Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Infor IDF Auxiliary Machine.exe

Overview

General Information

Sample name:Infor IDF Auxiliary Machine.exe
Analysis ID:1500785
MD5:62cdc45806e717f187e2f46780bd6834
SHA1:c84eb7d4061d8e57a37c493ca28a06403f56501d
SHA256:574bd976108995da86f648aad2403e6780d11bc36d579ce0a6098bd69287769a
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
AI detected suspicious sample
Machine Learning detection for sample
PE file has a writeable .text section
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Infor IDF Auxiliary Machine.exe (PID: 7316 cmdline: "C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exe" MD5: 62CDC45806E717F187E2F46780BD6834)
    • conhost.exe (PID: 7324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.5% probability
Source: Infor IDF Auxiliary Machine.exeJoe Sandbox ML: detected
Source: Infor IDF Auxiliary Machine.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Infor IDF Auxiliary Machine.exe, 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://java.sun.com

System Summary

barindex
Source: Infor IDF Auxiliary Machine.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_004166FC0_2_004166FC
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0040C8E00_2_0040C8E0
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0041ACE10_2_0041ACE1
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_00408E5D0_2_00408E5D
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_00413F000_2_00413F00
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: String function: 004166B0 appears 58 times
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: String function: 00401A0A appears 54 times
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: String function: 00415728 appears 187 times
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: String function: 00411F19 appears 38 times
Source: Infor IDF Auxiliary Machine.exeBinary or memory string: OriginalFilename vs Infor IDF Auxiliary Machine.exe
Source: Infor IDF Auxiliary Machine.exe, 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameconsole.exe@ vs Infor IDF Auxiliary Machine.exe
Source: Infor IDF Auxiliary Machine.exe, 00000000.00000000.2042309173.000000000043C000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameconsole.exe@ vs Infor IDF Auxiliary Machine.exe
Source: Infor IDF Auxiliary Machine.exeBinary or memory string: OriginalFilenameconsole.exe@ vs Infor IDF Auxiliary Machine.exe
Source: Infor IDF Auxiliary Machine.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Infor IDF Auxiliary Machine.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: classification engineClassification label: mal60.evad.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7324:120:WilError_03
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exe "C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exe"
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeSection loaded: version.dllJump to behavior

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeUnpacked PE file: 0.2.Infor IDF Auxiliary Machine.exe.400000.0.unpack .text:EW;.rsrc:EW; vs .text:ER;.rsrc:EW;
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0041F805 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041F805
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0042D04C push eax; ret 0_2_0042D0A1
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_00428018 push eax; retn 0042h0_2_00428019
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_004283D8 push esp; iretd 0_2_004283D9
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_004166EB push ecx; ret 0_2_004166FB
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_00415728 push eax; ret 0_2_00415746
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0041C880 push eax; ret 0_2_0041C894
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0041C880 push eax; ret 0_2_0041C8BC
Source: Infor IDF Auxiliary Machine.exeStatic PE information: section name: .text entropy: 7.970208954906549
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-19947
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeAPI coverage: 9.2 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0041E627 VirtualQuery,GetSystemInfo,VirtualQuery,VirtualAlloc,VirtualProtect,0_2_0041E627
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeAPI call chain: ExitProcess graph end nodegraph_0-19949
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0041F805 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041F805
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0041C9CE SetUnhandledExceptionFilter,0_2_0041C9CE
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0041C9BA SetUnhandledExceptionFilter,0_2_0041C9BA
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: GetLocaleInfoA,0_2_0041E70A
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: GetLastError,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar,0_2_0041F8FE
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: GetLocaleInfoA,_strncpy,0_2_0041D992
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: GetLocaleInfoA,MultiByteToWideChar,0_2_0041F9BA
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: GetLastError,WideCharToMultiByte,GetLocaleInfoA,0_2_0041FA2E
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: _strlen,_strlen,EnumSystemLocalesA,0_2_0041DEE8
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: _strlen,EnumSystemLocalesA,0_2_0041DEB1
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: _strlen,EnumSystemLocalesA,0_2_0041DF6E
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: GetLocaleInfoA,_TranslateName,_TranslateName,IsValidLocale,_strcat,0_2_0041DFC3
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_0041E429 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0041E429
Source: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exeCode function: 0_2_00414FC6 EntryPoint,GetVersionExA,GetModuleHandleA,_fast_error_exit,_fast_error_exit,GetCommandLineA,0_2_00414FC6
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
DLL Side-Loading
1
Process Injection
12
Software Packing
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory14
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Infor IDF Auxiliary Machine.exe5%ReversingLabs
Infor IDF Auxiliary Machine.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://java.sun.com0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://java.sun.comInfor IDF Auxiliary Machine.exe, 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1500785
Start date and time:2024-08-28 22:50:16 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Infor IDF Auxiliary Machine.exe
Detection:MAL
Classification:mal60.evad.winEXE@2/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 93%
  • Number of executed functions: 16
  • Number of non-executed functions: 95
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: Infor IDF Auxiliary Machine.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (console) Intel 80386, for MS Windows, PECompact2 compressed
Entropy (8bit):7.719974222025018
TrID:
  • Win32 Executable (generic) a (10002005/4) 98.96%
  • Win32 EXE PECompact compressed (v2.x) (59071/9) 0.58%
  • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
File name:Infor IDF Auxiliary Machine.exe
File size:122'880 bytes
MD5:62cdc45806e717f187e2f46780bd6834
SHA1:c84eb7d4061d8e57a37c493ca28a06403f56501d
SHA256:574bd976108995da86f648aad2403e6780d11bc36d579ce0a6098bd69287769a
SHA512:888edf170ea8dfdf165c6107efd9beff18e80597911b0df29a50aba31f91a5040504c23610492a896f5c04e3c3324e9c27681795304834e94e723038221bb6ae
SSDEEP:3072:YM5y2eLmj6MgLi58xh4V9A/PW/nVaTyVHZdY:KKj6ZLAaHWfVlY
TLSH:7BC3F1D6E6405DBBE06D0572CD3312A02BB0B9093F23968716F36ADB3C71A25258F6DD
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........r8...V...V...V...Y...V...6...V.....*.V.......V...?...V.9.....V.9.....V...W...V...2...V.V.....V.......V.Rich..V.........PE..L..
Icon Hash:76e9daf4c888b0f0
Entrypoint:0x414fc6
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x4C650145 [Fri Aug 13 08:24:37 2010 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:09d0478591d4f788cb3e5ea416c25237
Instruction
mov eax, 004438FCh
push eax
push dword ptr fs:[00000000h]
mov dword ptr fs:[00000000h], esp
xor eax, eax
mov dword ptr [eax], ecx
push eax
inc ebp
inc ebx
outsd
insd
jo 00007F7010D149E3h
arpl word ptr [edx+esi+00h], si
pop ecx
retf
aam 16h
pop es
pushad
rcr byte ptr [ecx], 00000022h
je 00007F7010D149A9h
in eax, 22h
dec esp
mov ebx, 26449820h
pop esi
add al, D1h
imul eax, esp, EEC4E71Eh
salc
push FFFFFFA6h
inc eax
or eax, dword ptr [esi-6CCA1C66h]
and dl, byte ptr [edi]
in al, 68h
fidiv dword ptr [eax+6303CD78h]
xor edx, dword ptr [ebx+44h]
push esp
mov esp, dword ptr [ebp+72h]
sbb ch, byte ptr [edi]
jnl 00007F7010D149F6h
mov bx, ds
and dword ptr [edx], A02D8029h
mov ebx, D0E870ACh
and cl, ch
push 00000046h
sub al, 02h
push FFFFFF81h
dec esp
mov eax, dword ptr [81D5B00Ch]
xor eax, 1B248E63h
add esp, dword ptr [esi]
push eax
add byte ptr [edx-6Bh], FFFFFFBCh
dec ebx
dec ebp
adc al, 02h
salc
pushfd
cdq
add ah, byte ptr [ecx]
mov al, byte ptr [A3B72108h]
pushad
test byte ptr [edx], cl
dec eax
mov dword ptr [E23DD200h], eax
sbb dword ptr [ebx+4D488D00h], ebp
fmul qword ptr [esi+0306AB36h]
arpl ax, sp
sbb dword ptr [eax], eax
Programming Language:
  • [ASM] VS2003 (.NET) build 3077
  • [C++] VS2003 (.NET) build 3077
  • [ C ] VS2003 (.NET) build 3077
  • [RES] VS2003 (.NET) build 3077
  • [LNK] VS2003 (.NET) build 3077
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x42e940x8f.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c0000x6e55.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x3b0000x162006b2e13c14c65b20d76c9b766f5db175dFalse0.9955420197740112data7.970208954906549IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x3c0000x80000x7a007606d67299f301afb8b445c88408d4e6False0.6684490266393442data6.468159493452258IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x3c5980x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.43658536585365854
RT_ICON0x3cc000x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.5376344086021505
RT_ICON0x3cee80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.597972972972973
RT_ICON0x3d0100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6471215351812367
RT_ICON0x3deb80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7572202166064982
RT_ICON0x3e7600x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.5823699421965318
RT_ICON0x3ecc80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.7104771784232365
RT_ICON0x412700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6843339587242027
RT_ICON0x423180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.9166666666666666
RT_STRING0x300000x2a8empty0
RT_STRING0x302a80x2b0emptyCatalanSpain0
RT_STRING0x305580x142emptyChineseTaiwan0
RT_STRING0x3069a0x1b4emptyCzechCzech Republic0
RT_STRING0x3084e0x2b4emptyDanishDenmark0
RT_STRING0x30b020x274emptyGermanGermany0
RT_STRING0x30d760x31cemptyGreekGreece0
RT_STRING0x310920x268emptyEnglishUnited States0
RT_STRING0x312fa0x276emptyFinnishFinland0
RT_STRING0x315700x28cemptyFrenchFrance0
RT_STRING0x317fc0x28cemptyHungarianHungary0
RT_STRING0x31a880x29cemptyItalianItaly0
RT_STRING0x31d240x1ceemptyJapaneseJapan0
RT_STRING0x31ef20x164emptyKoreanNorth Korea0
RT_STRING0x31ef20x164emptyKoreanSouth Korea0
RT_STRING0x320560x2a4emptyDutchNetherlands0
RT_STRING0x322fa0x26aemptyNorwegianNorway0
RT_STRING0x325640x202emptyPolishPoland0
RT_STRING0x327660x2d4emptyPortugueseBrazil0
RT_STRING0x32a3a0x2e4emptyRussianRussia0
RT_STRING0x32d1e0x2dcemptySlovakSlovakia0
RT_STRING0x32ffa0x262emptySwedishSweden0
RT_STRING0x3325c0x286emptyThaiThailand0
RT_STRING0x334e20x29cemptyTurkishTurkey0
RT_STRING0x3377e0x29eemptyIndonesianIndonesia0
RT_STRING0x33a1c0x2d6emptySlovenianSlovenia0
RT_STRING0x33cf20x2e8emptyBasqueFrance0
RT_STRING0x33cf20x2e8emptyBasqueSpain0
RT_STRING0x33fda0x140emptyChineseChina0
RT_STRING0x3411a0x2beemptyPortuguesePortugal0
RT_STRING0x343d80x286emptyFrenchCanada0
RT_GROUP_ICON0x427800x84dataEnglishUnited States0.6363636363636364
RT_VERSION0x428080x348dataEnglishUnited States0.45595238095238094
RT_MANIFEST0x42b500x305XML 1.0 document, ASCII text0.5420439844760673
DLLImport
kernel32.dllLoadLibraryA, GetProcAddress, VirtualAlloc, VirtualFree
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
CatalanSpain
ChineseTaiwan
CzechCzech Republic
DanishDenmark
GermanGermany
GreekGreece
FinnishFinland
FrenchFrance
HungarianHungary
ItalianItaly
JapaneseJapan
KoreanNorth Korea
KoreanSouth Korea
DutchNetherlands
NorwegianNorway
PolishPoland
PortugueseBrazil
RussianRussia
SlovakSlovakia
SwedishSweden
ThaiThailand
TurkishTurkey
IndonesianIndonesia
SlovenianSlovenia
ChineseChina
PortuguesePortugal
FrenchCanada
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:16:51:08
Start date:28/08/2024
Path:C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exe"
Imagebase:0x400000
File size:122'880 bytes
MD5 hash:62CDC45806E717F187E2F46780BD6834
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:16:51:08
Start date:28/08/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:4%
    Dynamic/Decrypted Code Coverage:1.1%
    Signature Coverage:3.9%
    Total number of Nodes:2000
    Total number of Limit Nodes:62
    execution_graph 19138 40db70 19145 4019e1 19138->19145 19144 40db92 19160 401d74 19145->19160 19147 401a03 19148 40292d 19147->19148 19149 402936 19148->19149 19151 40293d 19148->19151 19150 412241 numpunct 41 API calls 19149->19150 19150->19151 19152 402979 19151->19152 19153 402983 __EH_prolog 19152->19153 19276 40f3f5 19153->19276 19157 4029b6 ctype 19158 402a1f GetStdHandle lstrlenW WriteConsoleW 19157->19158 19159 402a58 ctype 19158->19159 19159->19144 19161 401d80 19160->19161 19162 401d88 19160->19162 19171 412265 19161->19171 19164 401db1 19162->19164 19165 401d9c 19162->19165 19189 402332 19164->19189 19185 4022b2 19165->19185 19168 401da7 19169 4022b2 41 API calls 19168->19169 19170 401daf std::runtime_error::~runtime_error ctype 19169->19170 19170->19147 19172 41226f __EH_prolog 19171->19172 19195 40242d 19172->19195 19178 4122a4 __EH_prolog 19179 40242d numpunct 41 API calls 19178->19179 19180 4122bf 19179->19180 19181 401163 numpunct 41 API calls 19180->19181 19182 4122cf 19181->19182 19204 415747 KiUserExceptionDispatcher 19182->19204 19184 4122e4 19186 4022b7 19185->19186 19188 4022be __shift ctype 19185->19188 19187 412265 numpunct 41 API calls 19186->19187 19187->19188 19188->19168 19190 402344 19189->19190 19191 40233d 19189->19191 19194 402355 ctype 19190->19194 19272 40256b 19190->19272 19192 4122a5 numpunct 41 API calls 19191->19192 19192->19190 19194->19170 19196 40243e std::runtime_error::~runtime_error 19195->19196 19205 401b00 19196->19205 19199 401163 19200 40116d __EH_prolog numpunct 19199->19200 19268 40187a 19200->19268 19203 415747 KiUserExceptionDispatcher 19203->19178 19204->19184 19206 401b0c _strlen 19205->19206 19209 401ef7 19206->19209 19208 401b19 19208->19199 19210 401f07 numpunct 19209->19210 19211 401f29 19210->19211 19213 401f0b 19210->19213 19227 401fee 19211->19227 19216 401a71 19213->19216 19215 401f27 std::runtime_error::~runtime_error 19215->19208 19217 401a84 19216->19217 19218 401a89 19216->19218 19219 412265 numpunct 41 API calls 19217->19219 19220 401ab7 19218->19220 19221 401a9f 19218->19221 19219->19218 19222 401fee numpunct 41 API calls 19220->19222 19233 401f66 19221->19233 19226 401ab5 std::runtime_error::~runtime_error 19222->19226 19224 401aa9 19225 401f66 numpunct 41 API calls 19224->19225 19225->19226 19226->19215 19228 402000 19227->19228 19229 401ffb 19227->19229 19232 402010 std::runtime_error::~runtime_error 19228->19232 19245 40244f 19228->19245 19237 4122a5 19229->19237 19232->19215 19234 401f75 19233->19234 19236 401f7a std::runtime_error::~runtime_error __shift 19233->19236 19235 412265 numpunct 41 API calls 19234->19235 19235->19236 19236->19224 19238 4122af __EH_prolog 19237->19238 19239 40242d numpunct 41 API calls 19238->19239 19240 4122bf 19239->19240 19241 401163 numpunct 41 API calls 19240->19241 19242 4122cf 19241->19242 19249 415747 KiUserExceptionDispatcher 19242->19249 19244 4122e4 19246 402459 __EH_prolog 19245->19246 19250 412241 19246->19250 19248 4024a9 std::runtime_error::~runtime_error 19248->19232 19249->19244 19253 412248 __getbuf 19250->19253 19252 412263 19252->19248 19253->19252 19255 41522d 19253->19255 19258 413023 19253->19258 19256 415201 __getbuf 36 API calls 19255->19256 19257 41523c 19256->19257 19257->19253 19259 413038 19258->19259 19267 413064 19258->19267 19261 413924 numpunct 36 API calls 19259->19261 19260 413961 numpunct 36 API calls 19262 413072 19260->19262 19263 413054 19261->19263 19264 415747 numpunct KiUserExceptionDispatcher 19262->19264 19265 413901 numpunct 40 API calls 19263->19265 19266 413083 19264->19266 19265->19267 19267->19260 19269 40188b std::runtime_error::~runtime_error 19268->19269 19270 401a71 numpunct 41 API calls 19269->19270 19271 40118e 19270->19271 19271->19203 19273 402575 __EH_prolog 19272->19273 19274 412241 numpunct 41 API calls 19273->19274 19275 4025c8 std::runtime_error::~runtime_error ctype 19274->19275 19275->19194 19277 40f3ff __EH_prolog 19276->19277 19278 4029b0 19277->19278 19279 412241 numpunct 41 API calls 19277->19279 19282 40f43c 19278->19282 19280 40f411 19279->19280 19280->19278 19303 40f75f 19280->19303 19283 40f446 __EH_prolog 19282->19283 19284 40f4b3 19283->19284 19285 40f46e GetModuleHandleW LoadStringW 19283->19285 19309 40f512 19284->19309 19287 40f490 19285->19287 19288 40f4db 19285->19288 19291 40f512 41 API calls 19287->19291 19322 401a0a 19288->19322 19289 40f4be 19292 4019e1 41 API calls 19289->19292 19296 40f499 19291->19296 19294 40f4c7 19292->19294 19294->19157 19315 40224c 19296->19315 19297 40f4f6 19329 40f376 19297->19329 19302 40f511 19306 40f97f 19303->19306 19307 412241 numpunct 41 API calls 19306->19307 19308 40f764 19307->19308 19308->19278 19310 40f51c __EH_prolog 19309->19310 19311 40f574 ctype 19310->19311 19312 4019e1 41 API calls 19310->19312 19311->19289 19313 40f561 19312->19313 19336 40f5e3 19313->19336 19316 40225a 19315->19316 19317 40227b 19316->19317 19318 40225e 19316->19318 19319 402332 41 API calls 19317->19319 19320 401d74 41 API calls 19318->19320 19321 402279 std::runtime_error::~runtime_error ctype 19319->19321 19320->19321 19321->19284 19369 401dfe 19322->19369 19325 40f326 19326 40f330 __EH_prolog numpunct 19325->19326 19327 4019e1 41 API calls 19326->19327 19328 40f357 ctype 19327->19328 19328->19297 19330 40f380 __EH_prolog 19329->19330 19373 413961 19330->19373 19332 40f38f 19377 40f3c5 19332->19377 19335 415747 KiUserExceptionDispatcher 19335->19302 19337 40f5f4 19336->19337 19344 40f60c 19336->19344 19345 40f780 19337->19345 19339 40f622 19343 40f780 41 API calls 19339->19343 19340 40f6bb 19355 40f6d2 19340->19355 19342 40f604 19342->19311 19343->19342 19344->19339 19344->19340 19346 40f78a __EH_prolog 19345->19346 19347 40f7cc 19346->19347 19348 40242d numpunct 41 API calls 19346->19348 19360 40f9a9 19347->19360 19350 40f7a7 19348->19350 19351 401163 numpunct 41 API calls 19350->19351 19352 40f7b7 19351->19352 19359 415747 KiUserExceptionDispatcher 19352->19359 19354 40f7dc 19354->19342 19357 40f6ea 19355->19357 19356 40f74a 19356->19342 19357->19356 19358 40f780 41 API calls 19357->19358 19358->19356 19359->19347 19361 40f9b3 __EH_prolog 19360->19361 19362 412241 numpunct 41 API calls 19361->19362 19363 40f9c3 19362->19363 19364 40f9ec 19363->19364 19366 40fa87 19363->19366 19364->19354 19367 4019e1 41 API calls 19366->19367 19368 40faa8 19367->19368 19368->19364 19370 401e07 19369->19370 19371 40224c 41 API calls 19370->19371 19372 401a26 19371->19372 19372->19325 19374 413979 _strlen 19373->19374 19376 413988 _strcat 19373->19376 19375 41522d __getbuf 36 API calls 19374->19375 19375->19376 19376->19332 19378 401d74 41 API calls 19377->19378 19379 40f3b4 19378->19379 19379->19335 19380 5702c5 19381 5702ca 19380->19381 19384 570304 19381->19384 19383 5702df 19385 570326 19384->19385 19386 570357 VirtualAlloc 19385->19386 19387 570384 19386->19387 19389 5703c1 19387->19389 19391 570a08 19387->19391 19390 570480 VirtualFree 19389->19390 19390->19383 19393 570a14 19391->19393 19392 570a42 19392->19389 19393->19392 19395 570a5e 19393->19395 19397 570a6c 19395->19397 19398 570a8e 19397->19398 19399 570aa3 19398->19399 19401 570c2a LoadLibraryA 19398->19401 19401->19398 19402 570c74 VirtualProtect VirtualProtect 19403 411587 19406 411f19 19403->19406 19405 4115a6 GetProcAddress 19407 411f6d 19406->19407 19408 411f2b GetModuleHandleA 19406->19408 19409 412021 19407->19409 19420 411f62 19407->19420 19410 411f47 19408->19410 19412 412030 19409->19412 19416 411fc8 19409->19416 19410->19407 19413 411f4b GetFileAttributesW 19410->19413 19411 411fcb InterlockedExchange 19411->19405 19427 411c6e 19412->19427 19413->19407 19415 411f57 GetLastError 19413->19415 19415->19407 19415->19420 19416->19411 19418 412052 19418->19416 19419 41203b InterlockedExchange 19419->19418 19421 41204b FreeLibrary 19419->19421 19420->19416 19422 411fe7 LoadLibraryA 19420->19422 19421->19418 19423 412007 InterlockedExchange 19422->19423 19424 411ff8 19422->19424 19423->19416 19426 412013 FreeLibrary 19423->19426 19424->19423 19425 411ffe LoadLibraryA 19424->19425 19425->19423 19426->19416 19428 411c90 LoadLibraryA 19427->19428 19429 411c83 19427->19429 19430 411ca9 GetSystemDirectoryA 19428->19430 19431 411e0c LoadLibraryA InterlockedExchange 19428->19431 19429->19428 19435 411f0b 19429->19435 19432 411cc0 19430->19432 19433 411cc6 GetWindowsDirectoryA 19430->19433 19434 411e29 FreeLibrary 19431->19434 19445 411e30 19431->19445 19432->19433 19436 411cd8 19433->19436 19437 411cde GetModuleFileNameA 19433->19437 19434->19445 19435->19418 19435->19419 19436->19437 19438 411cf5 19437->19438 19439 411cfb GetModuleHandleA GetModuleFileNameA 19437->19439 19438->19439 19440 411d11 19439->19440 19440->19440 19453 411adc CompareStringA 19440->19453 19442 411dae 19443 411dc5 19442->19443 19454 411adc CompareStringA 19442->19454 19448 411df7 FreeLibrary 19443->19448 19455 411adc CompareStringA 19443->19455 19445->19435 19450 411efb LoadLibraryA 19445->19450 19447 411ddc 19449 411e03 19447->19449 19456 411adc CompareStringA 19447->19456 19448->19449 19449->19431 19449->19435 19450->19435 19452 411df3 19452->19448 19452->19449 19453->19442 19454->19443 19455->19447 19456->19452 19457 414fc6 19458 414fd2 _fast_error_exit ctype 19457->19458 19459 414fde GetVersionExA 19458->19459 19460 415026 GetModuleHandleA 19459->19460 19461 41501a 19459->19461 19464 415040 19460->19464 19461->19460 19463 415092 19465 41509e 19463->19465 19617 414fa2 19463->19617 19496 41a748 HeapCreate 19464->19496 19503 418b98 19465->19503 19468 4150af 19521 41b5f1 19468->19521 19469 4150a4 19469->19468 19470 414fa2 _fast_error_exit 36 API calls 19469->19470 19470->19468 19473 4150c9 GetCommandLineA 19536 41c6d6 19473->19536 19479 4150e3 19480 4150ee 19479->19480 19481 414f7d __lock 36 API calls 19479->19481 19566 41c401 19480->19566 19481->19480 19484 4150ff 19578 417c24 19484->19578 19486 414f7d __lock 36 API calls 19486->19484 19488 415115 19582 40da80 19488->19582 19489 414f7d __lock 36 API calls 19489->19488 19491 415132 19492 415145 19491->19492 19614 417d51 19491->19614 19631 417d73 19492->19631 19495 41514a ctype 19497 41a792 19496->19497 19499 41a768 19496->19499 19497->19463 19498 41a795 19498->19463 19499->19498 19634 41a799 RtlAllocateHeap 19499->19634 19502 41a786 HeapDestroy 19502->19497 19636 415a28 19503->19636 19506 418ba1 19640 418981 19506->19640 19507 418ba9 GetModuleHandleA 19509 418c27 FlsAlloc 19507->19509 19510 418bbc GetProcAddress GetProcAddress GetProcAddress GetProcAddress 19507->19510 19511 418c7d 19509->19511 19512 418c3c 19509->19512 19510->19509 19514 418bff 19510->19514 19516 418981 FlsFree 19511->19516 19643 41b9d3 19512->19643 19514->19509 19518 418c82 19516->19518 19517 418c4a 19517->19511 19519 418c52 FlsSetValue 19517->19519 19518->19469 19519->19511 19520 418c63 GetCurrentThreadId 19519->19520 19520->19518 19522 41522d __getbuf 36 API calls 19521->19522 19524 41b600 19522->19524 19523 4150bd 19523->19473 19625 414f7d 19523->19625 19524->19523 19525 41b646 GetStartupInfoA 19524->19525 19526 41b660 19525->19526 19527 41b749 19525->19527 19526->19527 19531 41b6d1 19526->19531 19532 41522d __getbuf 36 API calls 19526->19532 19527->19523 19528 41b778 GetStdHandle 19527->19528 19529 41b7d9 SetHandleCount 19527->19529 19535 41b7ff __lock 2 API calls 19527->19535 19528->19527 19530 41b786 GetFileType 19528->19530 19529->19523 19530->19527 19531->19523 19531->19527 19533 41b6f7 GetFileType 19531->19533 19534 41b7ff __lock 2 API calls 19531->19534 19532->19526 19533->19531 19534->19531 19535->19527 19537 41c6f2 GetEnvironmentStringsW 19536->19537 19538 41c711 19536->19538 19540 41c6fa 19537->19540 19541 41c706 GetLastError 19537->19541 19539 41c7a1 19538->19539 19538->19540 19542 41c7ad GetEnvironmentStrings 19539->19542 19545 4150d9 19539->19545 19543 41c730 WideCharToMultiByte 19540->19543 19544 41c728 GetEnvironmentStringsW 19540->19544 19541->19538 19542->19545 19546 41c7b9 19542->19546 19548 41c764 19543->19548 19549 41c796 FreeEnvironmentStringsW 19543->19549 19544->19543 19544->19545 19559 41c634 19545->19559 19550 41522d __getbuf 36 API calls 19546->19550 19551 41522d __getbuf 36 API calls 19548->19551 19549->19545 19553 41c7d2 std::runtime_error::~runtime_error 19550->19553 19552 41c76a 19551->19552 19552->19549 19554 41c773 WideCharToMultiByte 19552->19554 19555 41c7e8 FreeEnvironmentStringsA 19553->19555 19556 41c784 19554->19556 19558 41c78d 19554->19558 19555->19545 19557 413e83 __mtdeletelocks 36 API calls 19556->19557 19557->19558 19558->19549 19560 41c646 19559->19560 19561 41c64b GetModuleFileNameA 19559->19561 19742 41f119 19560->19742 19563 41c673 19561->19563 19564 41522d __getbuf 36 API calls 19563->19564 19565 41c69e 19564->19565 19565->19479 19567 41c40e 19566->19567 19571 41c413 _strlen 19566->19571 19568 41f119 ___initmbctable 65 API calls 19567->19568 19568->19571 19569 41522d __getbuf 36 API calls 19576 41c444 _strcat _strlen 19569->19576 19570 4150f4 19570->19484 19570->19486 19571->19569 19571->19570 19572 41c48d 19573 413e83 __mtdeletelocks 36 API calls 19572->19573 19573->19570 19574 41522d __getbuf 36 API calls 19574->19576 19575 41c4b2 19577 413e83 __mtdeletelocks 36 API calls 19575->19577 19576->19570 19576->19572 19576->19574 19576->19575 19577->19570 19580 417c2d 19578->19580 19581 415107 19580->19581 19953 413901 19580->19953 19581->19488 19581->19489 19583 40da8a __EH_prolog 19582->19583 20015 410f3b GetModuleHandleW GetProcAddress 19583->20015 19586 40daa6 20018 401229 19586->20018 19587 40da9f 20066 410f7e 19587->20066 19590 40daaf 19591 40daf7 19590->19591 19592 40dacc 19590->19592 20036 401395 19591->20036 19593 401395 41 API calls 19592->19593 19595 40dad1 19593->19595 20076 40efd1 19595->20076 19599 40db08 20084 40bdf5 19599->20084 19602 40dad6 19602->19491 19615 417c8e std::locale::_Setgloballocale 36 API calls 19614->19615 19616 417d5e 19615->19616 19616->19492 19618 414fb0 19617->19618 19619 414fab 19617->19619 22926 41c251 19618->22926 22920 41c3c8 19619->22920 19623 417bca _fast_error_exit 3 API calls 19624 414fc3 19623->19624 19624->19465 19626 414f86 19625->19626 19627 414f8b 19625->19627 19629 41c3c8 _fast_error_exit 36 API calls 19626->19629 19628 41c251 _fast_error_exit 36 API calls 19627->19628 19630 414f94 19628->19630 19629->19627 19630->19473 19632 417c8e std::locale::_Setgloballocale 36 API calls 19631->19632 19633 417d7e 19632->19633 19633->19495 19635 41a781 19634->19635 19635->19498 19635->19502 19637 415a31 19636->19637 19639 415a5f 19637->19639 19650 41b7ff 19637->19650 19639->19506 19639->19507 19641 418999 19640->19641 19642 41898b FlsFree 19640->19642 19641->19641 19642->19641 19649 41b9df __getbuf ctype 19643->19649 19644 41ba4c RtlAllocateHeap 19644->19649 19646 41ba78 ctype 19646->19517 19649->19644 19649->19646 19655 415b7b 19649->19655 19662 41afc0 19649->19662 19668 41ba7d 19649->19668 19651 41b80b ctype 19650->19651 19652 41b81d GetModuleHandleA 19651->19652 19654 41b841 ctype 19651->19654 19653 41b82c GetProcAddress 19652->19653 19652->19654 19653->19654 19654->19637 19656 415ba1 RtlEnterCriticalSection 19655->19656 19657 415b8e 19655->19657 19656->19649 19671 415adb 19657->19671 19659 415b94 19659->19656 19660 414f7d __lock 35 API calls 19659->19660 19661 415ba0 19660->19661 19661->19656 19663 41aff2 19662->19663 19664 41b115 19663->19664 19667 41b05a 19663->19667 19729 41ab24 19663->19729 19664->19667 19737 41abdb 19664->19737 19667->19649 19741 415ac6 RtlLeaveCriticalSection 19668->19741 19670 41ba84 19670->19649 19672 415ae7 ctype 19671->19672 19673 41522d __getbuf 36 API calls 19672->19673 19675 415b0a __lock ctype 19672->19675 19674 415afe 19673->19674 19676 415b12 19674->19676 19677 415b05 19674->19677 19675->19659 19679 415b7b __lock 36 API calls 19676->19679 19692 415781 19677->19692 19680 415b19 19679->19680 19681 415b21 19680->19681 19682 415b59 19680->19682 19683 41b7ff __lock 2 API calls 19681->19683 19684 413e83 __mtdeletelocks 36 API calls 19682->19684 19685 415b2c 19683->19685 19687 415b55 19684->19687 19686 415b32 19685->19686 19685->19687 19695 413e83 19686->19695 19705 415b72 19687->19705 19690 415b38 19691 415781 __lock 36 API calls 19690->19691 19691->19675 19708 4189b1 GetLastError FlsGetValue 19692->19708 19694 415786 19694->19675 19696 413e8f ctype 19695->19696 19698 413eee ctype 19696->19698 19699 415b7b __lock 35 API calls 19696->19699 19704 413ecb 19696->19704 19697 413ee0 HeapFree 19697->19698 19698->19690 19701 413ea6 __mtdeletelocks 19699->19701 19700 413ec0 19724 413ed6 19700->19724 19701->19700 19718 41a80c 19701->19718 19704->19697 19704->19698 19728 415ac6 RtlLeaveCriticalSection 19705->19728 19707 415b79 19707->19675 19709 418a16 SetLastError 19708->19709 19710 4189cd 19708->19710 19709->19694 19711 41b9d3 _TranslateName 31 API calls 19710->19711 19712 4189d9 19711->19712 19713 4189e1 FlsSetValue 19712->19713 19714 418a0e 19712->19714 19713->19714 19715 4189f2 GetCurrentThreadId 19713->19715 19716 414f7d __lock 31 API calls 19714->19716 19715->19709 19717 418a15 19716->19717 19717->19709 19719 41a849 19718->19719 19723 41aaef __shift 19718->19723 19720 41aa35 VirtualFree 19719->19720 19719->19723 19721 41aa99 19720->19721 19722 41aaa8 VirtualFree HeapFree 19721->19722 19721->19723 19722->19723 19723->19700 19727 415ac6 RtlLeaveCriticalSection 19724->19727 19726 413edd 19726->19704 19727->19726 19728->19707 19730 41ab36 RtlReAllocateHeap 19729->19730 19731 41ab6a RtlAllocateHeap 19729->19731 19732 41ab55 19730->19732 19733 41ab59 19730->19733 19734 41ab91 19731->19734 19735 41ab95 VirtualAlloc 19731->19735 19732->19664 19733->19731 19734->19664 19735->19734 19736 41abaf HeapFree 19735->19736 19736->19734 19738 41abf0 VirtualAlloc 19737->19738 19740 41ac37 19738->19740 19740->19667 19741->19670 19743 41f122 19742->19743 19744 41f129 19742->19744 19746 41efc9 19743->19746 19744->19561 19747 41efd5 ctype 19746->19747 19748 415b7b __lock 36 API calls 19747->19748 19749 41efe0 19748->19749 19750 41eff4 GetOEMCP 19749->19750 19751 41f006 19749->19751 19752 41f01d 19750->19752 19751->19752 19753 41f00b GetACP 19751->19753 19755 41f05b 19752->19755 19756 41522d __getbuf 36 API calls 19752->19756 19760 41f0f8 19752->19760 19753->19752 19761 41f06d 19755->19761 19762 41ee39 19755->19762 19756->19755 19757 41f107 ctype 19757->19744 19759 413e83 __mtdeletelocks 36 API calls 19759->19760 19770 41f110 19760->19770 19761->19759 19761->19760 19763 41ee57 19762->19763 19769 41ee82 ___initmbctable 19762->19769 19764 41ee6e GetCPInfo 19763->19764 19763->19769 19764->19769 19766 41efb5 19783 416836 19766->19783 19769->19766 19773 41ecad GetCPInfo 19769->19773 19952 415ac6 RtlLeaveCriticalSection 19770->19952 19772 41f117 19772->19757 19777 41ecdd 19773->19777 19782 41ed9f 19773->19782 19775 41ed53 19812 417424 19775->19812 19776 416836 _fast_error_exit 36 API calls 19779 41ee37 19776->19779 19789 41c9da 19777->19789 19779->19766 19780 41ed77 19781 417424 _TranslateName 61 API calls 19780->19781 19781->19782 19782->19776 19784 41683e 19783->19784 19785 416805 ctype 19783->19785 19784->19761 19915 41e48f 19785->19915 19790 41c9e6 ctype 19789->19790 19791 41c9f0 GetStringTypeW 19790->19791 19793 41ca08 19790->19793 19792 41ca10 GetLastError 19791->19792 19791->19793 19792->19793 19794 41cb1d 19793->19794 19795 41ca3b 19793->19795 19856 41e70a GetLocaleInfoA 19794->19856 19796 41ca57 MultiByteToWideChar 19795->19796 19799 41cb17 ctype 19795->19799 19796->19799 19806 41ca85 _fast_error_exit ctype 19796->19806 19799->19775 19800 41cb69 GetStringTypeA 19800->19799 19802 41cb82 19800->19802 19804 413e83 __mtdeletelocks 36 API calls 19802->19804 19803 41cb5d 19803->19799 19803->19800 19804->19799 19805 41cae3 MultiByteToWideChar 19808 41cb0b 19805->19808 19809 41cafa GetStringTypeW 19805->19809 19806->19805 19807 41b9d3 _TranslateName 36 API calls 19806->19807 19810 41cad4 19807->19810 19808->19799 19811 413e83 __mtdeletelocks 36 API calls 19808->19811 19809->19808 19810->19799 19810->19805 19811->19799 19813 417430 ctype 19812->19813 19814 41743a LCMapStringW 19813->19814 19817 417455 19813->19817 19815 41745d GetLastError 19814->19815 19814->19817 19815->19817 19816 41767c 19819 41e70a ctype 50 API calls 19816->19819 19817->19816 19818 4174a8 19817->19818 19820 4174c9 MultiByteToWideChar 19818->19820 19822 417674 ctype 19818->19822 19821 4176a6 19819->19821 19820->19822 19825 4174f7 _fast_error_exit 19820->19825 19821->19822 19823 4177ad LCMapStringA 19821->19823 19824 4176bf 19821->19824 19822->19780 19828 4177aa 19823->19828 19826 41e74d _TranslateName 43 API calls 19824->19826 19827 417556 MultiByteToWideChar 19825->19827 19830 41522d __getbuf 36 API calls 19825->19830 19829 4176d1 19826->19829 19831 417573 LCMapStringW 19827->19831 19832 417659 19827->19832 19828->19822 19833 413e83 __mtdeletelocks 36 API calls 19828->19833 19829->19822 19834 4176db LCMapStringA 19829->19834 19835 417543 19830->19835 19831->19832 19836 417592 19831->19836 19837 417666 19832->19837 19840 413e83 __mtdeletelocks 36 API calls 19832->19840 19833->19822 19838 417775 19834->19838 19847 4176fa _fast_error_exit ctype 19834->19847 19835->19822 19835->19827 19839 417598 19836->19839 19844 4175c5 _fast_error_exit 19836->19844 19837->19822 19841 413e83 __mtdeletelocks 36 API calls 19837->19841 19838->19828 19842 413e83 __mtdeletelocks 36 API calls 19838->19842 19839->19832 19843 4175aa LCMapStringW 19839->19843 19840->19837 19841->19822 19842->19828 19843->19832 19845 417620 LCMapStringW 19844->19845 19846 41522d __getbuf 36 API calls 19844->19846 19845->19832 19849 417638 WideCharToMultiByte 19845->19849 19850 417611 19846->19850 19848 417758 LCMapStringA 19847->19848 19851 41522d __getbuf 36 API calls 19847->19851 19848->19838 19852 417779 19848->19852 19849->19832 19850->19832 19850->19845 19855 41773d ctype 19851->19855 19854 41e74d _TranslateName 43 API calls 19852->19854 19854->19838 19855->19838 19855->19848 19857 41e734 19856->19857 19858 41e739 19856->19858 19860 416836 _fast_error_exit 36 API calls 19857->19860 19888 41fc27 19858->19888 19861 41cb3d 19860->19861 19861->19799 19861->19800 19862 41e74d 19861->19862 19863 41e759 ctype 19862->19863 19864 41e780 GetCPInfo 19863->19864 19867 41e890 19863->19867 19865 41e791 19864->19865 19870 41e7a4 _strlen 19864->19870 19868 41e797 GetCPInfo 19865->19868 19865->19870 19866 41e84a 19872 416836 _fast_error_exit 36 API calls 19866->19872 19867->19866 19869 413e83 __mtdeletelocks 36 API calls 19867->19869 19868->19870 19869->19866 19871 41e7d8 MultiByteToWideChar 19870->19871 19875 41e7f2 _fast_error_exit ctype 19870->19875 19871->19866 19871->19875 19873 41e910 ctype 19872->19873 19873->19803 19874 41e858 MultiByteToWideChar 19874->19867 19877 41e873 19874->19877 19875->19874 19876 41b9d3 _TranslateName 36 API calls 19875->19876 19878 41e842 19876->19878 19879 41e898 19877->19879 19880 41e878 WideCharToMultiByte 19877->19880 19878->19866 19878->19874 19881 41e8b3 19879->19881 19882 41e89d WideCharToMultiByte 19879->19882 19880->19867 19883 41b9d3 _TranslateName 36 API calls 19881->19883 19882->19867 19882->19881 19884 41e8bb 19883->19884 19884->19867 19885 41e8c4 WideCharToMultiByte 19884->19885 19885->19867 19886 41e8d8 19885->19886 19887 413e83 __mtdeletelocks 36 API calls 19886->19887 19887->19867 19889 4189b1 _TranslateName 36 API calls 19888->19889 19890 41fc2e 19889->19890 19893 41fc3e 19890->19893 19895 415e97 19890->19895 19894 41fc6c 19893->19894 19903 418901 19893->19903 19894->19857 19896 415ea3 ctype 19895->19896 19897 415b7b __lock 36 API calls 19896->19897 19898 415eaa 19897->19898 19907 415c88 19898->19907 19902 415ec0 ctype 19902->19893 19904 41891f 19903->19904 19906 418916 19903->19906 19905 41c9da _TranslateName 50 API calls 19904->19905 19905->19906 19906->19893 19908 4189b1 _TranslateName 36 API calls 19907->19908 19910 415c8e 19908->19910 19909 415d43 19912 415ec9 19909->19912 19910->19909 19911 415bb8 _TranslateName 36 API calls 19910->19911 19911->19909 19913 415ac6 __mtdeletelocks RtlLeaveCriticalSection 19912->19913 19914 415ed0 19913->19914 19914->19902 19917 41e49e ctype 19915->19917 19916 41e4b1 19930 417d62 19916->19930 19917->19916 19918 41e500 GetModuleFileNameA 19917->19918 19921 41e51a _strcat _fast_error_exit _strncpy _strlen 19918->19921 19923 41f805 19921->19923 19924 41f818 LoadLibraryA 19923->19924 19927 41f885 19923->19927 19925 41f82d GetProcAddress 19924->19925 19924->19927 19926 41f844 GetProcAddress GetProcAddress 19925->19926 19925->19927 19926->19927 19928 41f867 GetProcAddress 19926->19928 19927->19916 19928->19927 19929 41f878 GetProcAddress 19928->19929 19929->19927 19933 417c8e 19930->19933 19932 417d6f 19934 417c9a ctype 19933->19934 19935 415b7b __lock 34 API calls 19934->19935 19936 417ca1 19935->19936 19937 417cb2 GetCurrentProcess TerminateProcess 19936->19937 19938 417cc2 std::locale::_Setgloballocale 19936->19938 19937->19938 19943 417d3d 19938->19943 19941 417d38 ctype 19941->19932 19944 417d42 19943->19944 19945 417d25 19943->19945 19951 415ac6 RtlLeaveCriticalSection 19944->19951 19945->19941 19947 417bca GetModuleHandleA 19945->19947 19948 417bd9 GetProcAddress 19947->19948 19949 417bef ExitProcess 19947->19949 19948->19949 19950 417be9 19948->19950 19950->19949 19951->19945 19952->19772 19956 4138c9 19953->19956 19955 41390a 19955->19581 19957 4138d5 ctype 19956->19957 19964 417bfa 19957->19964 19963 4138f2 ctype 19963->19955 19965 415b7b __lock 36 API calls 19964->19965 19966 4138da 19965->19966 19967 413821 19966->19967 19977 417d91 19967->19977 19969 41382d 19973 41386f 19969->19973 19985 417a1d 19969->19985 19971 41385a 19972 417a1d numpunct 39 API calls 19971->19972 19971->19973 19972->19973 19974 4138fb 19973->19974 20011 417c03 19974->20011 19978 417d9d ctype 19977->19978 19979 417de0 RtlSizeHeap 19978->19979 19980 415b7b __lock 36 API calls 19978->19980 19981 417df3 ctype 19979->19981 19982 417dad __mtdeletelocks 19980->19982 19981->19969 20003 417dfe 19982->20003 19986 417a29 ctype 19985->19986 19987 417a40 19986->19987 19988 417a32 19986->19988 19990 417a53 19987->19990 19991 417a47 19987->19991 19989 41522d __getbuf 36 API calls 19988->19989 19993 417a3a ctype 19989->19993 19996 417b8e __getbuf 19990->19996 20002 417a60 __getbuf std::runtime_error::~runtime_error ___sbh_resize_block __mtdeletelocks 19990->20002 19992 413e83 __mtdeletelocks 36 API calls 19991->19992 19992->19993 19993->19971 19994 417b9c RtlReAllocateHeap 19994->19996 19995 415b7b __lock 36 API calls 19995->20002 19996->19993 19996->19994 19998 417aec RtlAllocateHeap 19998->20002 19999 417b42 RtlReAllocateHeap 19999->20002 20000 41afc0 __getbuf 5 API calls 20000->20002 20001 41a80c VirtualFree VirtualFree HeapFree __mtdeletelocks 20001->20002 20002->19993 20002->19995 20002->19998 20002->19999 20002->20000 20002->20001 20007 417b85 20002->20007 20006 415ac6 RtlLeaveCriticalSection 20003->20006 20005 417dda 20005->19979 20005->19981 20006->20005 20010 415ac6 RtlLeaveCriticalSection 20007->20010 20009 417b8c 20009->20002 20010->20009 20014 415ac6 RtlLeaveCriticalSection 20011->20014 20013 413900 20013->19963 20014->20013 20016 410f61 GetCurrentProcess 20015->20016 20017 40da9b 20015->20017 20016->20017 20017->19586 20017->19587 20019 401233 __EH_prolog 20018->20019 20020 401a0a 41 API calls 20019->20020 20021 401278 GetCommandLineW 20020->20021 20022 401a0a 41 API calls 20021->20022 20023 401292 20022->20023 20152 40fab8 20023->20152 20025 40129f 20026 401315 20025->20026 20029 4026f8 41 API calls 20025->20029 20031 401d74 41 API calls 20025->20031 20033 40199e 41 API calls 20025->20033 20160 4016a2 20026->20160 20028 401356 20028->19590 20029->20025 20030 4019e1 41 API calls 20035 40131b ctype 20030->20035 20031->20025 20033->20025 20035->20028 20035->20030 20171 4067e9 20035->20171 20177 406ab8 20035->20177 20037 40139f __EH_prolog 20036->20037 20348 4013d9 20037->20348 20040 40bc90 20041 40bc9a __EH_prolog 20040->20041 20374 40cf80 20041->20374 20044 401395 41 API calls 20045 40bcc6 20044->20045 20377 40c25f 20045->20377 20048 401a0a 41 API calls 20049 40bd12 20048->20049 20050 4019e1 41 API calls 20049->20050 20051 40bd27 20050->20051 20052 4067e9 41 API calls 20051->20052 20053 40bd30 20052->20053 20403 406b1e 20053->20403 20055 40bd3c ctype 20056 4019e1 41 API calls 20055->20056 20057 40bd80 20056->20057 20058 4067e9 41 API calls 20057->20058 20059 40bd89 20058->20059 20412 4068d8 20059->20412 20061 40bd93 20062 401d74 41 API calls 20061->20062 20063 40bda1 ctype 20062->20063 20422 40c730 20063->20422 20065 40bdc1 20065->19599 20067 410f3b 3 API calls 20066->20067 20068 410f88 20067->20068 20069 410f93 GetModuleHandleW GetProcAddress GetModuleHandleW GetProcAddress 20068->20069 20074 410f8c 20068->20074 20070 410fca 20069->20070 20071 41101f GetModuleHandleW GetProcAddress 20069->20071 20070->20071 20072 410fd3 20070->20072 20073 410fee 20070->20073 20071->20074 21428 411148 20072->21428 20073->20071 20073->20074 20074->19586 20077 40efdb __EH_prolog 20076->20077 20078 412241 numpunct 41 API calls 20077->20078 20080 40f01b 20077->20080 20079 40eff7 20078->20079 20079->20080 20081 401395 41 API calls 20079->20081 20080->19602 20082 40f016 20081->20082 21449 40f041 20082->21449 20085 40bdff __EH_prolog 20084->20085 21455 40eaaa 20085->21455 20153 40fac2 __EH_prolog 20152->20153 20154 4019e1 41 API calls 20153->20154 20155 40faec 20154->20155 20156 4019e1 41 API calls 20155->20156 20157 40fafc 20156->20157 20180 40fb2e 20157->20180 20159 40fb05 ctype 20159->20025 20170 4016ac __EH_prolog ctype 20160->20170 20161 401845 ctype 20162 401861 ctype 20161->20162 20163 40199e 41 API calls 20161->20163 20162->20035 20163->20161 20164 40199e 41 API calls 20164->20170 20165 4019e1 41 API calls 20165->20170 20167 401a3c 41 API calls 20167->20170 20168 401d74 41 API calls 20168->20170 20169 401c49 41 API calls 20169->20170 20170->20161 20170->20164 20170->20165 20170->20167 20170->20168 20170->20169 20290 401a57 20170->20290 20172 4067f3 __EH_prolog 20171->20172 20173 4019e1 41 API calls 20172->20173 20174 40680b 20173->20174 20296 406532 20174->20296 20176 406813 ctype 20176->20035 20178 406abe GetFileAttributesW 20177->20178 20178->20035 20184 40fb38 __EH_prolog ctype 20180->20184 20181 40fc37 20181->20159 20184->20181 20186 40fc8a 20184->20186 20189 40199e 20184->20189 20196 4030c4 20184->20196 20200 40fcb2 20186->20200 20190 4019aa 20189->20190 20191 4019b7 20190->20191 20192 4019ca 20190->20192 20216 401c09 20191->20216 20219 401b66 20192->20219 20195 4019c5 20195->20184 20197 4030cd 20196->20197 20278 40324a 20197->20278 20201 40fcbc __EH_prolog 20200->20201 20206 40fd6b 20201->20206 20203 40fcd5 20204 40fcac 20203->20204 20210 40fd14 20203->20210 20204->20184 20207 40fd84 20206->20207 20208 40fd76 20206->20208 20207->20203 20208->20207 20209 402332 41 API calls 20208->20209 20209->20207 20211 40fd25 20210->20211 20212 40fd1e 20210->20212 20214 402332 41 API calls 20211->20214 20215 40fd38 ctype 20211->20215 20213 4122a5 numpunct 41 API calls 20212->20213 20213->20211 20214->20215 20215->20203 20223 4027c3 20216->20223 20220 401b6e 20219->20220 20231 40204c 20220->20231 20222 401b95 20222->20195 20224 4027cd __EH_prolog 20223->20224 20225 401c1d 20224->20225 20227 4028dc 20224->20227 20225->20195 20228 4028e6 __EH_prolog 20227->20228 20229 4028fd 20228->20229 20230 4019e1 41 API calls 20228->20230 20229->20224 20230->20229 20232 402056 __EH_prolog 20231->20232 20233 4019e1 41 API calls 20232->20233 20235 402070 20233->20235 20234 402121 ctype 20234->20222 20235->20234 20236 40209c 20235->20236 20257 410d53 20235->20257 20238 402176 20236->20238 20243 4020ad 20236->20243 20239 4021fd 20238->20239 20240 40218e 20238->20240 20242 402876 41 API calls 20239->20242 20241 402876 41 API calls 20240->20241 20244 4021a2 20241->20244 20245 40220d 20242->20245 20249 412241 numpunct 41 API calls 20243->20249 20247 401c09 41 API calls 20244->20247 20269 402827 20245->20269 20248 4021c2 20247->20248 20273 4026d2 20248->20273 20251 4020e3 20249->20251 20265 402876 20251->20265 20254 401c09 41 API calls 20255 40210c 20254->20255 20256 402876 41 API calls 20255->20256 20256->20234 20258 410d5d __EH_prolog 20257->20258 20259 40242d numpunct 41 API calls 20258->20259 20260 410d6d 20259->20260 20261 401163 numpunct 41 API calls 20260->20261 20262 410d7d 20261->20262 20277 415747 KiUserExceptionDispatcher 20262->20277 20264 410d92 20266 402880 __EH_prolog 20265->20266 20267 4020fd 20266->20267 20268 4028dc 41 API calls 20266->20268 20267->20254 20268->20266 20271 402832 20269->20271 20272 40284d 20269->20272 20270 401d74 41 API calls 20270->20271 20271->20270 20271->20272 20272->20248 20274 4026f3 20273->20274 20275 4026db 20273->20275 20274->20234 20275->20274 20276 401d74 41 API calls 20275->20276 20276->20275 20277->20264 20279 403258 20278->20279 20282 403571 20279->20282 20281 4030e8 20281->20184 20283 403585 20282->20283 20284 40357e 20282->20284 20286 4122a5 numpunct 41 API calls 20283->20286 20287 403597 20283->20287 20285 412265 numpunct 41 API calls 20284->20285 20285->20283 20286->20287 20288 402332 41 API calls 20287->20288 20289 4035b0 __shift ctype 20287->20289 20288->20289 20289->20281 20293 401c2a 20290->20293 20294 401d74 41 API calls 20293->20294 20295 401a6a 20294->20295 20295->20170 20297 40653c __EH_prolog 20296->20297 20298 401a57 41 API calls 20297->20298 20299 406559 20298->20299 20310 4026f8 20299->20310 20301 40656a ctype 20306 4065ce 20301->20306 20321 406eec 20301->20321 20303 40660d 20304 4019e1 41 API calls 20303->20304 20305 40661e 20304->20305 20314 406645 20305->20314 20306->20303 20309 406eec 41 API calls 20306->20309 20308 406626 ctype 20308->20176 20309->20306 20311 402702 20310->20311 20325 402718 20311->20325 20313 402714 20313->20301 20315 40664f __EH_prolog 20314->20315 20316 40669f 20315->20316 20318 4066ac 20315->20318 20317 4019e1 41 API calls 20316->20317 20319 4066aa ctype 20317->20319 20320 401a0a 41 API calls 20318->20320 20319->20308 20320->20319 20322 406ef7 20321->20322 20329 4070bd 20322->20329 20324 406f0a 20324->20301 20326 402723 20325->20326 20328 402728 20325->20328 20327 412265 numpunct 41 API calls 20326->20327 20327->20328 20328->20313 20330 4070cf 20329->20330 20331 4070d3 20330->20331 20332 4070fa 20330->20332 20340 407765 20331->20340 20333 407109 20332->20333 20334 412265 numpunct 41 API calls 20332->20334 20336 4122a5 numpunct 41 API calls 20333->20336 20337 40712c __shift 20333->20337 20334->20333 20336->20337 20338 402332 41 API calls 20337->20338 20339 4070f5 std::runtime_error::~runtime_error __shift ctype 20337->20339 20338->20339 20339->20324 20341 407773 20340->20341 20342 412265 numpunct 41 API calls 20341->20342 20343 407785 20341->20343 20342->20343 20344 4077bc 20343->20344 20345 4122a5 numpunct 41 API calls 20343->20345 20346 402332 41 API calls 20344->20346 20347 4077e1 std::runtime_error::~runtime_error __shift ctype 20344->20347 20345->20344 20346->20347 20347->20339 20353 4018af 20348->20353 20350 4013e3 20351 401d74 41 API calls 20350->20351 20352 4013c8 20351->20352 20352->20040 20354 4018ca ctype 20353->20354 20355 4018c1 20353->20355 20354->20350 20355->20354 20356 4018e9 20355->20356 20358 401916 20355->20358 20365 402779 20356->20365 20359 40192a 20358->20359 20360 401956 ctype 20358->20360 20361 402779 41 API calls 20359->20361 20369 401ba3 20360->20369 20363 401947 20361->20363 20363->20354 20364 402876 41 API calls 20363->20364 20364->20354 20366 40279f 20365->20366 20367 402784 20365->20367 20366->20354 20367->20366 20368 401d74 41 API calls 20367->20368 20368->20367 20370 401bb5 20369->20370 20371 401bb9 20369->20371 20370->20363 20372 412241 numpunct 41 API calls 20371->20372 20373 401bcf 20372->20373 20373->20363 20454 4033c4 20374->20454 20378 40c269 __EH_prolog 20377->20378 20460 40beed 20378->20460 20380 40c282 ctype 20381 4019e1 41 API calls 20380->20381 20382 40c29f 20381->20382 20528 40e3f9 20382->20528 20384 40c2a8 20558 40d0d0 20384->20558 20386 40c2b2 ctype 20568 40cfe8 20386->20568 20391 40c2e5 ctype 20588 40d144 20391->20588 20392 40bcf1 GetCurrentDirectoryW 20392->20048 20393 40c32f ctype 20393->20392 20394 40f3f5 41 API calls 20393->20394 20395 40c35a 20394->20395 20396 40f43c 43 API calls 20395->20396 20397 40c360 20396->20397 20398 40f326 41 API calls 20397->20398 20399 40c36c 20398->20399 20400 40f376 41 API calls 20399->20400 20401 40c37c 20400->20401 20612 415747 KiUserExceptionDispatcher 20401->20612 20404 406b28 __EH_prolog 20403->20404 20405 406b4a 20404->20405 20406 406b7b 20404->20406 20408 401c2a 41 API calls 20405->20408 20407 4019e1 41 API calls 20406->20407 20411 406b72 ctype 20407->20411 20409 406b63 20408->20409 20410 4019e1 41 API calls 20409->20410 20410->20411 20411->20055 20413 4068e2 __EH_prolog 20412->20413 20414 406923 20413->20414 20415 401d74 41 API calls 20413->20415 20416 401a57 41 API calls 20414->20416 20415->20414 20417 40693c 20416->20417 20418 401d74 41 API calls 20417->20418 20419 40694c ctype 20418->20419 20420 4019e1 41 API calls 20419->20420 20421 406999 ctype 20420->20421 20421->20061 20423 40c73a __EH_prolog 20422->20423 20424 40c774 GetKeyState 20423->20424 20426 401a0a 41 API calls 20423->20426 20425 40c78e 20424->20425 20429 40292d 41 API calls 20425->20429 20427 40c765 20426->20427 20428 413901 numpunct 40 API calls 20427->20428 20430 40c76f 20428->20430 20431 40c79c 20429->20431 20430->20424 21273 40d2e9 20431->21273 20434 40292d 41 API calls 20435 40c7b7 20434->20435 20436 40c838 20435->20436 20437 40242d numpunct 41 API calls 20435->20437 20436->20065 20438 40c7d2 20437->20438 21283 411365 20438->21283 20444 40c7f3 ctype 21310 413dac 20444->21310 20446 40c80e 21318 413aea 20446->21318 20448 40c819 20449 413aea 51 API calls 20448->20449 20450 40c824 20449->20450 20451 413aea 51 API calls 20450->20451 20452 40c82f 20451->20452 20453 406e25 59 API calls 20452->20453 20453->20436 20457 403961 20454->20457 20458 412241 numpunct 41 API calls 20457->20458 20459 4033c9 20458->20459 20459->20044 20461 40bef7 __EH_prolog 20460->20461 20613 401403 20461->20613 20463 40bf14 20464 4019e1 41 API calls 20463->20464 20465 40bf5a 20464->20465 20466 4067e9 41 API calls 20465->20466 20467 40bf66 20466->20467 20475 40bf99 ctype 20467->20475 20653 406a0a 20467->20653 20469 40bf86 20470 4026f8 41 API calls 20469->20470 20470->20475 20471 4019e1 41 API calls 20472 40c027 20471->20472 20473 4067e9 41 API calls 20472->20473 20474 40c030 20473->20474 20476 406ab8 GetFileAttributesW 20474->20476 20477 401a57 41 API calls 20475->20477 20485 40c001 ctype 20475->20485 20482 40c035 ctype 20476->20482 20478 40bfe4 20477->20478 20662 401c49 20478->20662 20480 40bffb 20670 401a3c 20480->20670 20481 40c06e 20486 4019e1 41 API calls 20481->20486 20482->20481 20674 40cefe 20482->20674 20485->20471 20488 40c07e 20486->20488 20490 4067e9 41 API calls 20488->20490 20489 401c49 41 API calls 20491 40c068 20489->20491 20492 40c087 20490->20492 20493 401a3c 41 API calls 20491->20493 20494 406ab8 GetFileAttributesW 20492->20494 20493->20481 20495 40c08c ctype 20494->20495 20496 40c0aa GetCurrentDirectoryW 20495->20496 20527 40c173 ctype 20495->20527 20505 40c0c7 20496->20505 20497 4019e1 41 API calls 20498 40c1c2 20497->20498 20499 4067e9 41 API calls 20498->20499 20500 40c1cb 20499->20500 20501 406ab8 GetFileAttributesW 20500->20501 20503 40c1d0 ctype 20501->20503 20502 40c227 20504 4019e1 41 API calls 20502->20504 20503->20502 20506 40f3f5 41 API calls 20503->20506 20511 40c232 ctype 20504->20511 20509 401a57 41 API calls 20505->20509 20507 40c1fa 20506->20507 20508 40f43c 43 API calls 20507->20508 20510 40c200 20508->20510 20512 40c110 20509->20512 20513 40f326 41 API calls 20510->20513 20511->20380 20515 401a0a 41 API calls 20512->20515 20514 40c20c 20513->20514 20516 40f376 41 API calls 20514->20516 20517 40c123 20515->20517 20519 40c219 20516->20519 20678 40265a 20517->20678 20652 415747 KiUserExceptionDispatcher 20519->20652 20520 40c135 20686 40b169 20520->20686 20523 40c14a 20524 40265a 41 API calls 20523->20524 20525 40c160 20524->20525 20526 401d74 41 API calls 20525->20526 20526->20527 20527->20497 20529 40e403 __EH_prolog 20528->20529 20530 4019e1 41 API calls 20529->20530 20531 40e421 20530->20531 20532 4067e9 41 API calls 20531->20532 20533 40e42d 20532->20533 20843 406c72 20533->20843 20535 40e437 ctype 20536 4019e1 41 API calls 20535->20536 20557 40e4aa ctype 20535->20557 20538 40e464 20536->20538 20537 40e776 20874 406e25 20537->20874 20540 401a0a 41 API calls 20538->20540 20541 40e47a 20540->20541 20861 406406 20541->20861 20543 40e489 20867 406471 20543->20867 20544 40e77c ctype 20544->20384 20548 40e7a3 41 API calls 20548->20557 20549 401d74 41 API calls 20549->20557 20550 401a57 41 API calls 20550->20557 20551 40e899 61 API calls 20551->20557 20552 4022b2 41 API calls 20552->20557 20553 402ff2 41 API calls 20553->20557 20554 4030c4 41 API calls 20554->20557 20555 40e802 53 API calls 20555->20557 20556 401c49 41 API calls 20556->20557 20557->20537 20557->20548 20557->20549 20557->20550 20557->20551 20557->20552 20557->20553 20557->20554 20557->20555 20557->20556 20559 40d0da __EH_prolog 20558->20559 20560 401a0a 41 API calls 20559->20560 20566 40d10c 20559->20566 20562 40d102 20560->20562 20561 401a0a 41 API calls 20563 40d123 20561->20563 20564 413901 numpunct 40 API calls 20562->20564 21267 40cf8c 20563->21267 20564->20566 20566->20561 20567 40d133 20567->20386 20569 40cff2 __EH_prolog 20568->20569 20570 40d024 20569->20570 20571 401a0a 41 API calls 20569->20571 20572 401a0a 41 API calls 20570->20572 20574 40d01a 20571->20574 20573 40d03b 20572->20573 20575 40cf8c 41 API calls 20573->20575 20576 413901 numpunct 40 API calls 20574->20576 20577 40c2cd 20575->20577 20576->20570 20577->20391 20578 40d05c 20577->20578 20579 40d066 __EH_prolog 20578->20579 20581 401a0a 41 API calls 20579->20581 20586 40d098 20579->20586 20580 401a0a 41 API calls 20583 40d0af 20580->20583 20582 40d08e 20581->20582 20584 413901 numpunct 40 API calls 20582->20584 20585 40cf8c 41 API calls 20583->20585 20584->20586 20587 40d0bf 20585->20587 20586->20580 20587->20391 20589 40d14e __EH_prolog 20588->20589 20590 40d189 20589->20590 20591 401a0a 41 API calls 20589->20591 20592 40d1b9 20590->20592 20595 401a0a 41 API calls 20590->20595 20594 40d17f 20591->20594 20593 401a0a 41 API calls 20592->20593 20596 40d1cf 20593->20596 20597 413901 numpunct 40 API calls 20594->20597 20598 40d1af 20595->20598 20599 40cf8c 41 API calls 20596->20599 20597->20590 20600 413901 numpunct 40 API calls 20598->20600 20601 40d1e0 20599->20601 20600->20592 20603 401a0a 41 API calls 20601->20603 20611 40d23a ctype 20601->20611 20602 4019e1 41 API calls 20604 40d256 ctype 20602->20604 20605 40d20e 20603->20605 20604->20393 20606 402ab4 43 API calls 20605->20606 20607 40d21b 20606->20607 20608 402bfc 41 API calls 20607->20608 20609 40d222 20608->20609 20610 407765 41 API calls 20609->20610 20610->20611 20611->20602 20612->20392 20614 40140d __EH_prolog 20613->20614 20615 4019e1 41 API calls 20614->20615 20616 40142e 20615->20616 20617 4067e9 41 API calls 20616->20617 20618 401437 20617->20618 20632 401479 ctype 20618->20632 20694 406b04 20618->20694 20620 406ab8 GetFileAttributesW 20622 40149d 20620->20622 20624 4014a1 20622->20624 20625 4014b2 20622->20625 20623 40265a 41 API calls 20628 401469 20623->20628 20626 406b04 41 API calls 20624->20626 20705 402ab4 20625->20705 20635 4014ad ctype 20626->20635 20697 406883 20628->20697 20632->20620 20633 4014c1 20634 406b04 41 API calls 20633->20634 20651 4014d5 ctype 20634->20651 20635->20463 20636 40153b 20637 401a0a 41 API calls 20636->20637 20639 40154d 20637->20639 20638 4019e1 41 API calls 20638->20651 20640 40f326 41 API calls 20639->20640 20642 401556 20640->20642 20641 401a3c 41 API calls 20641->20651 20643 40f376 41 API calls 20642->20643 20645 401566 20643->20645 20644 401c49 41 API calls 20644->20651 20728 415747 KiUserExceptionDispatcher 20645->20728 20646 406883 41 API calls 20646->20651 20648 401577 ctype 20650 406b04 41 API calls 20648->20650 20649 406ab8 GetFileAttributesW 20649->20651 20650->20635 20651->20636 20651->20638 20651->20641 20651->20644 20651->20646 20651->20648 20651->20649 20652->20502 20654 406a14 __EH_prolog 20653->20654 20655 406a27 20654->20655 20656 406a9b 20654->20656 20658 401c2a 41 API calls 20655->20658 20657 401a0a 41 API calls 20656->20657 20661 406a88 ctype 20657->20661 20660 406a44 20658->20660 20659 4019e1 41 API calls 20659->20661 20660->20659 20661->20469 20663 401c58 20662->20663 20664 401c5f 20662->20664 20665 412265 numpunct 41 API calls 20663->20665 20666 401c7e 20664->20666 20667 4122a5 numpunct 41 API calls 20664->20667 20665->20664 20668 402332 41 API calls 20666->20668 20669 401c93 std::runtime_error::~runtime_error ctype 20666->20669 20667->20666 20668->20669 20669->20480 20671 401a45 20670->20671 20830 401ce0 20671->20830 20673 401a54 20673->20485 20675 40cf0c 20674->20675 20839 40cf2f 20675->20839 20679 402664 __EH_prolog 20678->20679 20680 4019e1 41 API calls 20679->20680 20681 402678 20680->20681 20682 401a3c 41 API calls 20681->20682 20683 402685 20682->20683 20684 4019e1 41 API calls 20683->20684 20685 40268e ctype 20684->20685 20685->20520 20687 40b173 __EH_prolog 20686->20687 20688 4019e1 41 API calls 20687->20688 20689 40b187 20688->20689 20690 401c49 41 API calls 20689->20690 20691 40b199 20690->20691 20692 4019e1 41 API calls 20691->20692 20693 40b1a2 ctype 20692->20693 20693->20523 20695 4019e1 41 API calls 20694->20695 20696 401456 20695->20696 20696->20623 20698 40688d __EH_prolog 20697->20698 20699 4019e1 41 API calls 20698->20699 20700 4068a2 20699->20700 20701 406532 41 API calls 20700->20701 20702 4068ab 20701->20702 20703 401d74 41 API calls 20702->20703 20704 4068bb ctype 20703->20704 20704->20632 20706 402abe __EH_prolog 20705->20706 20707 4014bb 20706->20707 20708 412241 numpunct 41 API calls 20706->20708 20711 402eda 20707->20711 20709 402acf 20708->20709 20709->20707 20729 402af6 20709->20729 20719 402ee4 __EH_prolog ctype 20711->20719 20712 402f74 20713 401a0a 41 API calls 20712->20713 20715 402f8e 20713->20715 20714 4019e1 41 API calls 20714->20719 20792 402bfc 20715->20792 20717 402f97 20800 40e082 20717->20800 20719->20712 20719->20714 20721 4026f8 41 API calls 20719->20721 20722 402fba 20719->20722 20720 402f9f ctype 20720->20633 20721->20719 20723 4019e1 41 API calls 20722->20723 20724 402fd3 20723->20724 20725 402bfc 41 API calls 20724->20725 20726 402fdc 20725->20726 20727 40e082 41 API calls 20726->20727 20727->20720 20728->20648 20730 402b00 __EH_prolog 20729->20730 20731 4033c4 41 API calls 20730->20731 20732 402b09 20731->20732 20735 402b29 20732->20735 20734 402b13 20734->20707 20744 415728 20735->20744 20737 402b33 GetEnvironmentStringsW 20738 402be3 FreeEnvironmentStringsW 20737->20738 20742 402b51 ctype 20737->20742 20738->20734 20739 4030c4 41 API calls 20739->20742 20741 401d74 41 API calls 20741->20742 20742->20739 20742->20741 20743 402be2 20742->20743 20745 402ff2 20742->20745 20743->20738 20744->20737 20746 402ffc __EH_prolog 20745->20746 20755 40353f 20746->20755 20749 40301f 20754 403057 ctype 20749->20754 20763 403293 20749->20763 20754->20742 20756 40354b 20755->20756 20757 40300d 20756->20757 20758 402856 41 API calls 20756->20758 20757->20749 20759 402856 20757->20759 20758->20756 20760 40285f 20759->20760 20761 402718 41 API calls 20760->20761 20762 402874 20761->20762 20762->20749 20764 40329d __EH_prolog 20763->20764 20765 4019e1 41 API calls 20764->20765 20766 4032ab 20765->20766 20767 4019e1 41 API calls 20766->20767 20768 403047 20767->20768 20769 403106 20768->20769 20770 403114 20769->20770 20771 403127 20769->20771 20772 4033e5 41 API calls 20770->20772 20773 403132 20771->20773 20774 403157 20771->20774 20775 403122 20772->20775 20776 402856 41 API calls 20773->20776 20777 40315b 20774->20777 20778 40317e 20774->20778 20775->20754 20791 40313d 20776->20791 20780 402856 41 API calls 20777->20780 20779 402856 41 API calls 20778->20779 20781 403189 20779->20781 20780->20791 20786 402856 41 API calls 20781->20786 20787 4031a6 20781->20787 20782 40320a 20783 4032cb 41 API calls 20782->20783 20783->20775 20784 402856 41 API calls 20788 4031c8 20784->20788 20785 4033e5 41 API calls 20785->20775 20786->20787 20787->20784 20789 403145 20787->20789 20788->20782 20788->20789 20790 402856 41 API calls 20788->20790 20789->20785 20790->20791 20791->20782 20791->20789 20793 402c06 _fast_error_exit __EH_prolog 20792->20793 20812 403087 20793->20812 20796 402c30 20798 401a0a 41 API calls 20796->20798 20797 402ff2 41 API calls 20797->20796 20799 402c72 ctype 20798->20799 20799->20717 20801 40e08c __EH_prolog 20800->20801 20802 401a0a 41 API calls 20801->20802 20803 40e0c1 20802->20803 20804 4019e1 41 API calls 20803->20804 20805 40e0d6 20804->20805 20806 40fab8 41 API calls 20805->20806 20807 40e0e3 20806->20807 20808 40e102 20807->20808 20809 40199e 41 API calls 20807->20809 20817 40e13d 20808->20817 20809->20807 20811 40e10d ctype 20811->20720 20813 40353f 41 API calls 20812->20813 20814 403095 20813->20814 20815 402c2c 20814->20815 20816 402856 41 API calls 20814->20816 20815->20796 20815->20797 20816->20815 20820 407f9c 20817->20820 20821 407fa6 __EH_prolog 20820->20821 20822 401ba3 41 API calls 20821->20822 20823 407fbe 20822->20823 20824 407fda 20823->20824 20826 40867d 20823->20826 20824->20811 20828 408687 __EH_prolog 20826->20828 20827 4086d0 20827->20824 20828->20827 20829 4028dc 41 API calls 20828->20829 20829->20828 20831 401cef 20830->20831 20832 401d12 20831->20832 20833 401cf3 20831->20833 20834 401d24 20832->20834 20835 4122a5 numpunct 41 API calls 20832->20835 20836 401c49 41 API calls 20833->20836 20837 402332 41 API calls 20834->20837 20838 401d10 std::runtime_error::~runtime_error ctype 20834->20838 20835->20834 20836->20838 20837->20838 20838->20673 20840 40cf40 20839->20840 20841 4022b2 41 API calls 20840->20841 20842 40c058 20841->20842 20842->20489 20844 406c7c __EH_prolog 20843->20844 20845 406d02 20844->20845 20846 4019e1 41 API calls 20844->20846 20884 4145a9 20845->20884 20848 406cc3 20846->20848 20850 401a0a 41 API calls 20848->20850 20849 406d0d 20901 42013c 20849->20901 20852 406cd8 20850->20852 20854 406406 41 API calls 20852->20854 20853 406d18 20910 406e6e 20853->20910 20856 406ce8 20854->20856 20858 406471 41 API calls 20856->20858 20859 406cf4 20858->20859 20883 415747 KiUserExceptionDispatcher 20859->20883 20862 406410 __EH_prolog numpunct 20861->20862 20863 4019e1 41 API calls 20862->20863 20864 406439 20863->20864 20865 4019e1 41 API calls 20864->20865 20866 406449 ctype 20865->20866 20866->20543 20868 40647b __EH_prolog 20867->20868 20869 413961 numpunct 36 API calls 20868->20869 20870 40648c 20869->20870 21056 4064c9 20870->21056 20873 415747 KiUserExceptionDispatcher 20873->20557 20875 406e6e 41 API calls 20874->20875 20876 406e35 20875->20876 21061 4141d6 20876->21061 20878 406e40 21072 4146bc 20878->21072 20880 406e49 CloseHandle 21080 406ea8 20880->21080 20883->20845 20885 4145b5 ctype 20884->20885 20886 4145d2 GetFileType 20885->20886 20887 4145df GetLastError 20886->20887 20888 4145ee 20886->20888 20914 415793 20887->20914 20931 41442d 20888->20931 20891 414605 20893 414627 20891->20893 20894 41460f 20891->20894 20892 4145eb ctype 20892->20849 20952 41422f 20893->20952 20896 415781 __lock 36 API calls 20894->20896 20898 414614 20896->20898 20949 41578a 20898->20949 20905 420148 ctype 20901->20905 20902 42017d ctype 20902->20853 20904 4201fa 20906 420213 20904->20906 20907 420203 20904->20907 20905->20902 20986 420241 20905->20986 21004 420239 20906->21004 20908 415781 __lock 36 API calls 20907->20908 20908->20902 20911 406e7d 20910->20911 20912 406d2b 20911->20912 21029 406f2d 20911->21029 20912->20535 20915 4189b1 _TranslateName 36 API calls 20914->20915 20916 415799 20915->20916 20917 4157c9 20916->20917 20919 4157b1 20916->20919 20918 4189b1 _TranslateName 36 API calls 20917->20918 20921 4157ce 20918->20921 20920 4157da 20919->20920 20922 4157bb 20919->20922 20923 4157f8 20920->20923 20925 4157ea 20920->20925 20921->20892 20924 4189b1 _TranslateName 36 API calls 20922->20924 20926 4189b1 _TranslateName 36 API calls 20923->20926 20927 4157c0 20924->20927 20928 4189b1 _TranslateName 36 API calls 20925->20928 20929 4157fd 20926->20929 20927->20892 20930 4157ef 20928->20930 20929->20892 20930->20892 20932 414439 ctype 20931->20932 20933 415adb __lock 36 API calls 20932->20933 20934 414444 20933->20934 20935 415b7b __lock 36 API calls 20934->20935 20936 4144c1 __lock ctype 20934->20936 20945 414454 20935->20945 20936->20891 20937 414585 20976 4145a0 20937->20976 20938 414537 20940 41522d __getbuf 36 API calls 20938->20940 20944 414542 20940->20944 20941 4144e1 RtlEnterCriticalSection 20942 4144f1 RtlLeaveCriticalSection 20941->20942 20941->20945 20942->20945 20943 415b7b __lock 36 API calls 20943->20945 20944->20937 20967 41436b 20944->20967 20945->20936 20945->20937 20945->20938 20945->20941 20945->20943 20948 41b7ff __lock 2 API calls 20945->20948 20964 414506 20945->20964 20948->20945 20950 4189b1 _TranslateName 36 API calls 20949->20950 20951 41578f 20950->20951 20951->20892 20953 414292 20952->20953 20954 41423d 20952->20954 20955 415781 __lock 36 API calls 20953->20955 20954->20953 20960 41425c 20954->20960 20956 414297 20955->20956 20958 41578a _write_multi_char 36 API calls 20956->20958 20957 414288 20961 414668 20957->20961 20958->20957 20959 414282 SetStdHandle 20959->20957 20960->20957 20960->20959 20985 41440b RtlLeaveCriticalSection 20961->20985 20963 41466e 20963->20892 20979 415ac6 RtlLeaveCriticalSection 20964->20979 20966 41450d 20966->20941 20968 414377 ctype 20967->20968 20969 4143d9 RtlEnterCriticalSection 20968->20969 20970 415b7b __lock 36 API calls 20968->20970 20975 4143bc __lock ctype 20969->20975 20971 41439f 20970->20971 20972 4143b6 20971->20972 20973 41b7ff __lock 2 API calls 20971->20973 20972->20975 20980 414402 20972->20980 20973->20972 20975->20937 20984 415ac6 RtlLeaveCriticalSection 20976->20984 20978 4145a7 20978->20936 20979->20966 20983 415ac6 RtlLeaveCriticalSection 20980->20983 20982 414409 20982->20969 20983->20982 20984->20978 20985->20963 20987 42024d ctype 20986->20987 20988 415b7b __lock 36 API calls 20987->20988 20995 42025b 20988->20995 20989 4202cc 20991 41522d __getbuf 36 API calls 20989->20991 20993 4202d6 20991->20993 20992 42034f ctype 20992->20904 20996 41b7ff __lock 2 API calls 20993->20996 20998 4202c8 20993->20998 20995->20989 20997 415adb __lock 36 API calls 20995->20997 20995->20998 21007 414924 20995->21007 21012 414976 20995->21012 20999 4202fa 20996->20999 20997->20995 21017 42035a 20998->21017 21001 420305 20999->21001 21002 420318 RtlEnterCriticalSection 20999->21002 21003 413e83 __mtdeletelocks 36 API calls 21001->21003 21002->20998 21003->20998 21022 414947 21004->21022 21006 42023f 21006->20902 21008 414938 RtlEnterCriticalSection 21007->21008 21009 41492d 21007->21009 21008->20995 21010 415b7b __lock 36 API calls 21009->21010 21011 414936 21010->21011 21011->20995 21013 41498a RtlLeaveCriticalSection 21012->21013 21014 41497f 21012->21014 21013->20995 21020 415ac6 RtlLeaveCriticalSection 21014->21020 21016 414988 21016->20995 21021 415ac6 RtlLeaveCriticalSection 21017->21021 21019 420361 21019->20992 21020->21016 21021->21019 21023 414954 21022->21023 21024 41496b RtlLeaveCriticalSection 21022->21024 21023->21024 21025 41495b 21023->21025 21024->21006 21028 415ac6 RtlLeaveCriticalSection 21025->21028 21027 414969 21027->21006 21028->21027 21030 406f3e 21029->21030 21037 406f56 21029->21037 21038 4075e8 21030->21038 21032 407005 21048 407285 21032->21048 21033 406f6c 21036 4075e8 41 API calls 21033->21036 21035 406f4e 21035->20912 21036->21035 21037->21032 21037->21033 21039 4075f2 __EH_prolog 21038->21039 21040 407634 21039->21040 21042 40242d numpunct 41 API calls 21039->21042 21053 407b6f 21040->21053 21043 40760f 21042->21043 21044 401163 numpunct 41 API calls 21043->21044 21045 40761f 21044->21045 21052 415747 KiUserExceptionDispatcher 21045->21052 21047 407644 21047->21035 21050 40729d 21048->21050 21049 4072fd 21049->21035 21050->21049 21051 4075e8 41 API calls 21050->21051 21051->21049 21052->21040 21054 412241 numpunct 41 API calls 21053->21054 21055 407b7a 21054->21055 21055->21047 21057 401d74 41 API calls 21056->21057 21058 4064da 21057->21058 21059 401d74 41 API calls 21058->21059 21060 4064b7 21059->21060 21060->20873 21062 4141e2 ctype 21061->21062 21063 4141f2 21062->21063 21064 4141e9 21062->21064 21094 4148f5 21063->21094 21084 414101 21064->21084 21067 4141fa 21100 4140d3 21067->21100 21069 414206 21106 41421c 21069->21106 21071 4141ef ctype 21071->20878 21073 4146c8 ctype 21072->21073 21074 4148f5 37 API calls 21073->21074 21076 4146d5 ctype 21073->21076 21075 4146e8 21074->21075 21193 414670 21075->21193 21076->20880 21081 406ebd 21080->21081 21254 40701c 21081->21254 21083 406e5d 21083->20544 21085 41410d ctype 21084->21085 21086 415b7b __lock 36 API calls 21085->21086 21093 41411c 21086->21093 21087 4141b2 21112 4141cd 21087->21112 21089 414924 37 API calls 21089->21093 21090 4141bb ctype 21090->21071 21092 4140d3 46 API calls 21092->21093 21093->21087 21093->21089 21093->21092 21109 4141a1 21093->21109 21095 414902 21094->21095 21096 414919 RtlEnterCriticalSection 21094->21096 21095->21096 21097 414909 21095->21097 21096->21067 21098 415b7b __lock 36 API calls 21097->21098 21099 414917 21098->21099 21099->21067 21116 414076 21100->21116 21103 4140e3 21103->21069 21105 4140f6 21105->21069 21107 414947 2 API calls 21106->21107 21108 414224 21107->21108 21108->21071 21110 414976 2 API calls 21109->21110 21111 4141af 21110->21111 21111->21093 21115 415ac6 RtlLeaveCriticalSection 21112->21115 21114 4141d4 21114->21090 21115->21114 21117 41408b 21116->21117 21119 4140a7 21116->21119 21117->21119 21137 41b48a 21117->21137 21119->21103 21120 41b535 21119->21120 21121 41b541 ctype 21120->21121 21122 41b5dd 21121->21122 21124 41b570 21121->21124 21123 415781 __lock 36 API calls 21122->21123 21128 41b5cd ctype 21123->21128 21125 41436b _write_multi_char 37 API calls 21124->21125 21126 41b576 21125->21126 21136 41b5b0 21126->21136 21182 41432a 21126->21182 21128->21105 21129 415781 __lock 36 API calls 21133 41b5ba 21129->21133 21130 41b58a FlushFileBuffers 21131 41b5a1 21130->21131 21132 41b596 GetLastError 21130->21132 21131->21133 21135 41578a _write_multi_char 36 API calls 21131->21135 21132->21131 21189 41b5d5 21133->21189 21135->21136 21136->21129 21138 41b496 ctype 21137->21138 21139 41b519 21138->21139 21141 41b4c1 21138->21141 21140 415781 __lock 36 API calls 21139->21140 21142 41b51e 21140->21142 21143 41436b _write_multi_char 37 API calls 21141->21143 21144 41578a _write_multi_char 36 API calls 21142->21144 21145 41b4c7 21143->21145 21152 41b509 ctype 21144->21152 21146 41b4d5 21145->21146 21147 41b4e9 21145->21147 21155 41b2bc 21146->21155 21148 415781 __lock 36 API calls 21147->21148 21150 41b4ee 21148->21150 21151 41578a _write_multi_char 36 API calls 21150->21151 21153 41b4e1 21151->21153 21152->21119 21179 41b511 21153->21179 21156 41b2ed 21155->21156 21169 41b2e6 21155->21169 21157 41b326 21156->21157 21158 41f4fc _write_multi_char 38 API calls 21156->21158 21159 41b404 WriteFile 21157->21159 21160 41b337 21157->21160 21158->21157 21164 41b42c GetLastError 21159->21164 21165 41b3cb 21159->21165 21163 41b442 21160->21163 21160->21165 21167 41b38d WriteFile 21160->21167 21161 416836 _fast_error_exit 36 API calls 21162 41b482 21161->21162 21162->21153 21166 415781 __lock 36 API calls 21163->21166 21163->21169 21164->21165 21165->21163 21165->21169 21170 41b3e8 21165->21170 21171 41b45f 21166->21171 21167->21160 21168 41b3cd GetLastError 21167->21168 21168->21165 21169->21161 21172 41b3f0 21170->21172 21173 41b437 21170->21173 21174 41578a _write_multi_char 36 API calls 21171->21174 21176 415781 __lock 36 API calls 21172->21176 21175 415793 _write_multi_char 36 API calls 21173->21175 21174->21169 21175->21169 21177 41b3f5 21176->21177 21178 41578a _write_multi_char 36 API calls 21177->21178 21178->21169 21180 41440b _write_multi_char RtlLeaveCriticalSection 21179->21180 21181 41b517 21180->21181 21181->21152 21183 414336 21182->21183 21184 414351 21183->21184 21185 415781 __lock 36 API calls 21183->21185 21184->21130 21186 414359 21185->21186 21187 41578a _write_multi_char 36 API calls 21186->21187 21188 414364 21187->21188 21188->21130 21192 41440b RtlLeaveCriticalSection 21189->21192 21191 41b5db 21191->21128 21192->21191 21194 41467f 21193->21194 21201 41469c 21193->21201 21195 414076 44 API calls 21194->21195 21196 414685 21195->21196 21206 41b9a8 21196->21206 21200 414695 21200->21201 21202 413e83 __mtdeletelocks 36 API calls 21200->21202 21203 414705 21201->21203 21202->21201 21204 414947 2 API calls 21203->21204 21205 41470b 21204->21205 21205->21076 21207 41468d 21206->21207 21208 41b9b4 21206->21208 21210 41b90d 21207->21210 21208->21207 21209 413e83 __mtdeletelocks 36 API calls 21208->21209 21209->21207 21211 41b919 ctype 21210->21211 21212 41b98c 21211->21212 21214 41b944 21211->21214 21213 415781 __lock 36 API calls 21212->21213 21215 41b991 21213->21215 21216 41436b _write_multi_char 37 API calls 21214->21216 21217 41578a _write_multi_char 36 API calls 21215->21217 21218 41b94a 21216->21218 21224 41b97c ctype 21217->21224 21219 41b964 21218->21219 21220 41b958 21218->21220 21221 415781 __lock 36 API calls 21219->21221 21226 41b88a 21220->21226 21223 41b95e 21221->21223 21241 41b984 21223->21241 21224->21200 21227 41432a _write_multi_char 36 API calls 21226->21227 21228 41b896 21227->21228 21229 41b8d8 21228->21229 21230 41432a _write_multi_char 36 API calls 21228->21230 21238 41b8b6 21228->21238 21244 4142ab 21229->21244 21232 41b8ad 21230->21232 21234 41432a _write_multi_char 36 API calls 21232->21234 21233 41432a _write_multi_char 36 API calls 21235 41b8c2 CloseHandle 21233->21235 21234->21238 21235->21229 21239 41b8ce GetLastError 21235->21239 21236 41b902 21236->21223 21238->21229 21238->21233 21239->21229 21240 415793 _write_multi_char 36 API calls 21240->21236 21253 41440b RtlLeaveCriticalSection 21241->21253 21243 41b98a 21243->21224 21245 414311 21244->21245 21246 4142b9 21244->21246 21247 415781 __lock 36 API calls 21245->21247 21246->21245 21249 4142df 21246->21249 21248 414316 21247->21248 21250 41578a _write_multi_char 36 API calls 21248->21250 21251 414307 21249->21251 21252 414301 SetStdHandle 21249->21252 21250->21251 21251->21236 21251->21240 21252->21251 21253->21243 21255 40702d 21254->21255 21256 407032 21255->21256 21258 407312 21255->21258 21256->21083 21259 40731c __EH_prolog 21258->21259 21260 40242d numpunct 41 API calls 21259->21260 21265 40735d 21259->21265 21261 407338 21260->21261 21262 401163 numpunct 41 API calls 21261->21262 21263 407348 21262->21263 21266 415747 KiUserExceptionDispatcher 21263->21266 21265->21255 21266->21265 21268 40cf96 __EH_prolog 21267->21268 21269 403087 41 API calls 21268->21269 21270 40cfaf 21269->21270 21271 4019e1 41 API calls 21270->21271 21272 40cfc8 ctype 21271->21272 21272->20567 21274 40d2f3 __EH_prolog 21273->21274 21275 401a0a 41 API calls 21274->21275 21282 40d325 21274->21282 21277 40d31b 21275->21277 21276 401a0a 41 API calls 21278 40d33c 21276->21278 21280 413901 numpunct 40 API calls 21277->21280 21279 40cf8c 41 API calls 21278->21279 21281 40c7ae 21279->21281 21280->21282 21281->20434 21282->21276 21284 41136f __EH_prolog 21283->21284 21285 412241 numpunct 41 API calls 21284->21285 21286 40c7e2 21284->21286 21287 411380 21285->21287 21289 411442 21286->21289 21287->21286 21330 4113a7 21287->21330 21340 406832 21289->21340 21292 406d41 21294 406d4b __EH_prolog 21292->21294 21293 406dd1 21295 4145a9 43 API calls 21293->21295 21294->21293 21296 4019e1 41 API calls 21294->21296 21297 406ddc 21295->21297 21298 406d90 21296->21298 21300 42013c 40 API calls 21297->21300 21299 401a0a 41 API calls 21298->21299 21301 406da6 21299->21301 21302 406df1 21300->21302 21303 406406 41 API calls 21301->21303 21304 406e6e 41 API calls 21302->21304 21305 406db6 21303->21305 21306 406e03 std::runtime_error::~runtime_error 21304->21306 21307 406471 41 API calls 21305->21307 21306->20444 21308 406dc3 21307->21308 21347 415747 KiUserExceptionDispatcher 21308->21347 21311 413db8 ctype 21310->21311 21312 4148f5 37 API calls 21311->21312 21313 413dc0 21312->21313 21348 413d1d 21313->21348 21317 413de2 ctype 21317->20446 21319 413af6 ctype 21318->21319 21320 4148f5 37 API calls 21319->21320 21321 413b02 21320->21321 21406 417f98 21321->21406 21329 413b35 ctype 21329->20448 21331 4113b1 __EH_prolog 21330->21331 21332 401a0a 41 API calls 21331->21332 21333 4113cb 21332->21333 21334 4067e9 41 API calls 21333->21334 21335 4113d3 21334->21335 21336 401a0a 41 API calls 21335->21336 21337 411413 21336->21337 21338 406883 41 API calls 21337->21338 21339 411423 ctype 21338->21339 21339->21286 21341 40683c __EH_prolog 21340->21341 21344 40686d 21341->21344 21345 401d74 41 API calls 21344->21345 21346 40685c 21345->21346 21346->21292 21347->21293 21349 413d9b 21348->21349 21350 413d2a 21348->21350 21352 415781 __lock 36 API calls 21349->21352 21350->21349 21351 413d3c 21350->21351 21353 413d4d 21351->21353 21362 418da6 21351->21362 21354 413d8b 21352->21354 21355 414076 44 API calls 21353->21355 21359 413deb 21354->21359 21357 413d5a 21355->21357 21373 418cfb 21357->21373 21360 414947 2 API calls 21359->21360 21361 413df3 21360->21361 21361->21317 21363 418dbf 21362->21363 21364 418cfb _write_multi_char 40 API calls 21363->21364 21365 418dcb 21364->21365 21366 418e38 21365->21366 21368 418df8 21365->21368 21372 418ddf 21365->21372 21367 415781 __lock 36 API calls 21366->21367 21367->21372 21369 418cfb _write_multi_char 40 API calls 21368->21369 21368->21372 21370 418e97 21369->21370 21371 418cfb _write_multi_char 40 API calls 21370->21371 21370->21372 21371->21372 21372->21353 21374 418d07 ctype 21373->21374 21375 418d8a 21374->21375 21377 418d32 21374->21377 21376 415781 __lock 36 API calls 21375->21376 21378 418d8f 21376->21378 21379 41436b _write_multi_char 37 API calls 21377->21379 21380 41578a _write_multi_char 36 API calls 21378->21380 21381 418d38 21379->21381 21388 418d7a ctype 21380->21388 21382 418d46 21381->21382 21383 418d5a 21381->21383 21391 418c87 21382->21391 21385 415781 __lock 36 API calls 21383->21385 21387 418d5f 21385->21387 21386 418d52 21402 418d82 21386->21402 21389 41578a _write_multi_char 36 API calls 21387->21389 21388->21354 21389->21386 21392 41432a _write_multi_char 36 API calls 21391->21392 21393 418c92 21392->21393 21394 418ca8 SetFilePointer 21393->21394 21395 418c98 21393->21395 21397 418cc1 GetLastError 21394->21397 21398 418cc9 21394->21398 21396 415781 __lock 36 API calls 21395->21396 21399 418c9d 21396->21399 21397->21398 21400 415793 _write_multi_char 36 API calls 21398->21400 21401 418cd5 21398->21401 21399->21386 21400->21401 21401->21386 21405 41440b RtlLeaveCriticalSection 21402->21405 21404 418d88 21404->21388 21405->21404 21407 417fa5 _write_multi_char 21406->21407 21408 413b0d 21407->21408 21409 41522d __getbuf 36 API calls 21407->21409 21410 4180d1 21408->21410 21409->21408 21411 4188c8 21410->21411 21419 41810a __aulldvrm _strlen 21410->21419 21412 416836 _fast_error_exit 36 API calls 21411->21412 21413 413b1d 21412->21413 21421 418020 21413->21421 21414 41804a 47 API calls _write_multi_char 21414->21419 21415 41522d __getbuf 36 API calls 21415->21419 21416 41c011 38 API calls 21416->21419 21417 413e83 __mtdeletelocks 36 API calls 21417->21419 21418 418094 47 API calls 21418->21419 21419->21411 21419->21414 21419->21415 21419->21416 21419->21417 21419->21418 21420 41806f 47 API calls _write_multi_char 21419->21420 21420->21419 21422 418027 21421->21422 21423 413b29 21421->21423 21422->21423 21424 414076 44 API calls 21422->21424 21425 413b3e 21423->21425 21424->21423 21426 414947 2 API calls 21425->21426 21427 413b46 21426->21427 21427->21329 21429 411159 21428->21429 21430 41116b 21428->21430 21429->21430 21434 411209 21429->21434 21431 411195 21430->21431 21433 412241 numpunct 41 API calls 21430->21433 21431->20074 21433->21431 21435 41121f 21434->21435 21437 411224 21434->21437 21440 4112ff 21435->21440 21438 412241 numpunct 41 API calls 21437->21438 21439 411254 21438->21439 21439->21430 21441 411309 __EH_prolog 21440->21441 21442 40242d numpunct 41 API calls 21441->21442 21443 411319 21442->21443 21444 401163 numpunct 41 API calls 21443->21444 21445 411329 21444->21445 21448 415747 KiUserExceptionDispatcher 21445->21448 21447 41133e 21448->21447 21450 40f04b __EH_prolog 21449->21450 21451 401395 41 API calls 21450->21451 21452 40f062 21451->21452 21453 40bc90 102 API calls 21452->21453 21454 40f068 21453->21454 21454->20080 21456 40eab4 __EH_prolog 21455->21456 21457 401a0a 41 API calls 21456->21457 21458 40eb00 21457->21458 21459 4067e9 41 API calls 21458->21459 21460 40be15 21459->21460 21461 40c8e0 21460->21461 21462 40c8ea __EH_prolog 21461->21462 21463 4019e1 41 API calls 21462->21463 21464 40c90a 21463->21464 21465 4067e9 41 API calls 21464->21465 21466 40c916 21465->21466 21662 40d275 21466->21662 21468 40c92a ctype 21469 40ca26 21468->21469 21470 40c949 21468->21470 21471 401a0a 41 API calls 21469->21471 21472 40d275 41 API calls 21470->21472 21473 40ca32 21471->21473 21474 40c95c 21472->21474 21475 406883 41 API calls 21473->21475 21672 4066d8 21474->21672 21505 40ca01 ctype 21475->21505 21477 40c965 21478 406883 41 API calls 21477->21478 21480 40c979 ctype 21478->21480 21479 402ab4 43 API calls 21481 40ca5d 21479->21481 21484 406b04 41 API calls 21480->21484 21480->21505 21686 402c92 21481->21686 21486 40c9a4 21484->21486 21485 40d0d0 41 API calls 21487 40ca6f 21485->21487 21488 401a0a 41 API calls 21486->21488 21489 401d74 41 API calls 21487->21489 21490 40c9c0 21488->21490 21491 40ca7d ctype 21489->21491 21492 406b1e 41 API calls 21490->21492 21706 40d615 21491->21706 21493 40c9d2 21492->21493 21494 40265a 41 API calls 21493->21494 21496 40c9e0 21494->21496 21498 40b169 41 API calls 21496->21498 21500 40c9f1 21498->21500 21499 401d74 41 API calls 21502 40caa5 ctype 21499->21502 21501 406883 41 API calls 21500->21501 21501->21505 21716 40d767 21502->21716 21505->21479 21663 40d27f __EH_prolog 21662->21663 21664 40d2b1 21663->21664 21666 401a0a 41 API calls 21663->21666 21665 401a0a 41 API calls 21664->21665 21667 40d2c8 21665->21667 21668 40d2a7 21666->21668 21670 40cf8c 41 API calls 21667->21670 21669 413901 numpunct 40 API calls 21668->21669 21669->21664 21671 40d2d8 21670->21671 21671->21468 21673 4066e2 __EH_prolog 21672->21673 21674 406738 21673->21674 21675 406749 21673->21675 21678 4019e1 41 API calls 21674->21678 21676 406777 21675->21676 21677 40674e 21675->21677 21680 401a0a 41 API calls 21676->21680 21679 401a0a 41 API calls 21677->21679 21685 406744 ctype 21678->21685 21681 406762 21679->21681 21682 40676a 21680->21682 21683 406645 41 API calls 21681->21683 21684 4019e1 41 API calls 21682->21684 21683->21682 21684->21685 21685->21477 21687 402c9c __EH_prolog 21686->21687 21688 40242d numpunct 41 API calls 21687->21688 21689 402cb7 21688->21689 21690 411365 41 API calls 21689->21690 21691 402cc7 21690->21691 21692 411442 41 API calls 21691->21692 21693 402ccd 21692->21693 21694 406d41 52 API calls 21693->21694 21695 402cd8 ctype 21694->21695 21696 413dac 48 API calls 21695->21696 21705 402cf9 ctype 21696->21705 21697 402eb3 21698 406e25 59 API calls 21697->21698 21699 402ebb 21698->21699 21699->21485 21700 4040bc 80 API calls 21700->21705 21701 4019e1 41 API calls 21701->21705 21702 402bfc 41 API calls 21702->21705 21703 402ecc 21704 413aea 51 API calls 21704->21705 21705->21697 21705->21700 21705->21701 21705->21702 21705->21703 21705->21704 21707 40d61f __EH_prolog 21706->21707 21708 401a0a 41 API calls 21707->21708 21715 40d651 21707->21715 21710 40d647 21708->21710 21709 401a0a 41 API calls 21711 40d668 21709->21711 21713 413901 numpunct 40 API calls 21710->21713 21712 40cf8c 41 API calls 21711->21712 21714 40ca96 21712->21714 21713->21715 21714->21499 21715->21709 21717 40d771 __EH_prolog 21716->21717 21719 401a0a 41 API calls 21717->21719 21724 40d7a0 21717->21724 21718 401a0a 41 API calls 21720 40d7bf 21718->21720 21721 40d796 21719->21721 21723 40cf8c 41 API calls 21720->21723 21722 413901 numpunct 40 API calls 21721->21722 21722->21724 21725 40d7cd 21723->21725 21724->21718 21818 40d689 21725->21818 21819 40d693 __EH_prolog 21818->21819 21820 401a57 41 API calls 21819->21820 21821 40d725 21820->21821 21824 414999 21821->21824 21823 40d738 ctype 21825 4149a3 21824->21825 21827 4149b8 21825->21827 21828 41bcf6 21825->21828 21827->21823 21829 41bd02 21828->21829 21830 41bd18 21828->21830 21829->21825 22921 41c3d2 22920->22921 22922 41c3ff 22921->22922 22923 41c251 _fast_error_exit 36 API calls 22921->22923 22922->19618 22924 41c3e9 22923->22924 22925 41c251 _fast_error_exit 36 API calls 22924->22925 22925->22922 22927 41c277 22926->22927 22928 41c384 _strlen 22927->22928 22931 41c2b6 22927->22931 22936 41c37f 22927->22936 22932 41c399 GetStdHandle WriteFile 22928->22932 22929 416836 _fast_error_exit 33 API calls 22930 414fb9 22929->22930 22930->19623 22933 41c2c2 GetModuleFileNameA 22931->22933 22931->22936 22932->22936 22934 41c2dc _strcat _fast_error_exit _strncpy _strlen 22933->22934 22935 41f805 _fast_error_exit 6 API calls 22934->22935 22935->22936 22936->22929 22937 5704ab 22938 5704b5 LoadLibraryA 22937->22938 22939 5704cd 22938->22939 22939->22938 22940 5704d3 GetProcAddress 22939->22940 22941 5704f0 22939->22941 22940->22939

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 100 414fc6-415018 call 4166b0 call 41c880 GetVersionExA 105 415026-41503e GetModuleHandleA 100->105 106 41501a-415020 100->106 107 415040-41504b 105->107 108 41505f-415062 105->108 106->105 107->108 109 41504d-415056 107->109 110 41508b-415095 call 41a748 108->110 112 415077-41507b 109->112 113 415058-41505d 109->113 117 415097-41509e call 414fa2 110->117 118 41509f-4150a6 call 418b98 110->118 112->108 116 41507d-41507f 112->116 113->108 115 415064-41506b 113->115 115->108 119 41506d-415075 115->119 120 415085-415088 116->120 117->118 125 4150b0-4150bf call 41c7f8 call 41b5f1 118->125 126 4150a8-4150af call 414fa2 118->126 119->120 120->110 133 4150c1-4150c8 call 414f7d 125->133 134 4150c9-4150e5 GetCommandLineA call 41c6d6 call 41c634 125->134 126->125 133->134 141 4150e7-4150ee call 414f7d 134->141 142 4150ef-4150f6 call 41c401 134->142 141->142 147 415100-41510d call 417c24 142->147 148 4150f8-4150ff call 414f7d 142->148 153 415116-41513d call 40da80 147->153 154 41510f-415115 call 414f7d 147->154 148->147 159 415145-415185 call 417d73 call 4166eb 153->159 160 41513f-415140 call 417d51 153->160 154->153 160->159
    APIs
    • GetVersionExA.KERNEL32(?,004247B8,00000018), ref: 00414FE6
    • GetModuleHandleA.KERNEL32(00000000,?,004247B8,00000018), ref: 00415033
    • _fast_error_exit.LIBCMT ref: 00415099
    • _fast_error_exit.LIBCMT ref: 004150AA
    • GetCommandLineA.KERNEL32(?,004247B8,00000018), ref: 004150C9
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: _fast_error_exit$CommandHandleLineModuleVersion
    • String ID:
    • API String ID: 2471294817-0
    • Opcode ID: be51f0216baf2cf2f8e1b70fa28ccbb07090ee8127ad58b0c7e50d3b3e00463c
    • Instruction ID: 52348ceb12ad2935292754978af404c3743035051b11f28c4781ee22d84ee488
    • Opcode Fuzzy Hash: be51f0216baf2cf2f8e1b70fa28ccbb07090ee8127ad58b0c7e50d3b3e00463c
    • Instruction Fuzzy Hash: EB41D571E40610CAC720AF76DC466E93BA1AF84308F61443FE5199A292DB3D98C3CB8C

    Control-flow Graph

    APIs
    • GetModuleHandleA.KERNEL32(?,?,?,?,00411968,kernel32.dll,CreateFileMappingW,0042D340,004120A4), ref: 00411F31
    • GetFileAttributesW.KERNELBASE(???.???,00000000,GetFileAttributesW,?,?,?,?,00411968,kernel32.dll,CreateFileMappingW,0042D340,004120A4), ref: 00411F50
    • GetLastError.KERNEL32(?,?,?,?,00411968,kernel32.dll,CreateFileMappingW,0042D340,004120A4), ref: 00411F57
    • InterlockedExchange.KERNEL32(?,?), ref: 00411FCE
    • LoadLibraryA.KERNEL32(?,?,?,?,?,00411968,kernel32.dll,CreateFileMappingW,0042D340,004120A4), ref: 00411FF0
    • LoadLibraryA.KERNEL32(security.dll,?,?,?,?,00411968,kernel32.dll,CreateFileMappingW,0042D340,004120A4), ref: 00412003
    • InterlockedExchange.KERNEL32(00000001,00000000), ref: 00412009
    • FreeLibrary.KERNEL32(00000000,?,?,?,?,00411968,kernel32.dll,CreateFileMappingW,0042D340,004120A4), ref: 00412014
    • InterlockedExchange.KERNEL32(0042C064,00000000), ref: 00412041
    • FreeLibrary.KERNEL32(00000000,?,?,?,?,00411968,kernel32.dll,CreateFileMappingW,0042D340,004120A4), ref: 0041204C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Library$ExchangeInterlocked$FreeLoad$AttributesErrorFileHandleLastModule
    • String ID: ???.???$GetFileAttributesW$`AB$security.dll
    • API String ID: 1916585904-522417547
    • Opcode ID: 84fde1eb2596e27518b9b66f74fad4f568d33ae02a80d8bcb14e35c8c4c33197
    • Instruction ID: 0c90559da91bd831cd3dab65bf3bbea139e12f2d0966ec066b35a1c3824bc043
    • Opcode Fuzzy Hash: 84fde1eb2596e27518b9b66f74fad4f568d33ae02a80d8bcb14e35c8c4c33197
    • Instruction Fuzzy Hash: 1C4191317042059BCB318FA4AC44AEB3BA5EB59750B600226FB45E2270D77988D7DB6D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 42 41b5f1-41b603 call 41522d 45 41b605-41b608 42->45 46 41b60d-41b622 42->46 48 41b7ea-41b7ee 45->48 47 41b642-41b644 46->47 49 41b624-41b63c 47->49 50 41b646-41b65a GetStartupInfoA 47->50 49->47 51 41b660-41b666 50->51 52 41b749 50->52 51->52 53 41b66c-41b67f 51->53 54 41b74b-41b75a 52->54 55 41b681 53->55 56 41b683-41b689 53->56 57 41b7cb 54->57 58 41b75c-41b762 54->58 55->56 59 41b6d9-41b6dd 56->59 60 41b68b 56->60 61 41b7cf-41b7d3 57->61 62 41b764-41b767 58->62 63 41b76e-41b775 58->63 59->52 65 41b6df-41b6e8 59->65 66 41b690-41b699 call 41522d 60->66 61->54 67 41b7d9-41b7e5 SetHandleCount 61->67 64 41b778-41b784 GetStdHandle 62->64 63->64 68 41b7c5-41b7c9 64->68 69 41b786-41b78f GetFileType 64->69 70 41b6ea-41b6f0 65->70 71 41b73e-41b747 65->71 81 41b6d3 66->81 82 41b69b-41b6aa 66->82 73 41b7e7-41b7e9 67->73 68->61 69->68 74 41b791-41b79b 69->74 70->71 75 41b6f2-41b6f5 70->75 71->52 71->65 73->48 77 41b7a3-41b7a6 74->77 78 41b79d-41b7a1 74->78 79 41b702-41b739 call 41b7ff 75->79 80 41b6f7-41b700 GetFileType 75->80 83 41b7ac-41b7be call 41b7ff 77->83 84 41b7a8 77->84 78->83 92 41b769-41b76c 79->92 93 41b73b 79->93 80->71 80->79 81->59 86 41b6c2-41b6c4 82->86 83->92 95 41b7c0-41b7c3 83->95 84->83 89 41b6c6-41b6cf 86->89 90 41b6ac-41b6c0 86->90 89->66 94 41b6d1 89->94 90->86 92->73 93->71 94->59 95->61
    APIs
    • GetStartupInfoA.KERNEL32(?), ref: 0041B64E
    • GetFileType.KERNEL32(?), ref: 0041B6F8
    • GetStdHandle.KERNEL32(-000000F6), ref: 0041B779
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: FileHandleInfoStartupType
    • String ID: DB
    • API String ID: 2461013171-3807777182
    • Opcode ID: 63b2d08512decfe744177ba38bf9fb7207bbc92b537ac15aace0e44b3773ae25
    • Instruction ID: 5a94dd12d3dea06ee2feb2cc53fbe35cbf2be88284841c6ab5255a4807d3c723
    • Opcode Fuzzy Hash: 63b2d08512decfe744177ba38bf9fb7207bbc92b537ac15aace0e44b3773ae25
    • Instruction Fuzzy Hash: 6D51E4716043018FD7208F79DC847A677E4EB95324F288A2ED5B6CB2E1D738D486C79A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 96 417bca-417bd7 GetModuleHandleA 97 417bd9-417be7 GetProcAddress 96->97 98 417bef-417bf3 ExitProcess 96->98 97->98 99 417be9 97->99 99->98
    APIs
    • GetModuleHandleA.KERNEL32(mscoree.dll,00417D38,?,00424FE8,00000008,00417D6F,?,00000001,00000000,0041E5D6,00000003), ref: 00417BCF
    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00417BDF
    • ExitProcess.KERNEL32 ref: 00417BF3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: AddressExitHandleModuleProcProcess
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 75539706-1276376045
    • Opcode ID: 9e11737825365e066570363eff612e26edf7107d7f04036a6dcc465d1b32afbd
    • Instruction ID: dff2a8c5571777d997ac6d4ed434b35aa53ae8b83b5507574e0483bba6655685
    • Opcode Fuzzy Hash: 9e11737825365e066570363eff612e26edf7107d7f04036a6dcc465d1b32afbd
    • Instruction Fuzzy Hash: 0AD0C93070C241AFEB206BB1ED09E1B3AA4FFC0B467854425F815D42B0CF38D891AA2D

    Control-flow Graph

    APIs
    • __EH_prolog.LIBCMT ref: 0040BEF2
      • Part of subcall function 00401403: __EH_prolog.LIBCMT ref: 00401408
    • GetCurrentDirectoryW.KERNEL32(00000104,?,00000001,?,00000000,?,?,?,?,00000001,?,?), ref: 0040C0B6
      • Part of subcall function 004067E9: __EH_prolog.LIBCMT ref: 004067EE
      • Part of subcall function 00406AB8: GetFileAttributesW.KERNELBASE(-00000004,0040133F,?,?), ref: 00406AC7
      • Part of subcall function 0040F3F5: __EH_prolog.LIBCMT ref: 0040F3FA
      • Part of subcall function 0040F43C: __EH_prolog.LIBCMT ref: 0040F441
      • Part of subcall function 0040F43C: GetModuleHandleW.KERNEL32(00000000,00000000,?,00000100,00426B8C,?,00000000), ref: 0040F47F
      • Part of subcall function 0040F43C: LoadStringW.USER32(00000000), ref: 0040F486
      • Part of subcall function 0040F326: __EH_prolog.LIBCMT ref: 0040F32B
      • Part of subcall function 0040F376: __EH_prolog.LIBCMT ref: 0040F37B
      • Part of subcall function 00415747: KiUserExceptionDispatcher.NTDLL(?,?,00401278,004281F4,?,/A,?,?,?,00413083,00401278,004281F4,0042D4A8,00401278,00401278,?), ref: 00415775
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$AttributesCurrentDirectoryDispatcherExceptionFileHandleLoadModuleStringUser
    • String ID: .lax$exe
    • API String ID: 1625219707-1957734886
    • Opcode ID: b34d59570a1f93907e5c1e6b900ee7657ec6f6ff04d6baf857576de4f1375eee
    • Instruction ID: aa5d85868ac0a78d6ec3a13113cac6e50dcdc1d7307bac46abc1698d67d1b479
    • Opcode Fuzzy Hash: b34d59570a1f93907e5c1e6b900ee7657ec6f6ff04d6baf857576de4f1375eee
    • Instruction Fuzzy Hash: C5A1B371D04218AACF00EBE5CC82ADE7B78AF05304F10817FF910B71D2DB785A498BA9

    Control-flow Graph

    APIs
    • __EH_prolog.LIBCMT ref: 0040297E
      • Part of subcall function 0040F3F5: __EH_prolog.LIBCMT ref: 0040F3FA
      • Part of subcall function 0040F43C: __EH_prolog.LIBCMT ref: 0040F441
      • Part of subcall function 0040F43C: GetModuleHandleW.KERNEL32(00000000,00000000,?,00000100,00426B8C,?,00000000), ref: 0040F47F
      • Part of subcall function 0040F43C: LoadStringW.USER32(00000000), ref: 0040F486
    • GetStdHandle.KERNEL32(000000F4), ref: 00402A24
    • lstrlenW.KERNEL32(00000000,00000000,00000000), ref: 00402A37
    • WriteConsoleW.KERNELBASE(00000000,00000000,00000000), ref: 00402A46
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$Handle$ConsoleLoadModuleStringWritelstrlen
    • String ID:
    • API String ID: 2839003670-0
    • Opcode ID: 8e336697ad5142aa8815cc7adf89ab167a23bd38a681d37e9c415b90ec877e12
    • Instruction ID: 9d8bfae1d112d749d917fe8b20fabb6931b966bb80358f871ccd41f33f339e6c
    • Opcode Fuzzy Hash: 8e336697ad5142aa8815cc7adf89ab167a23bd38a681d37e9c415b90ec877e12
    • Instruction Fuzzy Hash: 24213573A00218BADB10EBE4DC49FDE7368AF18325F50457BF605B60D1DB78E6848B59

    Control-flow Graph

    APIs
    • __EH_prolog.LIBCMT ref: 0040DA85
      • Part of subcall function 00410F3B: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,?,?,?,0040DA9B,00000000,?), ref: 00410F4E
      • Part of subcall function 00410F3B: GetProcAddress.KERNEL32(00000000), ref: 00410F55
      • Part of subcall function 00410F3B: GetCurrentProcess.KERNEL32(00000000,?,?,0040DA9B,00000000,?), ref: 00410F65
      • Part of subcall function 00401395: __EH_prolog.LIBCMT ref: 0040139A
      • Part of subcall function 0040BC90: __EH_prolog.LIBCMT ref: 0040BC95
      • Part of subcall function 0040BC90: GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,00000000), ref: 0040BCFA
      • Part of subcall function 0040BDF5: __EH_prolog.LIBCMT ref: 0040BDFA
      • Part of subcall function 0040BDF5: WaitForSingleObject.KERNEL32(00000000,000000FF,?,?), ref: 0040BEBF
      • Part of subcall function 0040BDF5: GetExitCodeProcess.KERNEL32(?,?), ref: 0040BECC
      • Part of subcall function 0040D85B: __EH_prolog.LIBCMT ref: 0040D860
    • GetKeyState.USER32(00000011), ref: 0040DB30
    Strings
    • [press enter to close this window], xrefs: 0040DB3B
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$CurrentProcess$AddressCodeDirectoryExitHandleModuleObjectProcSingleStateWait
    • String ID: [press enter to close this window]
    • API String ID: 183739109-2096780919
    • Opcode ID: 885b697ad820a58aae98a06aa0c51c95854284fe6643e8fd198eb8955f7ec925
    • Instruction ID: 33bfe0f19483b0e39373e5f7727ff1bf281ced3f1f700108c7e5d37b4ac19dc3
    • Opcode Fuzzy Hash: 885b697ad820a58aae98a06aa0c51c95854284fe6643e8fd198eb8955f7ec925
    • Instruction Fuzzy Hash: 3D219271E042489ACF10FBE5D5467DDB7B8AF04308F0044AFE11577181CBB85A89CBAE

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 357 415747-41577e KiUserExceptionDispatcher
    APIs
    • KiUserExceptionDispatcher.NTDLL(?,?,00401278,004281F4,?,/A,?,?,?,00413083,00401278,004281F4,0042D4A8,00401278,00401278,?), ref: 00415775
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: DispatcherExceptionUser
    • String ID: /A
    • API String ID: 6842923-4160151031
    • Opcode ID: f08c6ecc858754770d08fa34b19157eda95fe8494b5390995d4a84d93febb9b8
    • Instruction ID: fc26b3cf50d0a34a08d36ca047944ad2759772b6f73facf253fad043e85ceed7
    • Opcode Fuzzy Hash: f08c6ecc858754770d08fa34b19157eda95fe8494b5390995d4a84d93febb9b8
    • Instruction Fuzzy Hash: 25E0E536E0011CABCF11DF99EC449DEBBB9FB89310F408026FA14A7150D774AA55DBA4

    Control-flow Graph

    APIs
    • __EH_prolog.LIBCMT ref: 0040BC95
      • Part of subcall function 00401395: __EH_prolog.LIBCMT ref: 0040139A
      • Part of subcall function 0040C25F: __EH_prolog.LIBCMT ref: 0040C264
    • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,00000000), ref: 0040BCFA
      • Part of subcall function 004067E9: __EH_prolog.LIBCMT ref: 004067EE
      • Part of subcall function 00406B1E: __EH_prolog.LIBCMT ref: 00406B23
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$CurrentDirectory
    • String ID:
    • API String ID: 730206648-0
    • Opcode ID: 5ca349435eb70097b2258bc4e512ecd40886a0f68d72b5190f26737569517e49
    • Instruction ID: d402d18aa3206320871a9d085a75376e2ece34b4051101a5d93a8e7ef23390ca
    • Opcode Fuzzy Hash: 5ca349435eb70097b2258bc4e512ecd40886a0f68d72b5190f26737569517e49
    • Instruction Fuzzy Hash: AD416071D01254EFCB00EFE9C946A8EBBB4AF14308F50456EF945B7691C778AA08C7E6

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 399 5704ab-5704b2 400 5704b5-5704cb LoadLibraryA 399->400 401 5704cd-5704d1 400->401 402 5704d3-5704e7 GetProcAddress 401->402 403 5704e9-5704ee 401->403 402->401 403->400 404 5704f0-5704f4 403->404
    APIs
    • LoadLibraryA.KERNELBASE ref: 005704BA
    • GetProcAddress.KERNEL32(?,00000000), ref: 005704DC
    Memory Dump Source
    • Source File: 00000000.00000002.2044215172.0000000000570000.00000040.00001000.00020000.00000000.sdmp, Offset: 00570000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_570000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID:
    • API String ID: 2574300362-0
    • Opcode ID: bfec523b0a34fb97738a06bdfbcae2ff6c25c63efdf5a5add7696fe588be8235
    • Instruction ID: 047bff9cb7e18dfa674330279a8f077aede19c0c72be186793bbe8ac163fa0c5
    • Opcode Fuzzy Hash: bfec523b0a34fb97738a06bdfbcae2ff6c25c63efdf5a5add7696fe588be8235
    • Instruction Fuzzy Hash: 86F0BE77600200DBCB10CF18DC809AAB7F2FF942653298879D94A97304D239BD159A10

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 405 570c74-570cc2 VirtualProtect * 2
    APIs
    • VirtualProtect.KERNELBASE(?,00001000,00000004,?,?), ref: 00570C9F
    • VirtualProtect.KERNEL32(?,00001000,?,?), ref: 00570CB8
    Memory Dump Source
    • Source File: 00000000.00000002.2044215172.0000000000570000.00000040.00001000.00020000.00000000.sdmp, Offset: 00570000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_570000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID:
    • API String ID: 544645111-0
    • Opcode ID: 559bbdefaf15e456d605dae105da3aef4e62acee13071953ca7ff870281ea4d7
    • Instruction ID: 0db10f7f7f2d54f55655ab94cb51b4411e090399127f33dd5203920eb90523f5
    • Opcode Fuzzy Hash: 559bbdefaf15e456d605dae105da3aef4e62acee13071953ca7ff870281ea4d7
    • Instruction Fuzzy Hash: 15F08276200305AFDB18CF40C844FDE77B9EB44390F10457AEE42AB684C6B0FA148B50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 406 41a748-41a766 HeapCreate 407 41a792-41a794 406->407 408 41a768-41a775 call 41a72e 406->408 411 41a795-41a798 408->411 412 41a777-41a784 call 41a799 408->412 412->411 415 41a786-41a78c HeapDestroy 412->415 415->407
    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000,00415092,00000001,?,004247B8,00000018), ref: 0041A759
      • Part of subcall function 0041A799: RtlAllocateHeap.NTDLL(00000000,00000140,0041A781), ref: 0041A7A6
    • HeapDestroy.KERNEL32(?,004247B8,00000018), ref: 0041A78C
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Heap$AllocateCreateDestroy
    • String ID:
    • API String ID: 316229882-0
    • Opcode ID: 39ae5f4eeaed9afa3268c597e5104310a47ecb4a8cb57128d404ec35618bc741
    • Instruction ID: 29a8363419bf7b76235f3d31d64908f01075f94bc863d2ba34fc8903b1f2bd0c
    • Opcode Fuzzy Hash: 39ae5f4eeaed9afa3268c597e5104310a47ecb4a8cb57128d404ec35618bc741
    • Instruction Fuzzy Hash: 7CE012B47513019ADB31AB316C097A636E4D744795F44483BB515C51E0FB74CAA1DA0A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 416 570304-570324 417 570326-57032b 416->417 418 57033b-57038c call 57049d VirtualAlloc call 57077a 416->418 417->418 419 57032d-570339 417->419 424 570426-570438 418->424 425 570392-5703b1 call 5706d8 call 5705f3 418->425 419->418 431 570440-570449 424->431 425->431 432 5703b7-5703bc call 570a08 425->432 433 570460-57049c call 570c66 call 570bb7 VirtualFree 431->433 434 57044b-57045d 431->434 438 5703c1-5703c3 432->438 434->433 438->431 439 5703c5-5703d3 438->439 441 5703d5-5703db 439->441 442 5703dd-5703e3 439->442 444 57040a-570419 441->444 445 5703e5-570401 442->445 446 570403-570409 442->446 448 570420 444->448 445->448 446->444 448->424
    APIs
    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?), ref: 00570372
    • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 0057048D
    Memory Dump Source
    • Source File: 00000000.00000002.2044215172.0000000000570000.00000040.00001000.00020000.00000000.sdmp, Offset: 00570000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_570000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Virtual$AllocFree
    • String ID:
    • API String ID: 2087232378-0
    • Opcode ID: 75ee3d0b778d5b05149a3ae5ecd3ba9b1428b0f0e8eca6b4ea6447106af3b3cb
    • Instruction ID: 56d2c70ce93c96dd1f7f2cdaad45c014646a7c7cb1758af585f1f096454574e2
    • Opcode Fuzzy Hash: 75ee3d0b778d5b05149a3ae5ecd3ba9b1428b0f0e8eca6b4ea6447106af3b3cb
    • Instruction Fuzzy Hash: A341BD72601746DFDB389F14DC88AEB77E9FF49341F009229EE0A97284DB70A915CB91

    Control-flow Graph

    APIs
    • __EH_prolog.LIBCMT ref: 0040C264
      • Part of subcall function 0040BEED: __EH_prolog.LIBCMT ref: 0040BEF2
      • Part of subcall function 0040E3F9: __EH_prolog.LIBCMT ref: 0040E3FE
      • Part of subcall function 0040D0D0: __EH_prolog.LIBCMT ref: 0040D0D5
      • Part of subcall function 0040CFE8: __EH_prolog.LIBCMT ref: 0040CFED
      • Part of subcall function 0040D05C: __EH_prolog.LIBCMT ref: 0040D061
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: ed2d833c2c01b4da2502007d4f2e884085fd53661ec2e5d61c149da5b6e70a9b
    • Instruction ID: 153bbef9904f94461048ff2239cbac7d85ecf114c63dfe1336c169005aaec7e1
    • Opcode Fuzzy Hash: ed2d833c2c01b4da2502007d4f2e884085fd53661ec2e5d61c149da5b6e70a9b
    • Instruction Fuzzy Hash: 7331A071D01218AADB11EBE9D986FEFBB78AF41314F10417FF900B31C2D7785A0986A6
    APIs
    • GetFileAttributesW.KERNELBASE(-00000004,0040133F,?,?), ref: 00406AC7
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID:
    • API String ID: 3188754299-0
    • Opcode ID: 5739bada32f22a109928ef0f35d511c0d226d86ad391682a40321510bc55c7e5
    • Instruction ID: afdddf1bddbb1ab465564c3f3ad37a78e02770f96a7cb6d62cdc45e823ba6929
    • Opcode Fuzzy Hash: 5739bada32f22a109928ef0f35d511c0d226d86ad391682a40321510bc55c7e5
    • Instruction Fuzzy Hash: E9C080766201008FCA089B34CD8C84D32506B4737533B8675D033FB1F0D234D555DE59
    APIs
    • LoadLibraryA.KERNELBASE(?), ref: 00570C34
    Memory Dump Source
    • Source File: 00000000.00000002.2044215172.0000000000570000.00000040.00001000.00020000.00000000.sdmp, Offset: 00570000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_570000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: a5954c49c222c1f3ec350f8a32cdbddcbdba2b08294a8bc0e7c3682721ad8435
    • Instruction ID: 8f64b75de0c81256e1979021028c1f10525bd8a4958c5d9d15c0b9e525517119
    • Opcode Fuzzy Hash: a5954c49c222c1f3ec350f8a32cdbddcbdba2b08294a8bc0e7c3682721ad8435
    • Instruction Fuzzy Hash: A1B0923321020597DB015F68E5C88CD7B21DBA42E63104133EA02980589B76C0218650
    APIs
    • __EH_prolog.LIBCMT ref: 00408E62
      • Part of subcall function 00408CB0: __EH_prolog.LIBCMT ref: 00408CB5
      • Part of subcall function 0040E1D8: __EH_prolog.LIBCMT ref: 0040E1DD
      • Part of subcall function 00408B42: __EH_prolog.LIBCMT ref: 00408B47
      • Part of subcall function 004046BD: __EH_prolog.LIBCMT ref: 004046C2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: $ $CurrentVersion$MicroVersion$SOFTWARE\JavaSoft\Java Runtime Environment$SOFTWARE\JavaSoft\Java Runtime Environment\$Sun$\..\jre\bin\client$\..\jre\bin\hotspot$\..\jre\bin\server$\classic$\client$\hotspot$\jre.exe$\jrew.exe$\pack200.exe$\server$jre.exe$jrew.exe$system32$syswow64
    • API String ID: 3519838083-2804910554
    • Opcode ID: ad77efde9717963f197c8d73ed4a1803274c2f54aeb37501d807ef3e862fc48b
    • Instruction ID: 1e7507257cd746e7733ca94bec581c81114ef3e80147510d26ece64c8374395f
    • Opcode Fuzzy Hash: ad77efde9717963f197c8d73ed4a1803274c2f54aeb37501d807ef3e862fc48b
    • Instruction Fuzzy Hash: 8452D471D003599ADB11EBA9C946BEEBBB49F05308F0441AFE940771C2C7BC5F498BA9
    APIs
    • LoadLibraryA.KERNEL32(user32.dll,00425548,?,?), ref: 0041F81D
    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0041F839
    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0041F84A
    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0041F857
    • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 0041F86D
    • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 0041F87E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: AddressProc$LibraryLoad
    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$user32.dll
    • API String ID: 2238633743-1612076079
    • Opcode ID: 1b231eca6e6ca0c4fbf13ecb73712b2d1c72790d6bdb087e815c357667c05b9b
    • Instruction ID: f461a004f676de98019ce9aad15efb724ad5c86a7e1fd8c3f073d35a5d6cb6a3
    • Opcode Fuzzy Hash: 1b231eca6e6ca0c4fbf13ecb73712b2d1c72790d6bdb087e815c357667c05b9b
    • Instruction Fuzzy Hash: 1E21A931B003169ED725BB75AC85BAB3BE8A784754B940037E511D1150E7B8C48BDB6D
    APIs
    • __EH_prolog.LIBCMT ref: 0040C8E5
      • Part of subcall function 004067E9: __EH_prolog.LIBCMT ref: 004067EE
      • Part of subcall function 0040D275: __EH_prolog.LIBCMT ref: 0040D27A
      • Part of subcall function 004066D8: __EH_prolog.LIBCMT ref: 004066DD
      • Part of subcall function 00406883: __EH_prolog.LIBCMT ref: 00406888
      • Part of subcall function 00406B1E: __EH_prolog.LIBCMT ref: 00406B23
      • Part of subcall function 0040265A: __EH_prolog.LIBCMT ref: 0040265F
      • Part of subcall function 0040B169: __EH_prolog.LIBCMT ref: 0040B16E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: -Xrs$all$class$invalid verbosity selection '%s', disabling verbosity.$none$normal
    • API String ID: 3519838083-1137796707
    • Opcode ID: 65b96c86cf66e314cf1757d1438fbc2e78f0dcfbfcbd1cb8841867d56b0804e3
    • Instruction ID: 3786e9a0fd1b39570c77000879a2f1eb8e3a88523833ee977a5fe2df0359dabc
    • Opcode Fuzzy Hash: 65b96c86cf66e314cf1757d1438fbc2e78f0dcfbfcbd1cb8841867d56b0804e3
    • Instruction Fuzzy Hash: 12026071D01258EADB00EBE5CD46BDEBB78AF05304F10417EF905B71D2D7796A088BAA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: InfoLocale_strncpy
    • String ID: 040a$1252$850$ESP$ESP
    • API String ID: 4025304676-1770330732
    • Opcode ID: 3e06e7d6357553c01a8415e5c1f8fe8cb37d89f2423108b310a2b083ae67bd02
    • Instruction ID: fcff750a64bcb8d57de21672546242907468af35653cd2e723ae3371f8b67390
    • Opcode Fuzzy Hash: 3e06e7d6357553c01a8415e5c1f8fe8cb37d89f2423108b310a2b083ae67bd02
    • Instruction Fuzzy Hash: 5821F7F2A28406DBC7188E38D985AF67799EF84380B484077D402CB6A0E739EA85C25D
    APIs
    • _TranslateName.LIBCMT ref: 0041E01E
    • _TranslateName.LIBCMT ref: 0041E067
    • IsValidLocale.KERNEL32(00000001), ref: 0041E0E1
    • _strcat.LIBCMT ref: 0041E124
      • Part of subcall function 0041DEB1: _strlen.LIBCMT ref: 0041DEB7
      • Part of subcall function 0041DEB1: EnumSystemLocalesA.KERNEL32(0041DAC7,00000001,00000000,0042C860,0041604A,?,0042D670,?,?,00000000,?), ref: 0041DED1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: NameTranslate$EnumLocaleLocalesSystemValid_strcat_strlen
    • String ID: Norwegian-Nynorsk
    • API String ID: 3343657701-461349085
    • Opcode ID: 46ca81f3c00113f2b475bfc71713a8c729927825085ef0e21a4e1548ae9b7a50
    • Instruction ID: cd137ce7416f07200242538995aa878f17d1052f24cc2e7959a146a5af76368f
    • Opcode Fuzzy Hash: 46ca81f3c00113f2b475bfc71713a8c729927825085ef0e21a4e1548ae9b7a50
    • Instruction Fuzzy Hash: 174196B9F40250AAD730BF339C41AEA3BE1AB08740B55447FE95597260D6788CC6CB1E
    APIs
    • GetLastError.KERNEL32 ref: 0041F92D
    • GetLocaleInfoA.KERNEL32(00000001,?,00000000,00000000,00426770,00000018,0041CC85,?,0042D84C,0042D808,00000004,00000000,00000000), ref: 0041F986
    • GetLocaleInfoA.KERNEL32(?,?,?,HXA), ref: 0041F9ED
    • MultiByteToWideChar.KERNEL32(?,00000001,?,000000FF,?,?,?,HXA), ref: 0041FA0D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: InfoLocale$ByteCharErrorLastMultiWide
    • String ID: HXA
    • API String ID: 97497842-4067533616
    • Opcode ID: f299f82d3cb0aee308ed8d7c8e9664a884abb312edf329b530f6124863416277
    • Instruction ID: 2609baf4c6197403248c23d45fb5098ceca742346116a0635a6d4264128fa2d7
    • Opcode Fuzzy Hash: f299f82d3cb0aee308ed8d7c8e9664a884abb312edf329b530f6124863416277
    • Instruction Fuzzy Hash: D53190B1A10205EFCF21AF51DC459EF7BB5FF84360B60413AF525A2260D3388D96DB99
    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0041E641
    • GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 0041E652
    • VirtualQuery.KERNEL32(?,?,0000001C,?,?,0000001C), ref: 0041E698
    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,0000001C), ref: 0041E6D6
    • VirtualProtect.KERNEL32(?,?,00000002,?,?,?,0000001C), ref: 0041E6FC
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Virtual$Query$AllocInfoProtectSystem
    • String ID:
    • API String ID: 4136887677-0
    • Opcode ID: a24f57d7ac257a25a86c5fb8c3e8046e59f1fd459f5daca52648b4e8a305ee4c
    • Instruction ID: ea47f9a0727f87aa8895d56aa1d9a993ecc454d9ff0b40fb471b75b3be788f3e
    • Opcode Fuzzy Hash: a24f57d7ac257a25a86c5fb8c3e8046e59f1fd459f5daca52648b4e8a305ee4c
    • Instruction Fuzzy Hash: 5131E336E00219EBDF20CBA5DD45AEEBBB8EB04710F940166ED01E3290D7349E81CB98
    APIs
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 0041E444
    • GetCurrentProcessId.KERNEL32 ref: 0041E450
    • GetCurrentThreadId.KERNEL32 ref: 0041E458
    • GetTickCount.KERNEL32 ref: 0041E460
    • QueryPerformanceCounter.KERNEL32(?), ref: 0041E46C
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
    • String ID:
    • API String ID: 1445889803-0
    • Opcode ID: 55d847e21f13af51a80f00a8b1b3df130785a90897a5857553846a2978548ae0
    • Instruction ID: 4ec97b83fc5e33799ff628e0ea3e2e39106a2f3e4376b37c9a73efe8360858c0
    • Opcode Fuzzy Hash: 55d847e21f13af51a80f00a8b1b3df130785a90897a5857553846a2978548ae0
    • Instruction Fuzzy Hash: EFF0FF75E011249BCB20DBF4ED8C99EBBF8FF5C341BC20561D841E7110EB3499D18A88
    APIs
      • Part of subcall function 0041E627: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0041E641
      • Part of subcall function 0041E627: GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 0041E652
      • Part of subcall function 0041E627: VirtualQuery.KERNEL32(?,?,0000001C,?,?,0000001C), ref: 0041E698
    • GetLocaleInfoA.KERNEL32(?,?,?,HXA), ref: 0041F9ED
    • MultiByteToWideChar.KERNEL32(?,00000001,?,000000FF,?,?,?,HXA), ref: 0041FA0D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: InfoQueryVirtual$ByteCharLocaleMultiSystemWide
    • String ID: HXA
    • API String ID: 2568233206-4067533616
    • Opcode ID: e8805e89830c256780e75dfd49b6eab8dc292b8e7cf01b704d6499840af37c51
    • Instruction ID: f890c634e2f2b62ddcc6733a3c571df3486c7ddb9e8042bc820a497a2e2ce928
    • Opcode Fuzzy Hash: e8805e89830c256780e75dfd49b6eab8dc292b8e7cf01b704d6499840af37c51
    • Instruction Fuzzy Hash: 73018435D00119AACF21AF65DC058EF7B74EF443A4B20423AF829721A0D6394D92CA98
    APIs
    • GetLastError.KERNEL32 ref: 0041FA5D
    • WideCharToMultiByte.KERNEL32(58301C42,00000000,?,000000FF,0042D84C,00001004,00000000,00000000,?,00000000), ref: 0041FB39
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ByteCharErrorLastMultiWide
    • String ID:
    • API String ID: 203985260-0
    • Opcode ID: ecb690969d840d88b5e21ee8166899d658a695c2cb9d50e7c72d7893cfd9a751
    • Instruction ID: d264ab06b22957c04969c53c92380e3cf6eab7006ad77897310d6261ea8e4fee
    • Opcode Fuzzy Hash: ecb690969d840d88b5e21ee8166899d658a695c2cb9d50e7c72d7893cfd9a751
    • Instruction Fuzzy Hash: E5318B71A01129EBCF228F60DC458DF7F75FF497A0B20412AF81996260C73899D7DBA9
    APIs
    • _strlen.LIBCMT ref: 0041DEEE
    • _strlen.LIBCMT ref: 0041DF06
    • EnumSystemLocalesA.KERNEL32(0041DBCC,00000001,00000000,?), ref: 0041DF4D
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: _strlen$EnumLocalesSystem
    • String ID:
    • API String ID: 2581538701-0
    • Opcode ID: b6852d7dda244e997bbf7e880fc0be9f0975f65cb06160938d9859bebf83c3c3
    • Instruction ID: 0702a00514c3aafb615b34d9b3769d4030597a14b277264647cda93da92d2ab5
    • Opcode Fuzzy Hash: b6852d7dda244e997bbf7e880fc0be9f0975f65cb06160938d9859bebf83c3c3
    • Instruction Fuzzy Hash: C3F03CF0E502059AE720BF3AED097A137E1E750755F9046BAE422832E0D77885C3CA0C
    APIs
    • _strlen.LIBCMT ref: 0041DF74
    • EnumSystemLocalesA.KERNEL32(0041DDE6,00000001,00000000,0042C860,0041604A,?,0042D670,?,?,00000000,?), ref: 0041DFAC
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: EnumLocalesSystem_strlen
    • String ID:
    • API String ID: 216762292-0
    • Opcode ID: 6317b2421eef26f11bd6730e82801faf01399a2e8dab33f1138cea39d251ff1d
    • Instruction ID: 836338381e67184d1acc1d9d344789029c3326f49940fb130e2f5c5fa72e689a
    • Opcode Fuzzy Hash: 6317b2421eef26f11bd6730e82801faf01399a2e8dab33f1138cea39d251ff1d
    • Instruction Fuzzy Hash: A4E0E5F4F642448AF720BF36EC097A13BE1E751B59F90457AE125862A5C6788587CF0C
    APIs
    • _strlen.LIBCMT ref: 0041DEB7
    • EnumSystemLocalesA.KERNEL32(0041DAC7,00000001,00000000,0042C860,0041604A,?,0042D670,?,?,00000000,?), ref: 0041DED1
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: EnumLocalesSystem_strlen
    • String ID:
    • API String ID: 216762292-0
    • Opcode ID: 726c762c6823e505d628f4d448feae2f631e1cc86f870dc2ba129b2068ce0b81
    • Instruction ID: fd240acc032a9ae4fea5ce65b405e498eeb3caa07eb0e858c1abcf3796dfac24
    • Opcode Fuzzy Hash: 726c762c6823e505d628f4d448feae2f631e1cc86f870dc2ba129b2068ce0b81
    • Instruction Fuzzy Hash: B9D017F1F502494AEB20AF32AC097603BA0E710B59F90856ADA20810E0C2684486CE08
    APIs
    • GetLocaleInfoA.KERNEL32(?,00001004,00000100,00000006,00000100,?,00000000), ref: 0041E72A
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: 925e746eabc221decdbc9e9e082074dc6d03278b5161c81548eadf1625223a08
    • Instruction ID: 9cb02bf14380981e35eb23f64719fc579559cb455c1f9affca35b4a72235ef09
    • Opcode Fuzzy Hash: 925e746eabc221decdbc9e9e082074dc6d03278b5161c81548eadf1625223a08
    • Instruction Fuzzy Hash: BBE09234A04248BBDB10EBA9D946ADD77B8AF04318F004166E920D61C0E774DA849759
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_0001C96C), ref: 0041C9BF
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: d5e9ba3343babe47f27c1d571ded0ca08a4559d1853762f43ed62b6e3b856b78
    • Instruction ID: 45a6559ba246d889c86a391612fbc2f0de7a6bcbab8338f82b9c31e7a93365f4
    • Opcode Fuzzy Hash: d5e9ba3343babe47f27c1d571ded0ca08a4559d1853762f43ed62b6e3b856b78
    • Instruction Fuzzy Hash: 7EA011F0FA02008B8320AF30AC0A2003AA0B280B023A08832E020E22A0EB3000828A28
    APIs
    • SetUnhandledExceptionFilter.KERNEL32 ref: 0041C9D3
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: e520a69d72f939327004755c6cdb161dcc9447a40bfe95765f14ce720f44e939
    • Instruction ID: d384b32fab9d0e98b6ba67db07e9e642d87e4e52d418467f06550871bb826b39
    • Opcode Fuzzy Hash: e520a69d72f939327004755c6cdb161dcc9447a40bfe95765f14ce720f44e939
    • Instruction Fuzzy Hash:
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 024c9f906ae4236277169058adc02ea42a03c649ac394ae48955fdc2ddf9ef4e
    • Instruction ID: a5f6a17643e4fa30bc47168d3e8fb17364691485aa0e7ac4bdeeed75f1edabbc
    • Opcode Fuzzy Hash: 024c9f906ae4236277169058adc02ea42a03c649ac394ae48955fdc2ddf9ef4e
    • Instruction Fuzzy Hash: 2B2128769002049FCB10DF69C8C08EBBBA9FF44314B4A85A9EC298B285D734F955CBE0
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
    • Instruction ID: 191ea19e4b8869d48a227b63d809db1a2faabff5766256ba2e53543e8d03c347
    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
    • Instruction Fuzzy Hash: 33115E77A0508187D6048E2DC4B86F7A3B5EBC532772C437BE0454B744C22A9BC7960C
    APIs
    • LoadLibraryA.KERNEL32(00000001,?,00000002), ref: 00411C98
    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00411CB6
    • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000002), ref: 00411CCE
    • GetModuleFileNameA.KERNEL32(?,?,00000104,?,00000002), ref: 00411CEF
    • GetModuleHandleA.KERNEL32(00000000,?,00000104,?,00000002), ref: 00411D04
    • GetModuleFileNameA.KERNEL32(00000000,?,00000002), ref: 00411D0B
    • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000002), ref: 00411DFA
    • LoadLibraryA.KERNEL32(advapi32.dll,?,00000002), ref: 00411E11
    • InterlockedExchange.KERNEL32(0042C084,00000000), ref: 00411E1F
    • FreeLibrary.KERNEL32(00000000,?,00000002), ref: 00411E2A
    • LoadLibraryA.KERNEL32(?,?,00000105,?,00000105,\Microsoft Shared\MSLU\,?,00000002), ref: 00411F02
      • Part of subcall function 00411ADC: CompareStringA.KERNEL32(00000409,00000001,?,000000FF,?,000000FF,00411DAE,?,?,?,?,?,?,?,?), ref: 00411AEF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Library$LoadModule$DirectoryFileFreeName$CompareExchangeHandleInterlockedStringSystemWindows
    • String ID: CommonFilesDir$RegCloseKey$RegOpenKeyExA$RegQueryValueExA$SOFTWARE\Microsoft\Windows\CurrentVersion$\Microsoft Shared\MSLU\$advapi32.dll
    • API String ID: 1518379172-4255789690
    • Opcode ID: 3c0a9924227e0c389fd7c83340b232a980eca20ab4ad9404eefbc85813d9a1e1
    • Instruction ID: bf8dba9fe5d8057f1bd1042d01fa7e3f7f38df035f26281d1a3cce4626a7edfb
    • Opcode Fuzzy Hash: 3c0a9924227e0c389fd7c83340b232a980eca20ab4ad9404eefbc85813d9a1e1
    • Instruction Fuzzy Hash: BE714271A0411DAACF219BA1DC94EDF7BBCEB44344F5400AAE705E3121E7389BC9CB58
    APIs
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,00000000,00000000), ref: 0041C2D2
    • _strcat.LIBCMT ref: 0041C2E5
    • _strlen.LIBCMT ref: 0041C2F2
    • _strlen.LIBCMT ref: 0041C301
    • _strncpy.LIBCMT ref: 0041C318
    • _strlen.LIBCMT ref: 0041C321
    • _strlen.LIBCMT ref: 0041C32E
    • _strcat.LIBCMT ref: 0041C34C
    • _strlen.LIBCMT ref: 0041C394
    • GetStdHandle.KERNEL32(000000F4,004254F8,00000000,?,00000000,00000000,00000000,00000000), ref: 0041C39F
    • WriteFile.KERNEL32(00000000), ref: 0041C3A6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: _strlen$File_strcat$HandleModuleNameWrite_strncpy
    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
    • API String ID: 3601721357-4022980321
    • Opcode ID: a30abcc432c2e45fd032e7e6496d7d7e29cb15107122b72e532235b00301d4ae
    • Instruction ID: 1fddcb1e1ddfe32f19bcc109b3d1b12d8b5b6a08c62580432a5a4107ef04f6c5
    • Opcode Fuzzy Hash: a30abcc432c2e45fd032e7e6496d7d7e29cb15107122b72e532235b00301d4ae
    • Instruction Fuzzy Hash: 5E310772680218AADB30ABB59CC2FEF3769EB44314F50441FF925D7192DA3C99D1872C
    APIs
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,004266C0,00000118,0041681E,00000001,00000000,00424A00,00000008,0041C3BD,00000000,00000000,00000000), ref: 0041E510
    • _strcat.LIBCMT ref: 0041E526
    • _strlen.LIBCMT ref: 0041E536
    • _strlen.LIBCMT ref: 0041E547
    • _strncpy.LIBCMT ref: 0041E561
    • _strlen.LIBCMT ref: 0041E56A
    • _strcat.LIBCMT ref: 0041E586
    Strings
    • ..., xrefs: 0041E55B
    • Unknown security failure detected!, xrefs: 0041E4D6
    • A buffer overrun has been detected which has corrupted the program'sinternal state. The program cannot safely continue execution and mustnow be terminated., xrefs: 0041E4F1
    • <program name unknown>, xrefs: 0041E51A
    • Program: , xrefs: 0041E597
    • Microsoft Visual C++ Runtime Library, xrefs: 0041E5C1
    • Buffer overrun detected!, xrefs: 0041E4EC, 0041E584
    • A security error of unknown cause has been detected which hascorrupted the program's internal state. The program cannot safelycontinue execution and must now be terminated., xrefs: 0041E4DB
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: _strlen$_strcat$FileModuleName_strncpy
    • String ID: ...$<program name unknown>$A buffer overrun has been detected which has corrupted the program'sinternal state. The program cannot safely continue execution and mustnow be terminated.$A security error of unknown cause has been detected which hascorrupted the program's internal state. The program cannot safelycontinue execution and must now be terminated.$Buffer overrun detected!$Microsoft Visual C++ Runtime Library$Program: $Unknown security failure detected!
    • API String ID: 3058806289-1010210193
    • Opcode ID: 60d77464501a9c87ce5a5a4acf8a3e58da9fd716d5b7b33f3a5cf4a03843a69e
    • Instruction ID: b31c63fd2c4f207a6329aac71f92bc0296f23ba8f879f6509e6fdeaeceee581e
    • Opcode Fuzzy Hash: 60d77464501a9c87ce5a5a4acf8a3e58da9fd716d5b7b33f3a5cf4a03843a69e
    • Instruction Fuzzy Hash: C331C771B41214BAC711ABA1AC42EDF37AA9F04314F50449BF510AA282DB3CDFD14BAD
    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,?,004150A4,?,004247B8,00000018), ref: 00418BB0
    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00418BC8
    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00418BD5
    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00418BE2
    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00418BEF
    • FlsAlloc.KERNEL32(00418A22,?,004247B8,00000018), ref: 00418C2C
    • FlsSetValue.KERNEL32(00000000,?,004247B8,00000018), ref: 00418C59
    • GetCurrentThreadId.KERNEL32 ref: 00418C6D
      • Part of subcall function 00418981: FlsFree.KERNEL32(00000005,00418C82,?,004247B8,00000018), ref: 0041898C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: AddressProc$AllocCurrentFreeHandleModuleThreadValue
    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$kernel32.dll
    • API String ID: 2355849793-282957996
    • Opcode ID: 012e15abca368c1597d430bded9e06c638291ed5235fd3e830dfbbb82c6b0752
    • Instruction ID: fd425951a6fb8aa6796692801cc9aa5a16ae922a9cff7db1b0451517fc0b33ae
    • Opcode Fuzzy Hash: 012e15abca368c1597d430bded9e06c638291ed5235fd3e830dfbbb82c6b0752
    • Instruction Fuzzy Hash: C6214FB1B417159BC3309F35BC49A5A7BA1EB85750790013FE519D72A0EB788482CBAC
    APIs
      • Part of subcall function 00410F3B: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,?,?,?,0040DA9B,00000000,?), ref: 00410F4E
      • Part of subcall function 00410F3B: GetProcAddress.KERNEL32(00000000), ref: 00410F55
      • Part of subcall function 00410F3B: GetCurrentProcess.KERNEL32(00000000,?,?,0040DA9B,00000000,?), ref: 00410F65
    • GetModuleHandleW.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,00000000,?,?,?,?,?,0040DAA6,00000000,00000000,?), ref: 00410FA7
    • GetProcAddress.KERNEL32(00000000), ref: 00410FB0
    • GetModuleHandleW.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,?,?,?,?,0040DAA6,00000000,00000000,?), ref: 00410FBB
    • GetProcAddress.KERNEL32(00000000), ref: 00410FBE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: AddressHandleModuleProc$CurrentProcess
    • String ID: Wow64DisableWow64FsRedirection$Wow64EnableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32
    • API String ID: 565683799-3439747844
    • Opcode ID: 453212b64c0269306f04363ff7a9b0ced16dc380a508bbf089e20933f90ddca0
    • Instruction ID: 4b54aee66c67425e005f3fe823602a2303617aec03ea178bea669df92479d699
    • Opcode Fuzzy Hash: 453212b64c0269306f04363ff7a9b0ced16dc380a508bbf089e20933f90ddca0
    • Instruction Fuzzy Hash: 6911A271E10258AECF24AFB5DC05EDB3E6CAB18385B50443BB601D2521DB7C89C18A6D
    APIs
    • LCMapStringW.KERNEL32(00000000,00000100,0042455C,00000001,00000000,00000000,00424F80,00000038,0041ED77,00000100,00000020,00000100,?,00000100,00000000,00000001), ref: 0041744B
    • GetLastError.KERNEL32 ref: 0041745D
    • MultiByteToWideChar.KERNEL32(?,00000000,0041EFB5,?,00000000,00000000,00424F80,00000038,0041ED77,00000100,00000020,00000100,?,00000100,00000000,00000001), ref: 004174E4
    • MultiByteToWideChar.KERNEL32(?,00000001,0041EFB5,?,?,00000000), ref: 00417565
    • LCMapStringW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 0041757F
    • LCMapStringW.KERNEL32(00000000,00000000,?,00000000,?,?), ref: 004175BA
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: String$ByteCharMultiWide$ErrorLast
    • String ID:
    • API String ID: 1775797328-0
    • Opcode ID: 3b2a213123ae2c72155ee2867309493a15f808347b693407346f854b2ee5c5c3
    • Instruction ID: 57e40128206f457cd21b3890a3f4c7c5a88f3d25b42aacd8fa13885fe63da5cc
    • Opcode Fuzzy Hash: 3b2a213123ae2c72155ee2867309493a15f808347b693407346f854b2ee5c5c3
    • Instruction Fuzzy Hash: E6B17E72904219EFCF219FA4DC849EE7FB5FF08364F10412AF925A22A0D7398991DF59
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: _strcat$___shr_12
    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$:B$?
    • API String ID: 1152255961-957608793
    • Opcode ID: 72f06b4f41fb07571f016515339e1c09eae94e6414b7684314048004edc806c3
    • Instruction ID: e57a2a0d5ef0140218a4c38f3a01904742a9b044f9002a104d13cb6f609df91a
    • Opcode Fuzzy Hash: 72f06b4f41fb07571f016515339e1c09eae94e6414b7684314048004edc806c3
    • Instruction Fuzzy Hash: 04813831A042AADECF11CF68E8447EFBBB4AF71314F88459BD841DB292D3788645C769
    APIs
    • __EH_prolog.LIBCMT ref: 0040AB6C
      • Part of subcall function 0040AD5D: __EH_prolog.LIBCMT ref: 0040AD62
      • Part of subcall function 0040AD5D: GetExitCodeProcess.KERNEL32(00000000,?), ref: 0040AE8A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$CodeExitProcess
    • String ID: ALL$JDK$JDK_J1$JDK_J2$JRE$JRE_J1$JRE_J2$MSJ
    • API String ID: 1786189289-467862012
    • Opcode ID: 37591d3fdf0b68c1b27b7d1802640a96b09f2620d9928fc2860fe2f848af0ee2
    • Instruction ID: d3543fd851d75a31ef1ecc64cc05e55038d5c9ea7c63f4a89326500076d3f62c
    • Opcode Fuzzy Hash: 37591d3fdf0b68c1b27b7d1802640a96b09f2620d9928fc2860fe2f848af0ee2
    • Instruction Fuzzy Hash: 0F510531604356ABDF20AB21C8026FA7765BF00346F40847BED11775C1E77CAA67A69F
    APIs
    • LCMapStringW.KERNEL32(00000000,00000100,0042455C,00000001,00000000,00000000,00424A60,00000024,00412CB7,?,00000100,?,00000001,?,00000001,?), ref: 004171EC
    • GetLastError.KERNEL32(?,00000100,?,00000001,?,00000001,?), ref: 004171FE
    • LCMapStringW.KERNEL32(?,?,?,?,?,?,00424A60,00000024,00412CB7,?,00000100,?,00000001,?,00000001,?), ref: 00417250
    • WideCharToMultiByte.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000,00424A60,00000024,00412CB7,?,00000100,?,00000001,?), ref: 004172AB
    • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000,?,00000100,?,00000001,?,00000001,?), ref: 0041731D
    • LCMapStringA.KERNEL32(?,?,?,?,00000000,00000000,?,00000100,?,00000001,?,00000001,?), ref: 00417339
    • LCMapStringA.KERNEL32(?,?,?,?,?,00000000,?,00000100,?,00000001,?,00000001,?), ref: 004173A5
    • _strncpy.LIBCMT ref: 004173CA
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: String$ByteCharMultiWide$ErrorLast_strncpy
    • String ID:
    • API String ID: 4089183155-0
    • Opcode ID: 0ae8a41c2e875b2265bdf39c30bd47532b52cfd6f6564c383f3ddd6d48d24726
    • Instruction ID: c8cb82fdfd3ab626dcbff0e6e6de350fda4e6dd80e5bd6da5c23149d1d09ffc6
    • Opcode Fuzzy Hash: 0ae8a41c2e875b2265bdf39c30bd47532b52cfd6f6564c383f3ddd6d48d24726
    • Instruction Fuzzy Hash: 93717C71D04219EFCF219FA4DC849EE7B75FB08354B24412AF924A22A0C7388DD2DF69
    APIs
    • __EH_prolog.LIBCMT ref: 0040FE57
      • Part of subcall function 00410134: __EH_prolog.LIBCMT ref: 00410139
      • Part of subcall function 00410F3B: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,?,?,?,0040DA9B,00000000,?), ref: 00410F4E
      • Part of subcall function 00410F3B: GetProcAddress.KERNEL32(00000000), ref: 00410F55
      • Part of subcall function 00410F3B: GetCurrentProcess.KERNEL32(00000000,?,?,0040DA9B,00000000,?), ref: 00410F65
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$AddressCurrentHandleModuleProcProcess
    • String ID: IBM$SOFTWARE\IBM\Java Development Kit$SOFTWARE\IBM\Java2 Runtime Environment$SOFTWARE\JavaSoft\Java Development Kit$SOFTWARE\JavaSoft\Java Runtime Environment$Sun
    • API String ID: 3857991278-1712796389
    • Opcode ID: 69ed3b92afadb8c486c4fa00c652dc4ea43ba203ec142067dd0ca5fafa1e17a8
    • Instruction ID: 390819e383806bfdc160e7e27f90a1ba953106ba19ca569711288e823cbfc12b
    • Opcode Fuzzy Hash: 69ed3b92afadb8c486c4fa00c652dc4ea43ba203ec142067dd0ca5fafa1e17a8
    • Instruction Fuzzy Hash: 60813B71E41208AEDB01EB91CD42FDDBB78AF15724F60012AF910B71D1C7B96B86CAA5
    APIs
    • __EH_prolog.LIBCMT ref: 00408B47
      • Part of subcall function 004068D8: __EH_prolog.LIBCMT ref: 004068DD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: IBM$Microsoft$Sun$ibm$jview.exe$wjview.exe
    • API String ID: 3519838083-281468356
    • Opcode ID: b31fca37f8fbe786fa17041fede0c0ee5eb69153a945814365de0ceb7280c30f
    • Instruction ID: 1d8badddfce9dad5c27da3f7b9227ccf84e2a1d3bdf78bb79557815c6f3e8de2
    • Opcode Fuzzy Hash: b31fca37f8fbe786fa17041fede0c0ee5eb69153a945814365de0ceb7280c30f
    • Instruction Fuzzy Hash: 8E41C272D01218AADB11EFA5C981AEFBB78AF45314F11813FF811732C1CB385E4587A8
    APIs
    • GetCPInfo.KERNEL32(00000000,?,004266D0,00000038,0041CB5D,?,00000000,00000000,0041EFB5,00000000,00000000,004255C8,0000001C,0041ED53,00000001,00000020), ref: 0041E78B
    • GetCPInfo.KERNEL32(00000000,00000001), ref: 0041E79E
    • _strlen.LIBCMT ref: 0041E7C2
    • MultiByteToWideChar.KERNEL32(00000000,00000001,0041EFB5,?,00000000,00000000), ref: 0041E7E3
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Info$ByteCharMultiWide_strlen
    • String ID:
    • API String ID: 1335377746-0
    • Opcode ID: 10cdb8a2ea9fd56441e4dd29bf3eb9c3c325b39430119f7847da183ff7e60023
    • Instruction ID: 7b18433cd00697b95d60660cb3c1ef6eb2ba60750e87ce0785c6354079567575
    • Opcode Fuzzy Hash: 10cdb8a2ea9fd56441e4dd29bf3eb9c3c325b39430119f7847da183ff7e60023
    • Instruction Fuzzy Hash: C4516D74D00218ABDB31EF66DC849DFBBB9EF44754F20412BF814A2290D7348D81DBA8
    APIs
    • GetEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,?,004150D9,?,004247B8,00000018), ref: 0041C6F2
    • GetLastError.KERNEL32(?,?,?,?,004150D9,?,004247B8,00000018), ref: 0041C706
    • GetEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,?,004150D9,?,004247B8,00000018), ref: 0041C728
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,004150D9), ref: 0041C75C
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,004150D9,?,004247B8,00000018), ref: 0041C77E
    • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,004150D9,?,004247B8,00000018), ref: 0041C797
    • GetEnvironmentStrings.KERNEL32(00000000,?,?,?,?,?,004150D9,?,004247B8,00000018), ref: 0041C7AD
    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0041C7E9
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: EnvironmentStrings$ByteCharFreeMultiWide$ErrorLast
    • String ID:
    • API String ID: 883850110-0
    • Opcode ID: f96978fe3591f21a212c14262195282294bcff93be8e80ca309d6cdf5a39b109
    • Instruction ID: 1c3f31bc1f99735f52c54a932543e9646fded3079ccb2e5aad69eb681a83eb3c
    • Opcode Fuzzy Hash: f96978fe3591f21a212c14262195282294bcff93be8e80ca309d6cdf5a39b109
    • Instruction Fuzzy Hash: 0F310AB2A442176FD7302F645CC48BBB6DCDB55354725053BF575C3280D7988CC18AAD
    APIs
    • __EH_prolog.LIBCMT ref: 0041038C
      • Part of subcall function 00406832: __EH_prolog.LIBCMT ref: 00406837
      • Part of subcall function 004089FD: __EH_prolog.LIBCMT ref: 00408A02
      • Part of subcall function 00408CB0: __EH_prolog.LIBCMT ref: 00408CB5
      • Part of subcall function 0040DC25: __EH_prolog.LIBCMT ref: 0040DC2A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: \java.exe$\javaw.exe$\jre.exe$\jrew.exe$\jview.exe
    • API String ID: 3519838083-3605272454
    • Opcode ID: 9a53a33964cc93550af6a5139dc514ed3c71b01655136d8ce9b5c561796b59ca
    • Instruction ID: 6c66026935f0216831b300f47a2ebe9d38291b9b982261de727d5c941923867f
    • Opcode Fuzzy Hash: 9a53a33964cc93550af6a5139dc514ed3c71b01655136d8ce9b5c561796b59ca
    • Instruction Fuzzy Hash: 22D19D71D10258EEDB11EBA4CD45BDEBBB4AF04304F10416EE510B31D2DBB8AA89CB69
    APIs
    • __EH_prolog.LIBCMT ref: 00408CB5
      • Part of subcall function 004068D8: __EH_prolog.LIBCMT ref: 004068DD
      • Part of subcall function 00406B1E: __EH_prolog.LIBCMT ref: 00406B23
      • Part of subcall function 0040265A: __EH_prolog.LIBCMT ref: 0040265F
      • Part of subcall function 004067E9: __EH_prolog.LIBCMT ref: 004067EE
      • Part of subcall function 00406AB8: GetFileAttributesW.KERNELBASE(-00000004,0040133F,?,?), ref: 00406AC7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$AttributesFile
    • String ID: \javac.exe$jre.exe$jrew.exe$jview.exe$wjview.exe
    • API String ID: 719147301-3427944829
    • Opcode ID: 519111e812d7d6288636cf1a1199f7feff8226266ef2d4c97323832c27646055
    • Instruction ID: a13502d764f6f15d69cc7483811924dc863150da3799e05c9a68c5db5f7f33a6
    • Opcode Fuzzy Hash: 519111e812d7d6288636cf1a1199f7feff8226266ef2d4c97323832c27646055
    • Instruction Fuzzy Hash: 0251E872D01219AACB11EBE8CE45BEFBB78AF11318F25827EA855B31D1D7780F058794
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prologState
    • String ID: console$lax.control-key=true$lax.stderr.redirect=console$lax.stdout.redirect=console
    • API String ID: 1651127522-1142411866
    • Opcode ID: 62a8e78fc42b8464aa554db53450769e4e57d1c39ce0708f54a7b270eea09cee
    • Instruction ID: dfaf8729562b2c1db49b24075371f92db3692f14c96d7e5afa284af00a607155
    • Opcode Fuzzy Hash: 62a8e78fc42b8464aa554db53450769e4e57d1c39ce0708f54a7b270eea09cee
    • Instruction Fuzzy Hash: 1E213671B44350AAD710FBBA9947BEE7AA49F01728F10026FF451731C2CBBD4644C22E
    APIs
    • __EH_prolog.LIBCMT ref: 0040F0FA
    • SetConsoleCtrlHandler.KERNEL32(0040F319,00000001), ref: 0040F10B
    • SetLastError.KERNEL32 ref: 0040F13A
    • WaitForSingleObject.KERNEL32(00000008,000000FF,?,00000000,00000001), ref: 0040F1B0
    • GetExitCodeProcess.KERNEL32(?,?), ref: 0040F1C5
    • ExitProcess.KERNEL32 ref: 0040F1DA
    • RtlExitUserThread.NTDLL(00000000), ref: 0040F1E1
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Exit$Process$CodeConsoleCtrlErrorH_prologHandlerLastObjectSingleThreadUserWait
    • String ID:
    • API String ID: 2193816540-0
    • Opcode ID: 8bc3b7668e7e5e5bfe45a262aeaced267f5363cd48c553a86aeb936f0713b879
    • Instruction ID: e9f3812800fb9ede828922c1798270eb805b758c1898e4910a66a8b7bf791762
    • Opcode Fuzzy Hash: 8bc3b7668e7e5e5bfe45a262aeaced267f5363cd48c553a86aeb936f0713b879
    • Instruction Fuzzy Hash: 20219271A00216EBCB14AFB5DC49A8ABAB4FF04314F00463AF115B66E1CB786945CB94
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$EB$EB
    • API String ID: 3519838083-158159671
    • Opcode ID: 0d68909b8b0f45778731f91c23b1d7a89d321a40ad3af7e1aa18915f099e1868
    • Instruction ID: 0a8a1b285ff889e7284506f7560a6ae0b8720b7af07a2115fa34f1a167cf86ab
    • Opcode Fuzzy Hash: 0d68909b8b0f45778731f91c23b1d7a89d321a40ad3af7e1aa18915f099e1868
    • Instruction Fuzzy Hash: B9116371A41218EBD711DFA0EA92BDDB774AB50308F64802FA645A71C1DBFD4A99CB0C
    APIs
    • GetStringTypeW.KERNEL32(00000001,0042455C,00000001,?,00424FA8,00000024,0041BCDD,00000001,00000100,00000001,00000000,00000001,00000000,?,?,00414AF3), ref: 00417804
    • GetLastError.KERNEL32(?,?,00414AF3,?,00000000,00000008,00000000,?,00000016,?,?,?,00414CA5,000000FF,000000FF,000000FF), ref: 00417816
    • GetStringTypeW.KERNEL32(?,00000100,000000FF,00000010,00424FA8,00000024,0041BCDD,00000001,00000100,00000001,00000000,00000001,00000000,?,?,00414AF3), ref: 00417840
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000100,000000FF,00000000,00000000,00000000,00000000,00424FA8,00000024,0041BCDD,00000001,00000100,00000001,00000000,00000001), ref: 00417898
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000100,00000000,?,00000000,00000000,00000000), ref: 0041791B
    • GetStringTypeA.KERNEL32(?,?,?,00000000,?), ref: 004179AD
      • Part of subcall function 0041B9D3: __lock.LIBCMT ref: 0041BA17
      • Part of subcall function 0041B9D3: RtlAllocateHeap.NTDLL(00000008,?,00425150), ref: 0041BA55
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: StringType$ByteCharMultiWide$AllocateErrorHeapLast__lock
    • String ID:
    • API String ID: 2327821635-0
    • Opcode ID: ebb9bac48a59801e7f319beffa0ae9fadc1de3cb2536a83aa5716d0902727cbc
    • Instruction ID: 451cc849405bcc63292fddc5cb94a3fd624bfef80be1c7b51f1ceedc86d623a2
    • Opcode Fuzzy Hash: ebb9bac48a59801e7f319beffa0ae9fadc1de3cb2536a83aa5716d0902727cbc
    • Instruction Fuzzy Hash: C6518071D04219EFCF21AFA5DC458EFBBB5FF04754B20412BF814A2260D3388A92DB99
    APIs
    • GetStringTypeW.KERNEL32(00000001,0042455C,00000001,?,004255C8,0000001C,0041ED53,00000001,00000020,00000100,?,00000000), ref: 0041C9FE
    • GetLastError.KERNEL32 ref: 0041CA10
    • MultiByteToWideChar.KERNEL32(?,00000000,00000000,0041EFB5,00000000,00000000,004255C8,0000001C,0041ED53,00000001,00000020,00000100,?,00000000), ref: 0041CA72
    • MultiByteToWideChar.KERNEL32(?,00000001,00000000,0041EFB5,?,00000000), ref: 0041CAF0
    • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,00000000), ref: 0041CB02
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ByteCharMultiStringTypeWide$ErrorLast
    • String ID:
    • API String ID: 3581945363-0
    • Opcode ID: fd3f87f64c5906040ffa863b06620bd87c600cea3b65315dd6e5582fac6fd858
    • Instruction ID: 9d6d0c741cd0c282e0ceaf928d1f80541d877b65ba82282077fb73e085f8ec83
    • Opcode Fuzzy Hash: fd3f87f64c5906040ffa863b06620bd87c600cea3b65315dd6e5582fac6fd858
    • Instruction Fuzzy Hash: 3541C531A84218ABCB22DF64EC86BDF7B75FF44760F14411AF911E6250C7389991CBE9
    APIs
    • __EH_prolog.LIBCMT ref: 0040A9C9
    • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,00000000), ref: 0040AA0E
    • GetStdHandle.KERNEL32(000000F5,?,?,?,?,?,00000000), ref: 0040AA1A
    • GetStdHandle.KERNEL32(000000F4,?,?,?,?,?,00000000), ref: 0040AA26
      • Part of subcall function 004066D8: __EH_prolog.LIBCMT ref: 004066DD
    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040AABD
    • GetLastError.KERNEL32(?,?,?), ref: 0040AACB
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Handle$H_prolog$ErrorLastObjectSingleWait
    • String ID:
    • API String ID: 2978390528-0
    • Opcode ID: 31db356805a268d5a3eb076ddfd6b5e9e19aa08b61795defdaff2ddced85ef54
    • Instruction ID: 5b66e927b6fd5f0c2caf3e061a290b367a18b3da78dd637c7ad4f65eb92948ab
    • Opcode Fuzzy Hash: 31db356805a268d5a3eb076ddfd6b5e9e19aa08b61795defdaff2ddced85ef54
    • Instruction Fuzzy Hash: 11416FB2E00218AFDB10EBA4CC8AFDE777CAB04314F50457BF514B71D1DA78AA54CA69
    APIs
    • ReadFile.KERNEL32(?,?,00000000,?,00000000,00000000,?,?), ref: 0041F5F9
    • GetLastError.KERNEL32 ref: 0041F603
    • ReadFile.KERNEL32(?,?,00000001,?,00000000), ref: 0041F6CC
    • GetLastError.KERNEL32 ref: 0041F6D6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ErrorFileLastRead
    • String ID: 1@
    • API String ID: 1948546556-1036656397
    • Opcode ID: e4e81b70e60a0f5aa089f855bbb94a3dd120b78998247ee932263cb4ba1e8f15
    • Instruction ID: 3e61911184b30c1e44a4e34ea084b11da34abeca48171019db01ce6fb36304e2
    • Opcode Fuzzy Hash: e4e81b70e60a0f5aa089f855bbb94a3dd120b78998247ee932263cb4ba1e8f15
    • Instruction Fuzzy Hash: DF61A6356043459FDB21CF58C884BDA7BF0AF01314F5441ABE8658B2A2D778D9CBCB59
    APIs
    • __EH_prolog.LIBCMT ref: 0040AD62
      • Part of subcall function 0040AF87: __EH_prolog.LIBCMT ref: 0040AF8C
      • Part of subcall function 0040EAAA: __EH_prolog.LIBCMT ref: 0040EAAF
      • Part of subcall function 0040EB7E: __EH_prolog.LIBCMT ref: 0040EB83
    • GetExitCodeProcess.KERNEL32(00000000,?), ref: 0040AE8A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$CodeExitProcess
    • String ID: JDK$JRE$com.zerog.util.jvm.Validator
    • API String ID: 1786189289-2755780433
    • Opcode ID: 0d37ebf1faab10e4f67a1b7d81f47353ef961a61cc499ae3b538402bcd41f4ff
    • Instruction ID: 9b459d25dd5898f9467672e8a4b145c6047de2a19797779f0c15c97fba251a6e
    • Opcode Fuzzy Hash: 0d37ebf1faab10e4f67a1b7d81f47353ef961a61cc499ae3b538402bcd41f4ff
    • Instruction Fuzzy Hash: C9517271D002599ADF10EBA5D946BDEB7B8AF44304F10407FB904B72C1D7785B49CBAA
    APIs
    • __EH_prolog.LIBCMT ref: 0040A2F9
      • Part of subcall function 004067E9: __EH_prolog.LIBCMT ref: 004067EE
      • Part of subcall function 004068D8: __EH_prolog.LIBCMT ref: 004068DD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: \bin\java.exe$\java.exe$system32$syswow64
    • API String ID: 3519838083-3234651240
    • Opcode ID: 2eaddf649ee53056219a8dd7312372a14b0e4dd8df65d5fcc7af9c34b2b21416
    • Instruction ID: 85fc40fa7b090057b4cff9c066aa9f173c0fe48305fdfe98ca5b839902fdd7fe
    • Opcode Fuzzy Hash: 2eaddf649ee53056219a8dd7312372a14b0e4dd8df65d5fcc7af9c34b2b21416
    • Instruction Fuzzy Hash: 6A518071D003289ADB10EBE5CC46BEEBBB4AF05318F00456EE915B71C1CBB85B48CB95
    APIs
    • __EH_prolog.LIBCMT ref: 0041226A
      • Part of subcall function 00401163: __EH_prolog.LIBCMT ref: 00401168
      • Part of subcall function 00415747: KiUserExceptionDispatcher.NTDLL(?,?,00401278,004281F4,?,/A,?,?,?,00413083,00401278,004281F4,0042D4A8,00401278,00401278,?), ref: 00415775
    • __EH_prolog.LIBCMT ref: 004122AA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$DispatcherExceptionUser
    • String ID: invalid string position$pEB$string too long
    • API String ID: 1370957130-461005008
    • Opcode ID: c60fa510a448b80caa1b6ca82e1d85ae9a1dc6db5cdadc9afb175ee8d4ee3911
    • Instruction ID: b75ce0494f71dd9d00632fa370008925e2026a752dc76bd960ee112793c15cb0
    • Opcode Fuzzy Hash: c60fa510a448b80caa1b6ca82e1d85ae9a1dc6db5cdadc9afb175ee8d4ee3911
    • Instruction Fuzzy Hash: 54F086B1D10118D7C700F7D1EC46BDD73B8BF54348F90402BE111B2094DBB84688CB68
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: _strcat_strlen
    • String ID: :A$T0A$/A
    • API String ID: 432593777-2141440836
    • Opcode ID: beb809f2225996f5001b95c28b9166104063e1fe50b60b62d878ec6e48c04983
    • Instruction ID: ac57415e97cf9eeaad8e4688a12e4ed066bf00738ff260a4d174c8562099a7f3
    • Opcode Fuzzy Hash: beb809f2225996f5001b95c28b9166104063e1fe50b60b62d878ec6e48c04983
    • Instruction Fuzzy Hash: 5BE04FF210C3115EE7145F56F801587FBE8DF54324B20881FF855C3250EBBAA8A18A5C
    APIs
    • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,?,?,?,0040DA9B,00000000,?), ref: 00410F4E
    • GetProcAddress.KERNEL32(00000000), ref: 00410F55
    • GetCurrentProcess.KERNEL32(00000000,?,?,0040DA9B,00000000,?), ref: 00410F65
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: AddressCurrentHandleModuleProcProcess
    • String ID: IsWow64Process$kernel32
    • API String ID: 4190356694-3789238822
    • Opcode ID: c1fc144c41faf2fe3b0b359dd55a644a18a0a4adf561c217383946529fc19021
    • Instruction ID: e57bb35ef3286bca47b963b0edd766ef26bf39249091e8193094d6132a14fc57
    • Opcode Fuzzy Hash: c1fc144c41faf2fe3b0b359dd55a644a18a0a4adf561c217383946529fc19021
    • Instruction Fuzzy Hash: 80E04F72E01628EBDB20DBF09C0EBCE7AAC9B04755B5149A6A901E3140D678DA8196A8
    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C,?,?,?,?,?,0041673D,?), ref: 0041E2B3
    • InterlockedExchange.KERNEL32(0042D8C8,00000001), ref: 0041E331
    • InterlockedExchange.KERNEL32(0042D8C8,00000000), ref: 0041E396
    • InterlockedExchange.KERNEL32(0042D8C8,00000001), ref: 0041E3BA
    • InterlockedExchange.KERNEL32(0042D8C8,00000000), ref: 0041E41A
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ExchangeInterlocked$QueryVirtual
    • String ID:
    • API String ID: 2947987494-0
    • Opcode ID: d0edcf8a1eb989224e18c8dfbcc835544c58e5e1e4f6457a3b918bfe4dc5c08e
    • Instruction ID: 5dca98a0126f508db255f135a1c328e9de624c188cec58f252d852239ec38bf8
    • Opcode Fuzzy Hash: d0edcf8a1eb989224e18c8dfbcc835544c58e5e1e4f6457a3b918bfe4dc5c08e
    • Instruction Fuzzy Hash: BD51F638B006198BCB289F1AD9907EA73E5EB85354F64817BDC61C7391D338DCC2864D
    APIs
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000001,?,00000000,?,?,?,?,?,?,?,(qB,?), ref: 0041F453
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,?,00000000,?,00000000), ref: 0041F4B4
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ByteCharMultiWide
    • String ID:
    • API String ID: 626452242-0
    • Opcode ID: 332e4c4af94b29404426b3aadfa8b8ad9d26cbed4feaf7e48a1229e1cf646118
    • Instruction ID: 7b05b72e52233bbebd4b67132d4f95332c1fc47ff47bef68287f2796feaf267f
    • Opcode Fuzzy Hash: 332e4c4af94b29404426b3aadfa8b8ad9d26cbed4feaf7e48a1229e1cf646118
    • Instruction Fuzzy Hash: 03518A7190015AAF8F20EF94EC908FFB7B9FB64304764453BE96192250D7349D8BCBA9
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ff3d403cf58bf7fca9261007d4a1504cf370e3ce3ada691057eba8d921932462
    • Instruction ID: 62fdcf725419c5d8c62da50c65500de067d8c696b9e3f92b15cfd751f9443ab3
    • Opcode Fuzzy Hash: ff3d403cf58bf7fca9261007d4a1504cf370e3ce3ada691057eba8d921932462
    • Instruction Fuzzy Hash: 4841C5B1E092259ACF30AF669C848EF7A74EE41768710413FF925A6290D73C5EC1CA9D
    APIs
    • GetLastError.KERNEL32(?,00000000,00415786,00415B3D,00000000,004247F8,00000008,00415B94,?,?,?,0041BA1C,00000004,00425150,00000010,00418C4A), ref: 004189B3
    • FlsGetValue.KERNEL32(?,0041BA1C,00000004,00425150,00000010,00418C4A,00000001,0000008C,?,004247B8,00000018), ref: 004189C1
    • SetLastError.KERNEL32(00000000,?,0041BA1C,00000004,00425150,00000010,00418C4A,00000001,0000008C,?,004247B8,00000018), ref: 00418A17
      • Part of subcall function 0041B9D3: __lock.LIBCMT ref: 0041BA17
      • Part of subcall function 0041B9D3: RtlAllocateHeap.NTDLL(00000008,?,00425150), ref: 0041BA55
    • FlsSetValue.KERNEL32(00000000,?,0041BA1C,00000004,00425150,00000010,00418C4A,00000001,0000008C,?,004247B8,00000018), ref: 004189E8
    • GetCurrentThreadId.KERNEL32 ref: 00418A00
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ErrorLastValue$AllocateCurrentHeapThread__lock
    • String ID:
    • API String ID: 1487844433-0
    • Opcode ID: e35d7d98850c37a71daedd9db5e6d2c65030dcfcf4092baa3f126770099fb887
    • Instruction ID: e0051e90053ba0a0896f8ad08b21ccf25472bbdbcd72e27b3f1dded6fefc1270
    • Opcode Fuzzy Hash: e35d7d98850c37a71daedd9db5e6d2c65030dcfcf4092baa3f126770099fb887
    • Instruction Fuzzy Hash: C2F068717057119BD7302F60BC4968A7A60EF007E1B50452BE656E72A1DF74888297D8
    APIs
    • __EH_prolog.LIBCMT ref: 0040AF8C
      • Part of subcall function 0040FAB8: __EH_prolog.LIBCMT ref: 0040FABD
      • Part of subcall function 0040265A: __EH_prolog.LIBCMT ref: 0040265F
      • Part of subcall function 0040B169: __EH_prolog.LIBCMT ref: 0040B16E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: ALL$JDK$JRE
    • API String ID: 3519838083-984268273
    • Opcode ID: 2d1b81d488eb6cc8968c902b9ed5649961cbaf910296a4dad82767a5bf12481c
    • Instruction ID: 2d035cca3fdabbe73337ee44b92911d75c1327593dfba8332d6857eb3b0ee127
    • Opcode Fuzzy Hash: 2d1b81d488eb6cc8968c902b9ed5649961cbaf910296a4dad82767a5bf12481c
    • Instruction Fuzzy Hash: 07514371E042199BCF00EFA9CD86AEE77B4AF45358F10417EF814772C2C7789E0596A9
    APIs
    • __EH_prolog.LIBCMT ref: 0040B8BD
      • Part of subcall function 0040B640: __EH_prolog.LIBCMT ref: 0040B645
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: key not open$key query failed$value not a string
    • API String ID: 3519838083-2296213663
    • Opcode ID: a4446861470b3b3de7c42047db3cd0402bbc8d86c8ecffb8c5d6b915a8ae7708
    • Instruction ID: 659e995e1fe2cc780d9e0de5cffdace463a45d16bf95da7fbcdea78ed852c959
    • Opcode Fuzzy Hash: a4446861470b3b3de7c42047db3cd0402bbc8d86c8ecffb8c5d6b915a8ae7708
    • Instruction Fuzzy Hash: A8416F71A05259EADB01EFA9C946BDEBBB4EF05308F50406FE50473281C7785B48CBEA
    APIs
    • __EH_prolog.LIBCMT ref: 0040122E
    • GetCommandLineW.KERNEL32(00426938), ref: 0040127C
      • Part of subcall function 0040FAB8: __EH_prolog.LIBCMT ref: 0040FABD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$CommandLine
    • String ID: -zglaxservice$console
    • API String ID: 1798744181-3138557499
    • Opcode ID: 24580e4d9ad6aa7df8f6f98be371624c37bfc7a5a743d969bbd0b31491f2cd70
    • Instruction ID: 2d0f8ca2bc7ece575ee91f839a6662ab3562104b913b37ba1e3b0240e0d4591d
    • Opcode Fuzzy Hash: 24580e4d9ad6aa7df8f6f98be371624c37bfc7a5a743d969bbd0b31491f2cd70
    • Instruction Fuzzy Hash: 3241C571A002409BCB10EFBDC94569EBBB4AF05304F15407FE804B7293D778AA448BAA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: $ENV_CLASSPATH$$CLASSPATH$lax.class.path
    • API String ID: 3519838083-1265333889
    • Opcode ID: 356435373a27bc92b8d4302289f4789fb672281795e08309da378e8d883a3d76
    • Instruction ID: 438a19e0c2c2be008b1a78d63cdaee5cc72b1d2057612e01336f6100667950cd
    • Opcode Fuzzy Hash: 356435373a27bc92b8d4302289f4789fb672281795e08309da378e8d883a3d76
    • Instruction Fuzzy Hash: 9D318471F05258AACB01FFB9A986ACD7BB4AB45318F50807FF410B72D2CA785A05C769
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: _strncpy$_strcspn
    • String ID: _.,
    • API String ID: 209312476-2709443920
    • Opcode ID: 116809ee5454bfbdae0519bdce487f5e25208b0145a3a00956a0f50813735077
    • Instruction ID: 86d299f6d05f734361a3f7f88e7b2b62fad447f8af077a0a4d7325cfee592dab
    • Opcode Fuzzy Hash: 116809ee5454bfbdae0519bdce487f5e25208b0145a3a00956a0f50813735077
    • Instruction Fuzzy Hash: 33213871D00B05EEEF708B24DA05BE73759AF92364F188417F849C6282E33D9AC58B5D
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: lax.win32.console.pause$true$yes
    • API String ID: 3519838083-3116419153
    • Opcode ID: d1d11c78fc9ec949d47cb1ab21dd759812af2dbe03280dac6bf4e020f856500a
    • Instruction ID: 91f3178f658fc5cd48efafd4fae658082265de401fa5b91777ef16e5936a5417
    • Opcode Fuzzy Hash: d1d11c78fc9ec949d47cb1ab21dd759812af2dbe03280dac6bf4e020f856500a
    • Instruction Fuzzy Hash: BB21E171F002589ACB00EFE49942AED7B74AB04319F50807FE811B31C1C7B89A48D769
    APIs
    • __EH_prolog.LIBCMT ref: 0040F441
    • GetModuleHandleW.KERNEL32(00000000,00000000,?,00000100,00426B8C,?,00000000), ref: 0040F47F
    • LoadStringW.USER32(00000000), ref: 0040F486
      • Part of subcall function 0040F512: __EH_prolog.LIBCMT ref: 0040F517
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$HandleLoadModuleString
    • String ID: invalid key
    • API String ID: 3611912700-3396617187
    • Opcode ID: cf3fdaedf8913e038841e25f7ce94de1f0565a564edfc68ef1eedc8918a1c039
    • Instruction ID: 43ad41bb033fb070c85a2acb04b305af505258056d4cb5b3d47a690f92adf5ba
    • Opcode Fuzzy Hash: cf3fdaedf8913e038841e25f7ce94de1f0565a564edfc68ef1eedc8918a1c039
    • Instruction Fuzzy Hash: 81216272A00709ABCB10FFA5DC46ADE73B8BF44304F10447BF811A7591DB78AA08CB68
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: _strcat_strlen
    • String ID: :A$/A
    • API String ID: 432593777-683655810
    • Opcode ID: 93b7d34b3b1065db4a154b335216cfcb0a26a1b247f0ae12ebbdc72d4e99cb98
    • Instruction ID: bf14f8818ef4f951228246e200014fd2555498ffe66e92abba0ea0fdd039433a
    • Opcode Fuzzy Hash: 93b7d34b3b1065db4a154b335216cfcb0a26a1b247f0ae12ebbdc72d4e99cb98
    • Instruction Fuzzy Hash: B2F037F2618701AE97109F55E501456F7E8EF44715310C91FE459D3750E774E891C758
    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,00425130,00000010,00415A53,00000000,00000FA0,00000000,?,00418B9D,004150A4,?,004247B8,00000018), ref: 0041B822
    • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionAndSpinCount), ref: 0041B832
    Strings
    • InitializeCriticalSectionAndSpinCount, xrefs: 0041B82C
    • kernel32.dll, xrefs: 0041B81D
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
    • API String ID: 1646373207-3733552308
    • Opcode ID: f8cfd781a73d808e84495d3e6ee5f162c75a73c7967d9de1169927b8a8d50b12
    • Instruction ID: 4c4c5c5884bfcaa54bb82efc316efe8da5e8e82151b8f211b2cef5fa199cfb0b
    • Opcode Fuzzy Hash: f8cfd781a73d808e84495d3e6ee5f162c75a73c7967d9de1169927b8a8d50b12
    • Instruction Fuzzy Hash: FBF03A70B40215EADB20AF61DC45B9E3BA8EB44B54BA04136E815E62A0D778C5D2DA5C
    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,MultiByteToWideChar), ref: 004121C0
    • SetLastError.KERNEL32(0000007F,00000000), ref: 004121D5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ErrorHandleLastModule
    • String ID: MultiByteToWideChar$kernel32.dll
    • API String ID: 4242514867-2998143648
    • Opcode ID: d35230aa7cde00b763fc49652336ba04ebad3697f02eaf1917839ca8b13ab95e
    • Instruction ID: aca718fd7e1e53d2cc8da59600c93c6d85baeaa1e9f1376373edbf4772db1ab8
    • Opcode Fuzzy Hash: d35230aa7cde00b763fc49652336ba04ebad3697f02eaf1917839ca8b13ab95e
    • Instruction Fuzzy Hash: C1D0C932B88208A69250A7E17C0EA777A98DBA5750BD00422BB15C5491E9A995E089AD
    APIs
    • GetModuleHandleA.KERNEL32(KERNEL32,004203A5), ref: 0042080F
    • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0042081F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: IsProcessorFeaturePresent$KERNEL32
    • API String ID: 1646373207-3105848591
    • Opcode ID: 2ce5a53da2ba8c60dc74da5fe69ead2245e16ebdf1c8c6ebbf912c541e684516
    • Instruction ID: 175cf54e01542d12263b030cd91fa3025be04a43e0b8fc3ad649ea32b3c63f53
    • Opcode Fuzzy Hash: 2ce5a53da2ba8c60dc74da5fe69ead2245e16ebdf1c8c6ebbf912c541e684516
    • Instruction Fuzzy Hash: 7AC0126534526565EA2027727D49B171288AB89B52FD400626415D0281CE58C081546D
    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,GetCPInfo), ref: 004120F0
    • SetLastError.KERNEL32(0000007F,00000000), ref: 00412104
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ErrorHandleLastModule
    • String ID: GetCPInfo$kernel32.dll
    • API String ID: 4242514867-4020370742
    • Opcode ID: 3e750baf46d18c7e220d7d340a8e57189167abccc73bacaf52e07d5932c68f46
    • Instruction ID: 58f253342a307a9fdb5b70656c412ce6308fd696dac86d4244b2e628255a2a60
    • Opcode Fuzzy Hash: 3e750baf46d18c7e220d7d340a8e57189167abccc73bacaf52e07d5932c68f46
    • Instruction Fuzzy Hash: CCC08031BC421066D25067F02C0EA676955EBF4741BD144237754C1091D95CC4D0C53D
    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,IsValidCodePage), ref: 0041216B
    • SetLastError.KERNEL32(0000007F,00000000), ref: 0041217F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ErrorHandleLastModule
    • String ID: IsValidCodePage$kernel32.dll
    • API String ID: 4242514867-1070563503
    • Opcode ID: 20d38ee14804076793a5da231e79e633c9479e75e7e2c3d5ff87839cfc670427
    • Instruction ID: 13011892d11ab4e1539e5d4a34820d1f16f9ce37942f451600be27c4dc841477
    • Opcode Fuzzy Hash: 20d38ee14804076793a5da231e79e633c9479e75e7e2c3d5ff87839cfc670427
    • Instruction Fuzzy Hash: B6C08032B8420067D21097F06C0DA676954DBE4741BD044337704C0090DE6CC4D0C53E
    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,GetFileAttributesW), ref: 00412131
    • SetLastError.KERNEL32(0000007F,00000000), ref: 00412145
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ErrorHandleLastModule
    • String ID: GetFileAttributesW$kernel32.dll
    • API String ID: 4242514867-3967345162
    • Opcode ID: e9b8594dd292461d899803575f68d3c4594aecc238e69c2f09f1eeb12754286e
    • Instruction ID: fe10567e8f9e459952b6202138f7cc16b4f00a42a5bc0414e2433638519b3992
    • Opcode Fuzzy Hash: e9b8594dd292461d899803575f68d3c4594aecc238e69c2f09f1eeb12754286e
    • Instruction Fuzzy Hash: D4C01231B9425095911057F16C0AA666914EBA07907A006227724C00E0D6A8D4D1853E
    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,lstrlenW), ref: 00412194
    • SetLastError.KERNEL32(0000007F,00000000), ref: 004121A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ErrorHandleLastModule
    • String ID: kernel32.dll$lstrlenW
    • API String ID: 4242514867-1353037567
    • Opcode ID: 7cf6e2ce359bb0f559b7899c30cb75f10e877b9dd660bf214ad7f22267b9b425
    • Instruction ID: 5adcc30e2f83eb8334d7b345b56e55d2476a2fd72ce10dd67bfc14644b17a796
    • Opcode Fuzzy Hash: 7cf6e2ce359bb0f559b7899c30cb75f10e877b9dd660bf214ad7f22267b9b425
    • Instruction Fuzzy Hash: ABC01232B8425069E61097F06C0DA666954EBE4741BD044227704C0090D9A894E0C52D
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetSystemWow64DirectoryW,0041050F,?,00000104,00000000,?,?,?,00000000), ref: 0041104A
    • GetProcAddress.KERNEL32(00000000), ref: 00411051
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: GetSystemWow64DirectoryW$kernel32.dll
    • API String ID: 1646373207-1816364905
    • Opcode ID: 834f25948144d7f69a5e93d261281fff115d5f7d3b56b91a83c9079f8eb00e7e
    • Instruction ID: 54869c74ee9ddc86258379d662f0ceb4b5afac1ae51c0acee345fc808ee50513
    • Opcode Fuzzy Hash: 834f25948144d7f69a5e93d261281fff115d5f7d3b56b91a83c9079f8eb00e7e
    • Instruction Fuzzy Hash: 27C02B70F84B004773105771AC1CF062C483504B013908093B701C0460CE18D041C72E
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: _strcspn_strlen_strncpy_strpbrk
    • String ID:
    • API String ID: 635841138-0
    • Opcode ID: ce234708ced47c643e7636637e99cfeb62a74c8038a33029ec81b380856e9e48
    • Instruction ID: 635981cbe2151109b6194cce370e88a77034d9ec2908c4ee9fd545fd02658f3e
    • Opcode Fuzzy Hash: ce234708ced47c643e7636637e99cfeb62a74c8038a33029ec81b380856e9e48
    • Instruction Fuzzy Hash: 0A510BB2D012269BDF319BA5DC816FF77A8AB44318F26052FD805A2242E73CCDC1879D
    APIs
    • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,?,0042D9E4), ref: 0041B3A4
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: 18b5f9fbf2ad483612655590b242f76d747ab116a6ff48ed956632f0df11284f
    • Instruction ID: ed280efa82c87b02be5e1dbf1e8acc392504d9f920e1def4a13abc69968bea66
    • Opcode Fuzzy Hash: 18b5f9fbf2ad483612655590b242f76d747ab116a6ff48ed956632f0df11284f
    • Instruction Fuzzy Hash: BB519471A00248CFDB32DFA9CC84AEDBBB8FF45304F60415AE9699B252D7345A81CF59
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 51058bebb2d4a0ba1d31e01f8713f4f304ca86666ea717fb46c6b7f53b281ab2
    • Instruction ID: 0ece8c6ab2a1b0978e4269eaa82fcc2a0f0fdde64aa38d79aa27d99546471abc
    • Opcode Fuzzy Hash: 51058bebb2d4a0ba1d31e01f8713f4f304ca86666ea717fb46c6b7f53b281ab2
    • Instruction Fuzzy Hash: 4631F571A04224AAEB24DB35AC41BEB3BA9DF44315F25806BF80892281E77DCDC1C25D
    APIs
    • __lock.LIBCMT ref: 0041444F
      • Part of subcall function 00415B7B: RtlEnterCriticalSection.NTDLL(?), ref: 00415BA3
    • __lock.LIBCMT ref: 0041449B
    • RtlEnterCriticalSection.NTDLL(0000000D), ref: 004144E5
    • RtlLeaveCriticalSection.NTDLL(0000000D), ref: 004144F2
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: CriticalSection$Enter__lock$Leave
    • String ID:
    • API String ID: 885841014-0
    • Opcode ID: a6c6612f6726ed16518befad866fbf69278125153c78e87308b65c73d5fe1b80
    • Instruction ID: 2e16277dc42f8a6a400e2c3b54ef0ad5139fdfe98634f10f164a33856e727b71
    • Opcode Fuzzy Hash: a6c6612f6726ed16518befad866fbf69278125153c78e87308b65c73d5fe1b80
    • Instruction Fuzzy Hash: 9B4117719007129BCB209F65D8417DE77A1AF81334F24862FD2359A1D1DB7C99C28B5C
    APIs
      • Part of subcall function 0041E627: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0041E641
      • Part of subcall function 0041E627: GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 0041E652
      • Part of subcall function 0041E627: VirtualQuery.KERNEL32(?,?,0000001C,?,?,0000001C), ref: 0041E698
    • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000,?,00000100,?,00000001,?,00000001,?), ref: 0041731D
    • LCMapStringA.KERNEL32(?,?,?,?,00000000,00000000,?,00000100,?,00000001,?,00000001,?), ref: 00417339
    • LCMapStringA.KERNEL32(?,?,?,?,?,00000000,?,00000100,?,00000001,?,00000001,?), ref: 004173A5
    • _strncpy.LIBCMT ref: 004173CA
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: QueryStringVirtual$ByteCharInfoMultiSystemWide_strncpy
    • String ID:
    • API String ID: 1411509361-0
    • Opcode ID: 0193c1170d1af1da8ed7c2d1208624dbb874ae913acbdab2569ca25da4a8d829
    • Instruction ID: c5b998f8757d9015ae8da4623aa08d2fb5ffe24b0753f7125c68bfb4f5fa2ded
    • Opcode Fuzzy Hash: 0193c1170d1af1da8ed7c2d1208624dbb874ae913acbdab2569ca25da4a8d829
    • Instruction Fuzzy Hash: D3315A72C0425EEBCF119FA5DC418EE7BB1FF48354F14812AF924621A0C7394992EF99
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: _strlen$___initmbctable_strcat
    • String ID:
    • API String ID: 109824703-0
    • Opcode ID: 83596566147bba89ac50cda230d8f960f942dace8478570eebe1e7f3e12f8b0b
    • Instruction ID: aecccb479df253a319077c954303b86f499dff71de012b39cee18dbd7cdd79d5
    • Opcode Fuzzy Hash: 83596566147bba89ac50cda230d8f960f942dace8478570eebe1e7f3e12f8b0b
    • Instruction Fuzzy Hash: BE1163B698C210AED7302FB1BC905F63786AB01328360467FE095432A1DB3C18D38B8C
    APIs
    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,?,?,004107CC,-00000004,0000001C,?,?,?,?,00000001,00000008), ref: 004110AA
    • UnmapViewOfFile.KERNEL32(00000000,?,?,004107CC,-00000004,0000001C,?,?,?,?,00000001,00000008,000000FF,?,?,00000001), ref: 004110FF
    • CloseHandle.KERNEL32(00000000,?,?,004107CC,-00000004,0000001C,?,?,?,?,00000001,00000008,000000FF,?,?,00000001), ref: 00411106
    • CloseHandle.KERNEL32(00000000,?,?,004107CC,-00000004,0000001C,?,?,?,?,00000001,00000008,000000FF,?,?,00000001), ref: 0041110D
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: CloseFileHandleView$Unmap
    • String ID:
    • API String ID: 1018311036-0
    • Opcode ID: efac7f39593556fe32960664120906300de0e62f58d815180b917fc59eec4a56
    • Instruction ID: 62ed04df4e5a14ae7252075893d07cec59bdeb1acca4e08cb964f562851f0438
    • Opcode Fuzzy Hash: efac7f39593556fe32960664120906300de0e62f58d815180b917fc59eec4a56
    • Instruction Fuzzy Hash: 50117F30B02260BBC7305B55DC4DEEB7E28EB5AB64F61811AF305566F1D2B94CC2C6A8
    APIs
    • CloseHandle.KERNEL32(?), ref: 00414E44
    • RtlExitUserThread.NTDLL(00000000), ref: 00414E53
    • FlsGetValue.KERNEL32(004247A8,0000000C), ref: 00414E6C
    • FlsSetValue.KERNEL32(?), ref: 00414E82
      • Part of subcall function 00413E83: __lock.LIBCMT ref: 00413EA1
      • Part of subcall function 00413E83: HeapFree.KERNEL32(00000000,?,004246F8,0000000C,00415B5F,00000000,004247F8,00000008,00415B94,?,?,?,0041BA1C,00000004,00425150,00000010), ref: 00413EE8
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Value$CloseExitFreeHandleHeapThreadUser__lock
    • String ID:
    • API String ID: 3768287693-0
    • Opcode ID: 8aaa84c5ea303c07c023bafa6713cc395e3b57277a4ace6475d1f005ec8d6440
    • Instruction ID: 7a9587cd1f16faa87f867f4acf5c4a1a87d23e5a42e8cb7b0da30dc50c65bc1b
    • Opcode Fuzzy Hash: 8aaa84c5ea303c07c023bafa6713cc395e3b57277a4ace6475d1f005ec8d6440
    • Instruction Fuzzy Hash: 08216D71A407109FD724AF65E845EAA7BA1FF84765B10451EF906973A0CF38EC81CA9C
    APIs
    • RtlReAllocateHeap.NTDLL(00000000,?,00000000,0041B115), ref: 0041AB4B
    • RtlAllocateHeap.NTDLL(00000008,000041C4,00000000), ref: 0041AB84
    • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 0041ABA2
    • HeapFree.KERNEL32(00000000,?), ref: 0041ABB9
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Heap$Allocate$AllocFreeVirtual
    • String ID:
    • API String ID: 94566200-0
    • Opcode ID: 54456761ee3a74d021dda87f4e7309e537ae6b3998d3a564d60b73401514c880
    • Instruction ID: 49930ada39713b44ade05262e838f32e531029d33af051b9bee5041e7601a2ac
    • Opcode Fuzzy Hash: 54456761ee3a74d021dda87f4e7309e537ae6b3998d3a564d60b73401514c880
    • Instruction Fuzzy Hash: 771119313042419FD7318F6AFC46AA67BB6FB91750790463AF252D62A0C370A8A6CB09
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ___addl
    • String ID:
    • API String ID: 2260456530-0
    • Opcode ID: a6d3fea94caffdbfbeec600a8d228e4f9831f0a4e76ee5ff08ec74ce47c2ef23
    • Instruction ID: 66be002701016eb227c6b7fc749c6a1329c3ce5f9475afadf3c012ef8399b07f
    • Opcode Fuzzy Hash: a6d3fea94caffdbfbeec600a8d228e4f9831f0a4e76ee5ff08ec74ce47c2ef23
    • Instruction Fuzzy Hash: 3DF06277600112EFEB205A42ED01E57B7EDFF44314B45482AFD58D2132E766E8A8CB52
    APIs
    • __EH_prolog.LIBCMT ref: 004054E7
      • Part of subcall function 00406131: __EH_prolog.LIBCMT ref: 00406136
      • Part of subcall function 00403CA9: std::locale::facet::_Decref.LIBCPMT ref: 00403CAF
    • _strcspn.LIBCMT ref: 00405655
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$Decref_strcspnstd::locale::facet::_
    • String ID: e
    • API String ID: 765611367-4024072794
    • Opcode ID: 6989579e8fe5a17550c66839fc7fceb2417a09a4820ae2b98edd922a51fc9261
    • Instruction ID: e86af2bc0806b7d8b6b9724ff1ed76631a4ccf934b6b9f0d06023629a3589b77
    • Opcode Fuzzy Hash: 6989579e8fe5a17550c66839fc7fceb2417a09a4820ae2b98edd922a51fc9261
    • Instruction Fuzzy Hash: E6D16772900608AFDF01DFA4DC85AEE7BB5EF08308F15402AF905BB292D739A951DF58
    APIs
    • __EH_prolog.LIBCMT ref: 00407317
      • Part of subcall function 00401163: __EH_prolog.LIBCMT ref: 00401168
      • Part of subcall function 00415747: KiUserExceptionDispatcher.NTDLL(?,?,00401278,004281F4,?,/A,?,?,?,00413083,00401278,004281F4,0042D4A8,00401278,00401278,?), ref: 00415775
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$DispatcherExceptionUser
    • String ID: invalid map/set<T> iterator$|EB
    • API String ID: 1370957130-889349240
    • Opcode ID: e794160866f02b4873d797d4c191187ab252ca78fb051dec6c60da122830fffd
    • Instruction ID: cfccddc9af60f329fc9c095f140bf7009386a4a59e08fec4e99f9c952b300543
    • Opcode Fuzzy Hash: e794160866f02b4873d797d4c191187ab252ca78fb051dec6c60da122830fffd
    • Instruction Fuzzy Hash: AEA14F70908280AFDB15CF14D184B667FE1AB55308F2880AED8855F392C779FD86CBA7
    APIs
    • __EH_prolog.LIBCMT ref: 00402C97
      • Part of subcall function 00411365: __EH_prolog.LIBCMT ref: 0041136A
      • Part of subcall function 00406D41: __EH_prolog.LIBCMT ref: 00406D46
      • Part of subcall function 004040BC: __EH_prolog.LIBCMT ref: 004040C1
      • Part of subcall function 00402BFC: __EH_prolog.LIBCMT ref: 00402C01
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: lax.nl.env.%s=%s$lax.nl.env.exact_case.%s=%s
    • API String ID: 3519838083-1796629959
    • Opcode ID: 4a00bd07545f5000b3c685a59bcf601e03f26b5f3d798c1067527e91460d2e79
    • Instruction ID: 95027f21c49b224b231d62f290a94ebe781777ef3e557235238f4059b0ef544d
    • Opcode Fuzzy Hash: 4a00bd07545f5000b3c685a59bcf601e03f26b5f3d798c1067527e91460d2e79
    • Instruction Fuzzy Hash: 9F715F71E00219EFCF04EB95C986AEEBBB8AF50304F50416AF505B71D1DB786E84CB99
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: JavaHome$MicroVersion
    • API String ID: 3519838083-2677630228
    • Opcode ID: 20e3acc952a038b3af12563df467047e2b899bb78b9081ae9525a04ba6000d8d
    • Instruction ID: 2c8e2a9dbf5c6fa99439792e0287f50f7f99ae12cea6863223e2ab28d2dfc39b
    • Opcode Fuzzy Hash: 20e3acc952a038b3af12563df467047e2b899bb78b9081ae9525a04ba6000d8d
    • Instruction Fuzzy Hash: 0F619471D04259EFDB00EFA5C946ADE7BB4AF05304F50416FF40077292DB78AA45CBA9
    APIs
    • __EH_prolog.LIBCMT ref: 00401408
      • Part of subcall function 004067E9: __EH_prolog.LIBCMT ref: 004067EE
      • Part of subcall function 0040265A: __EH_prolog.LIBCMT ref: 0040265F
      • Part of subcall function 00406883: __EH_prolog.LIBCMT ref: 00406888
      • Part of subcall function 00402AB4: __EH_prolog.LIBCMT ref: 00402AB9
      • Part of subcall function 00402EDA: __EH_prolog.LIBCMT ref: 00402EDF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: .exe$unable to locate executable
    • API String ID: 3519838083-1739398756
    • Opcode ID: c71029c300d5b6a1640cab96f17f8cf56ac9d7a8bef60e4433125bf09bd9b959
    • Instruction ID: efdf16bef9284aaf24fcecc9915265899847645a9463572c28b6bfea987de3dc
    • Opcode Fuzzy Hash: c71029c300d5b6a1640cab96f17f8cf56ac9d7a8bef60e4433125bf09bd9b959
    • Instruction Fuzzy Hash: 85515172D00218AADF10FBE5C846FCE7BB89F15318F41807BF505B71D2D6789A498B65
    APIs
    • __EH_prolog.LIBCMT ref: 00409842
      • Part of subcall function 00408CB0: __EH_prolog.LIBCMT ref: 00408CB5
      • Part of subcall function 00406B1E: __EH_prolog.LIBCMT ref: 00406B23
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: \..\jre\bin$\NPJava32.dll
    • API String ID: 3519838083-102645089
    • Opcode ID: d7bc56a210a47b4d84a6fa1c8a56245827030e8498592be318949e1f3c524d90
    • Instruction ID: bcfff82385b425507ad586e6357883958df313f2866ef671c63f73ec430543ac
    • Opcode Fuzzy Hash: d7bc56a210a47b4d84a6fa1c8a56245827030e8498592be318949e1f3c524d90
    • Instruction Fuzzy Hash: E25172B1E00219AACB00FFA5DC86BEE7B75AF01308F00457EF904772D2D7B95A498799
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Info
    • String ID: $
    • API String ID: 1807457897-3032137957
    • Opcode ID: ae6ef7f9dc25fadb2a6a880761758ca4c823e36990b62ee310361c5e3d6d48c8
    • Instruction ID: db05d62cadd328532e6515807ace2d16a0a9204a9efb37351131e07a25f339d2
    • Opcode Fuzzy Hash: ae6ef7f9dc25fadb2a6a880761758ca4c823e36990b62ee310361c5e3d6d48c8
    • Instruction Fuzzy Hash: 054169316002995EEB118B29EC59BFA3BE8EB05304F2404E6E946DB153C62949C5D7DC
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: Path$path
    • API String ID: 3519838083-1791709477
    • Opcode ID: 5e40aaf4ed47cdc820702f0185d1bf50c0d4d4fef65f9cdc397dc3e4546b6862
    • Instruction ID: 421d49ef3281a0bdf0f3de4d8cbc5f638aa4c1177e079d29fba60a70de246731
    • Opcode Fuzzy Hash: 5e40aaf4ed47cdc820702f0185d1bf50c0d4d4fef65f9cdc397dc3e4546b6862
    • Instruction Fuzzy Hash: 84318172A10119AFCB00EF99CA469EEBB74BF44314F10813AF811772D1DB74AA44DBD9
    APIs
    Strings
    • \StringFileInfo\040904b0\CompanyName, xrefs: 0040E38B
    • company: %s, xrefs: 0040E3B7
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: \StringFileInfo\040904b0\CompanyName$company: %s
    • API String ID: 3519838083-687074582
    • Opcode ID: 5810597c1f0495f06a95cfdf7065e61ff0b4142226a60e7ce9d97c1c4929aa32
    • Instruction ID: 3fff5d8134b0ef0de1aec03fddfc997c478f973f74c5401f8ddb14134fc405a9
    • Opcode Fuzzy Hash: 5810597c1f0495f06a95cfdf7065e61ff0b4142226a60e7ce9d97c1c4929aa32
    • Instruction Fuzzy Hash: 39214172D00118AACF00EF95D885DDEBBB8EF44758F10802BF915B7181D7789A44CBA8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: __shift_strcat_strlen
    • String ID: e+000
    • API String ID: 208078240-1027065040
    • Opcode ID: 1d245ffe33c64c34526efea1788691be5b00e9f0e900454bb2c238cb3bf20c32
    • Instruction ID: bbf1ecedab5fe765bbf9c983643f2e232d5e8be53f452894324958bf522748cb
    • Opcode Fuzzy Hash: 1d245ffe33c64c34526efea1788691be5b00e9f0e900454bb2c238cb3bf20c32
    • Instruction Fuzzy Hash: D921F0723083A49FD72A9E38AC907A63FD15B02358F5884AFE085CA293D679C8C1C759
    APIs
    • __EH_prolog.LIBCMT ref: 0040A13D
      • Part of subcall function 004067E9: __EH_prolog.LIBCMT ref: 004067EE
      • Part of subcall function 0040265A: __EH_prolog.LIBCMT ref: 0040265F
      • Part of subcall function 00406883: __EH_prolog.LIBCMT ref: 00406888
      • Part of subcall function 00406AB8: GetFileAttributesW.KERNELBASE(-00000004,0040133F,?,?), ref: 00406AC7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$AttributesFile
    • String ID: \bin\java.exe$\bin\jre.exe
    • API String ID: 719147301-1069483913
    • Opcode ID: 59ee3b2cd8abe1e5bc16460be772674d1a2bddcd1066ad65aac1b6acf2a43b74
    • Instruction ID: 92a5b913b861d30cfe90557012c406c35276ba141b0a28e92dcededde5ae75df
    • Opcode Fuzzy Hash: 59ee3b2cd8abe1e5bc16460be772674d1a2bddcd1066ad65aac1b6acf2a43b74
    • Instruction Fuzzy Hash: A1216872D00258AECB00FBE9D846ECEBB78AF15714F41853BF504B3182D779960987A5
    APIs
    • __EH_prolog.LIBCMT ref: 0040630A
      • Part of subcall function 0041235D: InterlockedIncrement.KERNEL32(00000000), ref: 0041236F
      • Part of subcall function 0041235D: InterlockedDecrement.KERNEL32(00000000), ref: 00412384
      • Part of subcall function 0041235D: __lock.LIBCMT ref: 0041238C
      • Part of subcall function 004063DF: _strlen.LIBCMT ref: 004063E4
      • Part of subcall function 00403D0A: _strlen.LIBCMT ref: 00403D1B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: Interlocked_strlen$DecrementH_prologIncrement__lock
    • String ID: false$true
    • API String ID: 3391087120-2658103896
    • Opcode ID: 541593a059fa759ec84aa5ea556c5072113d7219c51071618ccb036026c67f67
    • Instruction ID: 6a89202dff5fc2248bda2a38375d1ed002f8ab108d6cd8db08e3b3aef7542049
    • Opcode Fuzzy Hash: 541593a059fa759ec84aa5ea556c5072113d7219c51071618ccb036026c67f67
    • Instruction Fuzzy Hash: 29213EB1D007099FCB10EFB5D4425DEBBF8AF04304B10452FE069E7241E778A6418B98
    APIs
    • ___initmbctable.LIBCMT ref: 0041C646
    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exe,00000104,00000000,?,?,?,?,?,004150E3,?,004247B8,00000018), ref: 0041C65E
    Strings
    • C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exe, xrefs: 0041C650, 0041C655
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: FileModuleName___initmbctable
    • String ID: C:\Users\user\Desktop\Infor IDF Auxiliary Machine.exe
    • API String ID: 767393020-813280243
    • Opcode ID: 23910124e580494ea470da2430ae9f08fc4d75f05b09e9ad9b06ebe5f7a0cb0a
    • Instruction ID: 82801267961e233b6e6daf7bc4318ec6fa89f00873a84989f6fc0b4001794a96
    • Opcode Fuzzy Hash: 23910124e580494ea470da2430ae9f08fc4d75f05b09e9ad9b06ebe5f7a0cb0a
    • Instruction Fuzzy Hash: 4A11E7B2F44104AFD720DBA9EC81ADB77A8EB95360B50057BE809E3251D674AD418B68
    APIs
    • GetFileType.KERNEL32(?,00424758,00000010,00406D0D,00000000,00004000,?,?,00000000), ref: 004145D5
    • GetLastError.KERNEL32(?,?,00000000), ref: 004145DF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: ErrorFileLastType
    • String ID: @
    • API String ID: 1621975986-2766056989
    • Opcode ID: 9de71b022d57de2d21fae6fc9f57f2c52084fc36b36731b3d5e8fec9ab13e596
    • Instruction ID: 53e573fc3507acab2de635c1683088dacf71c2ad8c313c64f864c110a3d2ce43
    • Opcode Fuzzy Hash: 9de71b022d57de2d21fae6fc9f57f2c52084fc36b36731b3d5e8fec9ab13e596
    • Instruction Fuzzy Hash: 0E110871A05204ABCF21AB74E8067DD3B509F82339F19460BE6705B2D3CB7C45C1AB5D
    APIs
    • __EH_prolog.LIBCMT ref: 00406094
    • std::locale::facet::_Incref.LIBCPMT ref: 00406109
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prologIncrefstd::locale::facet::_
    • String ID: bad cast
    • API String ID: 931760182-3145022300
    • Opcode ID: c0cd3d3abf1e92f9b0aa3729aa151e29ca9bd95eeb94dee5ae8274da598e3fd7
    • Instruction ID: 43767b857c40ffc456dfc2e8a118e863a121c4098c06f96d5c5854140a4108cd
    • Opcode Fuzzy Hash: c0cd3d3abf1e92f9b0aa3729aa151e29ca9bd95eeb94dee5ae8274da598e3fd7
    • Instruction Fuzzy Hash: 7F01E532E0052497CB10FB65C9026EEB735AB80724F51022FE422B72D2DBBC9E01CB9C
    APIs
    • __EH_prolog.LIBCMT ref: 00406136
    • std::locale::facet::_Incref.LIBCPMT ref: 004061AB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prologIncrefstd::locale::facet::_
    • String ID: bad cast
    • API String ID: 931760182-3145022300
    • Opcode ID: 05e1d3d3be8a9cab048970543999a97e2840a0ab10b6864dc5deddf2a9afa88d
    • Instruction ID: d5b7b4dd72678ebc9806452029753f369796af98f022cbf710ff4df004465886
    • Opcode Fuzzy Hash: 05e1d3d3be8a9cab048970543999a97e2840a0ab10b6864dc5deddf2a9afa88d
    • Instruction Fuzzy Hash: 78018272E0052497CB10FBA5D902AEEB774AB80729F51026FE412B72D1DBBC9E01C798
    APIs
    • __EH_prolog.LIBCMT ref: 00405FD8
    • std::locale::facet::_Incref.LIBCPMT ref: 0040604D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prologIncrefstd::locale::facet::_
    • String ID: bad cast
    • API String ID: 931760182-3145022300
    • Opcode ID: 042c257e0917e37a35fde5ee1ac94dd84ef020ef63af04afe5fb087cf3e97c7d
    • Instruction ID: 4bf539fd838fc87eca0b192fd1ed4f0bb8996fc181f15976787db23ad23585f1
    • Opcode Fuzzy Hash: 042c257e0917e37a35fde5ee1ac94dd84ef020ef63af04afe5fb087cf3e97c7d
    • Instruction Fuzzy Hash: D6018272E0052597CB10FF65D9026EEB774AB40729F51422FE412B72D1DB7C9E05C798
    APIs
    • __EH_prolog.LIBCMT ref: 00412909
    • std::locale::facet::_Decref.LIBCPMT ref: 00412942
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: DecrefH_prologstd::locale::facet::_
    • String ID: )A
    • API String ID: 2855265189-2712435313
    • Opcode ID: bbc4e8b4384f7e507161fe53fd83af13d37484ce0c29fbd52105b897510ba6a0
    • Instruction ID: 9182611065c10ffccf4632655464990c376c23f88d02202db2df5448709ae679
    • Opcode Fuzzy Hash: bbc4e8b4384f7e507161fe53fd83af13d37484ce0c29fbd52105b897510ba6a0
    • Instruction Fuzzy Hash: 1A018074B002129FEB14EF55C505BEEB7B4EF90704F10445FA452A7291DBF8A980CB59
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: LaunchAnywhere$lax.application.name
    • API String ID: 3519838083-2002782635
    • Opcode ID: 40002d3bf324629e762742df3b633bc2a95dad7d20e3363427d9b6354151a1e5
    • Instruction ID: 3a187570a8b11176efac54b76b42f051ad089738f60c42394eecc0526552fe91
    • Opcode Fuzzy Hash: 40002d3bf324629e762742df3b633bc2a95dad7d20e3363427d9b6354151a1e5
    • Instruction Fuzzy Hash: 61F09071F44254ABC705BF59E94779C7B60EB1032AFA0822FF811672D1C7BC9644CA5D
    APIs
    • __EH_prolog.LIBCMT ref: 00411304
      • Part of subcall function 00401163: __EH_prolog.LIBCMT ref: 00401168
      • Part of subcall function 00415747: KiUserExceptionDispatcher.NTDLL(?,?,00401278,004281F4,?,/A,?,?,?,00413083,00401278,004281F4,0042D4A8,00401278,00401278,?), ref: 00415775
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2043765965.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2043751029.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.0000000000430000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2043765965.000000000043C000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Infor IDF Auxiliary Machine.jbxd
    Similarity
    • API ID: H_prolog$DispatcherExceptionUser
    • String ID: deque<T> too long$pEB
    • API String ID: 1370957130-2064984450
    • Opcode ID: 4231c20796b8a1549b54ce2d192d6f1a532675f22beba54fabbb4bbcb2246086
    • Instruction ID: eaa2d0e769b3d031f2bf12c30002e81721ee0c33293d6e8fac651faa5a5b3c6a
    • Opcode Fuzzy Hash: 4231c20796b8a1549b54ce2d192d6f1a532675f22beba54fabbb4bbcb2246086
    • Instruction Fuzzy Hash: BDE0E6B1A10118D6C704F7D1ED46ADD77B8BF1474CF90406BE111B5095DFB85648CB69