 7ff61758eebb 4653->4655 4657 7ff61758dc70 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 4656->4657 4658 7ff61758dc6d 4656->4658 4659 7ff617585b00 24 API calls 4657->4659 4658->4657 4660 7ff61758dd29 4659->4660 4661 7ff61758dd2e ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 4660->4661 4662 7ff61758dd4d 4660->4662 4661->4662 4670 7ff61758dd7e 4662->4670 5610 7ff61758e170 4662->5610 4666 7ff617585a50 12 API calls 4668 7ff61758ddd7 4666->4668 4668->4670 4671 7ff61758dddc ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 4668->4671 5623 7ff61758de30 4670->5623 4671->4670 4674 7ff61758b533 4673->4674 4675 7ff61758b551 4673->4675 4674->4675 4677 7ff61758b55d VirtualAlloc 4674->4677 4676 7ff617585ee0 7 API calls 4675->4676 4678 7ff61758b9b8 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4676->4678 4679 7ff61758b580 4677->4679 4680 7ff61758b90e 4677->4680 4678->4680 4681 7ff61758b5a0 4679->4681 4682 7ff61758b5b8 4679->4682 4683 7ff61758ebc0 8 API calls 4680->4683 5646 7ff61758afe0 4681->5646 4685 7ff61758b68b 4682->4685 4687 7ff61758ed70 5 API calls 4682->4687 4724 7ff61758b6bc 4682->4724 4686 7ff61758b9d6 4683->4686 4688 7ff61758b699 4685->4688 4689 7ff61758b6cc 4685->4689 4686->4459 4690 7ff61758b5ee 4687->4690 4692 7ff617585ee0 7 API calls 4688->4692 5714 7ff617586d90 4689->5714 4690->4685 4699 7ff617585d50 7 API calls 4690->4699 4691 7ff617585ee0 7 API calls 4694 7ff61758b8e1 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z VirtualFree 4691->4694 4695 7ff61758b6ac ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4692->4695 4700 7ff617582560 58 API calls 4694->4700 4695->4724 4696 7ff61758b5ac 4697 7ff617585ee0 7 API calls 4696->4697 4696->4724 4698 7ff61758b715 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z memcpy 4697->4698 4701 7ff61758b750 4698->4701 4702 7ff61758b77f 4698->4702 4703 7ff61758b625 4699->4703 4700->4680 4701->4702 4706 7ff61758b75d memcpy 4701->4706 4704 7ff617585ee0 7 API calls 4702->4704 4705 7ff6175826a0 25 API calls 4703->4705 4707 7ff61758b7a4 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 4704->4707 4708 7ff61758b639 4705->4708 4706->4701 4709 7ff617585ee0 7 API calls 4707->4709 4710 7ff61758b679 4708->4710 4714 7ff61758b672 _invalid_parameter_noinfo_noreturn 4708->4714 4712 7ff61758b7cf ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4709->4712 4711 7ff61758ed10 4 API calls 4710->4711 4711->4685 5740 7ff61758c810 4712->5740 4714->4710 4717 7ff61758b7fa 5750 7ff61758c960 4717->5750 4722 7ff617581ff0 9 API calls 4723 7ff61758b837 4722->4723 4723->4724 4725 7ff617585ee0 7 API calls 4723->4725 4724->4691 4726 7ff61758b861 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4725->4726 5795 7ff617589ce0 4726->5795 4728 7ff61758b895 4728->4724 5798 7ff61758bef0 4728->5798 4731 7ff61758b913 4732 7ff617585ee0 7 API calls 4731->4732 4733 7ff61758b934 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4732->4733 4734 7ff61758b98f VirtualFree 4733->4734 4735 7ff61758b965 4733->4735 4734->4680 4736 7ff61758b984 4735->4736 5824 7ff6175822e0 4735->5824 4737 7ff617582560 58 API calls 4736->4737 4737->4734 4739 7ff61758b979 5842 7ff617582420 4739->5842 4742 7ff617585ee0 7 API calls 4741->4742 4743 7ff617581cca ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4742->4743 4744 7ff617581ced 4743->4744 4745 7ff617581ce4 CloseHandle 4743->4745 4746 7ff6175812e0 22 API calls 4744->4746 4745->4744 4747 7ff617581cf7 4746->4747 6141 7ff61758d960 GetModuleHandleA 4747->6141 4750 7ff617581d45 4751 7ff617581d4e 4750->4751 4754 7ff617581d5f memset 4750->4754 4753 7ff61758ebc0 8 API calls 4751->4753 4752 7ff617581d3e _invalid_parameter_noinfo_noreturn 4752->4750 4755 7ff617581f08 4753->4755 4756 7ff617585570 29 API calls 4754->4756 4755->4459 4757 7ff617581d8d rand 4756->4757 4758 7ff617581dcd 4757->4758 4759 7ff617581e0a ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J 4758->4759 4760 7ff617581dd7 rand 4758->4760 4761 7ff617581e38 4759->4761 4760->4759 4760->4760 4762 7ff617585ee0 7 API calls 4761->4762 4763 7ff617581e44 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4762->4763 4764 7ff617585a50 12 API calls 4763->4764 4765 7ff617581e5e 4764->4765 4766 7ff617581e63 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 4765->4766 4767 7ff617581e81 4765->4767 4766->4767 4768 7ff617581e89 _wremove 4767->4768 4769 7ff617581f20 15 API calls 4768->4769 4770 7ff617581eaf 4769->4770 4770->4751 4771 7ff617581ee9 _invalid_parameter_noinfo_noreturn 4770->4771 4771->4751 6170 7ff617585750 4772->6170 4776 7ff617589b17 _CxxThrowException 4777 7ff617589b3e 4776->4777 4778 7ff617589b96 4776->4778 4777->4778 4780 7ff617589b44 4777->4780 4779 7ff617585ee0 7 API calls 4778->4779 4781 7ff617589ba9 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4779->4781 4782 7ff617585ee0 7 API calls 4780->4782 4783 7ff617589bc5 4781->4783 4784 7ff617589bca 4781->4784 4785 7ff617589b57 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX 4782->4785 4786 7ff617581c90 95 API calls 4783->4786 4784->4435 4784->4439 4787 7ff617585ee0 7 API calls 4785->4787 4786->4784 4788 7ff617589b76 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 4787->4788 4788->4781 4790 7ff61758a8da 4789->4790 4791 7ff61758e5d3 AreFileApisANSI 4789->4791 4790->4473 4790->4474 4792 7ff61758e5e8 4790->4792 4791->4790 4793 7ff61758e60f 4792->4793 4794 7ff61758e666 WideCharToMultiByte 4792->4794 4793->4794 4795 7ff61758e617 WideCharToMultiByte 4793->4795 4796 7ff61758e697 4794->4796 4795->4796 4799 7ff61758a921 4795->4799 4797 7ff61758e6a3 4796->4797 4798 7ff61758e69b GetLastError 4796->4798 4797->4799 4800 7ff61758e6b0 WideCharToMultiByte 4797->4800 4798->4797 4799->4478 4799->4481 4799->4482 4799->4485 4800->4799 4801 7ff61758e6dd GetLastError 4800->4801 4801->4799 4803 7ff61758ae1e 4802->4803 4804 7ff61758accd 4802->4804 4831 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 4803->4831 4807 7ff61758ad2f 4804->4807 4808 7ff61758ad5b 4804->4808 4809 7ff61758ae19 4807->4809 4810 7ff61758ad3c 4807->4810 4813 7ff61758ee80 std::_Facet_Register 3 API calls 4808->4813 4816 7ff61758ad44 4808->4816 4828 7ff617581130 4809->4828 4811 7ff61758ee80 std::_Facet_Register 3 API calls 4810->4811 4811->4816 4813->4816 4814 7ff61758ad88 memcpy memset 4817 7ff61758adb2 4814->4817 4819 7ff61758adc7 4814->4819 4815 7ff61758addb memcpy memset 4815->4819 4816->4814 4816->4815 4818 7ff61758add4 _invalid_parameter_noinfo_noreturn 4816->4818 4817->4818 4817->4819 4818->4815 4819->4485 4821 7ff617589170 4820->4821 4832 7ff617588de0 4821->4832 4823 7ff617589187 _CxxThrowException 4825 7ff617588eae 4824->4825 4826 7ff617588de0 27 API calls 4825->4826 4827 7ff617588ec5 _CxxThrowException __std_exception_copy 4826->4827 4827->4478 4829 7ff61758113e Concurrency::cancel_current_task 4828->4829 4830 7ff61758114f __std_exception_copy 4829->4830 4830->4803 4839 7ff617585d50 4832->4839 4834 7ff617588e22 4860 7ff617588bf0 4834->4860 4837 7ff617588e79 4837->4823 4838 7ff617588e72 _invalid_parameter_noinfo_noreturn 4838->4837 4840 7ff617585d6e memcpy 4839->4840 4844 7ff617585d9a 4839->4844 4840->4834 4841 7ff617585ea6 4875 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 4841->4875 4844->4841 4845 7ff617585df8 4844->4845 4846 7ff617585e24 4844->4846 4848 7ff617585e05 4845->4848 4849 7ff617585ea1 4845->4849 4850 7ff617585e29 4846->4850 4851 7ff617585e33 4846->4851 4852 7ff61758ee80 std::_Facet_Register 3 API calls 4848->4852 4853 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 4849->4853 4854 7ff61758ee80 std::_Facet_Register 3 API calls 4850->4854 4855 7ff617585e35 memcpy 4851->4855 4857 7ff617585e0d 4852->4857 4853->4841 4854->4857 4856 7ff617585e56 4855->4856 4859 7ff617585e7b 4855->4859 4858 7ff617585e9a _invalid_parameter_noinfo_noreturn 4856->4858 4856->4859 4857->4855 4857->4858 4858->4849 4859->4834 4876 7ff61758a740 4860->4876 4863 7ff617588c52 4865 7ff61758a820 10 API calls 4863->4865 4866 7ff617588c7f 4865->4866 4867 7ff617588cbe __std_exception_copy 4866->4867 4870 7ff617588cb2 _invalid_parameter_noinfo_noreturn 4866->4870 4871 7ff617588cb9 4866->4871 4868 7ff617588d28 4867->4868 4869 7ff617588d57 4867->4869 4868->4869 4873 7ff617588d50 _invalid_parameter_noinfo_noreturn 4868->4873 4872 7ff61758ebc0 8 API calls 4869->4872 4870->4871 4871->4867 4874 7ff617588d7c 4872->4874 4873->4869 4874->4837 4874->4838 4877 7ff61758a76d 4876->4877 4878 7ff617588c28 4877->4878 4879 7ff61758a7db 4877->4879 4881 7ff61758a7b6 4877->4881 4882 7ff61758a817 4877->4882 4878->4863 4890 7ff61758a820 4878->4890 4880 7ff61758a7e5 memcpy 4879->4880 4883 7ff61758ee80 std::_Facet_Register 3 API calls 4879->4883 4880->4878 4885 7ff61758ee80 std::_Facet_Register 3 API calls 4881->4885 4884 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 4882->4884 4883->4880 4886 7ff61758a81c 4884->4886 4887 7ff61758a7be 4885->4887 4888 7ff61758a7d4 _invalid_parameter_noinfo_noreturn 4887->4888 4889 7ff61758a7c6 4887->4889 4888->4879 4889->4880 4891 7ff61758a882 4890->4891 4892 7ff61758a843 memcpy 4890->4892 4896 7ff61758ae30 4891->4896 4892->4863 4895 7ff61758a895 4895->4863 4897 7ff61758ae5e 4896->4897 4898 7ff61758afb6 4896->4898 4901 7ff61758aec0 4897->4901 4902 7ff61758aeec 4897->4902 4914 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 4898->4914 4903 7ff61758afb1 4901->4903 4904 7ff61758aecd 4901->4904 4907 7ff61758ee80 std::_Facet_Register 3 API calls 4902->4907 4908 7ff61758aed5 4902->4908 4906 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 4903->4906 4905 7ff61758ee80 std::_Facet_Register 3 API calls 4904->4905 4905->4908 4906->4898 4907->4908 4909 7ff61758af71 memcpy memcpy 4908->4909 4910 7ff61758af1d memcpy memcpy 4908->4910 4911 7ff61758af6a _invalid_parameter_noinfo_noreturn 4908->4911 4912 7ff61758af5d 4909->4912 4910->4912 4913 7ff61758af48 4910->4913 4911->4909 4912->4895 4913->4911 4913->4912 4917 7ff61758eaae GetLastError 4916->4917 4918 7ff61758e8dc 4916->4918 4917->4918 4918->4520 4918->4521 4920 7ff617581333 4919->4920 4920->4920 4921 7ff617585d50 7 API calls 4920->4921 4922 7ff617581346 4921->4922 4930 7ff61758139c 4922->4930 5177 7ff6175880e0 4922->5177 4924 7ff617581401 4925 7ff61758143c 4924->4925 4928 7ff617581435 _invalid_parameter_noinfo_noreturn 4924->4928 4926 7ff61758ebc0 8 API calls 4925->4926 4929 7ff617581454 4926->4929 4928->4925 4929->4558 4930->4924 5195 7ff617588250 4930->5195 5215 7ff617585b00 4931->5215 4933 7ff617585645 4934 7ff61758564a ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 4933->4934 4935 7ff6175819f3 ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J 4933->4935 4934->4935 4935->4569 4935->4570 4937 7ff617585a6c 4936->4937 4938 7ff617585abf 4936->4938 5251 7ff6175858a0 4937->5251 4939 7ff617585ac6 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 4938->4939 4939->4573 4941 7ff617585aa3 fclose 4941->4938 4941->4939 4943 7ff617581f7e 4942->4943 4944 7ff617581fbb ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 4943->4944 4945 7ff617585a50 12 API calls 4943->4945 4945->4944 4947 7ff6175812e0 22 API calls 4946->4947 4948 7ff61758d554 4947->4948 4972 7ff61758d953 4948->4972 5263 7ff617588780 4948->5263 4951 7ff61758d959 5296 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 4951->5296 4952 7ff61758d5a4 4952->4951 4955 7ff617588780 6 API calls 4952->4955 4956 7ff61758d5e6 RegCreateKeyW 4955->4956 4957 7ff61758d616 RegSetKeyValueW 4956->4957 4966 7ff61758d60d 4956->4966 4958 7ff61758d653 RegCloseKey 4957->4958 4959 7ff61758d6c8 RegSetKeyValueW 4957->4959 4958->4966 4961 7ff61758d6f9 RegCloseKey 4959->4961 4962 7ff61758d70b RegCloseKey GetModuleHandleA 4959->4962 4960 7ff617587c70 27 API calls 4963 7ff61758d66c ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 4960->4963 4961->4966 4964 7ff61758d72a GetProcAddress GetProcAddress RtlAdjustPrivilege 4962->4964 4965 7ff61758d67c 4962->4965 4963->4965 4964->4966 4971 7ff61758d87a 4965->4971 4975 7ff61758d6c1 _invalid_parameter_noinfo_noreturn 4965->4975 4982 7ff61758d858 _invalid_parameter_noinfo_noreturn 4965->4982 4966->4960 4967 7ff61758d94e 4966->4967 4969 7ff617588780 6 API calls 4966->4969 5294 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 4967->5294 4973 7ff61758d7b1 RtlInitUnicodeString NtLoadDriver 4969->4973 4970 7ff61758d8ce 4974 7ff61758d922 4970->4974 4980 7ff61758d91b _invalid_parameter_noinfo_noreturn 4970->4980 4971->4970 4977 7ff61758d8c7 _invalid_parameter_noinfo_noreturn 4971->4977 5295 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 4972->5295 5278 7ff617587c70 4973->5278 4978 7ff61758ebc0 8 API calls 4974->4978 4975->4959 4977->4970 4981 7ff617581a93 4978->4981 4980->4974 4981->4587 4981->4588 4982->4965 4984 7ff61758df8e 4983->4984 4985 7ff61758df3d 4983->4985 4986 7ff61758df92 4984->4986 4996 7ff61758dfaf 4984->4996 4987 7ff61758df45 VirtualFree 4985->4987 4988 7ff61758df56 VirtualAlloc NtQuerySystemInformation 4985->4988 4989 7ff61758df97 VirtualFree 4986->4989 4998 7ff61758dfb4 4986->4998 4987->4988 4988->4984 4988->4985 4989->4998 4990 7ff61758e086 VirtualFree 4990->4998 4991 7ff61758ebc0 8 API calls 4992 7ff617581b4d 4991->4992 4992->4599 4992->4601 4993 7ff617585d50 7 API calls 4993->4996 4994 7ff61758e024 _stricmp 4995 7ff61758e0bc VirtualFree 4994->4995 4994->4996 4997 7ff61758e0e4 4995->4997 4995->4998 4996->4990 4996->4993 4996->4994 4996->4998 4999 7ff61758e10d _invalid_parameter_noinfo_noreturn 4996->4999 4997->4998 4997->4999 4998->4991 4999->4998 5311 7ff617583dd0 5000->5311 5003 7ff617583dd0 21 API calls 5004 7ff617583549 5003->5004 5005 7ff6175835e8 5004->5005 5006 7ff617583dd0 21 API calls 5004->5006 5007 7ff617583608 5005->5007 5008 7ff617583595 5005->5008 5009 7ff617583582 5006->5009 5010 7ff617587c70 27 API calls 5007->5010 5011 7ff617585ee0 7 API calls 5008->5011 5009->5008 5012 7ff617585ee0 7 API calls 5009->5012 5013 7ff617583614 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5010->5013 5014 7ff6175835a1 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5011->5014 5015 7ff6175835c4 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5012->5015 5016 7ff617587c70 27 API calls 5013->5016 5017 7ff617583bbe 5014->5017 5015->5005 5018 7ff617583657 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5016->5018 5019 7ff61758ebc0 8 API calls 5017->5019 5322 7ff617582fa0 5018->5322 5021 7ff617581bb1 5019->5021 5021->4606 5072 7ff617583f50 5021->5072 5023 7ff617582fa0 9 API calls 5024 7ff6175836bc 5023->5024 5327 7ff617583050 5024->5327 5027 7ff617585ee0 7 API calls 5028 7ff6175836ed ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5027->5028 5029 7ff6175812e0 22 API calls 5028->5029 5030 7ff617583706 5029->5030 5345 7ff6175832f0 5030->5345 5033 7ff61758373e DeviceIoControl 5034 7ff61758379b DeviceIoControl 5033->5034 5035 7ff617583728 5033->5035 5034->5035 5036 7ff617583804 5034->5036 5037 7ff617585ee0 7 API calls 5035->5037 5038 7ff617587c70 27 API calls 5036->5038 5039 7ff617583b63 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5037->5039 5041 7ff617583810 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5038->5041 5040 7ff6175831b0 58 API calls 5039->5040 5042 7ff617583b7e 5040->5042 5041->5035 5043 7ff617583849 DeviceIoControl 5041->5043 5042->5017 5047 7ff617583bb7 _invalid_parameter_noinfo_noreturn 5042->5047 5043->5035 5044 7ff6175838a5 5043->5044 5044->5035 5045 7ff6175838b3 DeviceIoControl 5044->5045 5045->5035 5046 7ff61758390f 5045->5046 5046->5035 5048 7ff6175839f0 5046->5048 5365 7ff61758ed70 EnterCriticalSection 5046->5365 5047->5017 5049 7ff6175839fa 5048->5049 5050 7ff617583a29 5048->5050 5052 7ff617585ee0 7 API calls 5049->5052 5370 7ff617587770 5050->5370 5055 7ff617583a0d ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5052->5055 5055->5035 5058 7ff617583a47 5060 7ff617583b0c 5058->5060 5061 7ff617583a58 DeviceIoControl 5058->5061 5396 7ff6175831b0 5060->5396 5061->5060 5064 7ff617583ab3 DeviceIoControl 5061->5064 5064->5060 5067 7ff617583b17 5069 7ff617585ee0 7 API calls 5067->5069 5071 7ff617583b2a ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5069->5071 5071->5042 5073 7ff617585d50 7 API calls 5072->5073 5074 7ff617583fbb 5073->5074 5075 7ff61758df00 24 API calls 5074->5075 5076 7ff617583fc6 5075->5076 5077 7ff617584004 5076->5077 5079 7ff617583ffd _invalid_parameter_noinfo_noreturn 5076->5079 5078 7ff617583dd0 21 API calls 5077->5078 5095 7ff61758400e 5077->5095 5080 7ff617584038 5078->5080 5079->5077 5083 7ff617583bf0 19 API calls 5080->5083 5080->5095 5081 7ff617585ee0 7 API calls 5082 7ff6175849a3 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5081->5082 5122 7ff617584247 5082->5122 5084 7ff617584071 5083->5084 5086 7ff617582fa0 9 API calls 5084->5086 5084->5095 5085 7ff61758ebc0 8 API calls 5087 7ff617581bc6 5085->5087 5088 7ff61758409a 5086->5088 5087->4606 5143 7ff617582a90 NtQuerySystemInformation 5087->5143 5089 7ff617582fa0 9 API calls 5088->5089 5090 7ff6175840b6 5089->5090 5091 7ff617585ee0 7 API calls 5090->5091 5090->5095 5092 7ff6175840e3 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5091->5092 5093 7ff617583050 58 API calls 5092->5093 5094 7ff61758411a 5093->5094 5094->5095 5096 7ff617585ee0 7 API calls 5094->5096 5095->5081 5095->5122 5097 7ff61758413d ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z DeviceIoControl 5096->5097 5098 7ff6175841eb 5097->5098 5099 7ff6175841a9 5097->5099 5101 7ff6175841f2 5098->5101 5102 7ff61758424e 5098->5102 5100 7ff617585ee0 7 API calls 5099->5100 5104 7ff6175841bc ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5100->5104 5105 7ff617585ee0 7 API calls 5101->5105 5103 7ff6175812e0 22 API calls 5102->5103 5134 7ff617584257 5103->5134 5106 7ff6175831b0 58 API calls 5104->5106 5107 7ff617584205 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5105->5107 5106->5095 5108 7ff6175831b0 58 API calls 5107->5108 5109 7ff617584220 5108->5109 5110 7ff617585ee0 7 API calls 5109->5110 5109->5122 5111 7ff617584237 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5110->5111 5111->5122 5112 7ff61758429f DeviceIoControl 5132 7ff61758463f 5112->5132 5112->5134 5113 7ff6175831b0 58 API calls 5113->5132 5114 7ff617585ee0 7 API calls 5117 7ff61758491f ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5114->5117 5115 7ff617585ee0 7 API calls 5118 7ff617584666 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5115->5118 5116 7ff617584323 DeviceIoControl 5116->5132 5116->5134 5117->5132 5118->5132 5119 7ff617584942 5119->5122 5124 7ff61758497f _invalid_parameter_noinfo_noreturn 5119->5124 5120 7ff6175845d6 DeviceIoControl 5120->5132 5120->5134 5121 7ff6175846bb _invalid_parameter_noinfo_noreturn 5123 7ff6175846c2 _invalid_parameter_noinfo_noreturn 5121->5123 5122->5085 5123->5132 5124->5122 5125 7ff6175843a8 memset 5125->5132 5125->5134 5126 7ff617585ee0 7 API calls 5126->5132 5127 7ff6175843d8 DeviceIoControl 5127->5132 5127->5134 5128 7ff617585bd0 7 API calls 5128->5132 5129 7ff617585bd0 7 API calls 5129->5134 5130 7ff6175888c0 7 API calls 5131 7ff617584736 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5130->5131 5131->5132 5132->5113 5132->5114 5132->5115 5132->5119 5132->5121 5132->5126 5132->5128 5132->5130 5133 7ff61758479d DeviceIoControl 5132->5133 5135 7ff617584780 _invalid_parameter_noinfo_noreturn 5132->5135 5136 7ff617584802 DeviceIoControl 5132->5136 5138 7ff617585ee0 7 API calls 5132->5138 5141 7ff617585ee0 7 API calls 5132->5141 5560 7ff617582560 5132->5560 5133->5132 5134->5112 5134->5116 5134->5120 5134->5123 5134->5125 5134->5127 5134->5129 5134->5132 5135->5132 5136->5132 5139 7ff61758488d ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5138->5139 5140 7ff6175831b0 58 API calls 5139->5140 5140->5132 5142 7ff6175848c4 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5141->5142 5142->5132 5144 7ff617582ad9 5143->5144 5150 7ff617582b26 5143->5150 5145 7ff617582ae0 VirtualFree VirtualAlloc NtQuerySystemInformation 5144->5145 5145->5145 5145->5150 5146 7ff617582baf 5147 7ff617582ef9 5146->5147 5148 7ff617582f54 VirtualFree 5146->5148 5153 7ff61758ebc0 8 API calls 5147->5153 5148->5147 5149 7ff617582bb8 VirtualFree 5149->5147 5152 7ff617582bd2 5149->5152 5150->5146 5150->5147 5150->5149 5151 7ff617582b60 GetCurrentProcessId 5150->5151 5156 7ff617582bb4 5150->5156 5151->5150 5154 7ff617582be0 DeviceIoControl 5152->5154 5170 7ff617582efd 5152->5170 5155 7ff617582f83 5153->5155 5157 7ff617582c3c 5154->5157 5154->5170 5155->4606 5156->5149 5160 7ff617582c57 DeviceIoControl 5157->5160 5157->5170 5158 7ff617585ee0 7 API calls 5159 7ff617582f10 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5158->5159 5159->5147 5161 7ff617582cb3 5160->5161 5160->5170 5162 7ff617582cce DeviceIoControl 5161->5162 5161->5170 5163 7ff617582d2a 5162->5163 5162->5170 5164 7ff617582d48 DeviceIoControl 5163->5164 5163->5170 5165 7ff617582da4 5164->5165 5164->5170 5166 7ff617582dd4 memset 5165->5166 5165->5170 5167 7ff617582dfb 5166->5167 5166->5170 5168 7ff617582e04 DeviceIoControl 5167->5168 5167->5170 5169 7ff617582e58 5168->5169 5168->5170 5169->5170 5171 7ff617582e6b DeviceIoControl 5169->5171 5170->5158 5171->5170 5172 7ff617582ec3 5171->5172 5173 7ff617585ee0 7 API calls 5172->5173 5174 7ff617582ed6 5173->5174 5175 7ff617585ee0 7 API calls 5174->5175 5176 7ff617582ee1 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5175->5176 5176->5147 5178 7ff617588109 5177->5178 5179 7ff617588239 5177->5179 5181 7ff61758823e 5178->5181 5183 7ff6175881a4 5178->5183 5184 7ff61758817c 5178->5184 5213 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 5179->5213 5182 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 5181->5182 5185 7ff617588244 5182->5185 5187 7ff61758ee80 std::_Facet_Register 3 API calls 5183->5187 5189 7ff617588191 5183->5189 5184->5181 5186 7ff617588189 5184->5186 5188 7ff61758ee80 std::_Facet_Register 3 API calls 5186->5188 5187->5189 5188->5189 5190 7ff6175881ce memcpy 5189->5190 5191 7ff617588213 memcpy 5189->5191 5193 7ff61758820c _invalid_parameter_noinfo_noreturn 5189->5193 5192 7ff6175881ff 5190->5192 5194 7ff6175881ea 5190->5194 5191->5192 5192->4930 5193->5191 5194->5192 5194->5193 5196 7ff617588280 5195->5196 5197 7ff6175883d9 5195->5197 5199 7ff6175883de 5196->5199 5200 7ff617588328 5196->5200 5201 7ff6175882fc 5196->5201 5214 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 5197->5214 5202 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 5199->5202 5206 7ff61758ee80 std::_Facet_Register 3 API calls 5200->5206 5211 7ff617588311 5200->5211 5201->5199 5203 7ff617588309 5201->5203 5204 7ff6175883e4 5202->5204 5205 7ff61758ee80 std::_Facet_Register 3 API calls 5203->5205 5205->5211 5206->5211 5207 7ff6175883a1 memcpy 5209 7ff61758838d 5207->5209 5208 7ff617588351 memcpy 5208->5209 5212 7ff617588378 5208->5212 5209->4930 5210 7ff61758839a _invalid_parameter_noinfo_noreturn 5210->5207 5211->5207 5211->5208 5211->5210 5212->5209 5212->5210 5216 7ff617585bbc 5215->5216 5217 7ff617585b21 ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH 5215->5217 5216->4933 5217->5216 5218 7ff617585b3b 5217->5218 5225 7ff617585990 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5218->5225 5223 7ff617585b7d ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5224 7ff617585b73 5223->5224 5224->4933 5226 7ff617585a1d 5225->5226 5227 7ff6175859cf _get_stream_buffer_pointers 5225->5227 5228 7ff61758ebc0 8 API calls 5226->5228 5227->5226 5229 7ff617585a40 ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2 5228->5229 5230 7ff617587ee0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 5229->5230 5231 7ff617587f35 5230->5231 5232 7ff617587faa ??1_Lockit@std@@QEAA 5231->5232 5233 7ff617587f4c ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 5231->5233 5234 7ff617587f58 5231->5234 5235 7ff61758ebc0 8 API calls 5232->5235 5233->5234 5234->5232 5237 7ff617587f6f ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 5234->5237 5236 7ff617585b63 ?always_noconv@codecvt_base@std@ 5235->5236 5236->5223 5236->5224 5238 7ff617587fd5 5237->5238 5239 7ff617587f83 5237->5239 5247 7ff617581220 5238->5247 5244 7ff61758e514 5239->5244 5242 7ff617587fda 5245 7ff61758ee80 std::_Facet_Register 3 API calls 5244->5245 5246 7ff617587f95 5245->5246 5246->5232 5250 7ff6175811f0 5247->5250 5249 7ff61758122e _CxxThrowException __std_exception_copy 5249->5242 5250->5249 5252 7ff617585973 5251->5252 5253 7ff6175858c3 5251->5253 5254 7ff61758ebc0 8 API calls 5252->5254 5253->5252 5256 7ff6175858cd 5253->5256 5255 7ff617585982 5254->5255 5255->4941 5257 7ff6175858e6 ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD 5256->5257 5258 7ff617585911 5256->5258 5259 7ff61758590c 5257->5259 5260 7ff61758ebc0 8 API calls 5258->5260 5259->5258 5262 7ff617585947 fwrite 5259->5262 5261 7ff61758592e 5260->5261 5261->4941 5262->5258 5264 7ff617588869 memcpy memcpy 5263->5264 5268 7ff6175887d4 5263->5268 5264->4952 5265 7ff6175888b1 5266 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 5265->5266 5269 7ff6175888b6 5266->5269 5267 7ff617588854 5271 7ff617588863 5267->5271 5272 7ff617588859 5267->5272 5268->5265 5268->5267 5270 7ff617588832 5268->5270 5273 7ff61758ee80 std::_Facet_Register 3 API calls 5270->5273 5271->5264 5274 7ff61758ee80 std::_Facet_Register 3 API calls 5272->5274 5275 7ff61758883a 5273->5275 5276 7ff61758883f 5274->5276 5275->5276 5277 7ff61758884d _invalid_parameter_noinfo_noreturn 5275->5277 5276->5271 5277->5267 5279 7ff617587ca0 5278->5279 5280 7ff617587cef 5279->5280 5281 7ff617587d02 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 5279->5281 5282 7ff617587d26 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 5280->5282 5283 7ff617587d30 ?getloc@ios_base@std@@QEBA?AVlocale@2 5280->5283 5281->5280 5286 7ff617587e9c ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5282->5286 5287 7ff617587ea6 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5282->5287 5297 7ff617587fe0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 5283->5297 5286->5287 5287->4965 5288 7ff617587db6 5288->5282 5291 7ff617587ddc ?widen@?$ctype@_W@std@@QEBA_WD ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5288->5291 5292 7ff617587e25 5288->5292 5289 7ff617587d99 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5289->5288 5290 7ff617587d4b 5289->5290 5290->5288 5290->5289 5291->5288 5292->5282 5293 7ff617587e2a ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5292->5293 5293->5282 5293->5292 5298 7ff617588035 5297->5298 5299 7ff6175880aa ??1_Lockit@std@@QEAA 5298->5299 5301 7ff61758804c ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 5298->5301 5302 7ff617588058 5298->5302 5300 7ff61758ebc0 8 API calls 5299->5300 5303 7ff6175880c5 5300->5303 5301->5302 5302->5299 5304 7ff61758806f ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 5302->5304 5303->5290 5305 7ff6175880d5 5304->5305 5306 7ff617588083 5304->5306 5307 7ff617581220 Concurrency::cancel_current_task 2 API calls 5305->5307 5308 7ff61758e514 std::_Facet_Register 3 API calls 5306->5308 5309 7ff6175880da 5307->5309 5310 7ff617588095 5308->5310 5310->5299 5312 7ff617583de1 5311->5312 5313 7ff617583e12 DeviceIoControl 5312->5313 5321 7ff617583ef9 5312->5321 5314 7ff617583e6c 5313->5314 5317 7ff617585ee0 7 API calls 5314->5317 5314->5321 5319 7ff617583ee9 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5317->5319 5318 7ff61758ebc0 8 API calls 5320 7ff617583520 5318->5320 5319->5321 5320->5003 5437 7ff617583bf0 5321->5437 5323 7ff617582fd2 DeviceIoControl 5322->5323 5324 7ff617583021 5322->5324 5323->5324 5325 7ff61758ebc0 8 API calls 5324->5325 5326 7ff61758303d 5325->5326 5326->5023 5328 7ff617583166 5327->5328 5330 7ff617583069 5327->5330 5328->5027 5329 7ff617583139 5331 7ff617583176 5329->5331 5332 7ff617583143 5329->5332 5330->5329 5333 7ff61758ed70 5 API calls 5330->5333 5476 7ff617587280 5331->5476 5334 7ff617585ee0 7 API calls 5332->5334 5335 7ff617583095 5333->5335 5337 7ff617583156 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5334->5337 5335->5329 5338 7ff617585d50 7 API calls 5335->5338 5337->5328 5339 7ff6175830d0 5338->5339 5453 7ff6175826a0 5339->5453 5342 7ff617583127 5473 7ff61758ed10 EnterCriticalSection LeaveCriticalSection 5342->5473 5344 7ff617583120 _invalid_parameter_noinfo_noreturn 5344->5342 5347 7ff617583350 5345->5347 5346 7ff617583457 5349 7ff617583486 5346->5349 5350 7ff617583461 5346->5350 5347->5346 5351 7ff61758ed70 5 API calls 5347->5351 5357 7ff6175834a0 5347->5357 5348 7ff61758ebc0 8 API calls 5352 7ff6175834c1 5348->5352 5531 7ff6175879f0 5349->5531 5353 7ff617585ee0 7 API calls 5350->5353 5354 7ff6175833a0 5351->5354 5352->5033 5352->5035 5356 7ff617583474 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5353->5356 5354->5346 5358 7ff617585d50 7 API calls 5354->5358 5356->5357 5357->5348 5359 7ff6175833dc 5358->5359 5360 7ff6175826a0 25 API calls 5359->5360 5361 7ff6175833f1 5360->5361 5362 7ff617583433 5361->5362 5364 7ff61758342c _invalid_parameter_noinfo_noreturn 5361->5364 5363 7ff61758ed10 4 API calls 5362->5363 5363->5346 5364->5362 5369 7ff61758ed86 5365->5369 5366 7ff61758ed8b LeaveCriticalSection 5369->5366 5557 7ff61758ee1c 5369->5557 5371 7ff6175877ae 5370->5371 5394 7ff6175877e8 5370->5394 5372 7ff6175877b3 GetModuleHandleA 5371->5372 5371->5394 5373 7ff617587808 GetProcAddress 5372->5373 5374 7ff6175877c5 5372->5374 5373->5374 5376 7ff617587829 5373->5376 5379 7ff617585ee0 7 API calls 5374->5379 5375 7ff61758ebc0 8 API calls 5377 7ff617583a3d 5375->5377 5378 7ff617587901 DeviceIoControl 5376->5378 5380 7ff61758ed70 5 API calls 5376->5380 5377->5035 5377->5058 5384 7ff617587973 5378->5384 5378->5394 5382 7ff6175877d8 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5379->5382 5383 7ff617587867 5380->5383 5382->5394 5383->5378 5385 7ff617585d50 7 API calls 5383->5385 5386 7ff617582090 25 API calls 5384->5386 5387 7ff61758789b 5385->5387 5388 7ff6175879b6 5386->5388 5389 7ff6175826a0 25 API calls 5387->5389 5393 7ff617582090 25 API calls 5388->5393 5388->5394 5390 7ff6175878af 5389->5390 5391 7ff6175878ef 5390->5391 5395 7ff6175878e8 _invalid_parameter_noinfo_noreturn 5390->5395 5392 7ff61758ed10 4 API calls 5391->5392 5392->5378 5393->5394 5394->5375 5395->5391 5397 7ff6175831c9 5396->5397 5398 7ff6175832c6 5396->5398 5399 7ff617583299 5397->5399 5402 7ff61758ed70 5 API calls 5397->5402 5398->5067 5400 7ff6175832d3 5399->5400 5401 7ff6175832a3 5399->5401 5405 7ff61758753a GetModuleHandleA 5400->5405 5436 7ff61758756f 5400->5436 5403 7ff617585ee0 7 API calls 5401->5403 5404 7ff6175831f5 5402->5404 5406 7ff6175832b6 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5403->5406 5404->5399 5408 7ff617585d50 7 API calls 5404->5408 5407 7ff617587595 GetProcAddress 5405->5407 5410 7ff61758754c 5405->5410 5406->5398 5407->5410 5412 7ff6175875b6 5407->5412 5409 7ff617583230 5408->5409 5413 7ff6175826a0 25 API calls 5409->5413 5414 7ff617585ee0 7 API calls 5410->5414 5411 7ff61758ebc0 8 API calls 5415 7ff61758757d 5411->5415 5416 7ff61758768f DeviceIoControl 5412->5416 5419 7ff61758ed70 5 API calls 5412->5419 5417 7ff617583245 5413->5417 5418 7ff61758755f ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5414->5418 5415->5067 5422 7ff617587701 5416->5422 5416->5436 5423 7ff617583287 5417->5423 5426 7ff617583280 _invalid_parameter_noinfo_noreturn 5417->5426 5418->5436 5421 7ff6175875f4 5419->5421 5421->5416 5425 7ff617585d50 7 API calls 5421->5425 5427 7ff617582090 25 API calls 5422->5427 5424 7ff61758ed10 4 API calls 5423->5424 5424->5399 5428 7ff617587629 5425->5428 5426->5423 5429 7ff617587744 5427->5429 5430 7ff6175826a0 25 API calls 5428->5430 5434 7ff617582090 25 API calls 5429->5434 5429->5436 5431 7ff61758763d 5430->5431 5432 7ff61758767d 5431->5432 5435 7ff617587676 _invalid_parameter_noinfo_noreturn 5431->5435 5433 7ff61758ed10 4 API calls 5432->5433 5433->5416 5434->5436 5435->5432 5436->5411 5438 7ff617583c1d 5437->5438 5439 7ff617583c47 5437->5439 5441 7ff617585ee0 7 API calls 5438->5441 5439->5438 5440 7ff617583c59 5439->5440 5443 7ff617583c7d DeviceIoControl 5440->5443 5444 7ff617583d7e 5440->5444 5442 7ff617583c30 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5441->5442 5452 7ff617583d66 5442->5452 5443->5444 5450 7ff617583cd7 5443->5450 5445 7ff617585ee0 7 API calls 5444->5445 5447 7ff617583d91 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5445->5447 5446 7ff61758ebc0 8 API calls 5448 7ff617583dc0 5446->5448 5447->5452 5448->5318 5449 7ff617585ee0 7 API calls 5451 7ff617583d4e ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5449->5451 5450->5449 5450->5452 5451->5452 5452->5446 5454 7ff6175829a4 5453->5454 5455 7ff6175826dc memset DeviceIoControl 5453->5455 5457 7ff61758ebc0 8 API calls 5454->5457 5455->5454 5456 7ff617582764 5455->5456 5456->5454 5458 7ff617582780 DeviceIoControl 5456->5458 5459 7ff6175829c3 5457->5459 5458->5454 5460 7ff6175827e1 5458->5460 5459->5342 5459->5344 5460->5454 5461 7ff617582804 VirtualAlloc 5460->5461 5462 7ff617582845 5461->5462 5463 7ff617582991 VirtualFree 5461->5463 5462->5463 5464 7ff617582857 DeviceIoControl 5462->5464 5463->5454 5464->5463 5468 7ff6175828b0 5464->5468 5465 7ff617585d50 7 API calls 5465->5468 5466 7ff617582925 _stricmp 5467 7ff6175829d4 5466->5467 5466->5468 5469 7ff617582a5d VirtualFree 5467->5469 5470 7ff617582a0f VirtualFree 5467->5470 5472 7ff617582a20 5467->5472 5468->5463 5468->5465 5468->5466 5471 7ff617582a56 _invalid_parameter_noinfo_noreturn 5468->5471 5469->5472 5470->5472 5471->5469 5472->5454 5472->5471 5474 7ff61758edd8 SetEvent ResetEvent 5473->5474 5477 7ff6175872bb 5476->5477 5478 7ff6175872f5 5476->5478 5477->5478 5479 7ff6175872c0 GetModuleHandleA 5477->5479 5480 7ff61758ebc0 8 API calls 5478->5480 5481 7ff61758731a GetProcAddress 5479->5481 5482 7ff6175872d2 5479->5482 5483 7ff617587303 5480->5483 5481->5482 5484 7ff61758733b 5481->5484 5485 7ff617585ee0 7 API calls 5482->5485 5483->5328 5486 7ff617587413 DeviceIoControl 5484->5486 5488 7ff61758ed70 5 API calls 5484->5488 5487 7ff6175872e5 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5485->5487 5486->5478 5491 7ff617587485 5486->5491 5487->5478 5490 7ff617587379 5488->5490 5490->5486 5493 7ff617585d50 7 API calls 5490->5493 5502 7ff617582090 5491->5502 5495 7ff6175873ad 5493->5495 5496 7ff6175826a0 25 API calls 5495->5496 5497 7ff6175873c1 5496->5497 5498 7ff617587401 5497->5498 5501 7ff6175873fa _invalid_parameter_noinfo_noreturn 5497->5501 5499 7ff61758ed10 4 API calls 5498->5499 5499->5486 5500 7ff617582090 25 API calls 5500->5478 5501->5498 5503 7ff6175820c2 5502->5503 5504 7ff617582270 5502->5504 5503->5504 5505 7ff6175820cb DeviceIoControl 5503->5505 5508 7ff61758ebc0 8 API calls 5504->5508 5506 7ff61758211d 5505->5506 5507 7ff617582153 5505->5507 5509 7ff617585ee0 7 API calls 5506->5509 5511 7ff61758229d 5507->5511 5512 7ff617582168 DeviceIoControl 5507->5512 5510 7ff617582290 5508->5510 5513 7ff617582130 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5509->5513 5510->5478 5510->5500 5514 7ff617585ee0 7 API calls 5511->5514 5512->5511 5515 7ff6175821c4 5512->5515 5513->5504 5516 7ff6175822b0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5514->5516 5515->5511 5517 7ff6175821d1 5515->5517 5516->5504 5523 7ff617581ff0 5517->5523 5519 7ff6175821e5 DeviceIoControl 5519->5504 5520 7ff617582241 5519->5520 5521 7ff617585ee0 7 API calls 5520->5521 5522 7ff617582254 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5521->5522 5522->5504 5524 7ff617582078 5523->5524 5525 7ff61758200e 5523->5525 5526 7ff61758ebc0 8 API calls 5524->5526 5525->5524 5527 7ff617582018 DeviceIoControl 5525->5527 5528 7ff617582087 5526->5528 5529 7ff61758ebc0 8 API calls 5527->5529 5528->5519 5530 7ff617582070 5529->5530 5530->5519 5532 7ff617587a68 5531->5532 5533 7ff617587a2e 5531->5533 5535 7ff61758ebc0 8 API calls 5532->5535 5533->5532 5534 7ff617587a33 GetModuleHandleA 5533->5534 5536 7ff617587a88 GetProcAddress 5534->5536 5537 7ff617587a45 5534->5537 5538 7ff617587a76 5535->5538 5536->5537 5539 7ff617587aa9 5536->5539 5541 7ff617585ee0 7 API calls 5537->5541 5538->5357 5540 7ff617587b81 DeviceIoControl 5539->5540 5542 7ff61758ed70 5 API calls 5539->5542 5540->5532 5546 7ff617587bf3 5540->5546 5544 7ff617587a58 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5541->5544 5545 7ff617587ae7 5542->5545 5544->5532 5545->5540 5548 7ff617585d50 7 API calls 5545->5548 5547 7ff617582090 25 API calls 5546->5547 5549 7ff617587c36 5547->5549 5550 7ff617587b1b 5548->5550 5549->5532 5555 7ff617582090 25 API calls 5549->5555 5551 7ff6175826a0 25 API calls 5550->5551 5552 7ff617587b2f 5551->5552 5553 7ff617587b6f 5552->5553 5556 7ff617587b68 _invalid_parameter_noinfo_noreturn 5552->5556 5554 7ff61758ed10 4 API calls 5553->5554 5554->5540 5555->5532 5556->5553 5558 7ff61758ee30 5557->5558 5559 7ff61758ee4d LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 5557->5559 5558->5559 5561 7ff617582579 5560->5561 5562 7ff617582676 5560->5562 5563 7ff617582649 5561->5563 5566 7ff61758ed70 5 API calls 5561->5566 5562->5132 5564 7ff617582683 5563->5564 5565 7ff617582653 5563->5565 5570 7ff61758704a GetModuleHandleA 5564->5570 5573 7ff61758707f 5564->5573 5567 7ff617585ee0 7 API calls 5565->5567 5568 7ff6175825a5 5566->5568 5569 7ff617582666 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5567->5569 5568->5563 5571 7ff617585d50 7 API calls 5568->5571 5569->5562 5572 7ff6175870a5 GetProcAddress 5570->5572 5575 7ff61758705c 5570->5575 5574 7ff6175825e0 5571->5574 5572->5575 5577 7ff6175870c6 5572->5577 5576 7ff61758ebc0 8 API calls 5573->5576 5579 7ff6175826a0 25 API calls 5574->5579 5580 7ff617585ee0 7 API calls 5575->5580 5581 7ff61758708d 5576->5581 5578 7ff61758719f DeviceIoControl 5577->5578 5582 7ff61758ed70 5 API calls 5577->5582 5578->5573 5587 7ff617587211 5578->5587 5584 7ff6175825f5 5579->5584 5585 7ff61758706f ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5580->5585 5581->5132 5586 7ff617587104 5582->5586 5588 7ff617582637 5584->5588 5591 7ff617582630 _invalid_parameter_noinfo_noreturn 5584->5591 5585->5573 5586->5578 5590 7ff617585d50 7 API calls 5586->5590 5592 7ff617582090 25 API calls 5587->5592 5589 7ff61758ed10 4 API calls 5588->5589 5589->5563 5593 7ff617587139 5590->5593 5591->5588 5594 7ff617587254 5592->5594 5595 7ff6175826a0 25 API calls 5593->5595 5594->5573 5599 7ff617582090 25 API calls 5594->5599 5596 7ff61758714d 5595->5596 5597 7ff61758718d 5596->5597 5600 7ff617587186 _invalid_parameter_noinfo_noreturn 5596->5600 5598 7ff61758ed10 4 API calls 5597->5598 5598->5578 5599->5573 5600->5597 5602 7ff61758f382 RtlLookupFunctionEntry 5601->5602 5603 7ff61758f19f 5602->5603 5604 7ff61758f398 RtlVirtualUnwind 5602->5604 5605 7ff61758f140 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5603->5605 5604->5602 5604->5603 5609 7ff61758f8f0 5606->5609 5608 7ff61758f91e _CxxThrowException 5609->5608 5613 7ff61758e1a4 5610->5613 5611 7ff61758e1b1 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5611->5613 5612 7ff61758e1d9 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5612->5613 5613->5611 5613->5612 5614 7ff61758e272 ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5613->5614 5615 7ff61758e24d ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5613->5615 5619 7ff61758e209 5613->5619 5614->5613 5615->5613 5616 7ff61758e223 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5616->5619 5617 7ff61758e2bc ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5617->5619 5618 7ff61758ddcd 5618->4666 5619->5616 5619->5617 5619->5618 5620 7ff61758e311 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5619->5620 5622 7ff61758e359 ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5619->5622 5627 7ff61758e390 5619->5627 5620->5619 5622->5619 5624 7ff61758de8e 5623->5624 5625 7ff61758decb ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 5624->5625 5626 7ff617585a50 12 API calls 5624->5626 5626->5625 5628 7ff61758e4f3 5627->5628 5629 7ff61758e3c8 5627->5629 5645 7ff61758afc0 ?_Xlength_error@std@@YAXPEBD 5628->5645 5630 7ff61758e3ee 5629->5630 5632 7ff61758e43a 5629->5632 5633 7ff61758e4f8 5630->5633 5634 7ff61758ee80 std::_Facet_Register 3 API calls 5630->5634 5636 7ff61758e3fd 5632->5636 5637 7ff61758ee80 std::_Facet_Register 3 API calls 5632->5637 5635 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 5633->5635 5634->5636 5638 7ff61758e4fe 5635->5638 5639 7ff61758e468 5636->5639 5640 7ff61758e46d memcpy 5636->5640 5641 7ff61758e4ec _invalid_parameter_noinfo_noreturn 5636->5641 5637->5636 5642 7ff61758e486 memcpy 5639->5642 5640->5642 5641->5628 5643 7ff61758e493 5642->5643 5644 7ff61758e4b8 5642->5644 5643->5641 5643->5644 5644->5619 5647 7ff61758b0de 5646->5647 5648 7ff61758b038 5646->5648 5649 7ff61758b158 5647->5649 5650 7ff61758b0e8 5647->5650 5651 7ff61758ed70 5 API calls 5648->5651 5860 7ff617586100 5649->5860 5652 7ff617585ee0 7 API calls 5650->5652 5653 7ff61758b044 5651->5653 5655 7ff61758b0fb ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5652->5655 5653->5647 5657 7ff617585d50 7 API calls 5653->5657 5656 7ff61758b10b 5655->5656 5661 7ff617585ee0 7 API calls 5656->5661 5659 7ff61758b078 5657->5659 5662 7ff6175826a0 25 API calls 5659->5662 5660 7ff61758b1b2 DeviceIoControl 5660->5656 5663 7ff61758b20c 5660->5663 5664 7ff61758b11e ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5661->5664 5665 7ff61758b08c 5662->5665 5666 7ff61758b252 5663->5666 5667 7ff61758b214 5663->5667 5711 7ff61758b12e 5664->5711 5668 7ff61758b0cc 5665->5668 5674 7ff61758b0c5 _invalid_parameter_noinfo_noreturn 5665->5674 5671 7ff61758b30a 5666->5671 5675 7ff61758ed70 5 API calls 5666->5675 5670 7ff617585ee0 7 API calls 5667->5670 5669 7ff61758ed10 4 API calls 5668->5669 5669->5647 5672 7ff61758b227 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5670->5672 5676 7ff61758b337 5671->5676 5681 7ff617585ee0 7 API calls 5671->5681 5678 7ff617582420 58 API calls 5672->5678 5673 7ff61758ebc0 8 API calls 5679 7ff61758b13c 5673->5679 5674->5668 5680 7ff61758b26d 5675->5680 5687 7ff61758b363 5676->5687 5886 7ff617586380 5676->5886 5683 7ff61758b242 5678->5683 5679->4696 5680->5671 5684 7ff617585d50 7 API calls 5680->5684 5682 7ff61758b327 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5681->5682 5682->5676 5685 7ff617582560 58 API calls 5683->5685 5686 7ff61758b2a4 5684->5686 5685->5711 5688 7ff6175826a0 25 API calls 5686->5688 5689 7ff61758b41b 5687->5689 5691 7ff61758ed70 5 API calls 5687->5691 5690 7ff61758b2b8 5688->5690 5695 7ff617585ee0 7 API calls 5689->5695 5698 7ff61758b448 5689->5698 5693 7ff61758b2f8 5690->5693 5699 7ff61758b2f1 _invalid_parameter_noinfo_noreturn 5690->5699 5694 7ff61758b37e 5691->5694 5697 7ff61758ed10 4 API calls 5693->5697 5694->5689 5700 7ff617585d50 7 API calls 5694->5700 5696 7ff61758b438 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5695->5696 5696->5698 5697->5671 5701 7ff61758b497 5698->5701 5702 7ff617585ee0 7 API calls 5698->5702 5912 7ff617586610 5698->5912 5699->5693 5703 7ff61758b3b5 5700->5703 5704 7ff617585ee0 7 API calls 5701->5704 5705 7ff61758b45b ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5702->5705 5706 7ff6175826a0 25 API calls 5703->5706 5707 7ff61758b4aa ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5704->5707 5708 7ff6175822e0 58 API calls 5705->5708 5709 7ff61758b3c9 5706->5709 5707->5711 5708->5698 5710 7ff61758b409 5709->5710 5713 7ff61758b402 _invalid_parameter_noinfo_noreturn 5709->5713 5712 7ff61758ed10 4 API calls 5710->5712 5711->5673 5712->5689 5713->5710 5715 7ff617586dca 5714->5715 5739 7ff617586e04 5714->5739 5716 7ff617586dcf GetModuleHandleA 5715->5716 5715->5739 5717 7ff617586e2a GetProcAddress 5716->5717 5718 7ff617586de1 5716->5718 5717->5718 5721 7ff617586e4b 5717->5721 5722 7ff617585ee0 7 API calls 5718->5722 5719 7ff61758ebc0 8 API calls 5720 7ff617586e12 5719->5720 5720->4696 5724 7ff61758ed70 5 API calls 5721->5724 5726 7ff617586f23 DeviceIoControl 5721->5726 5723 7ff617586df4 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5722->5723 5723->5739 5728 7ff617586e89 5724->5728 5727 7ff617586f95 5726->5727 5726->5739 5730 7ff617582090 25 API calls 5727->5730 5728->5726 5729 7ff617585d50 7 API calls 5728->5729 5731 7ff617586ebd 5729->5731 5732 7ff617586fd8 5730->5732 5733 7ff6175826a0 25 API calls 5731->5733 5737 7ff617582090 25 API calls 5732->5737 5732->5739 5734 7ff617586ed1 5733->5734 5735 7ff617586f11 5734->5735 5738 7ff617586f0a _invalid_parameter_noinfo_noreturn 5734->5738 5736 7ff61758ed10 4 API calls 5735->5736 5736->5726 5737->5739 5738->5735 5739->5719 5741 7ff61758c878 5740->5741 5744 7ff61758c84c 5740->5744 5742 7ff61758ebc0 8 API calls 5741->5742 5743 7ff61758b7ef 5742->5743 5746 7ff61758ba00 5743->5746 5744->5741 5938 7ff61758cf70 5744->5938 5749 7ff61758ba15 5746->5749 5747 7ff61758bacf 5747->4717 5748 7ff61758baf4 _invalid_parameter_noinfo_noreturn 5749->5747 5749->5748 5751 7ff61758cbd0 5750->5751 5762 7ff61758c9a2 5750->5762 5752 7ff61758ebc0 8 API calls 5751->5752 5753 7ff61758b806 5752->5753 5763 7ff61758bb00 5753->5763 5754 7ff61758cbea _invalid_parameter_noinfo_noreturn 5755 7ff61758cbf1 _invalid_parameter_noinfo_noreturn 5754->5755 5755->5751 5759 7ff617585d50 7 API calls 5759->5762 5761 7ff61758a740 5 API calls 5761->5762 5762->5751 5762->5754 5762->5755 5762->5759 5762->5761 5957 7ff61758d190 5762->5957 5974 7ff61758cc40 5762->5974 5985 7ff61758cd50 5762->5985 6007 7ff61758c690 5762->6007 5777 7ff61758bb37 5763->5777 5764 7ff61758bcf3 5766 7ff61758c380 20 API calls 5764->5766 5771 7ff61758bc28 5764->5771 5765 7ff61758df00 24 API calls 5765->5777 5768 7ff61758bc8c 5766->5768 5767 7ff61758bc2f 5770 7ff61758c170 7 API calls 5767->5770 5768->5771 5774 7ff61758bd89 _invalid_parameter_noinfo_noreturn 5768->5774 5769 7ff61758ebc0 8 API calls 5772 7ff61758b811 5769->5772 5773 7ff61758bc42 5770->5773 5771->5769 5772->4722 5772->4724 5775 7ff61758c460 7 API calls 5773->5775 5776 7ff61758bc5b 5775->5776 5778 7ff61758c170 7 API calls 5776->5778 5777->5764 5777->5765 5777->5767 5779 7ff6175826a0 25 API calls 5777->5779 5782 7ff61758bbac 5777->5782 5780 7ff61758bc6a ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5778->5780 5779->5777 5780->5771 5781 7ff61758bc83 5780->5781 5784 7ff61758c380 20 API calls 5781->5784 6054 7ff61758c170 5782->6054 5784->5768 5788 7ff61758c170 7 API calls 5789 7ff61758bbe7 5788->5789 5790 7ff61758c460 7 API calls 5789->5790 5791 7ff61758bc00 5790->5791 5792 7ff61758c170 7 API calls 5791->5792 5793 7ff61758bc0f ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5792->5793 6080 7ff61758bd90 5793->6080 5796 7ff617587c70 27 API calls 5795->5796 5797 7ff617589cf7 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5796->5797 5797->4728 5799 7ff61758bf27 5798->5799 5801 7ff61758bf61 5798->5801 5800 7ff61758bf2c GetModuleHandleA 5799->5800 5799->5801 5802 7ff61758bf3e 5800->5802 5803 7ff61758bf86 GetProcAddress 5800->5803 5804 7ff61758ebc0 8 API calls 5801->5804 5807 7ff617585ee0 7 API calls 5802->5807 5803->5802 5806 7ff61758bfa7 5803->5806 5805 7ff61758b8ca 5804->5805 5805->4724 5805->4731 5808 7ff61758c07f DeviceIoControl 5806->5808 5810 7ff61758ed70 5 API calls 5806->5810 5811 7ff61758bf51 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5807->5811 5808->5801 5813 7ff61758c0f1 5808->5813 5812 7ff61758bfe5 5810->5812 5811->5801 5812->5808 5814 7ff617585d50 7 API calls 5812->5814 5815 7ff617582090 25 API calls 5813->5815 5816 7ff61758c019 5814->5816 5817 7ff61758c134 5815->5817 5818 7ff6175826a0 25 API calls 5816->5818 5817->5801 5822 7ff617582090 25 API calls 5817->5822 5819 7ff61758c02d 5818->5819 5820 7ff61758c06d 5819->5820 5823 7ff61758c066 _invalid_parameter_noinfo_noreturn 5819->5823 5821 7ff61758ed10 4 API calls 5820->5821 5821->5808 5822->5801 5823->5820 5825 7ff6175823c1 5824->5825 5826 7ff617582311 5824->5826 5827 7ff6175823cb 5825->5827 5828 7ff6175823f8 5825->5828 5829 7ff61758ed70 5 API calls 5826->5829 5830 7ff617585ee0 7 API calls 5827->5830 6089 7ff617586890 5828->6089 5831 7ff61758231d 5829->5831 5833 7ff6175823de ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5830->5833 5831->5825 5835 7ff617585d50 7 API calls 5831->5835 5833->4739 5836 7ff617582358 5835->5836 5837 7ff6175826a0 25 API calls 5836->5837 5838 7ff61758236d 5837->5838 5839 7ff6175823af 5838->5839 5841 7ff6175823a8 _invalid_parameter_noinfo_noreturn 5838->5841 5840 7ff61758ed10 4 API calls 5839->5840 5840->5825 5841->5839 5843 7ff617582500 5842->5843 5844 7ff617582450 5842->5844 5845 7ff61758253a 5843->5845 5846 7ff61758250a 5843->5846 5847 7ff61758ed70 5 API calls 5844->5847 6115 7ff617586b10 5845->6115 5848 7ff617585ee0 7 API calls 5846->5848 5849 7ff61758245c 5847->5849 5851 7ff61758251d ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5848->5851 5849->5843 5853 7ff617585d50 7 API calls 5849->5853 5851->4736 5854 7ff617582497 5853->5854 5855 7ff6175826a0 25 API calls 5854->5855 5856 7ff6175824ac 5855->5856 5857 7ff6175824ee 5856->5857 5859 7ff6175824e7 _invalid_parameter_noinfo_noreturn 5856->5859 5858 7ff61758ed10 4 API calls 5857->5858 5858->5843 5859->5857 5861 7ff61758613b 5860->5861 5862 7ff617586175 5860->5862 5861->5862 5863 7ff617586140 GetModuleHandleA 5861->5863 5864 7ff61758ebc0 8 API calls 5862->5864 5865 7ff61758619a GetProcAddress 5863->5865 5866 7ff617586152 5863->5866 5867 7ff617586183 5864->5867 5865->5866 5868 7ff6175861bb 5865->5868 5870 7ff617585ee0 7 API calls 5866->5870 5867->5656 5867->5660 5869 7ff617586294 DeviceIoControl 5868->5869 5871 7ff61758ed70 5 API calls 5868->5871 5869->5862 5875 7ff617586306 5869->5875 5873 7ff617586165 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5870->5873 5874 7ff6175861f9 5871->5874 5873->5862 5874->5869 5877 7ff617585d50 7 API calls 5874->5877 5876 7ff617582090 25 API calls 5875->5876 5878 7ff617586349 5876->5878 5879 7ff61758622e 5877->5879 5878->5862 5884 7ff617582090 25 API calls 5878->5884 5880 7ff6175826a0 25 API calls 5879->5880 5881 7ff617586242 5880->5881 5882 7ff617586282 5881->5882 5885 7ff61758627b _invalid_parameter_noinfo_noreturn 5881->5885 5883 7ff61758ed10 4 API calls 5882->5883 5883->5869 5884->5862 5885->5882 5887 7ff6175863bb 5886->5887 5909 7ff6175863f5 5886->5909 5888 7ff6175863c0 GetModuleHandleA 5887->5888 5887->5909 5889 7ff61758641a GetProcAddress 5888->5889 5890 7ff6175863d2 5888->5890 5889->5890 5893 7ff61758643b 5889->5893 5894 7ff617585ee0 7 API calls 5890->5894 5891 7ff61758ebc0 8 API calls 5892 7ff617586403 5891->5892 5892->5676 5895 7ff617586513 DeviceIoControl 5893->5895 5896 7ff61758ed70 5 API calls 5893->5896 5898 7ff6175863e5 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5894->5898 5900 7ff617586585 5895->5900 5895->5909 5899 7ff617586479 5896->5899 5898->5909 5899->5895 5901 7ff617585d50 7 API calls 5899->5901 5902 7ff617582090 25 API calls 5900->5902 5903 7ff6175864ad 5901->5903 5904 7ff6175865c8 5902->5904 5905 7ff6175826a0 25 API calls 5903->5905 5908 7ff617582090 25 API calls 5904->5908 5904->5909 5906 7ff6175864c1 5905->5906 5910 7ff6175864fa _invalid_parameter_noinfo_noreturn 5906->5910 5911 7ff617586501 5906->5911 5907 7ff61758ed10 4 API calls 5907->5895 5908->5909 5909->5891 5910->5911 5911->5907 5913 7ff61758664b 5912->5913 5937 7ff617586685 5912->5937 5914 7ff617586650 GetModuleHandleA 5913->5914 5913->5937 5916 7ff6175866aa GetProcAddress 5914->5916 5917 7ff617586662 5914->5917 5915 7ff61758ebc0 8 API calls 5918 7ff617586693 5915->5918 5916->5917 5919 7ff6175866cb 5916->5919 5920 7ff617585ee0 7 API calls 5917->5920 5918->5698 5922 7ff61758ed70 5 API calls 5919->5922 5924 7ff6175867a3 DeviceIoControl 5919->5924 5921 7ff617586675 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5920->5921 5921->5937 5925 7ff617586709 5922->5925 5926 7ff617586815 5924->5926 5924->5937 5925->5924 5928 7ff617585d50 7 API calls 5925->5928 5927 7ff617582090 25 API calls 5926->5927 5929 7ff617586858 5927->5929 5930 7ff61758673d 5928->5930 5935 7ff617582090 25 API calls 5929->5935 5929->5937 5931 7ff6175826a0 25 API calls 5930->5931 5932 7ff617586751 5931->5932 5933 7ff617586791 5932->5933 5936 7ff61758678a _invalid_parameter_noinfo_noreturn 5932->5936 5934 7ff61758ed10 4 API calls 5933->5934 5934->5924 5935->5937 5936->5933 5937->5915 5939 7ff61758d175 5938->5939 5940 7ff61758cfda 5938->5940 5956 7ff61758afc0 ?_Xlength_error@std@@YAXPEBD 5939->5956 5942 7ff61758d17a 5940->5942 5945 7ff61758d077 5940->5945 5946 7ff61758d04e 5940->5946 5943 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 5942->5943 5944 7ff61758d180 5943->5944 5947 7ff61758ee80 std::_Facet_Register 3 API calls 5945->5947 5951 7ff61758d060 5945->5951 5946->5942 5948 7ff61758ee80 std::_Facet_Register 3 API calls 5946->5948 5947->5951 5948->5951 5949 7ff61758d0b6 5952 7ff61758d0d4 memcpy 5949->5952 5950 7ff61758d0bb memcpy 5950->5952 5951->5949 5951->5950 5953 7ff61758d16e _invalid_parameter_noinfo_noreturn 5951->5953 5954 7ff61758d0e1 5952->5954 5955 7ff61758d129 5952->5955 5953->5939 5954->5953 5954->5955 5955->5744 5958 7ff61758d200 5957->5958 5959 7ff61758d34d 5957->5959 6013 7ff61758d360 5958->6013 6041 7ff61758afc0 ?_Xlength_error@std@@YAXPEBD 5959->6041 5963 7ff61758d248 5964 7ff61758a740 5 API calls 5963->5964 5965 7ff61758d273 5964->5965 5968 7ff61758d29c 5965->5968 6028 7ff61758d490 5965->6028 5967 7ff61758d490 16 API calls 5969 7ff61758d2b0 5967->5969 5968->5967 5973 7ff61758d30d 5969->5973 6032 7ff61758c780 5969->6032 5971 7ff61758d2c2 5972 7ff61758d346 _invalid_parameter_noinfo_noreturn 5971->5972 5971->5973 5972->5959 5973->5762 5975 7ff61758a740 5 API calls 5974->5975 5976 7ff61758cc72 5975->5976 5977 7ff61758cd23 5976->5977 5978 7ff61758d360 18 API calls 5976->5978 5979 7ff61758ebc0 8 API calls 5977->5979 5980 7ff61758ccc1 5978->5980 5981 7ff61758cd34 5979->5981 5982 7ff61758a740 5 API calls 5980->5982 5983 7ff61758cd18 5980->5983 5981->5762 5982->5980 5984 7ff61758c780 16 API calls 5983->5984 5984->5977 5990 7ff61758cdc3 5985->5990 5991 7ff61758cf5a 5985->5991 5986 7ff61758cf55 5989 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 5986->5989 5989->5991 5990->5986 5992 7ff61758ce4e 5990->5992 5993 7ff61758ce20 5990->5993 6053 7ff61758afc0 ?_Xlength_error@std@@YAXPEBD 5991->6053 5995 7ff61758ee80 std::_Facet_Register 3 API calls 5992->5995 5996 7ff61758ce32 5992->5996 5993->5986 5994 7ff61758ee80 std::_Facet_Register 3 API calls 5993->5994 5994->5996 5995->5996 5997 7ff61758cf4e _invalid_parameter_noinfo_noreturn 5996->5997 5998 7ff61758cc40 20 API calls 5996->5998 5997->5986 5999 7ff61758ce91 5998->5999 6000 7ff61758cead 5999->6000 6042 7ff61758d3f0 5999->6042 6001 7ff61758d3f0 20 API calls 6000->6001 6003 7ff61758cec1 6001->6003 6006 7ff61758cf1a 6003->6006 6046 7ff61758c380 6003->6046 6005 7ff61758ced3 6005->5997 6005->6006 6006->5762 6008 7ff61758c6a1 6007->6008 6009 7ff61758c6f5 6007->6009 6010 7ff61758c780 16 API calls 6008->6010 6009->5762 6011 7ff61758c6aa 6010->6011 6011->6009 6012 7ff61758c710 _invalid_parameter_noinfo_noreturn 6011->6012 6014 7ff61758d3ce 6013->6014 6015 7ff61758d373 6013->6015 6016 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 6014->6016 6015->6014 6017 7ff61758d3b9 6015->6017 6019 7ff61758d391 6015->6019 6018 7ff61758c690 6016->6018 6017->5963 6022 7ff61758c780 16 API calls 6018->6022 6026 7ff61758c6f5 6018->6026 6020 7ff61758ee80 std::_Facet_Register 3 API calls 6019->6020 6021 7ff61758d399 6020->6021 6023 7ff61758d3a1 6021->6023 6024 7ff61758d3b2 _invalid_parameter_noinfo_noreturn 6021->6024 6025 7ff61758c6aa 6022->6025 6023->5963 6024->6017 6025->6026 6027 7ff61758c710 _invalid_parameter_noinfo_noreturn 6025->6027 6026->5963 6029 7ff61758d49e 6028->6029 6030 7ff61758c780 16 API calls 6029->6030 6031 7ff61758d502 6030->6031 6031->5968 6033 7ff61758c7ee 6032->6033 6034 7ff61758c785 6032->6034 6033->5971 6034->6033 6035 7ff61758c7fe _invalid_parameter_noinfo_noreturn 6034->6035 6039 7ff61758c810 6035->6039 6036 7ff61758c878 6037 7ff61758ebc0 8 API calls 6036->6037 6038 7ff61758c940 6037->6038 6038->5971 6039->6036 6040 7ff61758cf70 7 API calls 6039->6040 6040->6039 6043 7ff61758d401 6042->6043 6044 7ff61758c380 20 API calls 6043->6044 6045 7ff61758d481 6044->6045 6045->6000 6047 7ff61758c389 6046->6047 6048 7ff61758c3fc 6046->6048 6047->6048 6049 7ff61758c690 17 API calls 6047->6049 6050 7ff61758c40c _invalid_parameter_noinfo_noreturn ?uncaught_exception@std@ 6047->6050 6048->6005 6049->6047 6051 7ff61758c433 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 6050->6051 6052 7ff61758c43d 6050->6052 6051->6052 6052->6005 6055 7ff61758c1a0 6054->6055 6056 7ff61758c208 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 6055->6056 6059 7ff61758c1f5 6055->6059 6056->6059 6058 7ff61758c279 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 6062 7ff61758c293 6058->6062 6063 7ff61758c22f ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 6058->6063 6059->6058 6059->6063 6064 7ff61758c255 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 6059->6064 6065 7ff61758c276 6059->6065 6060 7ff61758c302 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 6061 7ff61758bbbf 6060->6061 6067 7ff61758c460 6061->6067 6062->6063 6066 7ff61758c298 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 6062->6066 6063->6060 6063->6061 6064->6059 6064->6063 6065->6058 6066->6062 6066->6063 6068 7ff61758c496 6067->6068 6069 7ff61758c4e4 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 6068->6069 6072 7ff61758c4d1 6068->6072 6069->6072 6071 7ff61758c594 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 6073 7ff61758c50b ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 6071->6073 6074 7ff61758c549 6071->6074 6072->6071 6072->6073 6077 7ff61758c591 6072->6077 6078 7ff61758c52d ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 6072->6078 6075 7ff61758bbd8 6073->6075 6076 7ff61758c5e8 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 6073->6076 6074->6073 6079 7ff61758c557 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 6074->6079 6075->5788 6076->6075 6077->6071 6078->6072 6078->6074 6079->6073 6079->6074 6081 7ff61758bda1 6080->6081 6084 7ff61758bdf1 6080->6084 6082 7ff61758c380 20 API calls 6081->6082 6083 7ff61758bdaa 6082->6083 6083->6084 6085 7ff61758be0c _invalid_parameter_noinfo_noreturn 6083->6085 6084->5771 6086 7ff61758be31 6085->6086 6087 7ff61758be79 6085->6087 6086->6087 6088 7ff61758be94 _invalid_parameter_noinfo_noreturn 6086->6088 6087->5771 6090 7ff617586908 6089->6090 6091 7ff6175868ce 6089->6091 6095 7ff61758ebc0 8 API calls 6090->6095 6091->6090 6092 7ff6175868d3 GetModuleHandleA 6091->6092 6093 7ff617586928 GetProcAddress 6092->6093 6094 7ff6175868e5 6092->6094 6093->6094 6097 7ff617586949 6093->6097 6099 7ff617585ee0 7 API calls 6094->6099 6096 7ff61758240d 6095->6096 6096->4739 6098 7ff617586a21 DeviceIoControl 6097->6098 6100 7ff61758ed70 5 API calls 6097->6100 6098->6090 6104 7ff617586a93 6098->6104 6102 7ff6175868f8 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6099->6102 6103 7ff617586987 6100->6103 6102->6090 6103->6098 6105 7ff617585d50 7 API calls 6103->6105 6106 7ff617582090 25 API calls 6104->6106 6107 7ff6175869bb 6105->6107 6108 7ff617586ad6 6106->6108 6109 7ff6175826a0 25 API calls 6107->6109 6108->6090 6113 7ff617582090 25 API calls 6108->6113 6110 7ff6175869cf 6109->6110 6111 7ff617586a0f 6110->6111 6114 7ff617586a08 _invalid_parameter_noinfo_noreturn 6110->6114 6112 7ff61758ed10 4 API calls 6111->6112 6112->6098 6113->6090 6114->6111 6116 7ff617586b4b 6115->6116 6140 7ff617586b85 6115->6140 6117 7ff617586b50 GetModuleHandleA 6116->6117 6116->6140 6118 7ff617586baa GetProcAddress 6117->6118 6119 7ff617586b62 6117->6119 6118->6119 6122 7ff617586bcb 6118->6122 6123 7ff617585ee0 7 API calls 6119->6123 6120 7ff61758ebc0 8 API calls 6121 7ff61758254a 6120->6121 6121->4736 6124 7ff617586ca3 DeviceIoControl 6122->6124 6126 7ff61758ed70 5 API calls 6122->6126 6125 7ff617586b75 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6123->6125 6129 7ff617586d15 6124->6129 6124->6140 6125->6140 6128 7ff617586c09 6126->6128 6128->6124 6131 7ff617585d50 7 API calls 6128->6131 6130 7ff617582090 25 API calls 6129->6130 6133 7ff617586d58 6130->6133 6132 7ff617586c3d 6131->6132 6134 7ff6175826a0 25 API calls 6132->6134 6138 7ff617582090 25 API calls 6133->6138 6133->6140 6135 7ff617586c51 6134->6135 6136 7ff617586c91 6135->6136 6139 7ff617586c8a _invalid_parameter_noinfo_noreturn 6135->6139 6137 7ff61758ed10 4 API calls 6136->6137 6137->6124 6138->6140 6139->6136 6140->6120 6142 7ff61758d9a6 6141->6142 6160 7ff61758dbd8 6141->6160 6146 7ff617588780 6 API calls 6142->6146 6153 7ff61758dc0a 6142->6153 6143 7ff61758ebc0 8 API calls 6144 7ff617581d00 6143->6144 6144->4750 6144->4752 6148 7ff61758d9f4 RtlInitUnicodeString 6146->6148 6149 7ff61758da1e 6148->6149 6150 7ff61758dc05 6148->6150 6152 7ff617588780 6 API calls 6149->6152 6168 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 6150->6168 6154 7ff61758da4b RegOpenKeyW 6152->6154 6169 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 6153->6169 6155 7ff61758da7a RegCloseKey GetProcAddress 6154->6155 6159 7ff61758da6f 6154->6159 6157 7ff61758da9a 6155->6157 6156 7ff61758db83 6156->6160 6163 7ff61758dbd1 _invalid_parameter_noinfo_noreturn 6156->6163 6158 7ff617587c70 27 API calls 6157->6158 6161 7ff61758daaf ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6158->6161 6159->6156 6162 7ff61758db7c _invalid_parameter_noinfo_noreturn 6159->6162 6160->6143 6164 7ff61758dade 6161->6164 6165 7ff61758db20 RegDeleteKeyW 6161->6165 6162->6156 6163->6160 6166 7ff617587c70 27 API calls 6164->6166 6165->6159 6167 7ff61758daf1 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z RegDeleteKeyW 6166->6167 6167->6159 6171 7ff617585771 6170->6171 6171->6171 6172 7ff617585d50 7 API calls 6171->6172 6173 7ff61758577f 6172->6173 6174 7ff6175893b0 6173->6174 6175 7ff617588bf0 23 API calls 6174->6175 6176 7ff6175893d8 6175->6176 6181 7ff6175894e0 6176->6181 6179 7ff6175894c0 6179->4776 6180 7ff6175894b9 _invalid_parameter_noinfo_noreturn 6180->6179 6182 7ff61758e5c0 __std_fs_code_page 2 API calls 6181->6182 6183 7ff617589541 6182->6183 6213 7ff61758aa00 6183->6213 6186 7ff61758aa00 40 API calls 6187 7ff6175895a3 6186->6187 6190 7ff6175895d9 6187->6190 6191 7ff6175895ed 6187->6191 6197 7ff6175895e7 6187->6197 6188 7ff61758a820 10 API calls 6189 7ff617589666 6188->6189 6192 7ff61758a820 10 API calls 6189->6192 6231 7ff61758ab50 6190->6231 6195 7ff6175895f9 memcpy 6191->6195 6191->6197 6194 7ff61758967b 6192->6194 6196 7ff61758a820 10 API calls 6194->6196 6195->6197 6198 7ff61758961b 6195->6198 6199 7ff617589695 6196->6199 6197->6188 6198->6197 6200 7ff6175896f1 _invalid_parameter_noinfo_noreturn 6198->6200 6201 7ff6175896c8 6199->6201 6203 7ff61758a820 10 API calls 6199->6203 6200->6201 6207 7ff6175896d5 6201->6207 6249 7ff6175883f0 6201->6249 6204 7ff6175896ae 6203->6204 6205 7ff61758a820 10 API calls 6204->6205 6205->6201 6206 7ff61758973d 6208 7ff61758978b 6206->6208 6212 7ff617589784 _invalid_parameter_noinfo_noreturn 6206->6212 6207->6206 6210 7ff617589736 _invalid_parameter_noinfo_noreturn 6207->6210 6209 7ff61758ebc0 8 API calls 6208->6209 6211 7ff61758947f 6209->6211 6210->6206 6211->6179 6211->6180 6212->6208 6214 7ff617589573 6213->6214 6215 7ff61758aa4d 6213->6215 6214->6186 6216 7ff61758ab38 6215->6216 6267 7ff61758e70c WideCharToMultiByte 6215->6267 6218 7ff617588ea0 29 API calls 6216->6218 6220 7ff61758ab3e 6218->6220 6221 7ff617589160 28 API calls 6220->6221 6224 7ff61758ab46 6221->6224 6222 7ff61758aadf 6225 7ff61758aca0 9 API calls 6222->6225 6223 7ff61758aab8 memset 6227 7ff61758aa91 6223->6227 6225->6227 6228 7ff61758e70c 4 API calls 6227->6228 6229 7ff61758ab0c 6228->6229 6229->6214 6230 7ff617589160 28 API calls 6229->6230 6230->6216 6235 7ff61758ab79 6231->6235 6243 7ff61758ac90 6231->6243 6233 7ff61758abd6 6236 7ff61758abe3 6233->6236 6237 7ff61758ac8b 6233->6237 6235->6233 6238 7ff61758abfe 6235->6238 6239 7ff61758ee80 std::_Facet_Register 3 API calls 6236->6239 6240 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 6237->6240 6241 7ff61758ee80 std::_Facet_Register 3 API calls 6238->6241 6242 7ff61758abeb 6238->6242 6239->6242 6240->6243 6241->6242 6244 7ff61758ac24 memcpy 6242->6244 6245 7ff61758ac65 memcpy 6242->6245 6246 7ff61758ac5e _invalid_parameter_noinfo_noreturn 6242->6246 6273 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 6243->6273 6247 7ff61758ac51 6244->6247 6248 7ff61758ac3c 6244->6248 6245->6247 6246->6245 6247->6197 6248->6246 6248->6247 6250 7ff61758841f 6249->6250 6261 7ff617588548 6249->6261 6253 7ff6175884a4 6250->6253 6254 7ff61758847c 6250->6254 6258 7ff61758ee80 std::_Facet_Register 3 API calls 6253->6258 6259 7ff617588491 6253->6259 6255 7ff617588543 6254->6255 6256 7ff617588489 6254->6256 6257 7ff617581130 Concurrency::cancel_current_task __std_exception_copy 6255->6257 6260 7ff61758ee80 std::_Facet_Register 3 API calls 6256->6260 6257->6261 6258->6259 6262 7ff617588513 memcpy 6259->6262 6263 7ff6175884c9 memcpy 6259->6263 6266 7ff61758850c _invalid_parameter_noinfo_noreturn 6259->6266 6260->6259 6274 7ff6175811d0 ?_Xlength_error@std@@YAXPEBD 6261->6274 6265 7ff6175884ff 6262->6265 6264 7ff6175884ea 6263->6264 6263->6265 6264->6265 6264->6266 6265->6207 6266->6262 6268 7ff61758e763 GetLastError 6267->6268 6269 7ff61758e76b 6267->6269 6268->6269 6270 7ff61758aa72 6269->6270 6271 7ff61758e778 WideCharToMultiByte 6269->6271 6270->6220 6270->6222 6270->6223 6270->6227 6271->6270 6272 7ff61758e7a6 GetLastError 6271->6272 6272->6270 6371 7ff617589040 6378 7ff61758e558 FormatMessageA 6371->6378 6374 7ff617585d50 7 API calls 6375 7ff6175890ae LocalFree 6374->6375 6376 7ff61758ebc0 8 API calls 6375->6376 6377 7ff6175890c9 6376->6377 6379 7ff617589075 6378->6379 6379->6374 6380 7ff61758c340 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 6561 7ff6175897c0 6562 7ff6175897e1 6561->6562 6563 7ff6175898b3 __std_exception_destroy 6562->6563 6564 7ff6175898fd _invalid_parameter_noinfo_noreturn 6562->6564 6565 7ff6175898ab 6562->6565 6566 7ff6175898dd 6563->6566 6568 7ff61758992a 6564->6568 6565->6563 6567 7ff617589a2b _invalid_parameter_noinfo_noreturn __std_exception_copy 6570 7ff617589a9c 6567->6570 6568->6567 6569 7ff6175899fc __std_exception_destroy 6568->6569 6569->6567 6571 7ff61758a740 5 API calls 6570->6571 6572 7ff617589ab8 6571->6572 6282 7ff6175860c0 ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 6382 7ff617584a40 6383 7ff617584a53 6382->6383 6384 7ff617584a74 6382->6384 6383->6384 6385 7ff617584a63 fflush 6383->6385 6385->6384 6386 7ff617585240 6387 7ff61758525b 6386->6387 6388 7ff6175852a9 ungetc 6387->6388 6389 7ff617585271 6387->6389 6388->6389 6577 7ff6175854c0 6578 7ff6175854cc _unlock_file 6577->6578 6579 7ff6175854d3 6577->6579 6578->6579 6580 7ff617584dc0 6581 7ff617584dd7 6580->6581 6582 7ff617584de2 6580->6582 6583 7ff617584de9 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J 6582->6583 6584 7ff617584df8 6582->6584 6583->6584 6585 7ff617584e22 memcpy 6584->6585 6587 7ff617584e50 6584->6587 6585->6587 6586 7ff617584ef7 6587->6586 6588 7ff617584ed1 6587->6588 6589 7ff617584ea0 fread 6587->6589 6588->6586 6590 7ff617584ed9 fread 6588->6590 6589->6586 6589->6587 6590->6586 6390 7ff61758f63c 6393 7ff61758fae8 6390->6393 6394 7ff61758f645 6393->6394 6395 7ff61758fb0b GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6393->6395 6395->6394 6396 7ff61758fd3c 6397 7ff61758fd74 __GSHandlerCheckCommon 6396->6397 6398 7ff61758fd8f __CxxFrameHandler4 6397->6398 6399 7ff61758fda0 6397->6399 6398->6399 6400 7ff617590050 6401 7ff617590063 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 6400->6401 6402 7ff617590078 6400->6402 6401->6402 6407 7ff617586049 6408 7ff617586057 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 6407->6408 6409 7ff617586077 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 6408->6409 6410 7ff617586081 6408->6410 6409->6410 6411 7ff61758f248 6414 7ff61758f25c IsProcessorFeaturePresent 6411->6414 6415 7ff61758f273 6414->6415 6420 7ff61758f2f8 RtlCaptureContext RtlLookupFunctionEntry 6415->6420 6421 7ff61758f328 RtlVirtualUnwind 6420->6421 6422 7ff61758f287 6420->6422 6421->6422 6423 7ff61758f140 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6422->6423 6595 7ff617584bd0 6596 7ff617584c03 6595->6596 6597 7ff6175858a0 10 API calls 6596->6597 6603 7ff617584c61 6596->6603 6601 7ff617584c26 6597->6601 6598 7ff61758ebc0 8 API calls 6599 7ff617584ccb 6598->6599 6600 7ff617584c34 _fseeki64 6602 7ff617584c4b fgetpos 6600->6602 6600->6603 6601->6600 6601->6602 6601->6603 6602->6603 6603->6598
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00007FF617589D54
                          • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF617589D9B
                          • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF617589DDB
                          • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF617589E6B
                          • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF617589EAB
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF617589F01
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF617589F29
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF617589F50
                          • memcmp.VCRUNTIME140(?), ref: 00007FF61758A0ED
                            • Part of subcall function 00007FF617589BE0: _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF617589C56
                            • Part of subcall function 00007FF617589BE0: _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF617589C8D
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF61758A21D
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758A240
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00007FF61758A278
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00007FF61758A27F
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00007FF61758A286
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00007FF61758A3DE
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?), ref: 00007FF61758A444
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00007FF61758A48E
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758A56F
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758A5FE
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758A621
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758A659
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@W@std@@@std@@$_invalid_parameter_noinfo_noreturn_wcsicmp$ExceptionFilterUnhandledmemcmp
                          • String ID: [!] Incorrect Usage!$ doesn't exist$.sys$PassAllocationPtr$[+] Free pool memory after usage enabled$[+] Mdl memory usage enabled$[+] Pass Allocation Ptr as first param enabled$[+] Usage: kdmapper.exe [--free][--mdl][--PassAllocationPtr] driver$[+] success$[-] Failed to map $[-] Failed to read image to memory$[-] File $[-] Warning failed to fully unload vulnerable driver $free$mdl
                          • API String ID: 2745243099-1302835770
                          • Opcode ID: 6215dc89822ff98d957ce301f8fdb99103dbc0e264c099da4b1e3350ad52609f
                          • Instruction ID: 6ebcf91c61e437bafc112074763b7191e742bc5cda9d2e847640d57a690c05c2
                          • Opcode Fuzzy Hash: 6215dc89822ff98d957ce301f8fdb99103dbc0e264c099da4b1e3350ad52609f
                          • Instruction Fuzzy Hash: 7C529162E28E4286FB109B66D8442BD2371FB54FB4F504235DA6E836EADF7CE585D300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 214 7ff617581780-7ff617581805 _time64 GetCurrentThreadId srand CreateFileW 215 7ff61758183c-7ff61758189f rand 214->215 216 7ff617581807-7ff617581837 CloseHandle call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 214->216 218 7ff6175818e6-7ff617581910 call 7ff617585ee0 call 7ff6175812e0 215->218 219 7ff6175818a1-7ff6175818ae 215->219 223 7ff617581c62-7ff617581c8d call 7ff61758ebc0 216->223 229 7ff617581915-7ff61758193a call 7ff6175888c0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 218->229 230 7ff617581912 218->230 221 7ff6175818b5-7ff6175818e4 rand 219->221 221->218 221->221 233 7ff61758193c-7ff617581953 229->233 234 7ff617581976-7ff617581987 call 7ff617581470 229->234 230->229 235 7ff617581955-7ff617581968 233->235 236 7ff617581971 call 7ff61758ebe0 233->236 241 7ff617581989 234->241 242 7ff6175819b1-7ff617581a1b _wremove memset call 7ff617585570 ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z 234->242 235->236 238 7ff61758196a-7ff617581970 _invalid_parameter_noinfo_noreturn 235->238 236->234 238->236 244 7ff617581990-7ff6175819ac call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 241->244 248 7ff617581a1d-7ff617581a25 call 7ff617585a50 242->248 249 7ff617581a59-7ff617581a61 call 7ff617585a50 242->249 250 7ff617581c13 244->250 256 7ff617581a27-7ff617581a43 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z 248->256 257 7ff617581a44-7ff617581a54 call 7ff617581f20 248->257 260 7ff617581a63-7ff617581a7f ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z 249->260 261 7ff617581a80-7ff617581a95 call 7ff617581f20 call 7ff61758d520 249->261 254 7ff617581c1a-7ff617581c23 250->254 258 7ff617581c25-7ff617581c3c 254->258 259 7ff617581c5f 254->259 256->257 257->244 264 7ff617581c5a call 7ff61758ebe0 258->264 265 7ff617581c3e-7ff617581c51 258->265 259->223 260->261 272 7ff617581a97-7ff617581ad1 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z _wremove 261->272 273 7ff617581ad6-7ff617581b0d CreateFileW 261->273 264->259 265->264 268 7ff617581c53-7ff617581c59 _invalid_parameter_noinfo_noreturn 265->268 268->264 272->250 275 7ff617581be8 273->275 276 7ff617581b13-7ff617581b5d call 7ff617585d50 call 7ff61758df00 273->276 277 7ff617581bef-7ff617581c0e call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff617581c90 275->277 286 7ff617581b9b-7ff617581b9e 276->286 287 7ff617581b5f-7ff617581b71 276->287 277->250 288 7ff617581ba9-7ff617581bb3 call 7ff6175834d0 286->288 289 7ff617581ba0-7ff617581ba7 286->289 290 7ff617581b73-7ff617581b86 287->290 291 7ff617581b8f-7ff617581b94 call 7ff61758ebe0 287->291 297 7ff617581bb5-7ff617581bbc 288->297 298 7ff617581bbe-7ff617581bc8 call 7ff617583f50 288->298 289->277 290->291 294 7ff617581b88-7ff617581b8e _invalid_parameter_noinfo_noreturn 290->294 291->286 294->291 297->277 301 7ff617581bca-7ff617581bd1 298->301 302 7ff617581bd3-7ff617581bdd call 7ff617582a90 298->302 301->277 302->254 305 7ff617581bdf-7ff617581be6 302->305 305->277
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FF6175817B6
                          • GetCurrentThreadId.KERNEL32 ref: 00007FF6175817BF
                          • srand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF6175817CA
                          • CreateFileW.KERNELBASE ref: 00007FF6175817F7
                          • CloseHandle.KERNEL32 ref: 00007FF61758180A
                            • Part of subcall function 00007FF617585EE0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617586066
                            • Part of subcall function 00007FF617585EE0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758606D
                            • Part of subcall function 00007FF617585EE0: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758607A
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758182D
                          • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF617581871
                          • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF6175818B5
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758192A
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758196A
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6175819A6
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_V01@@$rand$?setstate@?$basic_ios@_?uncaught_exception@std@@CloseCreateCurrentD@std@@@std@@FileHandleOsfx@?$basic_ostream@ThreadU?$char_traits@_invalid_parameter_noinfo_noreturn_time64srand
                          • String ID: [!] Failed to ClearMmUnloadedDrivers$[-] Can't find TEMP folder$[-] Failed to ClearKernelHashBucketList$[-] Failed to ClearPiDDBCacheTable$[-] Failed to create vulnerable driver file$[-] Failed to get ntoskrnl.exe$[-] Failed to get temp path$[-] Failed to load driver iqvw64e.sys$[-] Failed to register and start service for the vulnerable driver$[-] \Device\Nal is already in use.$[<] Loading vulnerable driver, Name: $\\.\Nal$gfff$ntoskrnl.exe
                          • API String ID: 3610494094-3036430678
                          • Opcode ID: 2b59b04520f9ab686594239d376feb6b6f182a9132356bf31cc9e9aecf889ab3
                          • Instruction ID: 1ac8dc49d5baf1eeaa87019ce094058cef0f6a6651f7817acf77301c20e30747
                          • Opcode Fuzzy Hash: 2b59b04520f9ab686594239d376feb6b6f182a9132356bf31cc9e9aecf889ab3
                          • Instruction Fuzzy Hash: 3CE18C61A28E5292EB00DB26E8542B93361FB95FB4F404239D95E836ABEF3CE544D700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 306 7ff61758d520-7ff61758d56d call 7ff6175812e0 309 7ff61758d573-7ff61758d5b3 call 7ff617588780 306->309 310 7ff61758d954-7ff61758d959 call 7ff6175811d0 306->310 315 7ff61758d95a-7ff61758d95f call 7ff6175811d0 309->315 316 7ff61758d5b9-7ff61758d5be 309->316 310->315 318 7ff61758d5c0 316->318 319 7ff61758d5c3-7ff61758d60b call 7ff617588780 RegCreateKeyW 316->319 318->319 323 7ff61758d616-7ff61758d651 RegSetKeyValueW 319->323 324 7ff61758d60d-7ff61758d614 319->324 326 7ff61758d653-7ff61758d659 RegCloseKey 323->326 327 7ff61758d6c8-7ff61758d6f7 RegSetKeyValueW 323->327 325 7ff61758d660-7ff61758d676 call 7ff617587c70 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 324->325 333 7ff61758d67c 325->333 326->325 329 7ff61758d6f9-7ff61758d706 RegCloseKey 327->329 330 7ff61758d70b-7ff61758d724 RegCloseKey GetModuleHandleA 327->330 329->325 332 7ff61758d72a-7ff61758d761 GetProcAddress * 2 RtlAdjustPrivilege 330->332 330->333 335 7ff61758d76f-7ff61758d77a 332->335 336 7ff61758d763-7ff61758d76a 332->336 334 7ff61758d67e-7ff61758d686 333->334 339 7ff61758d87f-7ff61758d898 334->339 340 7ff61758d68c-7ff61758d6a2 334->340 337 7ff61758d94e-7ff61758d953 call 7ff6175811d0 335->337 338 7ff61758d780-7ff61758d816 call 7ff617588780 RtlInitUnicodeString NtLoadDriver call 7ff617587c70 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 335->338 336->325 337->310 365 7ff61758d818-7ff61758d81a 338->365 366 7ff61758d81c-7ff61758d81e 338->366 343 7ff61758d8d3-7ff61758d8ec 339->343 344 7ff61758d89a-7ff61758d8b0 339->344 345 7ff61758d6a8-7ff61758d6bb 340->345 346 7ff61758d87a call 7ff61758ebe0 340->346 351 7ff61758d8ee-7ff61758d904 343->351 352 7ff61758d927-7ff61758d94d call 7ff61758ebc0 343->352 349 7ff61758d8ce call 7ff61758ebe0 344->349 350 7ff61758d8b2-7ff61758d8c5 344->350 345->346 353 7ff61758d6c1-7ff61758d6c7 _invalid_parameter_noinfo_noreturn 345->353 346->339 349->343 350->349 356 7ff61758d8c7-7ff61758d8cd _invalid_parameter_noinfo_noreturn 350->356 358 7ff61758d922 call 7ff61758ebe0 351->358 359 7ff61758d906-7ff61758d919 351->359 353->327 356->349 358->352 359->358 362 7ff61758d91b-7ff61758d921 _invalid_parameter_noinfo_noreturn 359->362 362->358 367 7ff61758d821-7ff61758d829 365->367 366->367 368 7ff61758d864-7ff61758d875 367->368 369 7ff61758d82b-7ff61758d841 367->369 368->334 370 7ff61758d85f call 7ff61758ebe0 369->370 371 7ff61758d843-7ff61758d856 369->371 370->368 371->370 372 7ff61758d858-7ff61758d85e _invalid_parameter_noinfo_noreturn 371->372 372->370
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$_invalid_parameter_noinfo_noreturn$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$Close$AddressProcV01@@Valuememcpy$AdjustCreateDriverHandleInitLoadModulePrivilegeStringUnicodeV21@@Vios_base@1@Xlength_error@std@@
                          • String ID: 4$Fatal error: failed to acquire SE_LOAD_DRIVER_PRIVILEGE. Make sure you are running as administrator.$ImagePath$NtLoadDriver$RtlAdjustPrivilege$SYSTEM\CurrentControlSet\Services\$Type$[+] NtLoadDriver Status 0x$[-] Can't create 'ImagePath' registry value$[-] Can't create 'Type' registry value$[-] Can't create service key$\??\$\Registry\Machine\System\CurrentControlSet\Services\$ntdll.dll
                          • API String ID: 3477860193-3793529226
                          • Opcode ID: b141cd0232939659d324549beaf113f3aa37b57c591dae2b4b39ed28c0b2125d
                          • Instruction ID: cba0a7184e7e2bbfae89f9b3becb6871a10bde0174c47ab08570b741ac7494ed
                          • Opcode Fuzzy Hash: b141cd0232939659d324549beaf113f3aa37b57c591dae2b4b39ed28c0b2125d
                          • Instruction Fuzzy Hash: 26C16061B28F4696FB00DB66E4443AC33B1EB58BB8F400635DA5D936AADF3CE148D344
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: __p___argc__p___wargv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock_cexit_exit_get_initial_wide_environment_register_thread_local_exe_atexit_callback
                          • String ID:
                          • API String ID: 1038555538-0
                          • Opcode ID: 8099f633f6f678d39012437267c2974ada0ce775aabdfdebe60bf3e181897385
                          • Instruction ID: 7448dd5aabe90af4d5b42e546ce6094c9461fa74e0f1997eb268195f4f22c7b3
                          • Opcode Fuzzy Hash: 8099f633f6f678d39012437267c2974ada0ce775aabdfdebe60bf3e181897385
                          • Instruction Fuzzy Hash: D0314B21A2DD4383FB50AB2794153B92391AF8DFA4F544138DB4EC72E7DE3DE905A211
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 425 7ff617587c70-7ff617587c9a 426 7ff617587ca0-7ff617587ca7 425->426 426->426 427 7ff617587ca9-7ff617587cb8 426->427 428 7ff617587cba-7ff617587cbd 427->428 429 7ff617587cc4 427->429 428->429 430 7ff617587cbf-7ff617587cc2 428->430 431 7ff617587cc6-7ff617587cd6 429->431 430->431 432 7ff617587cd8-7ff617587ce1 431->432 433 7ff617587ce4-7ff617587ced 431->433 432->433 434 7ff617587cf3-7ff617587cfb 433->434 435 7ff617587cef-7ff617587cf1 433->435 438 7ff617587cfd-7ff617587d00 434->438 439 7ff617587d1c 434->439 437 7ff617587d1e-7ff617587d24 435->437 441 7ff617587d26-7ff617587d2b 437->441 442 7ff617587d30-7ff617587d5b ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ call 7ff617587fe0 437->442 438->439 440 7ff617587d02-7ff617587d1a ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ 438->440 439->437 440->437 443 7ff617587e7c-7ff617587e9a ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 441->443 450 7ff617587d5d-7ff617587d66 442->450 451 7ff617587d79-7ff617587d92 442->451 445 7ff617587e9c-7ff617587ea5 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 443->445 446 7ff617587ea6-7ff617587eb6 443->446 445->446 448 7ff617587eb8-7ff617587ebe 446->448 449 7ff617587ebf-7ff617587ed1 446->449 448->449 450->451 458 7ff617587d68-7ff617587d73 450->458 452 7ff617587dcd 451->452 453 7ff617587d94-7ff617587d97 451->453 455 7ff617587dd3-7ff617587dd5 452->455 453->452 454 7ff617587d99-7ff617587db4 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 453->454 459 7ff617587dc8-7ff617587dcb 454->459 460 7ff617587db6-7ff617587dc6 454->460 461 7ff617587dd7-7ff617587dda 455->461 462 7ff617587e51-7ff617587e61 455->462 458->451 459->453 460->455 463 7ff617587ddc-7ff617587e23 ?widen@?$ctype@_W@std@@QEBA_WD@Z ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 461->463 464 7ff617587e25-7ff617587e28 461->464 465 7ff617587e77 462->465 463->455 464->462 466 7ff617587e2a-7ff617587e45 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 464->466 465->443 467 7ff617587e47-7ff617587e4a 466->467 468 7ff617587e63-7ff617587e66 466->468 467->462 468->464 468->465
                          APIs
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF617587D05
                          • ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF617587D3C
                          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF617587DAA
                          • ?widen@?$ctype@_W@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF617587DFA
                          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF617587E08
                          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF617587E3B
                          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF617587E8B
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF617587E92
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF617587E9F
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: U?$char_traits@_W@std@@@std@@$?sputc@?$basic_streambuf@_$D@std@@@std@@U?$char_traits@$?flush@?$basic_ostream@?getloc@ios_base@std@@?setstate@?$basic_ios@_?uncaught_exception@std@@?widen@?$ctype@_Osfx@?$basic_ostream@V12@Vlocale@2@W@std@@
                          • String ID:
                          • API String ID: 2222884580-0
                          • Opcode ID: ae68b658c52fe95b53231d82350469d6f1f3a2dcea84264f757e533ead7f9a9a
                          • Instruction ID: f18852ae6f454027c5435b55060f174f5e3e2055bf8960d80aa62b65150c9d77
                          • Opcode Fuzzy Hash: ae68b658c52fe95b53231d82350469d6f1f3a2dcea84264f757e533ead7f9a9a
                          • Instruction Fuzzy Hash: 33616062619E8182EB609F5AE580339A7A0FF85FE5F148936CE4E877A2CF3DD455D300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 469 7ff6175888c0-7ff6175888fa 470 7ff617588906 469->470 471 7ff6175888fc-7ff6175888ff 469->471 473 7ff617588908-7ff61758891b 470->473 471->470 472 7ff617588901-7ff617588904 471->472 472->473 474 7ff61758892c-7ff617588935 473->474 475 7ff61758891d-7ff617588929 473->475 476 7ff617588937-7ff617588939 474->476 477 7ff61758893b-7ff617588943 474->477 475->474 478 7ff617588969-7ff61758896f 476->478 479 7ff617588945-7ff617588948 477->479 480 7ff617588967 477->480 483 7ff617588971-7ff617588976 478->483 484 7ff61758897b-7ff617588992 478->484 479->480 482 7ff61758894a-7ff617588965 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ 479->482 480->478 482->478 485 7ff617588a37-7ff617588a55 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 483->485 486 7ff617588a03-7ff617588a1b ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 484->486 487 7ff617588994-7ff617588997 484->487 490 7ff617588a61-7ff617588a70 485->490 491 7ff617588a57-7ff617588a60 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 485->491 488 7ff6175889c0-7ff6175889c3 486->488 489 7ff617588a1d-7ff617588a22 486->489 492 7ff617588a00 487->492 493 7ff617588999-7ff6175889b4 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 487->493 499 7ff6175889c5-7ff6175889e0 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 488->499 500 7ff6175889e9-7ff6175889f9 488->500 494 7ff6175889e5 489->494 495 7ff617588a72-7ff617588a78 490->495 496 7ff617588a79-7ff617588a93 490->496 491->490 492->486 497 7ff6175889b6-7ff6175889bf 493->497 498 7ff6175889fb-7ff6175889fe 493->498 494->500 495->496 497->488 498->487 501 7ff6175889e2 499->501 502 7ff617588a24-7ff617588a27 499->502 500->485 501->494 502->488
                          APIs
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF61758894D
                          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF6175889AA
                          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF6175889D6
                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF617588A12
                          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF617588A46
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF617588A4D
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF617588A5A
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                          • String ID:
                          • API String ID: 2558415004-0
                          • Opcode ID: 769fb9137b7f7870149c6c292c35bda7a4246672e8ca47ed797a65c7fa96a35c
                          • Instruction ID: 766b56254580ab5d2250ffd315ecd990749ada1676ce31ba0c5beed6e81e298b
                          • Opcode Fuzzy Hash: 769fb9137b7f7870149c6c292c35bda7a4246672e8ca47ed797a65c7fa96a35c
                          • Instruction Fuzzy Hash: 83514162668E4182EB208F5BE580239A760FB85FE5F158536CE4E87BA5CF3DE546D300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 504 7ff617585ee0-7ff617585f0f 505 7ff617585f10-7ff617585f18 504->505 505->505 506 7ff617585f1a-7ff617585f29 505->506 507 7ff617585f2b-7ff617585f2e 506->507 508 7ff617585f35 506->508 507->508 509 7ff617585f30-7ff617585f33 507->509 510 7ff617585f37-7ff617585f4a 508->510 509->510 511 7ff617585f4c-7ff617585f58 510->511 512 7ff617585f5b-7ff617585f64 510->512 511->512 513 7ff617585f6a-7ff617585f72 512->513 514 7ff617585f66-7ff617585f68 512->514 517 7ff617585f96 513->517 518 7ff617585f74-7ff617585f77 513->518 516 7ff617585f98-7ff617585f9e 514->516 520 7ff617585faa-7ff617585fc1 516->520 521 7ff617585fa0-7ff617585fa5 516->521 517->516 518->517 519 7ff617585f79-7ff617585f94 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ 518->519 519->516 523 7ff617585fed-7ff617586005 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 520->523 524 7ff617585fc3-7ff617585fc6 520->524 522 7ff617586057-7ff617586075 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 521->522 529 7ff617586077-7ff617586080 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 522->529 530 7ff617586081-7ff617586091 522->530 527 7ff617586007-7ff61758600a 523->527 528 7ff61758602e-7ff617586033 523->528 525 7ff617585fea 524->525 526 7ff617585fc8-7ff617585fe3 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 524->526 525->523 526->528 533 7ff617585fe5-7ff617585fe8 526->533 534 7ff61758600c-7ff617586027 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 527->534 535 7ff617586037-7ff617586047 527->535 528->535 529->530 531 7ff61758609a-7ff6175860b4 530->531 532 7ff617586093-7ff617586099 530->532 532->531 533->524 534->528 536 7ff617586029-7ff61758602c 534->536 535->522 536->527
                          APIs
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617585F7C
                          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617585FD9
                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617585FFC
                          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758601D
                          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617586066
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758606D
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758607A
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                          • String ID:
                          • API String ID: 2558415004-0
                          • Opcode ID: d69801e4877d8ed5eeb335611211a648f6f96d2d6680bce6647c0a3fdc58d57b
                          • Instruction ID: dc4ca16f9a22c03754552406e3d5fa85d7b466bc089681f93e87daaedaebb3d3
                          • Opcode Fuzzy Hash: d69801e4877d8ed5eeb335611211a648f6f96d2d6680bce6647c0a3fdc58d57b
                          • Instruction Fuzzy Hash: 7D519F62618E41C2EB208F1BE584239A7A0FB84FE9F108535DE5E87BA6CF3DD446D304
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6175855A3
                          • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6175855C2
                          • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6175855F4
                          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF617585610
                            • Part of subcall function 00007FF617585B00: ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF617585B2C
                            • Part of subcall function 00007FF617585B00: ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF617585B54
                            • Part of subcall function 00007FF617585B00: ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF617585B69
                          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF61758565A
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@_D@std@@@1@_Fiopen@std@@Init@?$basic_streambuf@U?$char_traits@_U_iobuf@@V?$basic_streambuf@Vlocale@2@W@std@@@std@@
                          • String ID:
                          • API String ID: 612489050-0
                          • Opcode ID: 494154b431bb389ea1037c429a591c6917ead29e63a8b5c15e7c0e8b3c3990cd
                          • Instruction ID: 7c99399621940a03742070041762645ac98f50c4bb002b6f62ba2e3293546fd6
                          • Opcode Fuzzy Hash: 494154b431bb389ea1037c429a591c6917ead29e63a8b5c15e7c0e8b3c3990cd
                          • Instruction Fuzzy Hash: 18210632608B9186EB108F2AF85476A77A4FB99F99F449135DA8D83B25DF3DD005C740
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF617585B2C
                            • Part of subcall function 00007FF617585990: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,?,?,?,?,00007FF617585B4C), ref: 00007FF6175859C2
                            • Part of subcall function 00007FF617585990: _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF617585B4C), ref: 00007FF6175859F0
                          • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF617585B54
                            • Part of subcall function 00007FF617587EE0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617587F08
                            • Part of subcall function 00007FF617587EE0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617587F22
                            • Part of subcall function 00007FF617587EE0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617587F4C
                            • Part of subcall function 00007FF617587EE0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617587F77
                            • Part of subcall function 00007FF617587EE0: std::_Facet_Register.LIBCPMT ref: 00007FF617587F90
                            • Part of subcall function 00007FF617587EE0: ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617587FAF
                          • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF617585B69
                          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF617585B84
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$Init@?$basic_streambuf@Lockit@std@@$??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@Bid@locale@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@_get_stream_buffer_pointersstd::_
                          • String ID:
                          • API String ID: 3911317180-0
                          • Opcode ID: 0f35bd83fda0e4e46b3b0bda00aba7a3ecf8b12a79ba364633e4fbfc199bb1d5
                          • Instruction ID: 544170d433db8d37f12a41c67364aa966716ce701060b7db3d82234343f72084
                          • Opcode Fuzzy Hash: 0f35bd83fda0e4e46b3b0bda00aba7a3ecf8b12a79ba364633e4fbfc199bb1d5
                          • Instruction Fuzzy Hash: 42118F21B29E0682EF54DF22E40437963A0AF95FE9F284038CE4E8775ADE3DD844D340
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF6175860D5
                          • ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z.MSVCP140 ref: 00007FF6175860E1
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6175860EA
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@?put@?$basic_ostream@_?widen@?$basic_ios@_D@std@@@std@@U?$char_traits@V12@V12@_
                          • String ID:
                          • API String ID: 1552636710-0
                          • Opcode ID: 8bb6cd1e160a8824b80f01674d483b2bc2420e81a06ea2f8b8372f4244fa5c7d
                          • Instruction ID: 12407a15e7be51bcab3f20b3b19d816eabea195c5228903eb2d8b76ca4fb3731
                          • Opcode Fuzzy Hash: 8bb6cd1e160a8824b80f01674d483b2bc2420e81a06ea2f8b8372f4244fa5c7d
                          • Instruction Fuzzy Hash: 32D01754A84A1A82DE08AF26B8941382361EFADFA2B48A030CD0F87311CE3CD0958204
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: fwritememcpy
                          • String ID:
                          • API String ID: 4173912309-0
                          • Opcode ID: dd7b155a2662c67a1c57eecee65be0a1c87a1d0a6f3bc1967ed8b048e2f0c165
                          • Instruction ID: 4531d0a048de45b372d5047bd2cf0167e0531eff2dd55fb0a277e16ce392530d
                          • Opcode Fuzzy Hash: dd7b155a2662c67a1c57eecee65be0a1c87a1d0a6f3bc1967ed8b048e2f0c165
                          • Instruction Fuzzy Hash: E9215E22B29E8186EB948F5B944076967A0FB88FD4F5C403AEF4D87B5ACF3DE4518700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: D@std@@@std@@Init@?$basic_streambuf@U?$char_traits@fclose
                          • String ID:
                          • API String ID: 356833432-0
                          • Opcode ID: 8679cf307676c61e888b200f3cab3b2f6dbf8dc111f72ef9077225ed14305e97
                          • Instruction ID: 5675c81bf697e3e7b885994b22e2718e49b92dab1dcc3a3ea4711ccf77dd6e1e
                          • Opcode Fuzzy Hash: 8679cf307676c61e888b200f3cab3b2f6dbf8dc111f72ef9077225ed14305e97
                          • Instruction Fuzzy Hash: 37112B32618F9581EB408F2AE49036937A4FB98FD8F588036DE4D87769CF38C856C750
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 964 7ff617582a90-7ff617582ad7 NtQuerySystemInformation 965 7ff617582ad9 964->965 966 7ff617582b26-7ff617582b38 964->966 967 7ff617582ae0-7ff617582b24 VirtualFree VirtualAlloc NtQuerySystemInformation 965->967 968 7ff617582f4f-7ff617582f52 966->968 969 7ff617582b3e-7ff617582b41 966->969 967->966 967->967 970 7ff617582f65 968->970 971 7ff617582f54-7ff617582f5f VirtualFree 968->971 969->970 972 7ff617582b47-7ff617582b50 969->972 975 7ff617582f67-7ff617582f96 call 7ff61758ebc0 970->975 971->970 973 7ff617582bb8-7ff617582bcc VirtualFree 972->973 974 7ff617582b52-7ff617582b55 972->974 973->970 977 7ff617582bd2-7ff617582bda 973->977 976 7ff617582b60-7ff617582b9e GetCurrentProcessId 974->976 979 7ff617582ba6-7ff617582bad 976->979 980 7ff617582ba0-7ff617582ba4 976->980 981 7ff617582f46-7ff617582f4d 977->981 982 7ff617582be0-7ff617582c36 DeviceIoControl 977->982 979->976 985 7ff617582baf 979->985 980->979 984 7ff617582bb4 980->984 987 7ff617582f04-7ff617582f20 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 981->987 982->981 986 7ff617582c3c-7ff617582c43 982->986 984->973 985->971 986->981 989 7ff617582c49-7ff617582c51 986->989 987->970 991 7ff617582f3d-7ff617582f44 989->991 992 7ff617582c57-7ff617582cad DeviceIoControl 989->992 991->987 992->991 993 7ff617582cb3-7ff617582cba 992->993 993->991 994 7ff617582cc0-7ff617582cc8 993->994 995 7ff617582f34-7ff617582f3b 994->995 996 7ff617582cce-7ff617582d24 DeviceIoControl 994->996 995->987 996->995 997 7ff617582d2a-7ff617582d31 996->997 997->995 998 7ff617582d37-7ff617582d42 997->998 999 7ff617582f2b-7ff617582f32 998->999 1000 7ff617582d48-7ff617582d9e DeviceIoControl 998->1000 999->987 1000->999 1001 7ff617582da4-7ff617582dab 1000->1001 1001->999 1002 7ff617582db1-7ff617582df5 call 7ff61758f10c memset 1001->1002 1005 7ff617582dfb-7ff617582dfe 1002->1005 1006 7ff617582f22-7ff617582f29 1002->1006 1005->1006 1007 7ff617582e04-7ff617582e52 DeviceIoControl 1005->1007 1006->987 1007->1006 1008 7ff617582e58-7ff617582e65 1007->1008 1009 7ff617582efd 1008->1009 1010 7ff617582e6b-7ff617582ec1 DeviceIoControl 1008->1010 1009->987 1010->1009 1011 7ff617582ec3-7ff617582efb call 7ff617585ee0 * 2 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff61758ebe0 1010->1011 1011->975
                          APIs
                          • NtQuerySystemInformation.NTDLL ref: 00007FF617582ACC
                          • VirtualFree.KERNEL32 ref: 00007FF617582AEB
                          • VirtualAlloc.KERNEL32 ref: 00007FF617582B00
                          • NtQuerySystemInformation.NTDLL ref: 00007FF617582B19
                          • GetCurrentProcessId.KERNEL32 ref: 00007FF617582B85
                          • VirtualFree.KERNEL32 ref: 00007FF617582BC3
                          • DeviceIoControl.KERNEL32 ref: 00007FF617582C2E
                          • DeviceIoControl.KERNEL32 ref: 00007FF617582CA5
                          • DeviceIoControl.KERNEL32 ref: 00007FF617582D1C
                          • DeviceIoControl.KERNEL32 ref: 00007FF617582D96
                          • memset.VCRUNTIME140 ref: 00007FF617582DE5
                          • DeviceIoControl.KERNEL32 ref: 00007FF617582E4A
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582EEB
                          • DeviceIoControl.KERNEL32 ref: 00007FF617582EB9
                            • Part of subcall function 00007FF617585EE0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617586066
                            • Part of subcall function 00007FF617585EE0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758606D
                            • Part of subcall function 00007FF617585EE0: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758607A
                            • Part of subcall function 00007FF617585EE0: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617585F7C
                            • Part of subcall function 00007FF617585EE0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617585FD9
                            • Part of subcall function 00007FF617585EE0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617585FFC
                            • Part of subcall function 00007FF617585EE0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758601D
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582F1A
                          • VirtualFree.KERNEL32 ref: 00007FF617582F5F
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: ControlDevice$U?$char_traits@_W@std@@@std@@$V01@Virtual$D@std@@@std@@FreeU?$char_traits@$??6?$basic_ostream@_?sputc@?$basic_streambuf@_InformationQuerySystemV01@@$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@AllocCurrentOsfx@?$basic_ostream@ProcessV12@memset
                          • String ID: [!] Failed to find device_object$[!] Failed to find driver name$[!] Failed to find driver_object$[!] Failed to find driver_section$[!] Failed to read driver name$[!] Failed to write driver name length$[+] MmUnloadedDrivers Cleaned:
                          • API String ID: 3476330072-3011715350
                          • Opcode ID: 554791a905a9ed1b1d893eafea0bf69f6657606d5904096a2d87206383cde52d
                          • Instruction ID: 114783d67b72e542bdcc43128d59b232104241d9056785e97471883a53cb3970
                          • Opcode Fuzzy Hash: 554791a905a9ed1b1d893eafea0bf69f6657606d5904096a2d87206383cde52d
                          • Instruction Fuzzy Hash: 71E18B72B29F419AEB50CF61E4403AD37A4FB48B98F404539EA4D96B59DF38D219D300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: Virtual$Free$InformationQuerySystem$Alloc_invalid_parameter_noinfo_noreturn_stricmp
                          • String ID:
                          • API String ID: 562193759-0
                          • Opcode ID: 1522dd4d0bf6989cb67041938a95fef3a02e725a76e680aed42b1916397feb60
                          • Instruction ID: 73bdf98d3c538c1cdbc143217d55ecd4cdba2a56ce3210fdf7830257300c6444
                          • Opcode Fuzzy Hash: 1522dd4d0bf6989cb67041938a95fef3a02e725a76e680aed42b1916397feb60
                          • Instruction Fuzzy Hash: FA519462B18E4183FB208B16E84432972A1FB89FF4F544634DA6EC76DADE3DD481A700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 313767242-0
                          • Opcode ID: 27c1891ec76c73cda5552b3688cbcb8def1b2c8b2b26ff10889f24fdbe2c12a9
                          • Instruction ID: 917b02f0c0f4d2f3490aa76c2af4d5fe3d1233849a17db1ce9aff4018c3f1355
                          • Opcode Fuzzy Hash: 27c1891ec76c73cda5552b3688cbcb8def1b2c8b2b26ff10889f24fdbe2c12a9
                          • Instruction Fuzzy Hash: 25316D72619E8186EB609F61E8403ED73A0FB98B54F44443ADB4E87A99DF38D648C710
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF61758EB47
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: DebugDebuggerErrorLastOutputPresentString
                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                          • API String ID: 389471666-631824599
                          • Opcode ID: 6dace40f20ee360905f8cc9ad5317248b2015620551232ed4bc329e47bd697d4
                          • Instruction ID: 670508443895389c518b3e609100b1ce969e44af31c01004a4a54f1e0715ef32
                          • Opcode Fuzzy Hash: 6dace40f20ee360905f8cc9ad5317248b2015620551232ed4bc329e47bd697d4
                          • Instruction Fuzzy Hash: 04118F32624F9293E7448B22D6853B933A0FB18BA1F404139C60DC3A92EF3CE478D710
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 760 7ff6175834d0-7ff61758355a call 7ff617583dd0 * 2 765 7ff6175835e8 760->765 766 7ff617583560-7ff617583593 call 7ff617583dd0 760->766 767 7ff6175835ec-7ff6175835fd 765->767 774 7ff6175835b8-7ff6175835e6 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 766->774 775 7ff617583595 766->775 769 7ff617583608-7ff6175836d3 call 7ff617587c70 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff617587c70 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff617582fa0 * 2 call 7ff617583050 767->769 770 7ff6175835ff-7ff617583606 767->770 792 7ff6175836d5 769->792 793 7ff6175836e1-7ff617583726 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff6175812e0 call 7ff6175832f0 769->793 772 7ff61758359c-7ff6175835b3 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 770->772 782 7ff617583bc6-7ff617583bee call 7ff61758ebc0 772->782 774->767 775->772 792->793 800 7ff617583728-7ff61758372f 793->800 801 7ff617583734-7ff617583738 793->801 802 7ff617583b57 800->802 803 7ff617583b50 801->803 804 7ff61758373e-7ff617583795 DeviceIoControl 801->804 805 7ff617583b5e-7ff617583b76 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 802->805 803->802 804->803 806 7ff61758379b-7ff6175837f6 DeviceIoControl 804->806 812 7ff617583b79 call 7ff6175831b0 805->812 807 7ff6175837f8-7ff6175837ff 806->807 808 7ff617583804-7ff617583843 call 7ff617587c70 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 806->808 807->805 815 7ff617583849-7ff61758389f DeviceIoControl 808->815 816 7ff617583b47-7ff617583b4e 808->816 814 7ff617583b7e 812->814 817 7ff617583b80-7ff617583b88 814->817 815->816 818 7ff6175838a5-7ff6175838ad 815->818 816->802 819 7ff617583b8a-7ff617583ba0 817->819 820 7ff617583bc3 817->820 821 7ff6175838b3-7ff617583909 DeviceIoControl 818->821 822 7ff617583b3e-7ff617583b45 818->822 823 7ff617583ba2-7ff617583bb5 819->823 824 7ff617583bbe call 7ff61758ebe0 819->824 820->782 821->822 825 7ff61758390f-7ff617583912 821->825 822->802 823->824 826 7ff617583bb7-7ff617583bbd _invalid_parameter_noinfo_noreturn 823->826 824->820 828 7ff617583a1d-7ff617583a24 825->828 829 7ff617583918-7ff617583932 825->829 826->824 828->802 830 7ff617583938-7ff61758394b call 7ff61758ed70 829->830 831 7ff6175839f0-7ff6175839f8 829->831 830->831 839 7ff617583951-7ff617583987 call 7ff617585d50 830->839 832 7ff6175839fa-7ff617583a17 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 831->832 833 7ff617583a29-7ff617583a35 831->833 832->828 837 7ff617583a38 call 7ff617587770 833->837 840 7ff617583a3d-7ff617583a3f 837->840 847 7ff61758398a call 7ff6175826a0 839->847 840->828 841 7ff617583a41-7ff617583a45 840->841 841->828 843 7ff617583a47-7ff617583a52 841->843 845 7ff617583b0c-7ff617583b0f 843->845 846 7ff617583a58-7ff617583ab1 DeviceIoControl 843->846 850 7ff617583b12 call 7ff6175831b0 845->850 846->845 849 7ff617583ab3-7ff617583b06 DeviceIoControl 846->849 848 7ff61758398f-7ff61758399e 847->848 851 7ff6175839d4-7ff6175839eb call 7ff61758ed10 848->851 852 7ff6175839a0-7ff6175839b1 848->852 849->845 853 7ff617583b17-7ff617583b3c call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 850->853 851->831 854 7ff6175839b3-7ff6175839c6 852->854 855 7ff6175839cf call 7ff61758ebe0 852->855 853->817 854->855 858 7ff6175839c8-7ff6175839ce _invalid_parameter_noinfo_noreturn 854->858 855->851 858->855
                          APIs
                            • Part of subcall function 00007FF617583DD0: DeviceIoControl.KERNEL32 ref: 00007FF617583E62
                            • Part of subcall function 00007FF617583DD0: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617583EF3
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6175835AB
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6175835CE
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF61758361E
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF61758362E
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758363E
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF617583661
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF617583671
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617583681
                            • Part of subcall function 00007FF617585EE0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617586066
                            • Part of subcall function 00007FF617585EE0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758606D
                            • Part of subcall function 00007FF617585EE0: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758607A
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6175836F7
                            • Part of subcall function 00007FF6175812E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF617581435
                            • Part of subcall function 00007FF6175832F0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758342C
                            • Part of subcall function 00007FF6175832F0: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758347E
                          • DeviceIoControl.KERNEL32 ref: 00007FF61758378D
                          • DeviceIoControl.KERNEL32 ref: 00007FF6175837E7
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617583B6D
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF617583BB7
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_$V01@@$ControlDevice_invalid_parameter_noinfo_noreturn$V01@_V21@@Vios_base@1@$?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@
                          • String ID: RtlDeleteElementGenericTableAvl$[!] Failed to find RtlDeleteElementGenericTableAvl$[+] Found Table Entry = 0x$[+] PiDDBCacheTable Cleaned$[+] PiDDBCacheTable Ptr 0x$[+] PiDDBLock Locked$[+] PiDDBLock Ptr 0x$[+] PiDDBLock found with second pattern$[-] Can't delete from PiDDBCacheTable$[-] Can't get next entry$[-] Can't get prev entry$[-] Can't lock PiDDBCacheTable$[-] Can't set next entry$[-] Can't set prev entry$[-] Not found in cache$[-] Warning PiDDBCacheTable not found$[-] Warning PiDDBLock not found$xxx????xxxxx????xxx????x????x$xxxxxx$xxxxxx????xxxxx????xxx????xxxxx????x????xx?x
                          • API String ID: 3986681254-602910616
                          • Opcode ID: d583605c7b95d75d6afcba2cb90855f4bc63da00dc3abca4284f18ab1e2e8146
                          • Instruction ID: 7f47b3adf3beeb9cc7e53ff211224b5c7ef44fafe5b300377e0255ed63449118
                          • Opcode Fuzzy Hash: d583605c7b95d75d6afcba2cb90855f4bc63da00dc3abca4284f18ab1e2e8146
                          • Instruction Fuzzy Hash: 7A1238B1A19F4296EB00DF62E8503A833A4FB44BA8F404539D94D97BAADF3CE549D350
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 861 7ff61758b4e0-7ff61758b52d 862 7ff61758b533-7ff61758b540 861->862 863 7ff61758b9a5 861->863 862->863 865 7ff61758b546-7ff61758b54f 862->865 864 7ff61758b9ac-7ff61758b9c2 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 863->864 871 7ff61758b9c8 864->871 867 7ff61758b551-7ff61758b558 865->867 868 7ff61758b55d-7ff61758b57a VirtualAlloc 865->868 867->864 870 7ff61758b580-7ff61758b59e 868->870 868->871 873 7ff61758b5a0-7ff61758b5b3 call 7ff61758afe0 870->873 874 7ff61758b5b8-7ff61758b5ba 870->874 872 7ff61758b9ca-7ff61758b9f0 call 7ff61758ebc0 871->872 884 7ff61758b6e9-7ff61758b6f4 873->884 875 7ff61758b5c0-7ff61758b5dc 874->875 876 7ff61758b6bc-7ff61758b6c7 874->876 879 7ff61758b68f-7ff61758b697 875->879 880 7ff61758b5e2-7ff61758b5f5 call 7ff61758ed70 875->880 881 7ff61758b8d5 876->881 887 7ff61758b699-7ff61758b6b6 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 879->887 888 7ff61758b6cc-7ff61758b6e3 call 7ff617586d90 879->888 895 7ff61758b68b 880->895 896 7ff61758b5fb-7ff61758b648 call 7ff617585d50 call 7ff6175826a0 880->896 886 7ff61758b8dc-7ff61758b90e call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z VirtualFree call 7ff617582560 881->886 893 7ff61758b702-7ff61758b74e call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z memcpy 884->893 894 7ff61758b6f6-7ff61758b6fd 884->894 886->871 887->876 888->876 904 7ff61758b6e5 888->904 905 7ff61758b750 893->905 906 7ff61758b783-7ff61758b813 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff61758c810 call 7ff61758ba00 call 7ff61758c960 call 7ff61758bb00 893->906 894->881 895->879 918 7ff61758b67f-7ff61758b686 call 7ff61758ed10 896->918 919 7ff61758b64a-7ff61758b65b 896->919 904->884 909 7ff61758b754-7ff61758b75b 905->909 935 7ff61758b821-7ff61758b840 call 7ff617581ff0 906->935 936 7ff61758b815-7ff61758b81c 906->936 912 7ff61758b771-7ff61758b77d 909->912 913 7ff61758b75d-7ff61758b76c memcpy 909->913 912->909 916 7ff61758b77f 912->916 913->912 916->906 918->895 922 7ff61758b679-7ff61758b67e call 7ff61758ebe0 919->922 923 7ff61758b65d-7ff61758b670 919->923 922->918 923->922 925 7ff61758b672-7ff61758b678 _invalid_parameter_noinfo_noreturn 923->925 925->922 939 7ff61758b84e-7ff61758b897 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff617589ce0 935->939 940 7ff61758b842-7ff61758b849 935->940 936->881 945 7ff61758b8a2-7ff61758b8cc call 7ff61758bef0 939->945 946 7ff61758b899-7ff61758b8a0 939->946 940->886 949 7ff61758b8ce 945->949 950 7ff61758b913-7ff61758b91d 945->950 946->881 949->881 951 7ff61758b91f 950->951 952 7ff61758b921-7ff61758b963 call 7ff617585ee0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 950->952 951->952 955 7ff61758b98f-7ff61758b9a3 VirtualFree 952->955 956 7ff61758b965-7ff61758b96f 952->956 955->872 957 7ff61758b971-7ff61758b987 call 7ff6175822e0 call 7ff617582420 956->957 958 7ff61758b98a call 7ff617582560 956->958 957->958 958->955
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@VirtualW@std@@@std@@$AllocFree
                          • String ID: bytes of PE Header$ExAllocatePoolWithTag$[!] Failed to find ExAllocatePool$[+] DriverEntry returned 0x$[+] Image base has been allocated at 0x$[+] Skipped 0x$[-] Callback returns false, failed!$[-] Failed to allocate remote image in kernel$[-] Failed to call driver entry$[-] Failed to resolve imports$[-] Failed to write local image to remote image$[-] Image is not 64 bit$[-] Invalid format of PE image$[<] Calling DriverEntry 0x
                          • API String ID: 284350539-3204775764
                          • Opcode ID: ebc8a43a5b13ec11043c51ca0cd9d3df41b946e7c73cffafac2e7787980f7c30
                          • Instruction ID: 58abe24b23c268ee10b155780c84c07e5f9bac2c4b0a087c5bb412bcd299ba74
                          • Opcode Fuzzy Hash: ebc8a43a5b13ec11043c51ca0cd9d3df41b946e7c73cffafac2e7787980f7c30
                          • Instruction Fuzzy Hash: 6BE13961F28E4296FB10DB66E8502B933A6BB44FA4F80413ADD4D976ABDE3CE505D340
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758B0C5
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758B105
                          • DeviceIoControl.KERNEL32 ref: 00007FF61758B1FE
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758B231
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758B331
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758B2F1
                            • Part of subcall function 00007FF617585D50: memcpy.VCRUNTIME140 ref: 00007FF617585D81
                            • Part of subcall function 00007FF6175826A0: memset.VCRUNTIME140 ref: 00007FF6175826FB
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF617582756
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF6175827D3
                            • Part of subcall function 00007FF6175826A0: VirtualAlloc.KERNEL32 ref: 00007FF61758282A
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758B128
                            • Part of subcall function 00007FF61758ED70: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF6175861F9), ref: 00007FF61758ED80
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758B402
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758B442
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758B465
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758B4B4
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@W@std@@@std@@$ControlDevice_invalid_parameter_noinfo_noreturn$AllocCriticalEnterSectionVirtualmemcpymemset
                          • String ID: MmAllocatePagesForMdl$MmMapLockedPagesSpecifyCache$MmProtectMdlSystemAddress$[!] Failed to find MmAlocatePagesForMdl$[!] Failed to find MmMapLockedPagesSpecifyCache$[!] Failed to find MmProtectMdlSystemAddress$[+] Allocated pages for mdl$[-] Can't allocate pages for mdl$[-] Can't change protection for mdl pages, cleaning up$[-] Can't read the _MDL : byteCount$[-] Can't set mdl pages cache, cleaning up.$[-] Couldn't allocate enough memory, cleaning up
                          • API String ID: 3475076561-338763861
                          • Opcode ID: ca3dd29647efb5c5e65248918a88330c441370576a3028435841619c038c22f7
                          • Instruction ID: 633cce153d085dc22139c01ac3e5329a5f4065b464d0580adebc17acce9e7082
                          • Opcode Fuzzy Hash: ca3dd29647efb5c5e65248918a88330c441370576a3028435841619c038c22f7
                          • Instruction Fuzzy Hash: A3D13961A28E4296EB10DF26E8553A83365BF44FA8F804235D95D87AABDF3CE145E340
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32 ref: 00007FF61758D994
                          • RtlInitUnicodeString.NTDLL ref: 00007FF61758DA07
                          • RegOpenKeyW.ADVAPI32 ref: 00007FF61758DA65
                          • RegCloseKey.ADVAPI32 ref: 00007FF61758DA7E
                          • GetProcAddress.KERNEL32 ref: 00007FF61758DA8E
                            • Part of subcall function 00007FF617587C70: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF617587E8B
                            • Part of subcall function 00007FF617587C70: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF617587E92
                            • Part of subcall function 00007FF617587C70: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF617587E9F
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF61758DAB9
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z.MSVCP140 ref: 00007FF61758DAC4
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758DAD4
                          • RegDeleteKeyW.ADVAPI32 ref: 00007FF61758DB35
                            • Part of subcall function 00007FF617587C70: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF617587D05
                            • Part of subcall function 00007FF617587C70: ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF617587D3C
                            • Part of subcall function 00007FF617587C70: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF617587DAA
                            • Part of subcall function 00007FF617587C70: ?widen@?$ctype@_W@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF617587DFA
                            • Part of subcall function 00007FF617587C70: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF617587E08
                            • Part of subcall function 00007FF617587C70: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF617587E3B
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758DAFB
                          • RegDeleteKeyW.ADVAPI32 ref: 00007FF61758DB16
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758DB7C
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758DBD1
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: U?$char_traits@_W@std@@@std@@$V01@$??6?$basic_ostream@_$?sputc@?$basic_streambuf@_$D@std@@@std@@DeleteU?$char_traits@V01@@_invalid_parameter_noinfo_noreturn$?flush@?$basic_ostream@?getloc@ios_base@std@@?setstate@?$basic_ios@_?uncaught_exception@std@@?widen@?$ctype@_AddressCloseHandleInitModuleOpenOsfx@?$basic_ostream@ProcStringUnicodeV12@V21@@Vios_base@1@Vlocale@2@W@std@@
                          • String ID: "$NtUnloadDriver$SYSTEM\CurrentControlSet\Services\$[+] NtUnloadDriver Status 0x$[-] Driver Unload Failed!!$\Registry\Machine\System\CurrentControlSet\Services\$ntdll.dll
                          • API String ID: 1746233060-3977549460
                          • Opcode ID: 2cdf292f12626b4e133b536ab30b516b4e19748792bd49914833441eebd3c932
                          • Instruction ID: 896c83f9fb8b313239c28a01cd01319311ccca5bfd611f95b37e1b5fae6a9c12
                          • Opcode Fuzzy Hash: 2cdf292f12626b4e133b536ab30b516b4e19748792bd49914833441eebd3c932
                          • Instruction Fuzzy Hash: 69714C61B19F4296EB009F66E4943AC23A1EB58FB5F400635DA5D8379ADF3CE588D300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: CloseHandle$AttributesErrorFileLast__std_fs_open_handleterminate
                          • String ID:
                          • API String ID: 1657120197-0
                          • Opcode ID: 16d2dd352414c68191909dc51ecd308e890caea0bb5010e4d6c69a39b9191b09
                          • Instruction ID: 55311650e9b46c76b9273f2dd5c50b07c1b70ae6beb69f935bfa9565c3174cab
                          • Opcode Fuzzy Hash: 16d2dd352414c68191909dc51ecd308e890caea0bb5010e4d6c69a39b9191b09
                          • Instruction Fuzzy Hash: 20818231B24E5287F7A48B66A84467822B0AF59FB4F180335D97ED66D6EE3CE445A300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF617583280
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF617583B7E), ref: 00007FF6175832C0
                          • GetModuleHandleA.KERNEL32 ref: 00007FF617587541
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617587569
                            • Part of subcall function 00007FF61758ED70: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF6175861F9), ref: 00007FF61758ED80
                            • Part of subcall function 00007FF617585D50: memcpy.VCRUNTIME140 ref: 00007FF617585D81
                            • Part of subcall function 00007FF6175826A0: memset.VCRUNTIME140 ref: 00007FF6175826FB
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF617582756
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF6175827D3
                            • Part of subcall function 00007FF6175826A0: VirtualAlloc.KERNEL32 ref: 00007FF61758282A
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_ControlDeviceU?$char_traits@_V01@@W@std@@@std@@$AllocCriticalEnterHandleModuleSectionVirtual_invalid_parameter_noinfo_noreturnmemcpymemset
                          • String ID: ExReleaseResourceLite$NtAddAtom$[!] Failed to find ExReleaseResourceLite$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 4274139851-1591343369
                          • Opcode ID: 768cc27bd42aa7a59451d96e32002eda9157a1ab210d3772858ae1feb9700705
                          • Instruction ID: b7fcf21670bda0f99261525efc3d73587fab61521d4e04226dbc7ce671969a28
                          • Opcode Fuzzy Hash: 768cc27bd42aa7a59451d96e32002eda9157a1ab210d3772858ae1feb9700705
                          • Instruction Fuzzy Hash: 66A19B61A1CE4296EB50DB66E8503B833A1FB84BE8F404636D95D83BABDF3CE555D300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00007FF61758B24D), ref: 00007FF617582630
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF61758B24D), ref: 00007FF617582670
                          • GetModuleHandleA.KERNEL32 ref: 00007FF617587051
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617587079
                            • Part of subcall function 00007FF61758ED70: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF6175861F9), ref: 00007FF61758ED80
                            • Part of subcall function 00007FF617585D50: memcpy.VCRUNTIME140 ref: 00007FF617585D81
                            • Part of subcall function 00007FF6175826A0: memset.VCRUNTIME140 ref: 00007FF6175826FB
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF617582756
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF6175827D3
                            • Part of subcall function 00007FF6175826A0: VirtualAlloc.KERNEL32 ref: 00007FF61758282A
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_ControlDeviceU?$char_traits@_V01@@W@std@@@std@@$AllocCriticalEnterHandleModuleSectionVirtual_invalid_parameter_noinfo_noreturnmemcpymemset
                          • String ID: ExFreePool$NtAddAtom$[!] Failed to find ExAllocatePool$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 4274139851-3600435281
                          • Opcode ID: d6ea799b7a59b5f9668bfea1e48fd91ecd1aa4d84522f8d50955b6df98a9fb0d
                          • Instruction ID: acaf17e2b9ee620553d6449bc0347169503620241342e8dd55dd2607a6c6fd34
                          • Opcode Fuzzy Hash: d6ea799b7a59b5f9668bfea1e48fd91ecd1aa4d84522f8d50955b6df98a9fb0d
                          • Instruction Fuzzy Hash: 91A17C71A2CE42D6EB10CB62E8503B833A1BB94BE4F405636D95D83BAADE3CE555D700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00007FF617585EE0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617586066
                            • Part of subcall function 00007FF617585EE0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758606D
                            • Part of subcall function 00007FF617585EE0: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758607A
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617581CD4
                          • CloseHandle.KERNEL32 ref: 00007FF617581CE7
                            • Part of subcall function 00007FF617581780: memset.VCRUNTIME140 ref: 00007FF6175814B2
                            • Part of subcall function 00007FF617581780: GetTempPathW.KERNEL32 ref: 00007FF6175814C0
                            • Part of subcall function 00007FF617581780: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6175815F4
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF617581D3E
                          • memset.VCRUNTIME140 ref: 00007FF617581D6D
                            • Part of subcall function 00007FF617585570: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6175855A3
                            • Part of subcall function 00007FF617585570: ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6175855C2
                            • Part of subcall function 00007FF617585570: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6175855F4
                            • Part of subcall function 00007FF617585570: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF617585610
                            • Part of subcall function 00007FF617585570: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF61758565A
                          • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF617581D8E
                          • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF617581DD7
                          • ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z.MSVCP140 ref: 00007FF617581E15
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617581E4E
                          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF617581E7B
                          • _wremove.API-MS-WIN-CRT-FILESYSTEM-L1-1-0 ref: 00007FF617581E9A
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF617581EE9
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$V01@$?setstate@?$basic_ios@__invalid_parameter_noinfo_noreturn$??6?$basic_ostream@_V01@@memsetrand$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?uncaught_exception@std@@?write@?$basic_ostream@CloseD@std@@@1@_HandleInit@?$basic_streambuf@Osfx@?$basic_ostream@PathTempV12@V?$basic_streambuf@_wremove
                          • String ID: [!] Error dumping shit inside the disk$[+] Vul driver data destroyed before unlink$[<] Unloading vulnerable driver
                          • API String ID: 893052925-4078119036
                          • Opcode ID: 0ea12bb95fce93f6a9b4e14282e7de2139cd23635c301132d8d77501a5b121e7
                          • Instruction ID: 8a97ee3c451da1e1061903af6ca9d75ca23edbe03aec612e67b3187ba78dcf9f
                          • Opcode Fuzzy Hash: 0ea12bb95fce93f6a9b4e14282e7de2139cd23635c301132d8d77501a5b121e7
                          • Instruction Fuzzy Hash: BE619161B29E4683EF009B26E4552797361EB85FF0F40413ADA5E87AAADE3CE445D700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32 ref: 00007FF617586DD6
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617586DFE
                          • GetProcAddress.KERNEL32 ref: 00007FF617586E34
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF617586F0A
                          • DeviceIoControl.KERNEL32 ref: 00007FF617586F87
                            • Part of subcall function 00007FF617582090: DeviceIoControl.KERNEL32 ref: 00007FF617582113
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
                          • String ID: NtAddAtom$Thre$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 368370636-2969835678
                          • Opcode ID: f941c6a6cd1e9aca624a823072f0ad7957500ea88e410b7070049dbaa69dbb0f
                          • Instruction ID: eba337fea7d4b0864e14fb41b2bff78bb2adbf2dd3d29f12fc07b4c639dfc8af
                          • Opcode Fuzzy Hash: f941c6a6cd1e9aca624a823072f0ad7957500ea88e410b7070049dbaa69dbb0f
                          • Instruction Fuzzy Hash: 93717F61A2CF4296EB50CF62E4502B833A1EB48BA4F844136D94D87BABDF3CD545D350
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • DeviceIoControl.KERNEL32 ref: 00007FF617582113
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          • DeviceIoControl.KERNEL32 ref: 00007FF6175821B6
                          • DeviceIoControl.KERNEL32 ref: 00007FF617582237
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF61758225A
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758226A
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF6175822B6
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6175822C6
                            • Part of subcall function 00007FF617585EE0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617586066
                            • Part of subcall function 00007FF617585EE0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758606D
                            • Part of subcall function 00007FF617585EE0: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758607A
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_$ControlDeviceV01@@$?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@
                          • String ID: [!] Failed to unmap IO space of physical address 0x$[-] Failed to map IO space of 0x$[-] Failed to translate virtual address 0x
                          • API String ID: 20913588-3202290428
                          • Opcode ID: 768f457529084253f463b37839e8fa1816c7609cc994d824bb27b2bb77239e30
                          • Instruction ID: 381ac2394b35dc000fac2210046e451ac46684db4f37c90a205973a67b38b073
                          • Opcode Fuzzy Hash: 768f457529084253f463b37839e8fa1816c7609cc994d824bb27b2bb77239e30
                          • Instruction Fuzzy Hash: 7F518D72A28F8196EB108F62E8403A933E5FB44BD8F404139DA4E97B6ADF3DD159D314
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                          • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                          • API String ID: 2565136772-3242537097
                          • Opcode ID: c4ce521b54123e40f2a4c33261a7ee44a6471a2646a2cce499864e056e4be369
                          • Instruction ID: 0e9cc5ef5c5bfbfe776783f3a2d7b4dddd9ca7b568730cacb7802008b7cf86d3
                          • Opcode Fuzzy Hash: c4ce521b54123e40f2a4c33261a7ee44a6471a2646a2cce499864e056e4be369
                          • Instruction Fuzzy Hash: 1A213C60E1DE53D2FF549B22E85617473A0AF98FA0F540439C90EC66A3EE3CE449A310
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: Virtual$ControlDeviceFree$Alloc_invalid_parameter_noinfo_noreturn_stricmpmemset
                          • String ID: 3
                          • API String ID: 1424858730-1842515611
                          • Opcode ID: 6213ede2f433992a2591b7b58782d74ce245e1a8d5168f4aa95bd60e5e5d9d76
                          • Instruction ID: baa4ebf0327594c3266986046402564e7ec9b8a3ec7fdd57e3cf6b778a1ed992
                          • Opcode Fuzzy Hash: 6213ede2f433992a2591b7b58782d74ce245e1a8d5168f4aa95bd60e5e5d9d76
                          • Instruction Fuzzy Hash: 52A17332A18F8187E7508B26E48436E77A5FB84BE4F100235DA9D87BA9DF7CD495DB00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32 ref: 00007FF6175863C7
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6175863EF
                          • GetProcAddress.KERNEL32 ref: 00007FF617586424
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6175864FA
                          • DeviceIoControl.KERNEL32 ref: 00007FF617586577
                            • Part of subcall function 00007FF617582090: DeviceIoControl.KERNEL32 ref: 00007FF617582113
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
                          • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 368370636-2622504768
                          • Opcode ID: 07a35007ed487b56f4db587970e95c09a46324f4da80d6a941353208fa08caac
                          • Instruction ID: 1554fe4dbc04fdf870eb25a5b0943a11407709ff757f975007c8f737ab75fcc0
                          • Opcode Fuzzy Hash: 07a35007ed487b56f4db587970e95c09a46324f4da80d6a941353208fa08caac
                          • Instruction Fuzzy Hash: CF715D62B1CE529AFB10CBA2E4503BC3771AB54BA4F844135D94D97AABDF3CD509D310
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,00000000), ref: 00007FF6175877BA
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,00000000), ref: 00007FF6175877E2
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,00000000), ref: 00007FF617587812
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,00000000), ref: 00007FF6175878E8
                          • DeviceIoControl.KERNEL32 ref: 00007FF617587965
                            • Part of subcall function 00007FF617582090: DeviceIoControl.KERNEL32 ref: 00007FF617582113
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
                          • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 368370636-2622504768
                          • Opcode ID: 81b4bedc38861b05086186993a6f74988c16882a15b613ea5cb71aaaf96ff6c4
                          • Instruction ID: c7d62ee00f22726608506ad8436f232209a19c86c9093e73a1140ead54931415
                          • Opcode Fuzzy Hash: 81b4bedc38861b05086186993a6f74988c16882a15b613ea5cb71aaaf96ff6c4
                          • Instruction Fuzzy Hash: B4619E62F2DE429AFB40CBA2E8503BC33B1AB44FA8F804536DD4D966A7DE3C9115D300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32 ref: 00007FF617587A3A
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617587A62
                          • GetProcAddress.KERNEL32 ref: 00007FF617587A92
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF617587B68
                          • DeviceIoControl.KERNEL32 ref: 00007FF617587BE5
                            • Part of subcall function 00007FF617582090: DeviceIoControl.KERNEL32 ref: 00007FF617582113
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
                          • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 368370636-2622504768
                          • Opcode ID: 84c97eca53465d08e78729226a55af830cb9339d32ed7463627f7794beb48f5d
                          • Instruction ID: dc27a84b499905229fc3d55e16ef3ce98bfba251ca250e2af56912b6d7596853
                          • Opcode Fuzzy Hash: 84c97eca53465d08e78729226a55af830cb9339d32ed7463627f7794beb48f5d
                          • Instruction Fuzzy Hash: B7619D62F2CE429AFB00CBA2E8503BC3372AB54BA8F404535D94D977A6EE3CD615D300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6175868DA
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF617586902
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF617586932
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF617586A08
                          • DeviceIoControl.KERNEL32 ref: 00007FF617586A85
                            • Part of subcall function 00007FF617582090: DeviceIoControl.KERNEL32 ref: 00007FF617582113
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
                          • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 368370636-2622504768
                          • Opcode ID: 9a4293af2f4150105d48851c55dbca0007aceb5460ac93198b3acfaaf17999c1
                          • Instruction ID: a1848dacbc797ba4ec7666e46af459e9aa370932dc54340dd25616f1d1a5eecd
                          • Opcode Fuzzy Hash: 9a4293af2f4150105d48851c55dbca0007aceb5460ac93198b3acfaaf17999c1
                          • Instruction Fuzzy Hash: 70618C62F2CE52DAFB00CB62E8503BC37A1AB44BA8F444135D95D96AA7DF3CD509E310
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32 ref: 00007FF617586147
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758616F
                          • GetProcAddress.KERNEL32 ref: 00007FF6175861A4
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758627B
                          • DeviceIoControl.KERNEL32 ref: 00007FF6175862F8
                            • Part of subcall function 00007FF617582090: DeviceIoControl.KERNEL32 ref: 00007FF617582113
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
                          • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 368370636-2622504768
                          • Opcode ID: d20ad06c7b61c352fce585a0ff8434ccb2eb07d43663d833fa1180daf7105303
                          • Instruction ID: 4a25016c70ecf8101f23b6a7d10f6a8a73cb5b0013bfc12a54041ccaf2d48bac
                          • Opcode Fuzzy Hash: d20ad06c7b61c352fce585a0ff8434ccb2eb07d43663d833fa1180daf7105303
                          • Instruction Fuzzy Hash: 61717B61B1DE529AFB10CB66E8503AC23B1AB54BA8F404136DE4D87BABDF3CE505D350
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6175872C7
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6175872EF
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF617587324
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6175873FA
                          • DeviceIoControl.KERNEL32 ref: 00007FF617587477
                            • Part of subcall function 00007FF617582090: DeviceIoControl.KERNEL32 ref: 00007FF617582113
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
                          • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 368370636-2622504768
                          • Opcode ID: be05baaf74b1d8d274d14c97ad0e4151864797468fb0b1e4271cb7cd2fbe5eef
                          • Instruction ID: bb924c3d9beb56c155d90feb482ad541ff87cdb90f7f08973ee97d4dc3a574da
                          • Opcode Fuzzy Hash: be05baaf74b1d8d274d14c97ad0e4151864797468fb0b1e4271cb7cd2fbe5eef
                          • Instruction Fuzzy Hash: 2C61BE62B2CE829AFB00CFA6E4403BC37A1AB44BA8F444535D94D876A7DF3DD555D310
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32 ref: 00007FF61758BF33
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758BF5B
                          • GetProcAddress.KERNEL32 ref: 00007FF61758BF90
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758C066
                          • DeviceIoControl.KERNEL32 ref: 00007FF61758C0E3
                            • Part of subcall function 00007FF617582090: DeviceIoControl.KERNEL32 ref: 00007FF617582113
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
                          • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 368370636-2622504768
                          • Opcode ID: 75e2e38410f586f35d8dddb7e1d72bdc8479a1fee9ad144a26da23a9d45f23ed
                          • Instruction ID: 9fd0bba6b7f361decf661aee960760f3a6bd054e58d650c6ac341d17eb0a59dc
                          • Opcode Fuzzy Hash: 75e2e38410f586f35d8dddb7e1d72bdc8479a1fee9ad144a26da23a9d45f23ed
                          • Instruction Fuzzy Hash: 87617E62B1CF429AFB40CF66E8503BC33A1AB55BA8F404135E95D86AABDF3CE545D340
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32 ref: 00007FF617586657
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758667F
                          • GetProcAddress.KERNEL32 ref: 00007FF6175866B4
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758678A
                          • DeviceIoControl.KERNEL32 ref: 00007FF617586807
                            • Part of subcall function 00007FF617582090: DeviceIoControl.KERNEL32 ref: 00007FF617582113
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
                          • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 368370636-2622504768
                          • Opcode ID: 39f50019deb99410ad90aec79f35fd3a5a99c60ca9ebc274ef96fc974d90439a
                          • Instruction ID: 335f4aa9d649499728b851fa252330527cd7f296bc26b5312f6ec4268d31651e
                          • Opcode Fuzzy Hash: 39f50019deb99410ad90aec79f35fd3a5a99c60ca9ebc274ef96fc974d90439a
                          • Instruction Fuzzy Hash: 5F613D61B2CE82AAFB40CF62E8513BC37A1EB44BA8F844535D94D866ABDF3CD505D350
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF617586B57
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF617586B7F
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF617586BB4
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF617586C8A
                          • DeviceIoControl.KERNEL32 ref: 00007FF617586D07
                            • Part of subcall function 00007FF617582090: DeviceIoControl.KERNEL32 ref: 00007FF617582113
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617582136
                            • Part of subcall function 00007FF617582090: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617582146
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
                          • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
                          • API String ID: 368370636-2622504768
                          • Opcode ID: cead50ffe5b47cfb8cc927cc365ac5db4de201711db484fc60612dd3b6970a6a
                          • Instruction ID: a27c73555aaf4a8d65aeebd9035ae2f40eec23e2a8839880512ac3cf59a13e50
                          • Opcode Fuzzy Hash: cead50ffe5b47cfb8cc927cc365ac5db4de201711db484fc60612dd3b6970a6a
                          • Instruction Fuzzy Hash: 96618F62B2CE4296FB40CF62E8503B837A1EB48BA8F444135D94D87BABDE3CE545D310
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,00000000,?,00000000,00007FF617583F0F,00000000,?,?,?,00000000), ref: 00007FF617583C3A
                          • DeviceIoControl.KERNEL32 ref: 00007FF617583CC9
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617583D58
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,00000000,?,00000000,00007FF617583F0F,00000000,?,?,?,00000000), ref: 00007FF617583D9B
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@W@std@@@std@@$ControlDevice
                          • String ID: 3$[-] Can't find pattern$[-] Can't find pattern, Too big section$[-] No module address to find pattern$[-] Read failed in FindPatternAtKernel
                          • API String ID: 3608848186-1666346959
                          • Opcode ID: 25de1d027680055c0d75dfb10a8cff5800750f9e1251e320f3cd241881b6fdc3
                          • Instruction ID: 1a98024634ddbcf6854b197f8bb4de9707306df997ee783884b334105f1e6de1
                          • Opcode Fuzzy Hash: 25de1d027680055c0d75dfb10a8cff5800750f9e1251e320f3cd241881b6fdc3
                          • Instruction Fuzzy Hash: ED51A261A2DE9282EB609B12E8503B973A4BB84FF0F904136D98D877A7DE3CD445E700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00007FF6175893B0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6175894B9
                          • _CxxThrowException.VCRUNTIME140 ref: 00007FF617589B23
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF617589B80
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF617589B8E
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF617589B61
                            • Part of subcall function 00007FF617585EE0: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617585F7C
                            • Part of subcall function 00007FF617585EE0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617585FD9
                            • Part of subcall function 00007FF617585EE0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617585FFC
                            • Part of subcall function 00007FF617585EE0: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758601D
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617589BB3
                            • Part of subcall function 00007FF617585EE0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF617586066
                            • Part of subcall function 00007FF617585EE0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758606D
                            • Part of subcall function 00007FF617585EE0: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF617581549), ref: 00007FF61758607A
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: U?$char_traits@_W@std@@@std@@$V01@$??6?$basic_ostream@_$D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@ExceptionOsfx@?$basic_ostream@ThrowV01@@V12@V21@@Vios_base@1@_invalid_parameter_noinfo_noreturn
                          • String ID: by 0x$[!!] Crash$[!!] Crash at addr 0x$exists
                          • API String ID: 1156142711-3783130642
                          • Opcode ID: 2433a08d44a14ffa2f4b717e79ea06eeccedfbf0a0fe6e1c3e1452175cb43441
                          • Instruction ID: 638a4e2ca5f28aeeac76b890933273ce3f3d5d16c5de8cfe1ea67145771c1466
                          • Opcode Fuzzy Hash: 2433a08d44a14ffa2f4b717e79ea06eeccedfbf0a0fe6e1c3e1452175cb43441
                          • Instruction Fuzzy Hash: BE214DA1A29E47D2EF05DB26E8512B52361BF94FA4F409136D94D872A7EF3CE584D300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • __std_fs_code_page.MSVCPRT ref: 00007FF61758953C
                            • Part of subcall function 00007FF61758E5C0: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,00007FF617589541), ref: 00007FF61758E5C4
                            • Part of subcall function 00007FF61758E5C0: AreFileApisANSI.KERNEL32(?,?,?,?,00007FF617589541), ref: 00007FF61758E5D3
                          • memcpy.VCRUNTIME140 ref: 00007FF617589606
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6175896F1
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF617589736
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF617589784
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$ApisFile___lc_codepage_func__std_fs_code_pagememcpy
                          • String ID: ", "$: "
                          • API String ID: 2077005984-747220369
                          • Opcode ID: 16bf5ebe2fff60483ae1d27a1e0273d33ada5ad7d3949c36599683d03e71c104
                          • Instruction ID: 27dbe00ffb12207c92b5563907a7fa5454a543dc4f8395544f84bb8117072dcf
                          • Opcode Fuzzy Hash: 16bf5ebe2fff60483ae1d27a1e0273d33ada5ad7d3949c36599683d03e71c104
                          • Instruction Fuzzy Hash: 80817C62B24E418AFB04DF66E4443AC2372EB45FA8F404535DE5EA3B9ADF38D591D380
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E1B1
                          • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E1DC
                          • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E226
                          • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E250
                          • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E275
                          • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E2BC
                          • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E314
                          • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E35C
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?sgetc@?$basic_streambuf@$?sbumpc@?$basic_streambuf@
                          • String ID:
                          • API String ID: 2679766405-0
                          • Opcode ID: b6f55c8de661949aee00f3984c83d90d78f2788c2d7a99471a7ded81e72e6142
                          • Instruction ID: 3122a69981dcf58aaacadcae26aaa1f15617d094fe37c78bca203c32034d1a76
                          • Opcode Fuzzy Hash: b6f55c8de661949aee00f3984c83d90d78f2788c2d7a99471a7ded81e72e6142
                          • Instruction Fuzzy Hash: 7261272261DEC286EB259B23A5401397670AF29F74F088538DE6A872D3DF3DE464B310
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00007FF61758DF00: NtQuerySystemInformation.NTDLL ref: 00007FF61758DF30
                            • Part of subcall function 00007FF61758DF00: VirtualFree.KERNEL32 ref: 00007FF61758DF50
                            • Part of subcall function 00007FF61758DF00: VirtualAlloc.KERNEL32 ref: 00007FF61758DF66
                            • Part of subcall function 00007FF61758DF00: NtQuerySystemInformation.NTDLL ref: 00007FF61758DF81
                            • Part of subcall function 00007FF61758DF00: VirtualFree.KERNEL32 ref: 00007FF61758DFA2
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758BC19
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758BC74
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758BD89
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$Virtual$??6?$basic_ostream@_FreeInformationQuerySystemU?$char_traits@_V01@@W@std@@@std@@$Alloc_invalid_parameter_noinfo_noreturn
                          • String ID: wasn't found$[-] Dependency $[-] Failed to resolve import
                          • API String ID: 4161254548-3042260135
                          • Opcode ID: b75a786da65429a35c51f41b5eccc472ef01767a1e1ccf5411a84107e1a4d6ea
                          • Instruction ID: 03c5ecc059956ae65b782f836deba387effe95b630a8888bf6d87160b06d6e01
                          • Opcode Fuzzy Hash: b75a786da65429a35c51f41b5eccc472ef01767a1e1ccf5411a84107e1a4d6ea
                          • Instruction Fuzzy Hash: 526171A1B2AF4283EF04DB57E4552B92395AB49FE0B445436DE1D8775BEF3CE4809340
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                          • String ID:
                          • API String ID: 1155477157-0
                          • Opcode ID: 10da492c311634369be122289dfe6daa27bba4e054799d58432064070a81cbd1
                          • Instruction ID: 74c524ebbed6aca90c100196fded5467f8a18b0ecd4ce6876669586a4523050b
                          • Opcode Fuzzy Hash: 10da492c311634369be122289dfe6daa27bba4e054799d58432064070a81cbd1
                          • Instruction Fuzzy Hash: 19516D32A24F8592EB20AB26E5442686360FB19FE4F544A35DB6D877D2DF3CF194D340
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF61758C20B
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF61758C266
                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF61758C288
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF61758C2A9
                          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF61758C2F1
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF61758C2F8
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF61758C305
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@U?$char_traits@_V12@W@std@@@std@@
                          • String ID:
                          • API String ID: 1696915518-0
                          • Opcode ID: 7c5af59a61a5901a94b9be4e371c288fb094c82f43e77d766fac9c546b8e14dc
                          • Instruction ID: 8710a9050ca5916f2d86d4fde7c913434a0e5f0d42a190911ebf00ede93cfa21
                          • Opcode Fuzzy Hash: 7c5af59a61a5901a94b9be4e371c288fb094c82f43e77d766fac9c546b8e14dc
                          • Instruction Fuzzy Hash: 27514132618E4182EB208B5BE594278A760FB85FA1F15C575CE9F877E2CF3AD446D340
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF61758C4E7
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF61758C53E
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF61758C568
                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF61758C5A3
                          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF61758C5D7
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF61758C5DE
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF61758C5EB
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@U?$char_traits@_V12@W@std@@@std@@
                          • String ID:
                          • API String ID: 1696915518-0
                          • Opcode ID: 6809e7df6b3b435e6e7a0ca89babc5ee645a15c7694824f258ba07736d3164ee
                          • Instruction ID: 085116b623abe581016a614afcde1847296f4df5b07ae0368f421c79b0d9ec62
                          • Opcode Fuzzy Hash: 6809e7df6b3b435e6e7a0ca89babc5ee645a15c7694824f258ba07736d3164ee
                          • Instruction Fuzzy Hash: 20515072A18E4182EF208B1BE594279A7A1FB85FE1F15C675CE4E877A2CF3DD4859300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.VCRUNTIME140 ref: 00007FF61758DC61
                          • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF61758DC80
                          • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF61758DC9F
                          • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF61758DCDD
                          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF61758DCFD
                          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF61758DD46
                            • Part of subcall function 00007FF61758E170: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E1B1
                            • Part of subcall function 00007FF61758E170: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E1DC
                            • Part of subcall function 00007FF61758E170: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E226
                            • Part of subcall function 00007FF61758E170: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF61758E2BC
                            • Part of subcall function 00007FF617585A50: fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF617585AB5
                            • Part of subcall function 00007FF617585A50: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF617585AD1
                          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?), ref: 00007FF61758DDF4
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: U?$char_traits@$D@std@@@std@@$?sgetc@?$basic_streambuf@$?setstate@?$basic_ios@_Init@?$basic_streambuf@U?$char_traits@_W@std@@@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@D@std@@@1@_V?$basic_streambuf@fclosememset
                          • String ID:
                          • API String ID: 3541683867-0
                          • Opcode ID: 7c43e1f59e50279b32c3c19cd75952e97e27e4d7079a0b117e2feb7ed43b3fa7
                          • Instruction ID: 50a402bf2ef81338cd5e5c99aa099943d02b288ba137a4ae20d45aa4c489c06d
                          • Opcode Fuzzy Hash: 7c43e1f59e50279b32c3c19cd75952e97e27e4d7079a0b117e2feb7ed43b3fa7
                          • Instruction Fuzzy Hash: 03516E32628F85C6DB10CB25E4802AEB7B0FB99B54F444526EA8D83B69DF7CD505CB00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_ControlDeviceU?$char_traits@_V01@@W@std@@@std@@
                          • String ID: 3$PAGE$[-] Can't find section$[-] Can't read module headers
                          • API String ID: 2444052014-2613856548
                          • Opcode ID: 2462984fb34f65ef7ceb8d57b29be2cf40297862bc9cd2c2b3f74bb965730f32
                          • Instruction ID: 204883810b97e35ee0111951df8c372666f8da6d508bd94b77727f09b5bb9976
                          • Opcode Fuzzy Hash: 2462984fb34f65ef7ceb8d57b29be2cf40297862bc9cd2c2b3f74bb965730f32
                          • Instruction Fuzzy Hash: 3341A472B18F8183EB108F16E44067977A0FB44BA4F900239EA8D837AADF7CD445D700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617587F08
                          • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617587F22
                          • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617587F4C
                          • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617587F77
                          • std::_Facet_Register.LIBCPMT ref: 00007FF617587F90
                          • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617587FAF
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF617587FD5
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
                          • String ID:
                          • API String ID: 762505753-0
                          • Opcode ID: aac081fb6ab8dc4e0cedd32f07939e52412442d89e45bfb77454185207a42477
                          • Instruction ID: 40224426735d93822e8355abc283b79df85c8a4105a93baf28aada752b2eeb73
                          • Opcode Fuzzy Hash: aac081fb6ab8dc4e0cedd32f07939e52412442d89e45bfb77454185207a42477
                          • Instruction Fuzzy Hash: B7317C22A18E4682EB109F13E440179B760FB98FF4F081635EA9E837AADF3CD441D700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617588008
                          • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617588022
                          • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF61758804C
                          • ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF617588077
                          • std::_Facet_Register.LIBCPMT ref: 00007FF617588090
                          • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF617585B63), ref: 00007FF6175880AF
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6175880D5
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$ctype@_Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@W@std@@std::_
                          • String ID:
                          • API String ID: 3972169111-0
                          • Opcode ID: 5c0b4609359dca811e414cc2bdfba58c66f13b7f3c4bdf40a9d3cef80f24584a
                          • Instruction ID: ec71ea2868e6321209fad868728e74b3081824690b2ee256260fd48f3179feea
                          • Opcode Fuzzy Hash: 5c0b4609359dca811e414cc2bdfba58c66f13b7f3c4bdf40a9d3cef80f24584a
                          • Instruction Fuzzy Hash: CF313C22A68F41C2EB149B16F85016977A0FB98FE4B084635DAAE877A6DF3CE441C700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: fgetc
                          • String ID:
                          • API String ID: 2807381905-0
                          • Opcode ID: 2ae6432ab8bce6caa6c654dc9fda8d20a7f15626e7c950d6e5d4c36c8342661c
                          • Instruction ID: 2ebe6670ce9a406cce2765a41bf06da58a7cd02c93916dd13e8be99ef5830761
                          • Opcode Fuzzy Hash: 2ae6432ab8bce6caa6c654dc9fda8d20a7f15626e7c950d6e5d4c36c8342661c
                          • Instruction Fuzzy Hash: 8E816A32B24E41CAEB008F66D4802AC37B1FB48B68F644636DE5D93B9ADF38D495D350
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF61758AD8E
                          • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF61758AD9B
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF61758ADD4
                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF61758ADDE
                          • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF61758ADEB
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF61758AE19
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpymemset$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3189120677-0
                          • Opcode ID: 5bbfdf141c7cbc7c28c36d4fab6bb606404a323813984a4d5d51a7c37aaf269f
                          • Instruction ID: 12f979b1d90d203fe00e6f76c3ade01a12c8aedda939d799d83c0850665da60d
                          • Opcode Fuzzy Hash: 5bbfdf141c7cbc7c28c36d4fab6bb606404a323813984a4d5d51a7c37aaf269f
                          • Instruction Fuzzy Hash: D841C362B29E8142EF64DB17A4042A96255EB49FF0F440B35DF6D877D7DE3CD151A300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: 6e0001885c67a5ca7cbdb1913dfd76d2cca26bbd218eb2987c13fad8a98a0af5
                          • Instruction ID: 6b3cfa073aafb731de444b142230b6909e3389eaf847160a6c24cd804542ebec
                          • Opcode Fuzzy Hash: 6e0001885c67a5ca7cbdb1913dfd76d2cca26bbd218eb2987c13fad8a98a0af5
                          • Instruction Fuzzy Hash: 5241C362729E4146EF249B17A5042696351EB48FF4F440A36EF6D8BBC7CE3CD151A304
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ.MSVCP140 ref: 00007FF617585368
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: D@std@@@std@@Pninc@?$basic_streambuf@U?$char_traits@
                          • String ID:
                          • API String ID: 3551493264-0
                          • Opcode ID: e2410bce05d058eee38531beec051a3aa21e569b295d64732deea3f4c073b2e8
                          • Instruction ID: 23dcacd243cf44cd5c2c02895a7765e2acf347416e1c37dfb14510d077f41770
                          • Opcode Fuzzy Hash: e2410bce05d058eee38531beec051a3aa21e569b295d64732deea3f4c073b2e8
                          • Instruction Fuzzy Hash: EC415F32A19F8186DB508F2AE4403AD73A0FB84FA9F644136DA9D877A9DE7CD445D700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758342C
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF61758347E
                            • Part of subcall function 00007FF6175879F0: GetModuleHandleA.KERNEL32 ref: 00007FF617587A3A
                            • Part of subcall function 00007FF6175879F0: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF617587A62
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@W@std@@@std@@$HandleModule_invalid_parameter_noinfo_noreturn
                          • String ID: RtlLookupElementGenericTableAvl$[!] Failed to find RtlLookupElementGenericTableAvl
                          • API String ID: 4059861771-1952825546
                          • Opcode ID: f91b4048907dee39513a2d9e2412090ece693978832c89e79cced1154a2d6241
                          • Instruction ID: 24f59a58977e10e6003f85e288d3d5941b55cf47907299459fbeb47ab01ad50b
                          • Opcode Fuzzy Hash: f91b4048907dee39513a2d9e2412090ece693978832c89e79cced1154a2d6241
                          • Instruction Fuzzy Hash: C1415E62A2CF8282EB50DB16E8553696360FB85BB0F540239EA9D837B7DF7CD045DB00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF6175836CA), ref: 00007FF617583160
                            • Part of subcall function 00007FF61758ED70: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF6175861F9), ref: 00007FF61758ED80
                            • Part of subcall function 00007FF617585D50: memcpy.VCRUNTIME140 ref: 00007FF617585D81
                            • Part of subcall function 00007FF6175826A0: memset.VCRUNTIME140 ref: 00007FF6175826FB
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF617582756
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF6175827D3
                            • Part of subcall function 00007FF6175826A0: VirtualAlloc.KERNEL32 ref: 00007FF61758282A
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF617583120
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: ControlDeviceV01@$??6?$basic_ostream@_AllocCriticalEnterSectionU?$char_traits@_V01@@VirtualW@std@@@std@@_invalid_parameter_noinfo_noreturnmemcpymemset
                          • String ID: ExAcquireResourceExclusiveLite$[!] Failed to find ExAcquireResourceExclusiveLite
                          • API String ID: 254689191-2131800721
                          • Opcode ID: d56bb215954a491db55e19e084b643cf47709b202a96c0a336a4315cd5726018
                          • Instruction ID: 2f5873be940790ad91f355184462454f7adf3ff1f13e00cb0326325e72c2c50d
                          • Opcode Fuzzy Hash: d56bb215954a491db55e19e084b643cf47709b202a96c0a336a4315cd5726018
                          • Instruction Fuzzy Hash: 2F315C61A2CE4292EB50DB16E8403692361AF84FF0F505231E55EC66B7DF3CE085D740
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6175823E8
                            • Part of subcall function 00007FF61758ED70: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF6175861F9), ref: 00007FF61758ED80
                            • Part of subcall function 00007FF617585D50: memcpy.VCRUNTIME140 ref: 00007FF617585D81
                            • Part of subcall function 00007FF6175826A0: memset.VCRUNTIME140 ref: 00007FF6175826FB
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF617582756
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF6175827D3
                            • Part of subcall function 00007FF6175826A0: VirtualAlloc.KERNEL32 ref: 00007FF61758282A
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6175823A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: ControlDeviceV01@$??6?$basic_ostream@_AllocCriticalEnterSectionU?$char_traits@_V01@@VirtualW@std@@@std@@_invalid_parameter_noinfo_noreturnmemcpymemset
                          • String ID: MmUnmapLockedPages$[!] Failed to find MmUnmapLockedPages
                          • API String ID: 254689191-2848997145
                          • Opcode ID: 973acc5280c27da670c3b9094c275da85e44886411f116d0b83930af2ca6f37e
                          • Instruction ID: f0d30d13ea2cf3be4eb4cb6f4d4fc763574dfc3f0867b8b57d7a4bc0f154651c
                          • Opcode Fuzzy Hash: 973acc5280c27da670c3b9094c275da85e44886411f116d0b83930af2ca6f37e
                          • Instruction Fuzzy Hash: D1318D61A2CE4692EB40DB16E8513A92361EB84FF0F501235EA5DC37EBDE3CE485E300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF61758B242), ref: 00007FF617582527
                            • Part of subcall function 00007FF61758ED70: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF6175861F9), ref: 00007FF61758ED80
                            • Part of subcall function 00007FF617585D50: memcpy.VCRUNTIME140 ref: 00007FF617585D81
                            • Part of subcall function 00007FF6175826A0: memset.VCRUNTIME140 ref: 00007FF6175826FB
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF617582756
                            • Part of subcall function 00007FF6175826A0: DeviceIoControl.KERNEL32 ref: 00007FF6175827D3
                            • Part of subcall function 00007FF6175826A0: VirtualAlloc.KERNEL32 ref: 00007FF61758282A
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00007FF61758B242), ref: 00007FF6175824E7
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: ControlDeviceV01@$??6?$basic_ostream@_AllocCriticalEnterSectionU?$char_traits@_V01@@VirtualW@std@@@std@@_invalid_parameter_noinfo_noreturnmemcpymemset
                          • String ID: MmFreePagesFromMdl$[!] Failed to find MmFreePagesFromMdl
                          • API String ID: 254689191-1029121595
                          • Opcode ID: fa20e3aab8d1f4d46187acd225339f3e817f5b10ade771ad89716a3a21e68c40
                          • Instruction ID: f2256c83f51cc6f6a2fd11a350f3d2b3dd58e1ab743f78395e1789fda7ab3c0f
                          • Opcode Fuzzy Hash: fa20e3aab8d1f4d46187acd225339f3e817f5b10ade771ad89716a3a21e68c40
                          • Instruction Fuzzy Hash: 69317C71A2CE4292EB50DB26F8503692361BB88FF4F501231D69DC7AABDE3CD144D700
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy__std_exception_destroy
                          • String ID:
                          • API String ID: 2138705365-0
                          • Opcode ID: 2205cfd6339c9498596a29b3c30bdf12889898d0983d2445d7fbeb32194565aa
                          • Instruction ID: 2aa1b13593c9bfb88dbf2ce3a9568c087ad602f06937f8608198bd9cacb34070
                          • Opcode Fuzzy Hash: 2205cfd6339c9498596a29b3c30bdf12889898d0983d2445d7fbeb32194565aa
                          • Instruction Fuzzy Hash: FF817CB2A14E8292EB049F2AD49436C7335EB45F98F908035D78D47A6AEF78D8D5D340
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                          • String ID:
                          • API String ID: 1155477157-0
                          • Opcode ID: 6b6b4b9d01e2ae7b584df43724403675c4a8dc56640d5bda716cf79e8d65e3d1
                          • Instruction ID: 8481120334a286960d613774e5cb4eade15eb4755782cfacbb325473050e32d9
                          • Opcode Fuzzy Hash: 6b6b4b9d01e2ae7b584df43724403675c4a8dc56640d5bda716cf79e8d65e3d1
                          • Instruction Fuzzy Hash: 1F51ADB2B24F8A82DE04CB26D5441A963E0FB49FD0B448636DE5D87796EF3CE1929340
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                          • String ID:
                          • API String ID: 1155477157-0
                          • Opcode ID: e9607e1459929ec6f4067fa4e678572a91a8c4d957252fc830ff298ec4cc2cb7
                          • Instruction ID: 3995f03a9ae1a16a1657e0cc52514f0daaacf57c3d582a3cc26e8ab0a3cda593
                          • Opcode Fuzzy Hash: e9607e1459929ec6f4067fa4e678572a91a8c4d957252fc830ff298ec4cc2cb7
                          • Instruction Fuzzy Hash: 8F41D332B26E4546EF19DB27954427823519B04FF8F644A36DE2D47BDADE3CE4829300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: 27f7ce9152dddb5a4e3372883ab6ead06d49ff1432c807abeec17e9e7f9a3675
                          • Instruction ID: e587df09e0137c48cb41f4ab70f6acee9172fc8e9d32b0bc461309fb9bce8024
                          • Opcode Fuzzy Hash: 27f7ce9152dddb5a4e3372883ab6ead06d49ff1432c807abeec17e9e7f9a3675
                          • Instruction Fuzzy Hash: B541CE22B29F4682EB149B13E94416D6265EB08FF4F440735DE6E87BD6DF7CE091A300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memcpy.VCRUNTIME140(?,?,00000000,00007FF617581582), ref: 00007FF617585C0B
                          • memcpy.VCRUNTIME140(?,?,00000000,00007FF617581582), ref: 00007FF617585CEC
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FF617581582), ref: 00007FF617585D35
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF617585D42
                            • Part of subcall function 00007FF61758EE80: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF617585E2E), ref: 00007FF61758EE9A
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                          • String ID:
                          • API String ID: 1155477157-0
                          • Opcode ID: ccd7cce03d4ba9b0a9d7e9de07282b700467601af26e8bc8264e1f254a4e127b
                          • Instruction ID: b67706c7f76cc14638ccaff7ad416d898c8ad58e0d812a929f54ee78ea9bfca3
                          • Opcode Fuzzy Hash: ccd7cce03d4ba9b0a9d7e9de07282b700467601af26e8bc8264e1f254a4e127b
                          • Instruction Fuzzy Hash: A231F661B26E4656EF549B1394442BC2290AB04FF4F680B34DF3D877DADE7CE582A300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: __std_fs_convert_wide_to_narrow$__std_fs_code_pagememset
                          • String ID:
                          • API String ID: 3622096240-0
                          • Opcode ID: 9d6b2d4985100764f9f83310051530a167f5966a496c08115753a35d81474fc0
                          • Instruction ID: 921bb06f1605c6c5c773292afdd6162e9b6b57afa7bd01128695483dd321c7c2
                          • Opcode Fuzzy Hash: 9d6b2d4985100764f9f83310051530a167f5966a496c08115753a35d81474fc0
                          • Instruction Fuzzy Hash: 5E31A262A2CB4287EB249F67A84426AA6A1FB44FD0F454435EFCD87B93DF7CE1419340
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memcpy.VCRUNTIME140(?,?,?,00007FF61758E354), ref: 00007FF61758E473
                          • memcpy.VCRUNTIME140(?,?,?,00007FF61758E354), ref: 00007FF61758E486
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF61758E354), ref: 00007FF61758E4EC
                            • Part of subcall function 00007FF61758EE80: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF617585E2E), ref: 00007FF61758EE9A
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF61758E4F9
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                          • String ID:
                          • API String ID: 1155477157-0
                          • Opcode ID: a6601d10cbc77214e642144e2138ecc2b8b28d600f51c286392e5c18081e3651
                          • Instruction ID: 71c6fecdb047124671d983f197e022bba31bb1c792ac2e9507cdf36103963771
                          • Opcode Fuzzy Hash: a6601d10cbc77214e642144e2138ecc2b8b28d600f51c286392e5c18081e3651
                          • Instruction Fuzzy Hash: 8D41A262B29F8686EE14CB6795442796361AB09FE0F184935DBAD877E6DE3CE040E300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: 110ba8f7703c95fa816d4a4b89f59d4b185b480252ec63a561f4fad6dcc5d99b
                          • Instruction ID: 0bb0b9d1931f43a4e8a0bc5096c8fb1456cadab10c995d4a5fcfc5a4d329a845
                          • Opcode Fuzzy Hash: 110ba8f7703c95fa816d4a4b89f59d4b185b480252ec63a561f4fad6dcc5d99b
                          • Instruction Fuzzy Hash: 0831BF61B29E4686EF249B17A5042B86392EB48FF0F580735DA7E877D6DE7CF0419200
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: 2357da3bb513d7c9145eee397d78b7431cabcff220944bf8386c1124a6a143d5
                          • Instruction ID: 5bc8432afee3281c609d92d758afa1ff728b1102c37a00bf46abc7e268d85806
                          • Opcode Fuzzy Hash: 2357da3bb513d7c9145eee397d78b7431cabcff220944bf8386c1124a6a143d5
                          • Instruction Fuzzy Hash: 2D41DF22B29B825AEF149B17A5002A86351EB08FF0F580735DE6D47BD7CE7CE091A300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF617589573), ref: 00007FF61758AC2A
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF617589573), ref: 00007FF61758AC5E
                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF617589573), ref: 00007FF61758AC68
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF61758AC8B
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: 817ecf575b1ae1cec1e573c07ef55618db070116d72e27764646cd94895a952f
                          • Instruction ID: 4a7aa31234220a69e7f9491b4482a639ecd8f57a369470cbc5b9f99692dd4672
                          • Opcode Fuzzy Hash: 817ecf575b1ae1cec1e573c07ef55618db070116d72e27764646cd94895a952f
                          • Instruction Fuzzy Hash: 7C31CF61B29E4287EF149B1791041A8A352EB08FF0F584B35EA6E877C7DE3CE581A300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                          • String ID:
                          • API String ID: 1155477157-0
                          • Opcode ID: 17a6bd0400d76eeebadb61516333b4f4134b382caa0cfac2faaf4219823a850b
                          • Instruction ID: 8719830f7430a65fc3194c8152899e7e781b1cc8c63207bc3aa2856091c6cd72
                          • Opcode Fuzzy Hash: 17a6bd0400d76eeebadb61516333b4f4134b382caa0cfac2faaf4219823a850b
                          • Instruction Fuzzy Hash: 6431AF22B25A8596FB24DB13A5042A962A5EB48FF4F480B35DE7D877D6EE3CE0519300
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: ByteCharErrorLastMultiWide
                          • String ID:
                          • API String ID: 203985260-0
                          • Opcode ID: 98f79813ac48123c3c75fe13417aac944ec9262fc5e7f647da25030655104f1a
                          • Instruction ID: 9e24f6f3537402ef7b2ecf0ddf0e061fd1d8f5af25a008c4a8db68ede232cd94
                          • Opcode Fuzzy Hash: 98f79813ac48123c3c75fe13417aac944ec9262fc5e7f647da25030655104f1a
                          • Instruction Fuzzy Hash: 47214F76A28B9587E3508F12E84432E76B4FB99FD4F240138DB8993B9ADF3DD4118B00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF61758D346
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2096735620.00007FF617581000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF617580000, based on PE: true
                          • Associated: 00000003.00000002.2096716768.00007FF617580000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096766988.00007FF617591000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096789027.00007FF6175A2000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000003.00000002.2096803552.00007FF6175A3000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ff617580000_bugado.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: gfffffff$gfffffff
                          • API String ID: 3668304517-161084747
                          • Opcode ID: 8ddafdd1b9fa5781b3df14e0202f118e42dc4fa38e85b93b27dca32522a3f3cd
                          • Instruction ID: 324fac90e9939da7bd041268e1c4d33fdbf867bd7b12922595d592b54441b881
                          • Opcode Fuzzy Hash: 8ddafdd1b9fa5781b3df14e0202f118e42dc4fa38e85b93b27dca32522a3f3cd
                          • Instruction Fuzzy Hash: 7B41AFA2714B8A92DE14CB17F94456DA3A6F748FD4B448236DE4DCB759EE3CE181C302
                          Uniqueness

                          Uniqueness Score: -1.00%