The Midnight - Jason (official Audio) Apr 2026
: Set in 1999, Jason is a 20-something man working a grueling, low-wage job. He is overworked and carrying the silent burden of providing for his wife, who is heavily pregnant with their first child.
The track by The Midnight isn’t just a synthwave anthem; it’s a narrative of 1980s suburban escapism, longing, and the weight of adult expectations. The Midnight - Jason (Official Audio)
The official lore, particularly expanded upon in the comic series , tells a story centered on a young man named Jason during the transition from the late 90s into a future he isn't quite ready for. The Story of Jason : Set in 1999, Jason is a 20-something
: The story unfolds at home, where his wife gently nudges him to finish setting up the baby's nursery. This room becomes a physical manifestation of the future he is terrified he can't sustain. The official lore, particularly expanded upon in the
: The song and its associated media explore the "dangers of nostalgia". It captures that specific feeling of driving through a neon-lit city at night, wishing you could return to a version of yourself that didn't have so many responsibilities.
The track features a soaring saxophone solo and vocals by , which act as the voice of that neon-soaked memory calling him back to the "endless summer" of his youth. 'The Midnight: Shadows' Renders Nostalgia's Dangers in Neon
: While digging through old boxes, Jason finds a connection to his past—an old video game also titled The Midnight . It represents a simpler time before the pressure to "not fail" took over his life.
Nice write up – where can I get the vulnerable app? I checked IOLO’s website and the exploitdb but I can’t find 5.0.0.136
For “System Shield AntiVirus and AntiSpyware” you’ll need to run the downloader which downloads the main installation package but then you’ll need to also request a license. Best just to download “System Mechanic Pro” and install as a trial, this downloads the entire package and no license is required for installation
http://download.iolo.net/sm/15/pro/en/iolo/trial/SystemMechanicPro_15.5.0.61.exe
Hello.
Thanks for this demonstration!
I have a question. With this exploit, can we access to the winlogon.exe and open a handle for read and write memory?
Kind regards,
Yes you can as “SeDebugPrivilege” is also enabled
Why doesn’t it work with csrss.exe?
pHandle = OpenProcess(PROCESS_VM_READ, 0, 428); //my csrss PID
printf(“> pHandle: %d || %s\n”, pHandle, pHandle);
i got: 0 || (null)
It should work, most likely haven’t got the necessary privilege
Oh yes, thanks. But can you help me with “SeDebugPrivilege”. What offset?
Kind regards,
The SeDebugPrivilege is already enabled in this exploit, what you can do it use a previous exploit of mine which uses shellcode being injected in the winlogon process.
Thanks for nice write up. I want to study this case, so I’ve downloaded the link
http://download.iolo.net/sm/15/pro/en/iolo/trial/SystemMechanicPro_15.5.0.61.exe.
And opened amp.sys file with IDA pro, but I could not find the code related to ctl code 0x00226003. How can I find it?
Best just do a text search for 226003 and only one entry will be listed
Thanks! I found with its hex byte ’03 60 22′ in IDA search and reached vulnerable function.