Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1.exe

Overview

General Information

Sample name:1.exe
Analysis ID:1546802
MD5:d940ad60dee55174455c2a43a8353d2e
SHA1:7b0832cd378423da73831e6a45144248fe5d17e4
SHA256:47c1439cbe3d3ea852e7e45c2d201cb83e5949193b07d9f321c41e0343eaa6a8
Tags:exeReversingLabsuser-NDA0E
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May infect USB drives
PE file contains an invalid checksum
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 1.exe (PID: 7292 cmdline: "C:\Users\user\Desktop\1.exe" MD5: D940AD60DEE55174455C2A43A8353D2E)
    • conhost.exe (PID: 7300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 1.exeReversingLabs: Detection: 36%
Source: 1.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D3644 CryptHashData,_strnlen,___crtLCMapStringA,_malloc,___crtLCMapStringA,_strcpy_s,__freea,0_2_005D3644
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D1906 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptHashData,_memset,CryptHashData,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,__snwprintf_s,#205,0_2_005D1906
Source: 1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: msinfo32.pdb source: 1.exe
Source: Binary string: d:\_Bld\10657\7994\Sources\obj\Win32\Release\EvaluationContainer.csproj\Microsoft.Mashup.Container.pdb source: 1.exe
Source: Binary string: AcroRd32Info.pdb source: 1.exe
Source: Binary string: AcroRd32Info.pdb7 source: 1.exe
Source: Binary string: C:\re\jdk7u45\229\build\windows-amd64\tmp\sun\launcher\keytool\obj64\keytool.pdb source: 1.exe
Source: Binary string: SqlDumper.pdb source: 1.exe
Source: Binary string: C:\Perforce\FRMain\code\build\win\results\Release\info\arh.pdb source: 1.exe
Source: 1.exeBinary or memory string: :\autorun.inf
Source: 1.exeBinary or memory string: [Autorun]
Source: 1.exeString found in binary or memory: http://crl.geotrust.com/crls/gtglobal.crl04
Source: 1.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 1.exeString found in binary or memory: http://evcs-aia.ws.symantec.com/evcs.cer0
Source: 1.exeString found in binary or memory: http://evcs-crl.ws.symantec.com/evcs.crl0
Source: 1.exeString found in binary or memory: http://evcs-ocsp.ws.symantec.com04
Source: 1.exeString found in binary or memory: http://ocsp.geotrust.com0K
Source: 1.exeString found in binary or memory: http://ocsp.thawte.com0
Source: 1.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: 1.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: 1.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: 1.exeString found in binary or memory: http://www.geotrust.com/resources/cps0(
Source: 1.exeString found in binary or memory: http://www.symauth.com/cps0(
Source: 1.exeString found in binary or memory: http://www.symauth.com/cps09
Source: 1.exeString found in binary or memory: http://www.symauth.com/rpa04
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D9D7A0_2_005D9D7A
Source: C:\Users\user\Desktop\1.exeCode function: String function: 005D6024 appears 32 times
Source: 1.exe, 00000000.00000000.2030756299.00000000005E5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamearh.exe8 vs 1.exe
Source: 1.exeBinary or memory string: OriginalFilenamearh.exe8 vs 1.exe
Source: 1.exeBinary or memory string: OriginalFilenameSqlDumper.exeJ vs 1.exe
Source: 1.exeBinary or memory string: OriginalFilenameFirewall.exe vs 1.exe
Source: 1.exeBinary or memory string: OriginalFilenameAcroRd32Info.exe< vs 1.exe
Source: 1.exeBinary or memory string: OriginalFilenamekeytool.exeV vs 1.exe
Source: 1.exeBinary or memory string: OriginalFilenamemsinfo.dllj% vs 1.exe
Source: 1.exeBinary or memory string: OriginalFilenameMicrosoft.Mashup.Container.exeT vs 1.exe
Source: 1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 1.exeBinary or memory string: d:\_Bld\10657\7994\Sources\obj\Win32\Release\EvaluationContainer.csproj\Microsoft.Mashup.Container.pdb
Source: 1.exeBinary or memory string: @`@*\AC:\Program Files\Microsoft Visual Studio\VB98\pjtbinder.vbp
Source: classification engineClassification label: mal52.winEXE@2/1@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7300:120:WilError_03
Source: 1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 1.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.81%
Source: C:\Users\user\Desktop\1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 1.exeReversingLabs: Detection: 36%
Source: 1.exeString found in binary or memory: -installAppSilent
Source: 1.exeString found in binary or memory: -help
Source: 1.exeString found in binary or memory: arh -help
Source: 1.exeString found in binary or memory: arh -installAppSilent { (-location <loc>) -desktopShortcut -programMenu } <file>
Source: 1.exeString found in binary or memory: arh -help
Source: 1.exeString found in binary or memory: arh -installAppSilent { (-location <loc>) -desktopShortcut -programMenu } <file>
Source: 1.exeString found in binary or memory: -help
Source: 1.exeString found in binary or memory: arh -help
Source: 1.exeString found in binary or memory: arh -installAppSilent { (-location <loc>) -desktopShortcut -programMenu } <file>
Source: 1.exeString found in binary or memory: -installAppSilent
Source: 1.exeString found in binary or memory: -helpusage:
Source: 1.exeString found in binary or memory: -installAppSilent-locationargument -location already specified
Source: unknownProcess created: C:\Users\user\Desktop\1.exe "C:\Users\user\Desktop\1.exe"
Source: C:\Users\user\Desktop\1.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\1.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\1.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\1.exeSection loaded: msi.dllJump to behavior
Source: 1.exeStatic file information: File size 1212233 > 1048576
Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: msinfo32.pdb source: 1.exe
Source: Binary string: d:\_Bld\10657\7994\Sources\obj\Win32\Release\EvaluationContainer.csproj\Microsoft.Mashup.Container.pdb source: 1.exe
Source: Binary string: AcroRd32Info.pdb source: 1.exe
Source: Binary string: AcroRd32Info.pdb7 source: 1.exe
Source: Binary string: C:\re\jdk7u45\229\build\windows-amd64\tmp\sun\launcher\keytool\obj64\keytool.pdb source: 1.exe
Source: Binary string: SqlDumper.pdb source: 1.exe
Source: Binary string: C:\Perforce\FRMain\code\build\win\results\Release\info\arh.pdb source: 1.exe
Source: 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D4CEC LoadLibraryW,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_005D4CEC
Source: 1.exeStatic PE information: real checksum: 0x2563c should be: 0x133046
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D6069 push ecx; ret 0_2_005D607C
Source: C:\Users\user\Desktop\1.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-6293
Source: C:\Users\user\Desktop\1.exeAPI coverage: 9.3 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D24BC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005D24BC
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D4CEC LoadLibraryW,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_005D4CEC
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D1C57 WideCharToMultiByte,GetProcessHeap,HeapFree,0_2_005D1C57
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D24BC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005D24BC
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D44B5 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005D44B5
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D66B0 SetUnhandledExceptionFilter,0_2_005D66B0
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D49C3 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005D49C3
Source: C:\Users\user\Desktop\1.exeCode function: GetLocaleInfoA,0_2_005DD040
Source: C:\Users\user\Desktop\1.exeCode function: 0_2_005D7356 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_005D7356
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
Peripheral Device Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1546802 Sample: 1.exe Startdate: 01/11/2024 Architecture: WINDOWS Score: 52 10 Multi AV Scanner detection for submitted file 2->10 12 Machine Learning detection for sample 2->12 6 1.exe 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       
SourceDetectionScannerLabelLink
1.exe37%ReversingLabsWin32.Worm.Generic
1.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://www.symauth.com/cps0(0%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.symauth.com/rpa041.exefalse
    unknown
    http://crl.thawte.com/ThawteTimestampingCA.crl01.exefalse
    • URL Reputation: safe
    unknown
    http://www.symauth.com/cps091.exefalse
      unknown
      http://www.symauth.com/cps0(1.exefalse
      • URL Reputation: safe
      unknown
      http://ocsp.thawte.com01.exefalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1546802
      Start date and time:2024-11-01 15:58:46 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 3s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:3
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:1.exe
      Detection:MAL
      Classification:mal52.winEXE@2/1@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 97%
      • Number of executed functions: 5
      • Number of non-executed functions: 19
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: 1.exe
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\1.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):501
      Entropy (8bit):4.901853079623814
      Encrypted:false
      SSDEEP:12:IfwB/Mv/ClbUnubUnKYcgrqKjveBKbUnCtbUneoRgOuIBGE:RB/SNBQKj2BhHeMgU7
      MD5:8CBFCEA886415DD17F03BC96DB2E6164
      SHA1:DF43C95DE6B49EC456AE972F5115C94A77620060
      SHA-256:5F6290DDE347E8CC9E3051032BA4E1BB8647529B272BA5E6D9CECD200783BCD6
      SHA-512:3EC810A874B743C864200D86CE9B4DB723E376404E9CD16BB1813CC88407F04F7A07C3A5CAFB83D7B4B724964E7B30EB5EF5D3527D59FC2A5A8D93E9252FD4EA
      Malicious:false
      Reputation:low
      Preview:Adobe (R) AIR (R) Redistribution Helper (ARH)..Version 3.5.0.0..Copyright (c) 2008-2011 Adobe Systems Incorporated. All rights reserved.....usage:.. arh -help.. arh -version.. arh -appLocation <appid> (<pubid>)?.. arh -appVersion <appid> (<pubid>)?.. arh -installAppSilent { (-location <loc>) -desktopShortcut -programMenu } <file>.. arh -uninstallAppSilent <appid> (<pubid>)?.. arh -isAppInstalled <appid> (<pubid>)?.. arh -isRuntimeInstalled.. arh -runtimeVersion.. arh -updateUserState..
      File type:PE32 executable (console) Intel 80386, for MS Windows
      Entropy (8bit):6.5312679305983075
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.81%
      • Win32 Executable (generic) a (10002005/4) 49.76%
      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.41%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:1.exe
      File size:1'212'233 bytes
      MD5:d940ad60dee55174455c2a43a8353d2e
      SHA1:7b0832cd378423da73831e6a45144248fe5d17e4
      SHA256:47c1439cbe3d3ea852e7e45c2d201cb83e5949193b07d9f321c41e0343eaa6a8
      SHA512:67f71849e159598fc3aa358cacfff739ab6aa7f470df00497915cc15237b9f66d0d779b079fde3326b93beeaf1414abf2510233929e38da9b32d4c4253ea7f2d
      SSDEEP:24576:87g8Od5CN7g8O+C7WUtLpwbtLpwEoJdXN0BN2qnw4an:87rO67rO5btL2tLFoJdXN0BMOwLn
      TLSH:4D45AE21BBE84432F4B389318AB5D665EA76B9705B30CACF1284462F1E737D1D931B27
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................T................................{......................................Rich............................PE..L..
      Icon Hash:00928e8e8686b000
      Entrypoint:0x40333c
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x5036A813 [Thu Aug 23 22:00:51 2012 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:0
      File Version Major:5
      File Version Minor:0
      Subsystem Version Major:5
      Subsystem Version Minor:0
      Import Hash:085b8a5d9e723b8ba9982a936ce1c779
      Signature Valid:
      Signature Issuer:
      Signature Validation Error:
      Error Number:
      Not Before, Not After
        Subject Chain
          Version:
          Thumbprint MD5:
          Thumbprint SHA-1:
          Thumbprint SHA-256:
          Serial:
          Instruction
          call 00007F2D948B9B3Ah
          jmp 00007F2D948B59CAh
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          push ebp
          mov ebp, esp
          push esi
          xor eax, eax
          push eax
          push eax
          push eax
          push eax
          push eax
          push eax
          push eax
          push eax
          mov edx, dword ptr [ebp+0Ch]
          lea ecx, dword ptr [ecx+00h]
          mov al, byte ptr [edx]
          or al, al
          je 00007F2D948B5B2Bh
          add edx, 01h
          bts dword ptr [esp], eax
          jmp 00007F2D948B5B13h
          mov esi, dword ptr [ebp+08h]
          or ecx, FFFFFFFFh
          lea ecx, dword ptr [ecx+00h]
          add ecx, 01h
          mov al, byte ptr [esi]
          or al, al
          je 00007F2D948B5B2Bh
          add esi, 01h
          bt dword ptr [esp], eax
          jc 00007F2D948B5B10h
          mov eax, ecx
          add esp, 20h
          pop esi
          leave
          ret
          mov edi, edi
          push ebp
          mov ebp, esp
          push ebx
          push esi
          mov esi, dword ptr [ebp+08h]
          mov eax, dword ptr [esi+0Ch]
          mov ecx, eax
          and cl, 00000003h
          xor ebx, ebx
          cmp cl, 00000002h
          jne 00007F2D948B5B62h
          test eax, 00000108h
          je 00007F2D948B5B5Bh
          mov eax, dword ptr [esi+08h]
          push edi
          mov edi, dword ptr [esi]
          sub edi, eax
          test edi, edi
          jle 00007F2D948B5B4Eh
          push edi
          push eax
          push esi
          call 00007F2D948B8B0Ch
          pop ecx
          push eax
          call 00007F2D948BA3D7h
          add esp, 0Ch
          cmp eax, edi
          jne 00007F2D948B5B31h
          mov eax, dword ptr [esi+0Ch]
          test al, al
          jns 00007F2D948B5B31h
          and eax, FFFFFFFDh
          mov dword ptr [esi+0Ch], eax
          jmp 00007F2D948B5B29h
          or dword ptr [esi+0Ch], 20h
          or ebx, FFFFFFFFh
          pop edi
          mov eax, dword ptr [esi+08h]
          and dword ptr [esi+04h], 00000000h
          mov dword ptr [esi], eax
          pop esi
          mov eax, ebx
          pop ebx
          pop ebp
          ret
          mov edi, edi
          push ebp
          mov ebp, esp
          Programming Language:
          • [ASM] VS2008 SP1 build 30729
          • [ C ] VS2008 SP1 build 30729
          • [C++] VS2008 SP1 build 30729
          • [IMP] VS2005 build 50727
          • [RES] VS2008 build 21022
          • [LNK] VS2008 SP1 build 30729
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x10eb40x78.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x4f0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x13a000x1ed0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x160000xb54.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0xe1e00x1c.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x108700x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0xe0000x194.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000xce290xd0004daa39d9886367f120ef99196624dd86False0.5785381610576923data6.512952124582506IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0xe0000x37760x38008cf60ffda618ab7b4db1326ad4df73b1False0.36195591517857145data5.346637406106374IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x120000x2d240x1000200276f279210dec423b4d75c4d02560False0.228759765625data2.385971715246726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x150000x4f00x600c5e2007c37ffa663f97c4f23f337f2bbFalse0.3873697916666667data4.504810395738668IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x160000x17680x18003f1bf9d9187de4bb4a263b3783acea82False0.4075520833333333data4.009632852542217IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_VERSION0x150a00x2f4dataEnglishUnited States0.45634920634920634
          RT_MANIFEST0x153940x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
          DLLImport
          KERNEL32.dllWideCharToMultiByte, CreateFileA, HeapAlloc, GetProcessHeap, HeapFree, CloseHandle, GetExitCodeProcess, WaitForSingleObject, CreateProcessW, LocalFree, MultiByteToWideChar, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, WriteFile, SetFilePointer, WriteConsoleW, GetFileType, GetStdHandle, GetModuleFileNameW, GetLastError, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, SetHandleCount, GetStartupInfoA, Sleep, GetModuleHandleW, GetProcAddress, ExitProcess, LoadLibraryW, RaiseException, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetConsoleCP, GetConsoleMode, FlushFileBuffers, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LCMapStringA, LCMapStringW, VirtualAlloc, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, LoadLibraryA, RtlUnwind, WriteConsoleA, GetConsoleOutputCP, SetStdHandle, GetStringTypeA, GetStringTypeW, GetLocaleInfoA
          VERSION.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
          msi.dll
          SHLWAPI.dllPathAppendW, PathRemoveFileSpecW, StrDupW, StrChrA, PathAppendA
          ADVAPI32.dllCryptAcquireContextW, CryptDestroyHash, RegOpenKeyExW, RegQueryValueExW, RegCloseKey, CryptReleaseContext, CryptCreateHash, CryptHashData, CryptGetHashParam
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:10:59:35
          Start date:01/11/2024
          Path:C:\Users\user\Desktop\1.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\1.exe"
          Imagebase:0x5d0000
          File size:1'212'233 bytes
          MD5 hash:D940AD60DEE55174455C2A43A8353D2E
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:10:59:35
          Start date:01/11/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6d64d0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:6.5%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:5.5%
            Total number of Nodes:1954
            Total number of Limit Nodes:66
            execution_graph 8550 5d2582 8557 5d3573 8550->8557 8553 5d2595 8555 5d38c3 __output_l 67 API calls 8553->8555 8556 5d25a0 8555->8556 8558 5d3446 _flsall 105 API calls 8557->8558 8559 5d2587 8558->8559 8559->8553 8560 5d3f20 8559->8560 8561 5d3f2c __msize 8560->8561 8562 5d4473 __lock 67 API calls 8561->8562 8564 5d3f38 8562->8564 8563 5d3fa1 8583 5d3fb6 8563->8583 8564->8563 8568 5d3f76 DeleteCriticalSection 8564->8568 8570 5da859 8564->8570 8566 5d3fad __msize 8566->8553 8569 5d38c3 __output_l 67 API calls 8568->8569 8569->8564 8571 5da865 __msize 8570->8571 8572 5da879 8571->8572 8573 5da896 8571->8573 8574 5d5fd9 __output_l 67 API calls 8572->8574 8575 5d25a2 __lock_file 68 API calls 8573->8575 8579 5da88e __msize 8573->8579 8576 5da87e 8574->8576 8577 5da8ae 8575->8577 8578 5d45dd __output_l 6 API calls 8576->8578 8586 5da7e2 8577->8586 8578->8579 8579->8564 8656 5d4399 LeaveCriticalSection 8583->8656 8585 5d3fbd 8585->8566 8587 5da7f6 8586->8587 8588 5da812 8586->8588 8589 5d5fd9 __output_l 67 API calls 8587->8589 8590 5da80b 8588->8590 8592 5d3396 __flush 101 API calls 8588->8592 8591 5da7fb 8589->8591 8602 5da8cd 8590->8602 8593 5d45dd __output_l 6 API calls 8591->8593 8594 5da81e 8592->8594 8593->8590 8595 5db6ee __freebuf 67 API calls 8594->8595 8596 5da826 8595->8596 8597 5d63b1 __fileno 67 API calls 8596->8597 8598 5da82c 8597->8598 8605 5dd641 8598->8605 8600 5da832 8600->8590 8601 5d38c3 __output_l 67 API calls 8600->8601 8601->8590 8603 5d2615 _fwprintf 2 API calls 8602->8603 8604 5da8d3 8603->8604 8604->8579 8606 5dd64d __msize 8605->8606 8607 5dd655 8606->8607 8608 5dd670 8606->8608 8609 5d5fec __write_nolock 67 API calls 8607->8609 8610 5dd67e 8608->8610 8613 5dd6bf 8608->8613 8611 5dd65a 8609->8611 8612 5d5fec __write_nolock 67 API calls 8610->8612 8614 5d5fd9 __output_l 67 API calls 8611->8614 8615 5dd683 8612->8615 8616 5dc698 ___lock_fhandle 68 API calls 8613->8616 8625 5dd662 __msize 8614->8625 8617 5d5fd9 __output_l 67 API calls 8615->8617 8618 5dd6c5 8616->8618 8619 5dd68a 8617->8619 8620 5dd6e0 8618->8620 8621 5dd6d2 8618->8621 8622 5d45dd __output_l 6 API calls 8619->8622 8624 5d5fd9 __output_l 67 API calls 8620->8624 8628 5dd5a5 8621->8628 8622->8625 8626 5dd6da 8624->8626 8625->8600 8643 5dd704 8626->8643 8629 5dc621 __lseeki64_nolock 67 API calls 8628->8629 8632 5dd5b5 8629->8632 8630 5dd60b 8646 5dc59b 8630->8646 8632->8630 8633 5dd5e9 8632->8633 8635 5dc621 __lseeki64_nolock 67 API calls 8632->8635 8633->8630 8636 5dc621 __lseeki64_nolock 67 API calls 8633->8636 8638 5dd5e0 8635->8638 8639 5dd5f5 CloseHandle 8636->8639 8637 5dd635 8637->8626 8642 5dc621 __lseeki64_nolock 67 API calls 8638->8642 8639->8630 8640 5dd601 GetLastError 8639->8640 8640->8630 8641 5d5fff __dosmaperr 67 API calls 8641->8637 8642->8633 8655 5dc738 LeaveCriticalSection 8643->8655 8645 5dd70c 8645->8625 8647 5dc5ac 8646->8647 8648 5dc607 8646->8648 8647->8648 8653 5dc5d7 8647->8653 8649 5d5fd9 __output_l 67 API calls 8648->8649 8650 5dc60c 8649->8650 8651 5d5fec __write_nolock 67 API calls 8650->8651 8652 5dc5fd 8651->8652 8652->8637 8652->8641 8653->8652 8654 5dc5f7 SetStdHandle 8653->8654 8654->8652 8655->8645 8656->8585 8673 5d64b1 8676 5d64a1 8673->8676 8675 5d64be ctype 8679 5dbf43 8676->8679 8678 5d64af 8678->8675 8680 5dbf4f __msize 8679->8680 8681 5d4473 __lock 67 API calls 8680->8681 8682 5dbf56 8681->8682 8686 5d38c3 __output_l 67 API calls 8682->8686 8687 5dbf8f 8682->8687 8688 5dbf86 8682->8688 8684 5dbfa0 __msize 8684->8678 8685 5d38c3 __output_l 67 API calls 8685->8687 8686->8688 8689 5dbfaa 8687->8689 8688->8685 8692 5d4399 LeaveCriticalSection 8689->8692 8691 5dbfb1 8691->8684 8692->8691 6256 5d31eb 6257 5d31f7 __msize 6256->6257 6291 5d7326 HeapCreate 6257->6291 6260 5d3254 6293 5d7199 GetModuleHandleW 6260->6293 6264 5d3265 __RTC_Initialize 6327 5d3bed 6264->6327 6265 5d31c2 _fast_error_exit 67 API calls 6265->6264 6267 5d3274 6268 5d3280 GetCommandLineW 6267->6268 6394 5d3fef 6267->6394 6342 5d6ce0 GetEnvironmentStringsW 6268->6342 6272 5d328f 6349 5d6c32 GetModuleFileNameW 6272->6349 6275 5d32a4 6355 5d6a03 6275->6355 6276 5d3fef __amsg_exit 67 API calls 6276->6275 6279 5d32b5 6368 5d40ae 6279->6368 6280 5d3fef __amsg_exit 67 API calls 6280->6279 6282 5d32bd 6283 5d32c8 6282->6283 6284 5d3fef __amsg_exit 67 API calls 6282->6284 6374 5d15a9 6283->6374 6284->6283 6286 5d32e5 6287 5d32f7 6286->6287 6383 5d425f 6286->6383 6401 5d428b 6287->6401 6290 5d32fc __msize 6292 5d3248 6291->6292 6292->6260 6386 5d31c2 6292->6386 6294 5d71ad 6293->6294 6295 5d71b4 6293->6295 6404 5d3fbf 6294->6404 6297 5d731c 6295->6297 6298 5d71be GetProcAddress GetProcAddress GetProcAddress GetProcAddress 6295->6298 6463 5d6eb3 6297->6463 6300 5d7207 TlsAlloc 6298->6300 6302 5d325a 6300->6302 6304 5d7255 TlsSetValue 6300->6304 6302->6264 6302->6265 6304->6302 6305 5d7266 6304->6305 6408 5d42a9 6305->6408 6310 5d6d89 __encode_pointer 6 API calls 6311 5d7286 6310->6311 6312 5d6d89 __encode_pointer 6 API calls 6311->6312 6313 5d7296 6312->6313 6314 5d6d89 __encode_pointer 6 API calls 6313->6314 6315 5d72a6 6314->6315 6425 5d42f7 6315->6425 6322 5d6e04 __decode_pointer 6 API calls 6323 5d72fa 6322->6323 6323->6297 6324 5d7301 6323->6324 6445 5d6ef0 6324->6445 6326 5d7309 GetCurrentThreadId 6326->6302 6792 5d6024 6327->6792 6329 5d3bf9 GetStartupInfoA 6330 5d3e86 __calloc_crt 67 API calls 6329->6330 6336 5d3c1a 6330->6336 6331 5d3e38 __msize 6331->6267 6332 5d3db5 GetStdHandle 6337 5d3d7f 6332->6337 6333 5d3e1a SetHandleCount 6333->6331 6334 5d3e86 __calloc_crt 67 API calls 6334->6336 6335 5d3dc7 GetFileType 6335->6337 6336->6331 6336->6334 6336->6337 6339 5d3d02 6336->6339 6337->6331 6337->6332 6337->6333 6337->6335 6340 5da449 __mtinitlocknum InitializeCriticalSectionAndSpinCount 6337->6340 6338 5d3d2b GetFileType 6338->6339 6339->6331 6339->6337 6339->6338 6341 5da449 __mtinitlocknum InitializeCriticalSectionAndSpinCount 6339->6341 6340->6337 6341->6339 6343 5d6cf5 6342->6343 6344 5d6cf1 6342->6344 6346 5d3e41 __malloc_crt 67 API calls 6343->6346 6344->6272 6347 5d6d16 _realloc 6346->6347 6348 5d6d1d FreeEnvironmentStringsW 6347->6348 6348->6272 6350 5d6c67 _wparse_cmdline 6349->6350 6351 5d3299 6350->6351 6352 5d6ca4 6350->6352 6351->6275 6351->6276 6353 5d3e41 __malloc_crt 67 API calls 6352->6353 6354 5d6caa _wparse_cmdline 6353->6354 6354->6351 6356 5d6a1b _wcslen 6355->6356 6358 5d32aa 6355->6358 6357 5d3e86 __calloc_crt 67 API calls 6356->6357 6359 5d6a3f _wcslen 6357->6359 6358->6279 6358->6280 6359->6358 6360 5d6aa4 6359->6360 6362 5d3e86 __calloc_crt 67 API calls 6359->6362 6363 5d6aca 6359->6363 6366 5d6a89 6359->6366 6793 5d51cf 6359->6793 6361 5d38c3 __output_l 67 API calls 6360->6361 6361->6358 6362->6359 6364 5d38c3 __output_l 67 API calls 6363->6364 6364->6358 6366->6359 6367 5d44b5 __invoke_watson 10 API calls 6366->6367 6367->6366 6370 5d40bc __IsNonwritableInCurrentImage 6368->6370 6802 5da8d5 6370->6802 6371 5d40da __initterm_e 6373 5d40f9 __IsNonwritableInCurrentImage __initterm 6371->6373 6806 5d3ad0 6371->6806 6373->6282 6906 5d315d 6374->6906 6377 5d1622 6918 5d1000 6377->6918 6378 5d15ec WideCharToMultiByte 6380 5d315d 75 API calls 6378->6380 6381 5d1603 WideCharToMultiByte 6380->6381 6381->6377 6381->6378 6382 5d1631 ctype 6382->6286 6384 5d4133 _doexit 67 API calls 6383->6384 6385 5d4270 6384->6385 6385->6287 6387 5d31d5 6386->6387 6388 5d31d0 6386->6388 6390 5d66be __NMSG_WRITE 67 API calls 6387->6390 6389 5d6869 __FF_MSGBANNER 67 API calls 6388->6389 6389->6387 6391 5d31dd 6390->6391 6392 5d4043 _malloc 3 API calls 6391->6392 6393 5d31e7 6392->6393 6393->6260 6395 5d6869 __FF_MSGBANNER 67 API calls 6394->6395 6396 5d3ff9 6395->6396 6397 5d66be __NMSG_WRITE 67 API calls 6396->6397 6398 5d4001 6397->6398 6399 5d6e04 __decode_pointer 6 API calls 6398->6399 6400 5d327f 6399->6400 6400->6268 6402 5d4133 _doexit 67 API calls 6401->6402 6403 5d4296 6402->6403 6403->6290 6405 5d3fca Sleep GetModuleHandleW 6404->6405 6406 5d3fec 6405->6406 6407 5d3fe8 6405->6407 6406->6295 6407->6405 6407->6406 6469 5d6dfb 6408->6469 6410 5d42b1 __init_pointers 6472 5daa86 6410->6472 6413 5d6d89 __encode_pointer 6 API calls 6414 5d42ed 6413->6414 6415 5d6d89 TlsGetValue 6414->6415 6416 5d6da1 6415->6416 6417 5d6dc2 GetModuleHandleW 6415->6417 6416->6417 6418 5d6dab TlsGetValue 6416->6418 6419 5d6ddd GetProcAddress 6417->6419 6420 5d6dd2 6417->6420 6422 5d6db6 6418->6422 6424 5d6dba 6419->6424 6421 5d3fbf __crt_waiting_on_module_handle 2 API calls 6420->6421 6423 5d6dd8 6421->6423 6422->6417 6422->6424 6423->6419 6423->6424 6424->6310 6426 5d4302 6425->6426 6428 5d4330 6426->6428 6475 5da449 6426->6475 6428->6297 6429 5d6e04 TlsGetValue 6428->6429 6430 5d6e3d GetModuleHandleW 6429->6430 6431 5d6e1c 6429->6431 6433 5d6e4d 6430->6433 6434 5d6e58 GetProcAddress 6430->6434 6431->6430 6432 5d6e26 TlsGetValue 6431->6432 6437 5d6e31 6432->6437 6435 5d3fbf __crt_waiting_on_module_handle 2 API calls 6433->6435 6436 5d6e35 6434->6436 6438 5d6e53 6435->6438 6436->6297 6439 5d3e86 6436->6439 6437->6430 6437->6436 6438->6434 6438->6436 6441 5d3e8f 6439->6441 6442 5d3ecc 6441->6442 6443 5d3ead Sleep 6441->6443 6480 5da4a9 6441->6480 6442->6297 6442->6322 6444 5d3ec2 6443->6444 6444->6441 6444->6442 6771 5d6024 6445->6771 6447 5d6efc GetModuleHandleW 6448 5d6f0c 6447->6448 6449 5d6f12 6447->6449 6452 5d3fbf __crt_waiting_on_module_handle 2 API calls 6448->6452 6450 5d6f4e 6449->6450 6451 5d6f2a GetProcAddress GetProcAddress 6449->6451 6453 5d4473 __lock 63 API calls 6450->6453 6451->6450 6452->6449 6454 5d6f6d InterlockedIncrement 6453->6454 6772 5d6fc5 6454->6772 6457 5d4473 __lock 63 API calls 6458 5d6f8e 6457->6458 6775 5d9204 InterlockedIncrement 6458->6775 6460 5d6fac 6787 5d6fce 6460->6787 6462 5d6fb9 __msize 6462->6326 6464 5d6ebd 6463->6464 6465 5d6ec9 6463->6465 6466 5d6e04 __decode_pointer 6 API calls 6464->6466 6467 5d6edd TlsFree 6465->6467 6468 5d6eeb 6465->6468 6466->6465 6467->6468 6468->6468 6470 5d6d89 __encode_pointer 6 API calls 6469->6470 6471 5d6e02 6470->6471 6471->6410 6473 5d6d89 __encode_pointer 6 API calls 6472->6473 6474 5d42e3 6473->6474 6474->6413 6479 5d6024 6475->6479 6477 5da455 InitializeCriticalSectionAndSpinCount 6478 5da499 __msize 6477->6478 6478->6426 6479->6477 6481 5da4b5 __msize 6480->6481 6482 5da4cd 6481->6482 6492 5da4ec _memset 6481->6492 6493 5d5fd9 6482->6493 6486 5da55e HeapAlloc 6486->6492 6487 5da4e2 __msize 6487->6441 6492->6486 6492->6487 6499 5d4473 6492->6499 6506 5da05b 6492->6506 6512 5da5a5 6492->6512 6515 5d65fa 6492->6515 6518 5d6fd7 GetLastError 6493->6518 6495 5d5fde 6496 5d45dd 6495->6496 6497 5d6e04 __decode_pointer 6 API calls 6496->6497 6498 5d45ed __invoke_watson 6497->6498 6500 5d4488 6499->6500 6501 5d449b EnterCriticalSection 6499->6501 6566 5d43b0 6500->6566 6501->6492 6503 5d448e 6503->6501 6504 5d3fef __amsg_exit 66 API calls 6503->6504 6505 5d449a 6504->6505 6505->6501 6509 5da089 6506->6509 6507 5da122 6511 5da12b 6507->6511 6766 5d9c72 6507->6766 6509->6507 6509->6511 6759 5d9bc2 6509->6759 6511->6492 6770 5d4399 LeaveCriticalSection 6512->6770 6514 5da5ac 6514->6492 6516 5d6e04 __decode_pointer 6 API calls 6515->6516 6517 5d660a 6516->6517 6517->6492 6533 5d6e7f TlsGetValue 6518->6533 6521 5d7044 SetLastError 6521->6495 6522 5d3e86 __calloc_crt 64 API calls 6523 5d7002 6522->6523 6523->6521 6524 5d700a 6523->6524 6525 5d6e04 __decode_pointer 6 API calls 6524->6525 6526 5d701c 6525->6526 6527 5d703b 6526->6527 6528 5d7023 6526->6528 6538 5d38c3 6527->6538 6529 5d6ef0 __initptd 64 API calls 6528->6529 6531 5d702b GetCurrentThreadId 6529->6531 6531->6521 6532 5d7041 6532->6521 6534 5d6eaf 6533->6534 6535 5d6e94 6533->6535 6534->6521 6534->6522 6536 5d6e04 __decode_pointer 6 API calls 6535->6536 6537 5d6e9f TlsSetValue 6536->6537 6537->6534 6539 5d38cf __msize 6538->6539 6540 5d390e 6539->6540 6541 5d4473 __lock 65 API calls 6539->6541 6546 5d3948 _realloc __msize 6539->6546 6542 5d3923 HeapFree 6540->6542 6540->6546 6547 5d38e6 ___sbh_find_block 6541->6547 6543 5d3935 6542->6543 6542->6546 6544 5d5fd9 __output_l 65 API calls 6543->6544 6545 5d393a GetLastError 6544->6545 6545->6546 6546->6532 6548 5d3900 6547->6548 6551 5d98ac 6547->6551 6558 5d3919 6548->6558 6552 5d98eb 6551->6552 6557 5d9b8d 6551->6557 6553 5d9ad7 VirtualFree 6552->6553 6552->6557 6554 5d9b3b 6553->6554 6555 5d9b4a VirtualFree HeapFree 6554->6555 6554->6557 6561 5dd240 6555->6561 6557->6548 6565 5d4399 LeaveCriticalSection 6558->6565 6560 5d3920 6560->6540 6563 5dd258 6561->6563 6562 5dd287 6562->6557 6563->6562 6564 5dd27f __VEC_memcpy 6563->6564 6564->6562 6565->6560 6567 5d43bc __msize 6566->6567 6568 5d43e2 6567->6568 6592 5d6869 6567->6592 6577 5d43f2 __msize 6568->6577 6638 5d3e41 6568->6638 6575 5d4404 6579 5d5fd9 __output_l 67 API calls 6575->6579 6576 5d4413 6580 5d4473 __lock 67 API calls 6576->6580 6577->6503 6579->6577 6581 5d441a 6580->6581 6582 5d444e 6581->6582 6583 5d4422 6581->6583 6584 5d38c3 __output_l 67 API calls 6582->6584 6585 5da449 __mtinitlocknum InitializeCriticalSectionAndSpinCount 6583->6585 6587 5d443f 6584->6587 6586 5d442d 6585->6586 6586->6587 6588 5d38c3 __output_l 67 API calls 6586->6588 6643 5d446a 6587->6643 6590 5d4439 6588->6590 6591 5d5fd9 __output_l 67 API calls 6590->6591 6591->6587 6646 5d523e 6592->6646 6595 5d523e __set_error_mode 67 API calls 6599 5d687d 6595->6599 6596 5d66be __NMSG_WRITE 67 API calls 6597 5d6895 6596->6597 6598 5d66be __NMSG_WRITE 67 API calls 6597->6598 6600 5d43d1 6598->6600 6599->6596 6599->6600 6601 5d66be 6600->6601 6602 5d66d2 6601->6602 6603 5d523e __set_error_mode 64 API calls 6602->6603 6634 5d43d8 6602->6634 6604 5d66f4 6603->6604 6605 5d6832 GetStdHandle 6604->6605 6606 5d523e __set_error_mode 64 API calls 6604->6606 6607 5d6840 _strlen 6605->6607 6605->6634 6608 5d6705 6606->6608 6610 5d6859 WriteFile 6607->6610 6607->6634 6608->6605 6609 5d6717 6608->6609 6609->6634 6652 5d93e0 6609->6652 6610->6634 6613 5d674d GetModuleFileNameA 6615 5d676b 6613->6615 6619 5d678e _strlen 6613->6619 6617 5d93e0 _strcpy_s 64 API calls 6615->6617 6618 5d677b 6617->6618 6618->6619 6621 5d44b5 __invoke_watson 10 API calls 6618->6621 6620 5d67d1 6619->6620 6668 5d380e 6619->6668 6677 5dc11c 6620->6677 6621->6619 6626 5d67f5 6628 5dc11c _strcat_s 64 API calls 6626->6628 6627 5d44b5 __invoke_watson 10 API calls 6627->6626 6629 5d6809 6628->6629 6631 5d681a 6629->6631 6632 5d44b5 __invoke_watson 10 API calls 6629->6632 6630 5d44b5 __invoke_watson 10 API calls 6630->6620 6686 5dbfb3 6631->6686 6632->6631 6635 5d4043 6634->6635 6724 5d4018 GetModuleHandleW 6635->6724 6640 5d3e4a 6638->6640 6641 5d3e80 6640->6641 6642 5d3e61 Sleep 6640->6642 6728 5d6521 6640->6728 6641->6575 6641->6576 6642->6640 6758 5d4399 LeaveCriticalSection 6643->6758 6645 5d4471 6645->6577 6647 5d524d 6646->6647 6648 5d5fd9 __output_l 67 API calls 6647->6648 6649 5d5257 6647->6649 6650 5d5270 6648->6650 6649->6595 6649->6599 6651 5d45dd __output_l 6 API calls 6650->6651 6651->6649 6653 5d93f8 6652->6653 6654 5d93f1 6652->6654 6655 5d5fd9 __output_l 67 API calls 6653->6655 6654->6653 6659 5d941e 6654->6659 6656 5d93fd 6655->6656 6657 5d45dd __output_l 6 API calls 6656->6657 6658 5d6739 6657->6658 6658->6613 6661 5d44b5 6658->6661 6659->6658 6660 5d5fd9 __output_l 67 API calls 6659->6660 6660->6656 6713 5d2ec0 6661->6713 6663 5d44e2 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6664 5d45be GetCurrentProcess TerminateProcess 6663->6664 6667 5d45b2 __invoke_watson 6663->6667 6715 5d24bc 6664->6715 6666 5d45db 6666->6613 6667->6664 6673 5d3820 6668->6673 6669 5d3824 6670 5d3829 6669->6670 6671 5d5fd9 __output_l 67 API calls 6669->6671 6670->6620 6670->6630 6672 5d3840 6671->6672 6674 5d45dd __output_l 6 API calls 6672->6674 6673->6669 6673->6670 6675 5d386a 6673->6675 6674->6670 6675->6670 6676 5d5fd9 __output_l 67 API calls 6675->6676 6676->6672 6678 5dc134 6677->6678 6681 5dc12d 6677->6681 6679 5d5fd9 __output_l 67 API calls 6678->6679 6680 5dc139 6679->6680 6682 5d45dd __output_l 6 API calls 6680->6682 6681->6678 6684 5dc168 6681->6684 6683 5d67e4 6682->6683 6683->6626 6683->6627 6684->6683 6685 5d5fd9 __output_l 67 API calls 6684->6685 6685->6680 6687 5d6dfb __init_pointers 6 API calls 6686->6687 6688 5dbfc3 6687->6688 6689 5dc05e 6688->6689 6690 5dbfd6 LoadLibraryA 6688->6690 6697 5d6e04 __decode_pointer 6 API calls 6689->6697 6709 5dc088 6689->6709 6691 5dbfeb GetProcAddress 6690->6691 6692 5dc100 6690->6692 6691->6692 6694 5dc001 6691->6694 6692->6634 6693 5dc0b3 6695 5d6e04 __decode_pointer 6 API calls 6693->6695 6698 5d6d89 __encode_pointer 6 API calls 6694->6698 6695->6692 6696 5d6e04 __decode_pointer 6 API calls 6706 5dc0cb 6696->6706 6699 5dc07b 6697->6699 6700 5dc007 GetProcAddress 6698->6700 6701 5d6e04 __decode_pointer 6 API calls 6699->6701 6702 5d6d89 __encode_pointer 6 API calls 6700->6702 6701->6709 6703 5dc01c GetProcAddress 6702->6703 6704 5d6d89 __encode_pointer 6 API calls 6703->6704 6705 5dc031 GetProcAddress 6704->6705 6707 5d6d89 __encode_pointer 6 API calls 6705->6707 6706->6693 6708 5d6e04 __decode_pointer 6 API calls 6706->6708 6710 5dc046 6707->6710 6708->6693 6709->6693 6709->6696 6710->6689 6711 5dc050 GetProcAddress 6710->6711 6712 5d6d89 __encode_pointer 6 API calls 6711->6712 6712->6689 6714 5d2ecc __VEC_memzero 6713->6714 6714->6663 6714->6714 6716 5d24c4 6715->6716 6717 5d24c6 IsDebuggerPresent 6715->6717 6716->6666 6723 5da432 6717->6723 6720 5d3bb4 SetUnhandledExceptionFilter UnhandledExceptionFilter 6721 5d3bd9 GetCurrentProcess TerminateProcess 6720->6721 6722 5d3bd1 __invoke_watson 6720->6722 6721->6666 6722->6721 6723->6720 6725 5d402c GetProcAddress 6724->6725 6726 5d4041 ExitProcess 6724->6726 6725->6726 6727 5d403c 6725->6727 6727->6726 6729 5d65d4 6728->6729 6734 5d6533 6728->6734 6730 5d65fa _malloc 6 API calls 6729->6730 6731 5d65da 6730->6731 6733 5d5fd9 __output_l 66 API calls 6731->6733 6732 5d6869 __FF_MSGBANNER 66 API calls 6739 5d6544 6732->6739 6735 5d65cc 6733->6735 6734->6735 6734->6739 6741 5d65c0 6734->6741 6743 5d65fa _malloc 6 API calls 6734->6743 6744 5d65c5 6734->6744 6746 5d64d2 6734->6746 6735->6640 6737 5d66be __NMSG_WRITE 66 API calls 6737->6739 6738 5d6590 HeapAlloc 6738->6734 6739->6732 6739->6734 6739->6737 6739->6738 6740 5d4043 _malloc 3 API calls 6739->6740 6740->6739 6742 5d5fd9 __output_l 66 API calls 6741->6742 6742->6744 6743->6734 6745 5d5fd9 __output_l 66 API calls 6744->6745 6745->6735 6747 5d64de __msize 6746->6747 6748 5d650f __msize 6747->6748 6749 5d4473 __lock 67 API calls 6747->6749 6748->6734 6750 5d64f4 6749->6750 6751 5da05b ___sbh_alloc_block 5 API calls 6750->6751 6752 5d64ff 6751->6752 6754 5d6518 6752->6754 6757 5d4399 LeaveCriticalSection 6754->6757 6756 5d651f 6756->6748 6757->6756 6758->6645 6760 5d9c09 HeapAlloc 6759->6760 6761 5d9bd5 HeapReAlloc 6759->6761 6763 5d9bf3 6760->6763 6764 5d9c2c VirtualAlloc 6760->6764 6762 5d9bf7 6761->6762 6761->6763 6762->6760 6763->6507 6764->6763 6765 5d9c46 HeapFree 6764->6765 6765->6763 6767 5d9c89 VirtualAlloc 6766->6767 6769 5d9cd0 6767->6769 6769->6511 6770->6514 6771->6447 6790 5d4399 LeaveCriticalSection 6772->6790 6774 5d6f87 6774->6457 6776 5d9225 6775->6776 6777 5d9222 InterlockedIncrement 6775->6777 6778 5d922f InterlockedIncrement 6776->6778 6779 5d9232 6776->6779 6777->6776 6778->6779 6780 5d923c InterlockedIncrement 6779->6780 6781 5d923f 6779->6781 6780->6781 6782 5d9249 InterlockedIncrement 6781->6782 6784 5d924c 6781->6784 6782->6784 6783 5d9265 InterlockedIncrement 6783->6784 6784->6783 6785 5d9275 InterlockedIncrement 6784->6785 6786 5d9280 InterlockedIncrement 6784->6786 6785->6784 6786->6460 6791 5d4399 LeaveCriticalSection 6787->6791 6789 5d6fd5 6789->6462 6790->6774 6791->6789 6792->6329 6794 5d51e7 6793->6794 6795 5d51e0 6793->6795 6796 5d5fd9 __output_l 67 API calls 6794->6796 6795->6794 6799 5d5213 6795->6799 6801 5d51ec 6796->6801 6797 5d45dd __output_l 6 API calls 6798 5d51fb 6797->6798 6798->6359 6799->6798 6800 5d5fd9 __output_l 67 API calls 6799->6800 6800->6801 6801->6797 6803 5da8db 6802->6803 6804 5d6d89 __encode_pointer 6 API calls 6803->6804 6805 5da8f3 6803->6805 6804->6803 6805->6371 6809 5d3a94 6806->6809 6808 5d3add 6808->6373 6810 5d3aa0 __msize 6809->6810 6817 5d405b 6810->6817 6816 5d3ac1 __msize 6816->6808 6818 5d4473 __lock 67 API calls 6817->6818 6819 5d3aa5 6818->6819 6820 5d39a9 6819->6820 6821 5d6e04 __decode_pointer 6 API calls 6820->6821 6822 5d39bd 6821->6822 6823 5d6e04 __decode_pointer 6 API calls 6822->6823 6824 5d39cd 6823->6824 6825 5d3a50 6824->6825 6840 5da38f 6824->6840 6837 5d3aca 6825->6837 6827 5d6d89 __encode_pointer 6 API calls 6828 5d3a45 6827->6828 6831 5d6d89 __encode_pointer 6 API calls 6828->6831 6829 5d3a0f 6829->6825 6833 5d3ed2 __realloc_crt 73 API calls 6829->6833 6834 5d3a25 6829->6834 6830 5d39eb 6830->6829 6836 5d3a37 6830->6836 6853 5d3ed2 6830->6853 6831->6825 6833->6834 6834->6825 6835 5d6d89 __encode_pointer 6 API calls 6834->6835 6835->6836 6836->6827 6902 5d4064 6837->6902 6841 5da39b __msize 6840->6841 6842 5da3c8 6841->6842 6843 5da3ab 6841->6843 6844 5da409 HeapSize 6842->6844 6846 5d4473 __lock 67 API calls 6842->6846 6845 5d5fd9 __output_l 67 API calls 6843->6845 6849 5da3c0 __msize 6844->6849 6847 5da3b0 6845->6847 6850 5da3d8 ___sbh_find_block 6846->6850 6848 5d45dd __output_l 6 API calls 6847->6848 6848->6849 6849->6830 6858 5da429 6850->6858 6855 5d3edb 6853->6855 6856 5d3f1a 6855->6856 6857 5d3efb Sleep 6855->6857 6862 5da5c7 6855->6862 6856->6829 6857->6855 6861 5d4399 LeaveCriticalSection 6858->6861 6860 5da404 6860->6844 6860->6849 6861->6860 6863 5da5d3 __msize 6862->6863 6864 5da5e8 6863->6864 6865 5da5da 6863->6865 6867 5da5ef 6864->6867 6868 5da5fb 6864->6868 6866 5d6521 _malloc 67 API calls 6865->6866 6884 5da5e2 _realloc __msize 6866->6884 6869 5d38c3 __output_l 67 API calls 6867->6869 6875 5da76d 6868->6875 6889 5da608 ___sbh_resize_block _realloc ___sbh_find_block 6868->6889 6869->6884 6870 5da7a0 6873 5d65fa _malloc 6 API calls 6870->6873 6871 5da772 HeapReAlloc 6871->6875 6871->6884 6872 5d4473 __lock 67 API calls 6872->6889 6874 5da7a6 6873->6874 6876 5d5fd9 __output_l 67 API calls 6874->6876 6875->6870 6875->6871 6877 5da7c4 6875->6877 6878 5d65fa _malloc 6 API calls 6875->6878 6882 5da7ba 6875->6882 6876->6884 6879 5d5fd9 __output_l 67 API calls 6877->6879 6877->6884 6878->6875 6881 5da7cd GetLastError 6879->6881 6881->6884 6883 5d5fd9 __output_l 67 API calls 6882->6883 6896 5da73b 6883->6896 6884->6855 6885 5da693 HeapAlloc 6885->6889 6886 5da6e8 HeapReAlloc 6886->6889 6887 5da740 GetLastError 6887->6884 6888 5da05b ___sbh_alloc_block 5 API calls 6888->6889 6889->6870 6889->6872 6889->6884 6889->6885 6889->6886 6889->6888 6890 5da753 6889->6890 6891 5d65fa _malloc 6 API calls 6889->6891 6894 5da736 6889->6894 6897 5d98ac VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 6889->6897 6898 5da70b 6889->6898 6890->6884 6892 5d5fd9 __output_l 67 API calls 6890->6892 6891->6889 6893 5da760 6892->6893 6893->6881 6893->6884 6895 5d5fd9 __output_l 67 API calls 6894->6895 6895->6896 6896->6884 6896->6887 6897->6889 6901 5d4399 LeaveCriticalSection 6898->6901 6900 5da712 6900->6889 6901->6900 6905 5d4399 LeaveCriticalSection 6902->6905 6904 5d3acf 6904->6816 6905->6904 6908 5d3167 6906->6908 6907 5d6521 _malloc 67 API calls 6907->6908 6908->6907 6909 5d15cb 6908->6909 6910 5d65fa _malloc 6 API calls 6908->6910 6913 5d3183 std::bad_alloc::bad_alloc 6908->6913 6909->6377 6909->6378 6910->6908 6911 5d31a9 7024 5d3140 6911->7024 6913->6911 6915 5d3ad0 __cinit 74 API calls 6913->6915 6915->6911 6917 5d31c1 6919 5d10cd 6918->6919 6920 5d101b 6918->6920 6923 5d10e4 6919->6923 6924 5d1040 6919->6924 7036 5d2df0 6920->7036 6922 5d1025 6925 5d2df0 _printf 105 API calls 6922->6925 6930 5d1109 6923->6930 6931 5d10f7 6923->6931 6926 5d2df0 _printf 105 API calls 6924->6926 6927 5d1036 6925->6927 6928 5d104d 6926->6928 6929 5d2df0 _printf 105 API calls 6927->6929 6932 5d2df0 _printf 105 API calls 6928->6932 6929->6924 6936 5d122e 6930->6936 6951 5d1120 6930->6951 6933 5d2df0 _printf 105 API calls 6931->6933 6934 5d1059 6932->6934 7018 5d10c5 ctype 6933->7018 6935 5d2df0 _printf 105 API calls 6934->6935 6937 5d1065 6935->6937 6940 5d12dd 6936->6940 6948 5d1245 6936->6948 6938 5d2df0 _printf 105 API calls 6937->6938 6939 5d1071 6938->6939 6942 5d2df0 _printf 105 API calls 6939->6942 6947 5d1336 6940->6947 6961 5d12f0 6940->6961 6941 5d11eb 7076 5d1712 6941->7076 6944 5d107d 6942->6944 6945 5d2df0 _printf 105 API calls 6944->6945 6949 5d1089 6945->6949 6946 5d11a9 __wassert 6946->7018 7053 5d2f3a 6946->7053 6958 5d1349 6947->6958 6959 5d1368 6947->6959 6948->6946 7089 5d1726 6948->7089 6954 5d2df0 _printf 105 API calls 6949->6954 6951->6941 6951->6946 6952 5d1225 6952->7018 6957 5d1095 6954->6957 6955 5d11fd __wassert 6955->6952 6963 5d2f3a _fprintf 105 API calls 6955->6963 6956 5d1277 6962 5d127e 6956->6962 6972 5d12c0 __wassert 6956->6972 6960 5d2df0 _printf 105 API calls 6957->6960 6958->6946 6964 5d1352 6958->6964 6970 5d13cd 6959->6970 6971 5d137b 6959->6971 6965 5d10a1 6960->6965 6961->6946 7098 5d1795 6961->7098 6962->6946 6976 5d1288 __wassert 6962->6976 6963->6952 7103 5d1754 6964->7103 6968 5d2df0 _printf 105 API calls 6965->6968 6969 5d10ad 6968->6969 6973 5d2df0 _printf 105 API calls 6969->6973 6983 5d1493 6970->6983 6984 5d13e4 6970->6984 6971->6946 6974 5d1384 6971->6974 6975 5d2f3a _fprintf 105 API calls 6972->6975 6977 5d10b9 6973->6977 6978 5d1754 3 API calls 6974->6978 6975->7018 6979 5d2f3a _fprintf 105 API calls 6976->6979 6976->7018 6980 5d2df0 _printf 105 API calls 6977->6980 6981 5d1389 6978->6981 6979->7018 6980->7018 6981->6972 6981->6976 6982 5d139d 6981->6982 7107 5d1759 6982->7107 6983->6946 6993 5d14b4 6983->6993 7269 5d174f 6983->7269 6984->6946 6987 5d1795 3 API calls 6984->6987 6990 5d1417 6987->6990 6988 5d13af 6991 5d2df0 _printf 105 API calls 6988->6991 6990->6946 6994 5d142d 6990->6994 6991->7018 6992 5d1597 6995 5d2df0 _printf 105 API calls 6992->6995 6993->6946 6993->6992 6998 5d14ea 6993->6998 6994->6972 6996 5d143b 6994->6996 6997 5d15a4 6995->6997 6996->6976 7001 5d145c 6996->7001 7002 5d1445 6996->7002 6997->6997 7000 5d315d 75 API calls 6998->7000 7003 5d1507 _memset 7000->7003 7005 5d315d 75 API calls 7001->7005 7117 5d269e 7002->7117 7275 5d175e 7003->7275 7007 5d1462 7005->7007 7264 5d17be 7007->7264 7010 5d146f 7010->6976 7012 5d147a 7010->7012 7011 5d151d 7013 5d1535 7011->7013 7014 5d1524 7011->7014 7015 5d2df0 _printf 105 API calls 7012->7015 7013->6972 7017 5d153e 7013->7017 7016 5d2df0 _printf 105 API calls 7014->7016 7015->7018 7019 5d152f ctype 7016->7019 7020 5d1543 __wassert 7017->7020 7021 5d154f __wassert 7017->7021 7018->6382 7019->6992 7022 5d2f3a _fprintf 105 API calls 7020->7022 7023 5d2f3a _fprintf 105 API calls 7021->7023 7022->7019 7023->7019 7030 5d6400 7024->7030 7027 5d6622 7028 5d664b 7027->7028 7029 5d6657 RaiseException 7027->7029 7028->7029 7029->6917 7031 5d3150 7030->7031 7032 5d6420 _strlen 7030->7032 7031->7027 7032->7031 7033 5d6521 _malloc 67 API calls 7032->7033 7034 5d6433 7033->7034 7034->7031 7035 5d93e0 _strcpy_s 67 API calls 7034->7035 7035->7031 7037 5d2dfc __msize 7036->7037 7038 5d2e0a 7037->7038 7039 5d2e27 __wassert 7037->7039 7040 5d5fd9 __output_l 67 API calls 7038->7040 7300 5d25e3 7039->7300 7041 5d2e0f 7040->7041 7042 5d45dd __output_l 6 API calls 7041->7042 7052 5d2e1f __msize 7042->7052 7044 5d2e39 __wassert 7305 5d5289 7044->7305 7046 5d2e4b __wassert 7314 5d53ff 7046->7314 7048 5d2e63 __wassert 7335 5d5325 7048->7335 7052->6922 7054 5d2f46 __msize 7053->7054 7055 5d2f59 7054->7055 7056 5d2f85 7054->7056 7057 5d5fd9 __output_l 67 API calls 7055->7057 7731 5d25a2 7056->7731 7058 5d2f5e 7057->7058 7060 5d45dd __output_l 6 API calls 7058->7060 7065 5d2f6e __msize 7060->7065 7062 5d63b1 __fileno 67 API calls 7071 5d2f9e 7062->7071 7064 5d5289 __stbuf 67 API calls 7066 5d301a 7064->7066 7065->7018 7067 5d53ff __output_l 103 API calls 7066->7067 7068 5d302a 7067->7068 7070 5d5325 __ftbuf 101 API calls 7068->7070 7069 5d5fd9 __output_l 67 API calls 7072 5d2ff8 7069->7072 7073 5d3034 7070->7073 7071->7069 7075 5d3008 7071->7075 7074 5d45dd __output_l 6 API calls 7072->7074 7737 5d304c 7073->7737 7074->7075 7075->7064 7075->7073 7077 5d171b 7076->7077 7078 5d1720 GetProcessHeap HeapAlloc 7076->7078 7077->6955 7080 5d2030 7078->7080 7082 5d1f95 7078->7082 7080->6955 7081 5d2020 GetProcessHeap HeapFree 7081->7080 7082->7081 7084 5d1fd4 7082->7084 7747 5d1ebf StrChrA 7082->7747 7084->7081 7085 5d1ebf 2 API calls 7084->7085 7086 5d200f 7085->7086 7086->7081 7751 5d1aed 7086->7751 7091 5d172f 7089->7091 7090 5d1734 7090->6956 7091->7090 7790 5d1906 CryptAcquireContextW 7091->7790 7094 5d1c04 #141 #16 7095 5d1c20 7094->7095 7096 5d24bc __output_l 5 API calls 7095->7096 7097 5d1c2a 7096->7097 7097->6956 7100 5d179e 7098->7100 7099 5d17a3 7099->6946 7100->7099 8047 5d1c57 7100->8047 7104 5d20db 7103->7104 7105 5d1c57 3 API calls 7104->7105 7106 5d20ef 7105->7106 7106->6976 7108 5d242e 7107->7108 8051 5d1cb1 7108->8051 7111 5d248d 7115 5d24bc __output_l 5 API calls 7111->7115 7112 5d2470 PathAppendA 7112->7111 7113 5d2483 7112->7113 8055 5d1d25 MultiByteToWideChar 7113->8055 7116 5d13a6 7115->7116 7116->6976 7116->6988 7118 5d523e __set_error_mode 67 API calls 7117->7118 7119 5d26cf 7118->7119 7120 5d2d0f GetStdHandle 7119->7120 7122 5d523e __set_error_mode 67 API calls 7119->7122 7121 5d2d25 7120->7121 7129 5d2d8a __wassert 7120->7129 7121->7129 8147 5d2680 7121->8147 7123 5d26e0 7122->7123 7123->7120 7125 5d26f2 7123->7125 7127 5d51cf __wcsdup 67 API calls 7125->7127 7131 5d2709 7127->7131 7128 5d2daa __wassert 8179 5d4831 7128->8179 7129->7128 8162 5d48c5 7129->8162 7130 5d2d51 GetFileType 7130->7129 7132 5d2d5d _wcslen 7130->7132 7133 5d271c 7131->7133 7136 5d44b5 __invoke_watson 10 API calls 7131->7136 7140 5d2d71 WriteConsoleW 7132->7140 8065 5d5152 7133->8065 7136->7133 7139 5d2dcb __wassert 8196 5d3520 7139->8196 7140->7129 7142 5d2d85 7140->7142 7141 5d2743 7144 5d5152 __wassert 67 API calls 7141->7144 8150 5d49c3 7142->8150 7143 5d44b5 __invoke_watson 10 API calls 7143->7141 7146 5d2758 7144->7146 7148 5d276c GetModuleFileNameW 7146->7148 7150 5d44b5 __invoke_watson 10 API calls 7146->7150 7151 5d278c 7148->7151 7156 5d27b3 _wcslen 7148->7156 7149 5d2cf6 7154 5d49c3 _abort 69 API calls 7149->7154 7261 5d2cfb 7149->7261 7152 5d2769 7150->7152 7153 5d51cf __wcsdup 67 API calls 7151->7153 7152->7148 7155 5d27a2 7153->7155 7154->7261 7155->7156 7161 5d44b5 __invoke_watson 10 API calls 7155->7161 7157 5d280f 7156->7157 8074 5d5065 7156->8074 7160 5d5152 __wassert 67 API calls 7157->7160 7158 5d24bc __output_l 5 API calls 7159 5d1459 7158->7159 7159->7001 7162 5d2820 7160->7162 7161->7156 7164 5d2831 7162->7164 7165 5d44b5 __invoke_watson 10 API calls 7162->7165 7166 5d5152 __wassert 67 API calls 7164->7166 7165->7164 7168 5d2847 7166->7168 7169 5d2858 7168->7169 7171 5d44b5 __invoke_watson 10 API calls 7168->7171 7172 5d5152 __wassert 67 API calls 7169->7172 7170 5d44b5 __invoke_watson 10 API calls 7170->7157 7171->7169 7173 5d286d 7172->7173 7174 5d44b5 __invoke_watson 10 API calls 7173->7174 7179 5d287e _wcslen 7173->7179 7174->7179 7175 5d5152 __wassert 67 API calls 7176 5d2aac 7175->7176 7177 5d2abd 7176->7177 7178 5d44b5 __invoke_watson 10 API calls 7176->7178 7180 5d5152 __wassert 67 API calls 7177->7180 7178->7177 7181 5d2973 7179->7181 7185 5d2907 7179->7185 7215 5d295c 7179->7215 7182 5d2ad3 7180->7182 7183 5d2978 7181->7183 7184 5d29ea 7181->7184 7187 5d2ae4 7182->7187 7191 5d44b5 __invoke_watson 10 API calls 7182->7191 7188 5d4f77 __wassert 67 API calls 7183->7188 7186 5d4f77 __wassert 67 API calls 7184->7186 8083 5d4f77 7185->8083 7190 5d29ff 7186->7190 7194 5d5152 __wassert 67 API calls 7187->7194 7192 5d299b 7188->7192 7195 5d2a10 7190->7195 7201 5d44b5 __invoke_watson 10 API calls 7190->7201 7191->7187 7196 5d29ac 7192->7196 7203 5d44b5 __invoke_watson 10 API calls 7192->7203 7198 5d2af9 7194->7198 7202 5d5152 __wassert 67 API calls 7195->7202 7199 5d5152 __wassert 67 API calls 7196->7199 7197 5d2935 7200 5d5152 __wassert 67 API calls 7197->7200 7205 5d44b5 __invoke_watson 10 API calls 7198->7205 7214 5d2b0a _wcslen 7198->7214 7206 5d29c2 7199->7206 7207 5d294b 7200->7207 7201->7195 7208 5d2a26 7202->7208 7203->7196 7204 5d44b5 __invoke_watson 10 API calls 7204->7197 7205->7214 7211 5d44b5 __invoke_watson 10 API calls 7206->7211 7206->7215 7213 5d44b5 __invoke_watson 10 API calls 7207->7213 7207->7215 7209 5d2a37 7208->7209 7210 5d44b5 __invoke_watson 10 API calls 7208->7210 7212 5d4f77 __wassert 67 API calls 7209->7212 7210->7209 7211->7215 7216 5d2a59 7212->7216 7213->7215 8092 5d4f4b 7214->8092 7215->7175 7217 5d2a6a 7216->7217 7219 5d44b5 __invoke_watson 10 API calls 7216->7219 7221 5d5152 __wassert 67 API calls 7217->7221 7219->7217 7223 5d2a80 7221->7223 7222 5d2b4f 7225 5d5152 __wassert 67 API calls 7222->7225 7223->7215 7226 5d44b5 __invoke_watson 10 API calls 7223->7226 7224 5d44b5 __invoke_watson 10 API calls 7224->7222 7227 5d2b65 7225->7227 7226->7215 7228 5d2b76 7227->7228 7229 5d44b5 __invoke_watson 10 API calls 7227->7229 7230 5d5152 __wassert 67 API calls 7228->7230 7229->7228 7231 5d2b8b 7230->7231 7232 5d44b5 __invoke_watson 10 API calls 7231->7232 7233 5d2b9c _wcslen 7231->7233 7232->7233 7235 5d4f77 __wassert 67 API calls 7233->7235 7244 5d2bfd 7233->7244 7234 5d5152 __wassert 67 API calls 7236 5d2c1b 7234->7236 7237 5d2bec 7235->7237 7238 5d2c2c 7236->7238 7239 5d44b5 __invoke_watson 10 API calls 7236->7239 7241 5d44b5 __invoke_watson 10 API calls 7237->7241 7237->7244 7240 5d5152 __wassert 67 API calls 7238->7240 7239->7238 7242 5d2c42 7240->7242 7241->7244 7243 5d2c53 7242->7243 7245 5d44b5 __invoke_watson 10 API calls 7242->7245 7246 5d5152 __wassert 67 API calls 7243->7246 7244->7234 7245->7243 7247 5d2c68 7246->7247 7248 5d2c79 7247->7248 7249 5d44b5 __invoke_watson 10 API calls 7247->7249 7250 5d5152 __wassert 67 API calls 7248->7250 7249->7248 7251 5d2c8f 7250->7251 7252 5d2ca0 7251->7252 7254 5d44b5 __invoke_watson 10 API calls 7251->7254 7253 5d5152 __wassert 67 API calls 7252->7253 7255 5d2cb5 7253->7255 7254->7252 7256 5d2cc6 7255->7256 7257 5d44b5 __invoke_watson 10 API calls 7255->7257 8096 5d4cec 7256->8096 7257->7256 7261->7158 7262 5d2cee 8144 5d4275 7262->8144 7265 5d17c9 7264->7265 7266 5d17ce 7265->7266 7267 5d1cb1 3 API calls 7265->7267 7266->7010 7268 5d2429 7267->7268 7268->7010 7270 5d1c2c StrDupW 7269->7270 7271 5d1c52 7270->7271 7272 5d1c42 7270->7272 7271->6993 7273 5d1aed 80 API calls 7272->7273 7274 5d1c48 LocalFree 7273->7274 7274->7271 7277 5d1769 _memset 7275->7277 7276 5d176e 7276->7011 7277->7276 7278 5d1906 135 API calls 7277->7278 7282 5d2182 _memset 7278->7282 7279 5d23e9 7280 5d24bc __output_l 5 API calls 7279->7280 7281 5d23fc 7280->7281 7281->7011 7282->7279 7283 5d21c0 MultiByteToWideChar 7282->7283 7284 5d21e5 7283->7284 7284->7279 7285 5d2203 MultiByteToWideChar 7284->7285 7286 5d2219 7284->7286 7285->7286 7286->7279 7287 5d226c GetProcessHeap HeapAlloc 7286->7287 7293 5d2294 7287->7293 7288 5d22d0 RegOpenKeyExW 7289 5d23cf 7288->7289 7290 5d2308 RegQueryValueExW 7288->7290 7292 5d23d9 GetProcessHeap HeapFree 7289->7292 7291 5d23c1 RegCloseKey 7290->7291 7294 5d2333 7290->7294 7291->7292 7292->7279 7293->7288 7295 5d23b7 7294->7295 7296 5d234f GetProcessHeap HeapAlloc RegQueryValueExW 7294->7296 7295->7291 7297 5d237c WideCharToMultiByte 7296->7297 7298 5d23a5 GetProcessHeap HeapFree 7296->7298 7297->7298 7299 5d239f 7297->7299 7298->7291 7299->7298 7301 5d2606 EnterCriticalSection 7300->7301 7302 5d25f0 7300->7302 7301->7044 7303 5d4473 __lock 67 API calls 7302->7303 7304 5d25f9 7303->7304 7304->7044 7343 5d63b1 7305->7343 7309 5d529e __wassert 7310 5d5305 7309->7310 7311 5d52e5 7309->7311 7310->7046 7312 5d3e41 __malloc_crt 67 API calls 7311->7312 7313 5d52eb 7312->7313 7313->7310 7358 5d35bd 7314->7358 7317 5d546a 7318 5d5fd9 __output_l 67 API calls 7317->7318 7319 5d546f 7318->7319 7321 5d45dd __output_l 6 API calls 7319->7321 7320 5d63b1 __fileno 67 API calls 7330 5d54ab __output_l __aulldvrm _strlen 7320->7330 7322 5d5481 7321->7322 7323 5d24bc __output_l 5 API calls 7322->7323 7324 5d5f74 7323->7324 7324->7048 7326 5d5359 101 API calls __output_l 7326->7330 7327 5d38c3 __output_l 67 API calls 7327->7330 7328 5d53b2 101 API calls _write_string 7328->7330 7329 5dbd87 79 API calls __cftof 7329->7330 7330->7317 7330->7322 7330->7326 7330->7327 7330->7328 7330->7329 7333 5d584f 7330->7333 7334 5d538c 101 API calls _write_multi_char 7330->7334 7366 5dbda4 7330->7366 7331 5d3e41 __malloc_crt 67 API calls 7331->7333 7332 5d6e04 6 API calls __decode_pointer 7332->7333 7333->7330 7333->7331 7333->7332 7334->7330 7336 5d2e74 7335->7336 7337 5d5330 7335->7337 7339 5d2e8c 7336->7339 7337->7336 7577 5d3396 7337->7577 7340 5d2e91 __wassert 7339->7340 7725 5d2651 7340->7725 7342 5d2e9c 7342->7052 7344 5d63c0 7343->7344 7346 5d5298 7343->7346 7345 5d5fd9 __output_l 67 API calls 7344->7345 7347 5d63c5 7345->7347 7349 5dbb25 7346->7349 7348 5d45dd __output_l 6 API calls 7347->7348 7348->7346 7350 5dbb32 7349->7350 7352 5dbb41 7349->7352 7351 5d5fd9 __output_l 67 API calls 7350->7351 7353 5dbb37 7351->7353 7354 5dbb65 7352->7354 7355 5d5fd9 __output_l 67 API calls 7352->7355 7353->7309 7354->7309 7356 5dbb55 7355->7356 7357 5d45dd __output_l 6 API calls 7356->7357 7357->7354 7359 5d35d0 7358->7359 7365 5d361d 7358->7365 7369 5d7050 7359->7369 7362 5d35fd 7362->7365 7389 5d8bfe 7362->7389 7365->7317 7365->7320 7365->7330 7367 5d35bd _LocaleUpdate::_LocaleUpdate 77 API calls 7366->7367 7368 5dbdb7 7367->7368 7368->7330 7370 5d6fd7 __getptd_noexit 67 API calls 7369->7370 7371 5d7058 7370->7371 7372 5d35d5 7371->7372 7373 5d3fef __amsg_exit 67 API calls 7371->7373 7372->7362 7374 5d936a 7372->7374 7373->7372 7375 5d9376 __msize 7374->7375 7376 5d7050 __getptd 67 API calls 7375->7376 7377 5d937b 7376->7377 7378 5d93a9 7377->7378 7380 5d938d 7377->7380 7379 5d4473 __lock 67 API calls 7378->7379 7381 5d93b0 7379->7381 7382 5d7050 __getptd 67 API calls 7380->7382 7405 5d932c 7381->7405 7384 5d9392 7382->7384 7387 5d3fef __amsg_exit 67 API calls 7384->7387 7388 5d93a0 __msize 7384->7388 7387->7388 7388->7362 7390 5d8c0a __msize 7389->7390 7391 5d7050 __getptd 67 API calls 7390->7391 7392 5d8c0f 7391->7392 7393 5d4473 __lock 67 API calls 7392->7393 7400 5d8c21 7392->7400 7394 5d8c3f 7393->7394 7395 5d8c88 7394->7395 7398 5d8c56 InterlockedDecrement 7394->7398 7399 5d8c70 InterlockedIncrement 7394->7399 7573 5d8c99 7395->7573 7396 5d3fef __amsg_exit 67 API calls 7401 5d8c2f __msize 7396->7401 7398->7399 7402 5d8c61 7398->7402 7399->7395 7400->7396 7400->7401 7401->7365 7402->7399 7403 5d38c3 __output_l 67 API calls 7402->7403 7404 5d8c6f 7403->7404 7404->7399 7406 5d9330 7405->7406 7412 5d9362 7405->7412 7407 5d9204 ___addlocaleref 8 API calls 7406->7407 7406->7412 7408 5d9343 7407->7408 7408->7412 7416 5d9293 7408->7416 7413 5d93d4 7412->7413 7572 5d4399 LeaveCriticalSection 7413->7572 7415 5d93db 7415->7384 7417 5d92a4 InterlockedDecrement 7416->7417 7418 5d9327 7416->7418 7419 5d92bc 7417->7419 7420 5d92b9 InterlockedDecrement 7417->7420 7418->7412 7430 5d90bb 7418->7430 7421 5d92c9 7419->7421 7422 5d92c6 InterlockedDecrement 7419->7422 7420->7419 7423 5d92d6 7421->7423 7424 5d92d3 InterlockedDecrement 7421->7424 7422->7421 7425 5d92e0 InterlockedDecrement 7423->7425 7427 5d92e3 7423->7427 7424->7423 7425->7427 7426 5d92fc InterlockedDecrement 7426->7427 7427->7426 7428 5d930c InterlockedDecrement 7427->7428 7429 5d9317 InterlockedDecrement 7427->7429 7428->7427 7429->7418 7431 5d913f 7430->7431 7437 5d90d2 7430->7437 7432 5d918c 7431->7432 7433 5d38c3 __output_l 67 API calls 7431->7433 7447 5d91b3 7432->7447 7484 5dcd3c 7432->7484 7435 5d9160 7433->7435 7440 5d38c3 __output_l 67 API calls 7435->7440 7437->7431 7439 5d9106 7437->7439 7443 5d38c3 __output_l 67 API calls 7437->7443 7438 5d9127 7441 5d38c3 __output_l 67 API calls 7438->7441 7439->7438 7450 5d38c3 __output_l 67 API calls 7439->7450 7445 5d9173 7440->7445 7446 5d9134 7441->7446 7442 5d38c3 __output_l 67 API calls 7442->7447 7448 5d90fb 7443->7448 7444 5d91f8 7449 5d38c3 __output_l 67 API calls 7444->7449 7452 5d38c3 __output_l 67 API calls 7445->7452 7453 5d38c3 __output_l 67 API calls 7446->7453 7447->7444 7451 5d38c3 67 API calls __output_l 7447->7451 7460 5dcf16 7448->7460 7455 5d91fe 7449->7455 7456 5d911c 7450->7456 7451->7447 7457 5d9181 7452->7457 7453->7431 7455->7412 7476 5dced1 7456->7476 7459 5d38c3 __output_l 67 API calls 7457->7459 7459->7432 7461 5dcf23 7460->7461 7475 5dcfa0 7460->7475 7462 5dcf34 7461->7462 7463 5d38c3 __output_l 67 API calls 7461->7463 7464 5dcf46 7462->7464 7465 5d38c3 __output_l 67 API calls 7462->7465 7463->7462 7466 5dcf58 7464->7466 7468 5d38c3 __output_l 67 API calls 7464->7468 7465->7464 7467 5dcf6a 7466->7467 7469 5d38c3 __output_l 67 API calls 7466->7469 7470 5d38c3 __output_l 67 API calls 7467->7470 7471 5dcf7c 7467->7471 7468->7466 7469->7467 7470->7471 7472 5d38c3 __output_l 67 API calls 7471->7472 7473 5dcf8e 7471->7473 7472->7473 7474 5d38c3 __output_l 67 API calls 7473->7474 7473->7475 7474->7475 7475->7439 7477 5dcede 7476->7477 7483 5dcf12 7476->7483 7478 5dceee 7477->7478 7479 5d38c3 __output_l 67 API calls 7477->7479 7480 5d38c3 __output_l 67 API calls 7478->7480 7481 5dcf00 7478->7481 7479->7478 7480->7481 7482 5d38c3 __output_l 67 API calls 7481->7482 7481->7483 7482->7483 7483->7438 7485 5dcd4d 7484->7485 7486 5d91ac 7484->7486 7487 5d38c3 __output_l 67 API calls 7485->7487 7486->7442 7488 5dcd55 7487->7488 7489 5d38c3 __output_l 67 API calls 7488->7489 7490 5dcd5d 7489->7490 7491 5d38c3 __output_l 67 API calls 7490->7491 7492 5dcd65 7491->7492 7493 5d38c3 __output_l 67 API calls 7492->7493 7494 5dcd6d 7493->7494 7495 5d38c3 __output_l 67 API calls 7494->7495 7496 5dcd75 7495->7496 7497 5d38c3 __output_l 67 API calls 7496->7497 7498 5dcd7d 7497->7498 7499 5d38c3 __output_l 67 API calls 7498->7499 7500 5dcd84 7499->7500 7501 5d38c3 __output_l 67 API calls 7500->7501 7502 5dcd8c 7501->7502 7503 5d38c3 __output_l 67 API calls 7502->7503 7504 5dcd94 7503->7504 7505 5d38c3 __output_l 67 API calls 7504->7505 7506 5dcd9c 7505->7506 7507 5d38c3 __output_l 67 API calls 7506->7507 7508 5dcda4 7507->7508 7509 5d38c3 __output_l 67 API calls 7508->7509 7510 5dcdac 7509->7510 7511 5d38c3 __output_l 67 API calls 7510->7511 7512 5dcdb4 7511->7512 7513 5d38c3 __output_l 67 API calls 7512->7513 7514 5dcdbc 7513->7514 7515 5d38c3 __output_l 67 API calls 7514->7515 7516 5dcdc4 7515->7516 7517 5d38c3 __output_l 67 API calls 7516->7517 7518 5dcdcc 7517->7518 7519 5d38c3 __output_l 67 API calls 7518->7519 7520 5dcdd7 7519->7520 7521 5d38c3 __output_l 67 API calls 7520->7521 7522 5dcddf 7521->7522 7523 5d38c3 __output_l 67 API calls 7522->7523 7524 5dcde7 7523->7524 7525 5d38c3 __output_l 67 API calls 7524->7525 7526 5dcdef 7525->7526 7527 5d38c3 __output_l 67 API calls 7526->7527 7528 5dcdf7 7527->7528 7529 5d38c3 __output_l 67 API calls 7528->7529 7530 5dcdff 7529->7530 7531 5d38c3 __output_l 67 API calls 7530->7531 7532 5dce07 7531->7532 7533 5d38c3 __output_l 67 API calls 7532->7533 7534 5dce0f 7533->7534 7535 5d38c3 __output_l 67 API calls 7534->7535 7536 5dce17 7535->7536 7537 5d38c3 __output_l 67 API calls 7536->7537 7538 5dce1f 7537->7538 7539 5d38c3 __output_l 67 API calls 7538->7539 7540 5dce27 7539->7540 7541 5d38c3 __output_l 67 API calls 7540->7541 7542 5dce2f 7541->7542 7543 5d38c3 __output_l 67 API calls 7542->7543 7544 5dce37 7543->7544 7545 5d38c3 __output_l 67 API calls 7544->7545 7546 5dce3f 7545->7546 7547 5d38c3 __output_l 67 API calls 7546->7547 7548 5dce47 7547->7548 7549 5d38c3 __output_l 67 API calls 7548->7549 7550 5dce4f 7549->7550 7551 5d38c3 __output_l 67 API calls 7550->7551 7552 5dce5d 7551->7552 7553 5d38c3 __output_l 67 API calls 7552->7553 7554 5dce68 7553->7554 7555 5d38c3 __output_l 67 API calls 7554->7555 7556 5dce73 7555->7556 7557 5d38c3 __output_l 67 API calls 7556->7557 7558 5dce7e 7557->7558 7559 5d38c3 __output_l 67 API calls 7558->7559 7560 5dce89 7559->7560 7561 5d38c3 __output_l 67 API calls 7560->7561 7562 5dce94 7561->7562 7563 5d38c3 __output_l 67 API calls 7562->7563 7564 5dce9f 7563->7564 7565 5d38c3 __output_l 67 API calls 7564->7565 7566 5dceaa 7565->7566 7567 5d38c3 __output_l 67 API calls 7566->7567 7568 5dceb5 7567->7568 7569 5d38c3 __output_l 67 API calls 7568->7569 7570 5dcec0 7569->7570 7571 5d38c3 __output_l 67 API calls 7570->7571 7571->7486 7572->7415 7576 5d4399 LeaveCriticalSection 7573->7576 7575 5d8ca0 7575->7400 7576->7575 7578 5d33d1 7577->7578 7579 5d33af 7577->7579 7578->7336 7579->7578 7580 5d63b1 __fileno 67 API calls 7579->7580 7581 5d33ca 7580->7581 7583 5d7c83 7581->7583 7584 5d7c8f __msize 7583->7584 7585 5d7c97 7584->7585 7586 5d7cb2 7584->7586 7683 5d5fec 7585->7683 7588 5d7cc0 7586->7588 7591 5d7d01 7586->7591 7590 5d5fec __write_nolock 67 API calls 7588->7590 7593 5d7cc5 7590->7593 7608 5dc698 7591->7608 7592 5d5fd9 __output_l 67 API calls 7601 5d7ca4 __msize 7592->7601 7595 5d5fd9 __output_l 67 API calls 7593->7595 7597 5d7ccc 7595->7597 7596 5d7d07 7599 5d7d2a 7596->7599 7600 5d7d14 7596->7600 7598 5d45dd __output_l 6 API calls 7597->7598 7598->7601 7603 5d5fd9 __output_l 67 API calls 7599->7603 7618 5d7550 7600->7618 7601->7578 7605 5d7d2f 7603->7605 7604 5d7d22 7686 5d7d55 7604->7686 7606 5d5fec __write_nolock 67 API calls 7605->7606 7606->7604 7609 5dc6a4 __msize 7608->7609 7610 5dc6ff 7609->7610 7613 5d4473 __lock 67 API calls 7609->7613 7611 5dc704 EnterCriticalSection 7610->7611 7612 5dc721 __msize 7610->7612 7611->7612 7612->7596 7614 5dc6d0 7613->7614 7615 5dc6e7 7614->7615 7617 5da449 __mtinitlocknum InitializeCriticalSectionAndSpinCount 7614->7617 7689 5dc72f 7615->7689 7617->7615 7619 5d755f __write_nolock 7618->7619 7620 5d75b8 7619->7620 7621 5d7591 7619->7621 7668 5d7586 7619->7668 7624 5d7620 7620->7624 7625 5d75fa 7620->7625 7623 5d5fec __write_nolock 67 API calls 7621->7623 7622 5d24bc __output_l 5 API calls 7626 5d7c81 7622->7626 7627 5d7596 7623->7627 7629 5d7637 7624->7629 7630 5d7626 7624->7630 7628 5d5fec __write_nolock 67 API calls 7625->7628 7626->7604 7631 5d5fd9 __output_l 67 API calls 7627->7631 7633 5d75ff 7628->7633 7632 5dbb25 __stbuf 67 API calls 7629->7632 7693 5dc190 7630->7693 7635 5d759d 7631->7635 7637 5d763f 7632->7637 7638 5d5fd9 __output_l 67 API calls 7633->7638 7636 5d45dd __output_l 6 API calls 7635->7636 7636->7668 7640 5d78e5 7637->7640 7645 5d7050 __getptd 67 API calls 7637->7645 7641 5d7608 7638->7641 7643 5d78f5 7640->7643 7644 5d7bb4 WriteFile 7640->7644 7642 5d45dd __output_l 6 API calls 7641->7642 7642->7668 7646 5d79d3 7643->7646 7667 5d7909 7643->7667 7648 5d7be7 GetLastError 7644->7648 7675 5d7aae 7644->7675 7647 5d765a GetConsoleMode 7645->7647 7661 5d7ab3 7646->7661 7665 5d79e2 7646->7665 7647->7640 7649 5d7685 7647->7649 7652 5d78c7 7648->7652 7649->7640 7650 5d7697 GetConsoleCP 7649->7650 7650->7652 7680 5d76ba 7650->7680 7651 5d7c32 7654 5d5fd9 __output_l 67 API calls 7651->7654 7651->7668 7652->7651 7653 5d7c05 7652->7653 7652->7668 7656 5d7c24 7653->7656 7657 5d7c10 7653->7657 7659 5d7c55 7654->7659 7655 5d7b19 WideCharToMultiByte 7655->7648 7663 5d7b50 WriteFile 7655->7663 7706 5d5fff 7656->7706 7662 5d5fd9 __output_l 67 API calls 7657->7662 7658 5d7977 WriteFile 7658->7648 7658->7667 7660 5d5fec __write_nolock 67 API calls 7659->7660 7660->7668 7661->7651 7661->7655 7670 5d7c15 7662->7670 7669 5d7b87 GetLastError 7663->7669 7674 5d7b7b 7663->7674 7664 5d7a57 WriteFile 7664->7648 7671 5d79ed 7664->7671 7665->7651 7665->7664 7667->7651 7667->7652 7667->7658 7668->7622 7669->7674 7672 5d5fec __write_nolock 67 API calls 7670->7672 7671->7652 7671->7665 7671->7675 7672->7668 7674->7652 7674->7661 7674->7663 7674->7675 7675->7652 7676 5d7766 WideCharToMultiByte 7676->7652 7678 5d7797 WriteFile 7676->7678 7677 5dc553 79 API calls __fassign 7677->7680 7678->7648 7679 5d77be 7678->7679 7679->7648 7679->7652 7679->7680 7681 5dc377 11 API calls __putwch_nolock 7679->7681 7682 5d77eb WriteFile 7679->7682 7680->7652 7680->7676 7680->7677 7680->7679 7703 5dbddc 7680->7703 7681->7679 7682->7648 7682->7679 7684 5d6fd7 __getptd_noexit 67 API calls 7683->7684 7685 5d5ff1 7684->7685 7685->7592 7724 5dc738 LeaveCriticalSection 7686->7724 7688 5d7d5d 7688->7601 7692 5d4399 LeaveCriticalSection 7689->7692 7691 5dc736 7691->7610 7692->7691 7711 5dc621 7693->7711 7695 5dc1ae 7696 5dc1c7 SetFilePointer 7695->7696 7697 5dc1b6 7695->7697 7699 5dc1df GetLastError 7696->7699 7701 5d7634 7696->7701 7698 5d5fd9 __output_l 67 API calls 7697->7698 7698->7701 7700 5dc1e9 7699->7700 7699->7701 7702 5d5fff __dosmaperr 67 API calls 7700->7702 7701->7629 7702->7701 7704 5dbda4 __isleadbyte_l 77 API calls 7703->7704 7705 5dbdeb 7704->7705 7705->7680 7707 5d5fec __write_nolock 67 API calls 7706->7707 7708 5d600a _realloc 7707->7708 7709 5d5fd9 __output_l 67 API calls 7708->7709 7710 5d601d 7709->7710 7710->7668 7712 5dc62e 7711->7712 7714 5dc646 7711->7714 7713 5d5fec __write_nolock 67 API calls 7712->7713 7716 5dc633 7713->7716 7715 5d5fec __write_nolock 67 API calls 7714->7715 7717 5dc68b 7714->7717 7718 5dc674 7715->7718 7719 5d5fd9 __output_l 67 API calls 7716->7719 7717->7695 7720 5d5fd9 __output_l 67 API calls 7718->7720 7721 5dc63b 7719->7721 7722 5dc67b 7720->7722 7721->7695 7723 5d45dd __output_l 6 API calls 7722->7723 7723->7717 7724->7688 7726 5d2674 LeaveCriticalSection 7725->7726 7727 5d2661 7725->7727 7726->7342 7730 5d4399 LeaveCriticalSection 7727->7730 7729 5d2671 7729->7342 7730->7729 7732 5d25b4 7731->7732 7733 5d25d6 EnterCriticalSection 7731->7733 7732->7733 7734 5d25bc 7732->7734 7735 5d25cc 7733->7735 7736 5d4473 __lock 67 API calls 7734->7736 7735->7062 7735->7075 7736->7735 7740 5d2615 7737->7740 7739 5d3054 7739->7065 7741 5d2645 LeaveCriticalSection 7740->7741 7742 5d2626 7740->7742 7741->7739 7742->7741 7743 5d262d 7742->7743 7746 5d4399 LeaveCriticalSection 7743->7746 7745 5d2642 7745->7739 7746->7745 7748 5d1ee8 7747->7748 7749 5d1f0f MultiByteToWideChar 7748->7749 7750 5d1f3c 7748->7750 7749->7750 7750->7084 7764 5d18c8 7751->7764 7753 5d1b0a 7753->7081 7754 5d1b05 _memset 7754->7753 7770 5d3951 7754->7770 7757 5d38c3 __output_l 67 API calls 7758 5d1b6d 7757->7758 7759 5d1b7d WaitForSingleObject 7758->7759 7760 5d1ba9 CloseHandle CloseHandle GetProcessHeap HeapFree 7758->7760 7761 5d1b8d 7759->7761 7760->7753 7761->7760 7762 5d1b95 GetExitCodeProcess 7761->7762 7762->7760 7763 5d1ba6 7762->7763 7763->7760 7765 5d18d4 7764->7765 7765->7765 7778 5d1853 #90 7765->7778 7768 5d1901 7768->7754 7769 5d18f9 PathAppendW 7769->7768 7771 5d3962 _wcslen 7770->7771 7777 5d1b47 CreateProcessW 7770->7777 7783 5da340 7771->7783 7774 5d51cf __wcsdup 67 API calls 7775 5d398a 7774->7775 7776 5d44b5 __invoke_watson 10 API calls 7775->7776 7775->7777 7776->7777 7777->7757 7779 5d1881 GetProcessHeap HeapAlloc 7778->7779 7780 5d1872 7778->7780 7781 5d18af #90 PathRemoveFileSpecW 7779->7781 7782 5d1877 7779->7782 7780->7779 7780->7782 7781->7782 7782->7768 7782->7769 7784 5da4a9 __calloc_impl 67 API calls 7783->7784 7785 5da35a 7784->7785 7786 5d5fd9 __output_l 67 API calls 7785->7786 7789 5d3977 7785->7789 7787 5da36d 7786->7787 7788 5d5fd9 __output_l 67 API calls 7787->7788 7787->7789 7788->7789 7789->7774 7789->7777 7791 5d194b CryptCreateHash 7790->7791 7802 5d1a32 7790->7802 7792 5d1a43 CryptReleaseContext 7791->7792 7795 5d196d 7791->7795 7793 5d1a52 7792->7793 7792->7802 7815 5d357c 7793->7815 7794 5d24bc __output_l 5 API calls 7797 5d1aeb 7794->7797 7795->7795 7798 5d1979 CryptHashData 7795->7798 7797->7094 7797->7095 7800 5d1a0b 7798->7800 7804 5d1990 _memset 7798->7804 7801 5d1a17 CryptGetHashParam 7800->7801 7800->7802 7801->7802 7803 5d1a3a CryptDestroyHash 7801->7803 7802->7794 7803->7792 7804->7800 7805 5d380e __NMSG_WRITE 67 API calls 7804->7805 7806 5d19c2 7805->7806 7806->7800 7812 5d37f7 7806->7812 7809 5d19da CryptHashData 7809->7800 7810 5d19ee CryptHashData 7809->7810 7810->7800 7818 5d37c2 7812->7818 7943 5d4725 7815->7943 7819 5d35bd _LocaleUpdate::_LocaleUpdate 77 API calls 7818->7819 7820 5d37d6 7819->7820 7823 5d3644 7820->7823 7824 5d365e 7823->7824 7825 5d367a _strnlen 7823->7825 7826 5d5fd9 __output_l 67 API calls 7824->7826 7825->7824 7828 5d368e 7825->7828 7827 5d3663 7826->7827 7829 5d45dd __output_l 6 API calls 7827->7829 7830 5d3672 7828->7830 7856 5d97ed 7828->7856 7829->7830 7833 5d24bc __output_l 5 API calls 7830->7833 7837 5d19d4 7833->7837 7834 5d36dd 7838 5d5fd9 __output_l 67 API calls 7834->7838 7835 5d36f4 7836 5d36f9 7835->7836 7842 5d3707 7835->7842 7839 5d5fd9 __output_l 67 API calls 7836->7839 7837->7800 7837->7809 7847 5d36e2 7838->7847 7839->7827 7840 5d3758 7844 5d5fd9 __output_l 67 API calls 7840->7844 7841 5d3765 7845 5d97ed ___crtLCMapStringA 102 API calls 7841->7845 7846 5d6521 _malloc 67 API calls 7842->7846 7851 5d3721 __crtGetStringTypeA_stat 7842->7851 7843 5d5fd9 __output_l 67 API calls 7843->7830 7844->7847 7848 5d3780 7845->7848 7846->7851 7847->7843 7849 5d379a 7848->7849 7850 5d3787 7848->7850 7853 5d5fd9 __output_l 67 API calls 7849->7853 7852 5d93e0 _strcpy_s 67 API calls 7850->7852 7851->7840 7851->7841 7854 5d3793 7852->7854 7853->7854 7861 5d359d 7854->7861 7857 5d35bd _LocaleUpdate::_LocaleUpdate 77 API calls 7856->7857 7858 5d9800 7857->7858 7865 5d9448 7858->7865 7862 5d35a9 7861->7862 7863 5d35ba 7861->7863 7862->7863 7864 5d38c3 __output_l 67 API calls 7862->7864 7863->7830 7864->7863 7866 5d9469 LCMapStringW 7865->7866 7869 5d9484 7865->7869 7867 5d948c GetLastError 7866->7867 7866->7869 7867->7869 7868 5d9682 7912 5dd040 GetLocaleInfoA 7868->7912 7869->7868 7870 5d94de 7869->7870 7872 5d94f7 MultiByteToWideChar 7870->7872 7889 5d9679 7870->7889 7879 5d9524 7872->7879 7872->7889 7874 5d24bc __output_l 5 API calls 7875 5d36d1 7874->7875 7875->7834 7875->7835 7876 5d953d __crtGetStringTypeA_stat 7882 5d9575 MultiByteToWideChar 7876->7882 7876->7889 7877 5d979e LCMapStringA 7880 5d96fa 7877->7880 7878 5d96c3 7918 5dd089 7878->7918 7879->7876 7884 5d6521 _malloc 67 API calls 7879->7884 7883 5d97c5 7880->7883 7888 5d38c3 __output_l 67 API calls 7880->7888 7886 5d958e LCMapStringW 7882->7886 7887 5d9670 7882->7887 7883->7889 7894 5d38c3 __output_l 67 API calls 7883->7894 7884->7876 7886->7887 7892 5d95af 7886->7892 7891 5d359d __freea 67 API calls 7887->7891 7888->7883 7889->7874 7890 5d96df LCMapStringA 7890->7880 7898 5d9701 7890->7898 7891->7889 7893 5d95b8 7892->7893 7897 5d95e1 7892->7897 7893->7887 7895 5d95ca LCMapStringW 7893->7895 7894->7889 7895->7887 7896 5d9630 LCMapStringW 7899 5d9648 WideCharToMultiByte 7896->7899 7900 5d966a 7896->7900 7902 5d95fc __crtGetStringTypeA_stat 7897->7902 7904 5d6521 _malloc 67 API calls 7897->7904 7901 5d6521 _malloc 67 API calls 7898->7901 7903 5d9712 _memset __crtGetStringTypeA_stat 7898->7903 7899->7900 7905 5d359d __freea 67 API calls 7900->7905 7901->7903 7902->7887 7902->7896 7903->7880 7906 5d9750 LCMapStringA 7903->7906 7904->7902 7905->7887 7908 5d976c 7906->7908 7909 5d9770 7906->7909 7911 5d359d __freea 67 API calls 7908->7911 7910 5dd089 ___convertcp 74 API calls 7909->7910 7910->7908 7911->7880 7913 5dd073 7912->7913 7914 5dd06e 7912->7914 7915 5ddc33 ___ansicp 90 API calls 7913->7915 7916 5d24bc __output_l 5 API calls 7914->7916 7915->7914 7917 5d96aa 7916->7917 7917->7877 7917->7878 7917->7889 7919 5dd0c9 GetCPInfo 7918->7919 7920 5dd153 7918->7920 7921 5dd13e MultiByteToWideChar 7919->7921 7922 5dd0e0 7919->7922 7923 5d24bc __output_l 5 API calls 7920->7923 7921->7920 7927 5dd0f9 _strlen 7921->7927 7922->7921 7924 5dd0e6 GetCPInfo 7922->7924 7925 5d96d5 7923->7925 7924->7921 7926 5dd0f3 7924->7926 7925->7889 7925->7890 7926->7921 7926->7927 7928 5d6521 _malloc 67 API calls 7927->7928 7931 5dd12b _memset __crtGetStringTypeA_stat 7927->7931 7928->7931 7929 5dd188 MultiByteToWideChar 7930 5dd1a0 7929->7930 7940 5dd1bf 7929->7940 7933 5dd1c4 7930->7933 7934 5dd1a7 WideCharToMultiByte 7930->7934 7931->7920 7931->7929 7932 5d359d __freea 67 API calls 7932->7920 7935 5dd1cf WideCharToMultiByte 7933->7935 7936 5dd1e3 7933->7936 7934->7940 7935->7936 7935->7940 7937 5d3e86 __calloc_crt 67 API calls 7936->7937 7938 5dd1eb 7937->7938 7939 5dd1f4 WideCharToMultiByte 7938->7939 7938->7940 7939->7940 7941 5dd206 7939->7941 7940->7932 7942 5d38c3 __output_l 67 API calls 7941->7942 7942->7940 7944 5d4732 7943->7944 7946 5d4752 7943->7946 7945 5d5fd9 __output_l 67 API calls 7944->7945 7947 5d4737 7945->7947 7948 5d4760 7946->7948 7950 5d4787 7946->7950 7949 5d45dd __output_l 6 API calls 7947->7949 7951 5d5fd9 __output_l 67 API calls 7948->7951 7953 5d1ab3 #205 7948->7953 7949->7953 7952 5d5fd9 __output_l 67 API calls 7950->7952 7954 5d477c 7951->7954 7955 5d478c 7952->7955 7953->7802 7958 5d45dd __output_l 6 API calls 7954->7958 7956 5d479a 7955->7956 7957 5d47c7 7955->7957 7973 5d4603 7956->7973 7960 5d4603 __vswprintf_helper 101 API calls 7957->7960 7958->7953 7962 5d47d5 7960->7962 7964 5d47ea 7962->7964 7965 5d47fd 7962->7965 7963 5d47b4 7966 5d5fd9 __output_l 67 API calls 7963->7966 7967 5d5fd9 __output_l 67 API calls 7964->7967 7965->7953 7971 5d5fd9 __output_l 67 API calls 7965->7971 7968 5d47b9 7966->7968 7969 5d47ef 7967->7969 7968->7953 7970 5d5fd9 __output_l 67 API calls 7968->7970 7969->7953 7972 5d5fd9 __output_l 67 API calls 7969->7972 7970->7953 7971->7954 7972->7953 7974 5d4633 7973->7974 7975 5d4613 7973->7975 7977 5d4643 7974->7977 7984 5d4663 7974->7984 7976 5d5fd9 __output_l 67 API calls 7975->7976 7978 5d4618 7976->7978 7979 5d5fd9 __output_l 67 API calls 7977->7979 7980 5d45dd __output_l 6 API calls 7978->7980 7981 5d4648 7979->7981 7986 5d4628 7980->7986 7982 5d45dd __output_l 6 API calls 7981->7982 7982->7986 7983 5d46aa 7983->7986 7987 5d73ec __flsbuf 101 API calls 7983->7987 7984->7983 7984->7986 7988 5d73ec 7984->7988 7986->7963 7986->7965 7987->7986 7989 5d63b1 __fileno 67 API calls 7988->7989 7990 5d73fc 7989->7990 7991 5d741e 7990->7991 7992 5d7407 7990->7992 7994 5d7422 7991->7994 8002 5d742f __wassert 7991->8002 7993 5d5fd9 __output_l 67 API calls 7992->7993 8004 5d740c 7993->8004 7995 5d5fd9 __output_l 67 API calls 7994->7995 7995->8004 7996 5d7490 7997 5d751f 7996->7997 7998 5d749f 7996->7998 7999 5d7c83 __locking 101 API calls 7997->7999 8000 5d74b6 7998->8000 8005 5d74d3 7998->8005 7999->8004 8001 5d7c83 __locking 101 API calls 8000->8001 8001->8004 8002->7996 8003 5dbb25 __stbuf 67 API calls 8002->8003 8002->8004 8006 5d7485 8002->8006 8003->8006 8004->7983 8005->8004 8012 5dc215 8005->8012 8006->7996 8009 5dc32e 8006->8009 8010 5d3e41 __malloc_crt 67 API calls 8009->8010 8011 5dc343 8010->8011 8011->7996 8013 5dc221 __msize 8012->8013 8014 5dc24e 8013->8014 8015 5dc232 8013->8015 8016 5dc25c 8014->8016 8018 5dc27d 8014->8018 8017 5d5fec __write_nolock 67 API calls 8015->8017 8019 5d5fec __write_nolock 67 API calls 8016->8019 8020 5dc237 8017->8020 8023 5dc29d 8018->8023 8024 5dc2c3 8018->8024 8022 5dc261 8019->8022 8021 5d5fd9 __output_l 67 API calls 8020->8021 8038 5dc23f __msize 8021->8038 8026 5d5fd9 __output_l 67 API calls 8022->8026 8027 5d5fec __write_nolock 67 API calls 8023->8027 8025 5dc698 ___lock_fhandle 68 API calls 8024->8025 8028 5dc2c9 8025->8028 8029 5dc268 8026->8029 8030 5dc2a2 8027->8030 8032 5dc2d6 8028->8032 8033 5dc2f2 8028->8033 8034 5d45dd __output_l 6 API calls 8029->8034 8031 5d5fd9 __output_l 67 API calls 8030->8031 8035 5dc2a9 8031->8035 8036 5dc190 __lseeki64_nolock 69 API calls 8032->8036 8037 5d5fd9 __output_l 67 API calls 8033->8037 8034->8038 8039 5d45dd __output_l 6 API calls 8035->8039 8040 5dc2e7 8036->8040 8041 5dc2f7 8037->8041 8038->8004 8039->8038 8044 5dc324 8040->8044 8042 5d5fec __write_nolock 67 API calls 8041->8042 8042->8040 8045 5dc738 __unlock_fhandle LeaveCriticalSection 8044->8045 8046 5dc32c 8045->8046 8046->8038 8048 5d1c6c 8047->8048 8049 5d1c75 8048->8049 8050 5d1c79 WideCharToMultiByte GetProcessHeap HeapFree 8048->8050 8049->6946 8050->8049 8052 5d1cc6 8051->8052 8053 5d1ccf 8052->8053 8054 5d1cd8 WideCharToMultiByte GetProcessHeap HeapFree 8052->8054 8053->7111 8053->7112 8054->8053 8056 5d1d77 GetFileVersionInfoSizeW 8055->8056 8060 5d1e00 8055->8060 8057 5d1d8b GetProcessHeap HeapAlloc 8056->8057 8056->8060 8059 5d1da4 GetFileVersionInfoW 8057->8059 8057->8060 8058 5d24bc __output_l 5 API calls 8061 5d1e13 8058->8061 8062 5d1db6 VerQueryValueW 8059->8062 8063 5d1df3 GetProcessHeap HeapFree 8059->8063 8060->8058 8061->7111 8062->8063 8064 5d1dd2 8062->8064 8063->8060 8064->8063 8066 5d516a 8065->8066 8069 5d5163 8065->8069 8067 5d5fd9 __output_l 67 API calls 8066->8067 8068 5d516f 8067->8068 8070 5d45dd __output_l 6 API calls 8068->8070 8069->8066 8071 5d51a6 8069->8071 8072 5d2732 8070->8072 8071->8072 8073 5d5fd9 __output_l 67 API calls 8071->8073 8072->7141 8072->7143 8073->8068 8079 5d5077 8074->8079 8075 5d507b 8076 5d5fd9 __output_l 67 API calls 8075->8076 8077 5d27fe 8075->8077 8078 5d5097 8076->8078 8077->7157 8077->7170 8080 5d45dd __output_l 6 API calls 8078->8080 8079->8075 8079->8077 8081 5d50c7 8079->8081 8080->8077 8081->8077 8082 5d5fd9 __output_l 67 API calls 8081->8082 8082->8078 8088 5d4f8a 8083->8088 8084 5d4f8e 8085 5d2924 8084->8085 8086 5d5fd9 __output_l 67 API calls 8084->8086 8085->7197 8085->7204 8087 5d4faa 8086->8087 8089 5d45dd __output_l 6 API calls 8087->8089 8088->8084 8090 5d4fec 8088->8090 8089->8085 8090->8085 8091 5d5fd9 __output_l 67 API calls 8090->8091 8091->8087 8093 5d4f56 8092->8093 8207 5d4e55 8093->8207 8097 5d6dfb __init_pointers 6 API calls 8096->8097 8098 5d4cfc 8097->8098 8099 5d4d0f LoadLibraryW 8098->8099 8103 5d4d97 8098->8103 8101 5d2cdf 8099->8101 8102 5d4d24 GetProcAddress 8099->8102 8100 5d4dc1 8106 5d6e04 __decode_pointer 6 API calls 8100->8106 8120 5d4dec 8100->8120 8101->7149 8123 5d4b3c 8101->8123 8102->8101 8104 5d4d3a 8102->8104 8103->8100 8107 5d6e04 __decode_pointer 6 API calls 8103->8107 8108 5d6d89 __encode_pointer 6 API calls 8104->8108 8105 5d6e04 __decode_pointer 6 API calls 8105->8101 8116 5d4e04 8106->8116 8109 5d4db4 8107->8109 8110 5d4d40 GetProcAddress 8108->8110 8111 5d6e04 __decode_pointer 6 API calls 8109->8111 8112 5d6d89 __encode_pointer 6 API calls 8110->8112 8111->8100 8113 5d4d55 GetProcAddress 8112->8113 8114 5d6d89 __encode_pointer 6 API calls 8113->8114 8115 5d4d6a GetProcAddress 8114->8115 8117 5d6d89 __encode_pointer 6 API calls 8115->8117 8118 5d6e04 __decode_pointer 6 API calls 8116->8118 8116->8120 8119 5d4d7f 8117->8119 8118->8120 8119->8103 8121 5d4d89 GetProcAddress 8119->8121 8120->8105 8122 5d6d89 __encode_pointer 6 API calls 8121->8122 8122->8103 8127 5d4b48 __msize 8123->8127 8124 5d4ba4 8125 5d4b85 8124->8125 8130 5d4bb3 8124->8130 8129 5d6e04 __decode_pointer 6 API calls 8125->8129 8126 5d4b6f 8128 5d6fd7 __getptd_noexit 67 API calls 8126->8128 8127->8124 8127->8125 8127->8126 8133 5d4b6b 8127->8133 8131 5d4b74 _siglookup 8128->8131 8129->8131 8132 5d5fd9 __output_l 67 API calls 8130->8132 8135 5d4c1a 8131->8135 8137 5d4275 __wassert 67 API calls 8131->8137 8143 5d4b7d __msize 8131->8143 8134 5d4bb8 8132->8134 8133->8126 8133->8130 8136 5d45dd __output_l 6 API calls 8134->8136 8138 5d4473 __lock 67 API calls 8135->8138 8140 5d4c25 8135->8140 8136->8143 8137->8135 8138->8140 8139 5d6dfb __init_pointers 6 API calls 8141 5d4c5a 8139->8141 8140->8139 8140->8141 8220 5d4cb0 8141->8220 8143->7262 8225 5d4133 8144->8225 8146 5d4286 8146->7149 8250 5d46fb 8147->8250 8151 5d49e9 8150->8151 8152 5d49e2 8150->8152 8253 5d4b2f 8151->8253 8153 5d66be __NMSG_WRITE 67 API calls 8152->8153 8153->8151 8156 5d4b3c _raise 67 API calls 8157 5d49fa _memset 8156->8157 8158 5d4ad2 8157->8158 8161 5d4a92 SetUnhandledExceptionFilter UnhandledExceptionFilter 8157->8161 8159 5d4275 __wassert 67 API calls 8158->8159 8160 5d4ad9 8159->8160 8161->8158 8165 5d48d1 __msize 8162->8165 8163 5d48e4 8164 5d5fd9 __output_l 67 API calls 8163->8164 8166 5d48e9 8164->8166 8165->8163 8167 5d492d 8165->8167 8168 5d45dd __output_l 6 API calls 8166->8168 8169 5d25a2 __lock_file 68 API calls 8167->8169 8173 5d48f9 __msize 8168->8173 8170 5d493c 8169->8170 8171 5d3396 __flush 101 API calls 8170->8171 8172 5d4946 8171->8172 8256 5db6ee 8172->8256 8173->7128 8176 5d495e 8260 5d49b9 8176->8260 8177 5d3e41 __malloc_crt 67 API calls 8177->8176 8180 5d483d __msize 8179->8180 8181 5d484d 8180->8181 8183 5d4876 8180->8183 8182 5d5fd9 __output_l 67 API calls 8181->8182 8184 5d4852 8182->8184 8185 5d25a2 __lock_file 68 API calls 8183->8185 8186 5d45dd __output_l 6 API calls 8184->8186 8187 5d487f 8185->8187 8191 5d4862 __msize 8186->8191 8188 5d5289 __stbuf 67 API calls 8187->8188 8189 5d4889 8188->8189 8263 5d7e40 8189->8263 8191->7139 8193 5d5325 __ftbuf 101 API calls 8194 5d48a3 8193->8194 8284 5d48bb 8194->8284 8197 5d352c __msize 8196->8197 8198 5d353c 8197->8198 8199 5d3533 8197->8199 8201 5d25a2 __lock_file 68 API calls 8198->8201 8287 5d3446 8199->8287 8202 5d3544 8201->8202 8297 5d33fe 8202->8297 8205 5d3539 __msize 8205->7149 8208 5d4e65 8207->8208 8209 5d4e83 8207->8209 8210 5d5fd9 __output_l 67 API calls 8208->8210 8211 5d4e89 8209->8211 8212 5d4eb8 8209->8212 8213 5d4e6a 8210->8213 8214 5d5fd9 __output_l 67 API calls 8211->8214 8215 5d5fd9 __output_l 67 API calls 8212->8215 8219 5d2b3e 8212->8219 8216 5d45dd __output_l 6 API calls 8213->8216 8217 5d4e8e 8214->8217 8215->8217 8216->8219 8218 5d45dd __output_l 6 API calls 8217->8218 8218->8219 8219->7222 8219->7224 8221 5d4cbd 8220->8221 8222 5d4cb6 8220->8222 8221->8143 8224 5d4399 LeaveCriticalSection 8222->8224 8224->8221 8226 5d413f __msize 8225->8226 8227 5d4473 __lock 67 API calls 8226->8227 8228 5d4146 8227->8228 8229 5d420f __initterm 8228->8229 8231 5d4172 8228->8231 8244 5d424a 8229->8244 8233 5d6e04 __decode_pointer 6 API calls 8231->8233 8235 5d417d 8233->8235 8234 5d4247 __msize 8234->8146 8237 5d41ff __initterm 8235->8237 8239 5d6e04 __decode_pointer 6 API calls 8235->8239 8237->8229 8238 5d423e 8240 5d4043 _malloc 3 API calls 8238->8240 8243 5d4192 8239->8243 8240->8234 8241 5d6dfb 6 API calls __init_pointers 8241->8243 8242 5d6e04 6 API calls __decode_pointer 8242->8243 8243->8237 8243->8241 8243->8242 8245 5d4250 8244->8245 8247 5d422b 8244->8247 8249 5d4399 LeaveCriticalSection 8245->8249 8247->8234 8248 5d4399 LeaveCriticalSection 8247->8248 8248->8238 8249->8247 8251 5d4603 __vswprintf_helper 101 API calls 8250->8251 8252 5d2699 8251->8252 8252->7129 8252->7130 8254 5d6e04 __decode_pointer 6 API calls 8253->8254 8255 5d49ef 8254->8255 8255->8156 8255->8157 8257 5db6fe 8256->8257 8259 5d494c 8256->8259 8258 5d38c3 __output_l 67 API calls 8257->8258 8257->8259 8258->8259 8259->8176 8259->8177 8261 5d2615 _fwprintf 2 API calls 8260->8261 8262 5d49c1 8261->8262 8262->8173 8264 5d35bd _LocaleUpdate::_LocaleUpdate 77 API calls 8263->8264 8265 5d7ea7 8264->8265 8266 5d7eaf 8265->8266 8276 5d7ee6 __output_l __aulldvrm _strlen 8265->8276 8267 5d5fd9 __output_l 67 API calls 8266->8267 8268 5d7eb4 8267->8268 8269 5d45dd __output_l 6 API calls 8268->8269 8271 5d7ec4 8269->8271 8270 5d24bc __output_l 5 API calls 8272 5d4899 8270->8272 8271->8270 8272->8193 8273 5d38c3 __output_l 67 API calls 8273->8276 8274 5dbda4 __isleadbyte_l 77 API calls 8274->8276 8275 5dc43c 79 API calls __fassign 8275->8276 8276->8271 8276->8273 8276->8274 8276->8275 8277 5d8976 8276->8277 8278 5d3e41 __malloc_crt 67 API calls 8276->8278 8280 5daafc 103 API calls _write_string 8276->8280 8281 5d6e04 6 API calls __decode_pointer 8276->8281 8282 5daaa6 103 API calls _write_multi_char 8276->8282 8283 5daad5 103 API calls _write_multi_char 8276->8283 8279 5d5fd9 __output_l 67 API calls 8277->8279 8278->8276 8279->8268 8280->8276 8281->8276 8282->8276 8283->8276 8285 5d2615 _fwprintf 2 API calls 8284->8285 8286 5d48c3 8285->8286 8286->8191 8288 5d3452 __msize 8287->8288 8289 5d4473 __lock 67 API calls 8288->8289 8295 5d3461 8289->8295 8290 5d34f9 8313 5d3517 8290->8313 8292 5d25e3 _printf 68 API calls 8292->8295 8293 5d3505 __msize 8293->8205 8295->8290 8295->8292 8296 5d33fe 105 API calls __fflush_nolock 8295->8296 8310 5d34e8 8295->8310 8296->8295 8298 5d340b 8297->8298 8299 5d3414 8297->8299 8300 5d3446 _flsall 105 API calls 8298->8300 8301 5d3396 __flush 101 API calls 8299->8301 8302 5d3411 8300->8302 8303 5d341a 8301->8303 8307 5d3569 8302->8307 8303->8302 8304 5d63b1 __fileno 67 API calls 8303->8304 8305 5d3433 8304->8305 8317 5d7d5f 8305->8317 8308 5d2615 _fwprintf 2 API calls 8307->8308 8309 5d3571 8308->8309 8309->8205 8311 5d2651 _flsall 2 API calls 8310->8311 8312 5d34f6 8311->8312 8312->8295 8316 5d4399 LeaveCriticalSection 8313->8316 8315 5d351e 8315->8293 8316->8315 8318 5d7d6b __msize 8317->8318 8319 5d7d86 8318->8319 8320 5d7d73 8318->8320 8322 5d7d94 8319->8322 8325 5d7dce 8319->8325 8321 5d5fd9 __output_l 67 API calls 8320->8321 8323 5d7d78 __msize 8321->8323 8324 5d5fd9 __output_l 67 API calls 8322->8324 8323->8302 8326 5d7d99 8324->8326 8327 5dc698 ___lock_fhandle 68 API calls 8325->8327 8328 5d45dd __output_l 6 API calls 8326->8328 8329 5d7dd4 8327->8329 8328->8323 8330 5dc621 __lseeki64_nolock 67 API calls 8329->8330 8338 5d7e0d 8329->8338 8332 5d7de9 FlushFileBuffers 8330->8332 8331 5d5fd9 __output_l 67 API calls 8333 5d7e17 8331->8333 8334 5d7df5 GetLastError 8332->8334 8335 5d7e00 8332->8335 8339 5d7e36 8333->8339 8334->8335 8335->8333 8337 5d5fec __write_nolock 67 API calls 8335->8337 8337->8338 8338->8331 8342 5dc738 LeaveCriticalSection 8339->8342 8341 5d7e3e 8341->8323 8342->8341 8386 5d706a 8388 5d7076 __msize 8386->8388 8387 5d708e 8390 5d709c 8387->8390 8392 5d38c3 __output_l 67 API calls 8387->8392 8388->8387 8389 5d38c3 __output_l 67 API calls 8388->8389 8391 5d7178 __msize 8388->8391 8389->8387 8393 5d70aa 8390->8393 8394 5d38c3 __output_l 67 API calls 8390->8394 8392->8390 8395 5d70b8 8393->8395 8396 5d38c3 __output_l 67 API calls 8393->8396 8394->8393 8397 5d70c6 8395->8397 8398 5d38c3 __output_l 67 API calls 8395->8398 8396->8395 8399 5d70d4 8397->8399 8400 5d38c3 __output_l 67 API calls 8397->8400 8398->8397 8401 5d70e2 8399->8401 8402 5d38c3 __output_l 67 API calls 8399->8402 8400->8399 8403 5d38c3 __output_l 67 API calls 8401->8403 8406 5d70f3 8401->8406 8402->8401 8403->8406 8404 5d4473 __lock 67 API calls 8405 5d70fb 8404->8405 8407 5d7107 InterlockedDecrement 8405->8407 8408 5d7120 8405->8408 8406->8404 8407->8408 8409 5d7112 8407->8409 8422 5d7184 8408->8422 8409->8408 8412 5d38c3 __output_l 67 API calls 8409->8412 8412->8408 8413 5d4473 __lock 67 API calls 8414 5d7134 8413->8414 8415 5d7165 8414->8415 8417 5d9293 ___removelocaleref 8 API calls 8414->8417 8425 5d7190 8415->8425 8420 5d7149 8417->8420 8419 5d38c3 __output_l 67 API calls 8419->8391 8420->8415 8421 5d90bb ___freetlocinfo 67 API calls 8420->8421 8421->8415 8428 5d4399 LeaveCriticalSection 8422->8428 8424 5d712d 8424->8413 8429 5d4399 LeaveCriticalSection 8425->8429 8427 5d7172 8427->8419 8428->8424 8429->8427 8430 5d9064 8433 5d4399 LeaveCriticalSection 8430->8433 8432 5d906b 8433->8432

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 5d1000-5d1015 1 5d10cd-5d10de call 5d3060 0->1 2 5d101b-5d103b call 5d2df0 * 3 0->2 7 5d10e4-5d10f5 call 5d3060 1->7 8 5d1043-5d10c0 call 5d2df0 * 11 1->8 18 5d1040 2->18 16 5d1109-5d111a call 5d3060 7->16 17 5d10f7-5d1107 call 5d2df0 7->17 26 5d10c5 8->26 27 5d122e-5d123f call 5d3060 16->27 28 5d1120-5d112e 16->28 17->26 18->8 33 5d10c6 26->33 41 5d12dd-5d12ee call 5d3060 27->41 42 5d1245-5d1248 27->42 31 5d1130 28->31 32 5d11a2-5d11a7 28->32 36 5d1137-5d1148 call 5d3060 31->36 39 5d11a9-5d11ae 32->39 40 5d11e2 32->40 37 5d10c8-5d10cc 33->37 59 5d114a-5d114d 36->59 60 5d1160-5d1171 call 5d3060 36->60 47 5d11b5-5d11c5 call 5d24cb call 5d2f3a 39->47 43 5d11eb-5d1205 call 5d1712 40->43 44 5d11e4-5d11e9 40->44 63 5d1336-5d1347 call 5d3060 41->63 64 5d12f0-5d12f3 41->64 49 5d124a-5d124f 42->49 50 5d1254-5d1257 42->50 65 5d1207-5d1209 43->65 66 5d1212 43->66 44->47 88 5d11c7-5d11c8 47->88 49->47 56 5d1259-5d125e 50->56 57 5d1263-5d126b 50->57 56->47 67 5d126d 57->67 68 5d1270-5d127c call 5d1726 57->68 69 5d114f-5d1152 59->69 70 5d11b0 59->70 86 5d117e-5d118f call 5d3060 60->86 87 5d1173-5d1176 60->87 95 5d1349-5d134c 63->95 96 5d1368-5d1379 call 5d3060 63->96 76 5d12ff-5d1302 64->76 77 5d12f5-5d12fa 64->77 78 5d120b-5d1210 65->78 79 5d1227-5d1229 65->79 80 5d1217-5d1226 call 5d24cb call 5d2f3a 66->80 67->68 104 5d127e-5d1281 68->104 105 5d12c0 68->105 82 5d11cd-5d11d2 69->82 83 5d1154-5d115e 69->83 70->47 76->39 89 5d1308-5d1310 76->89 77->47 78->80 79->37 80->79 82->47 92 5d119a-5d11a0 83->92 86->32 120 5d1191-5d1194 86->120 98 5d1178-5d117c 87->98 99 5d11d4-5d11d9 87->99 88->37 101 5d1315-5d1321 call 5d1795 89->101 102 5d1312 89->102 92->32 92->36 95->39 109 5d1352-5d1359 call 5d1754 95->109 129 5d13cd-5d13de call 5d3060 96->129 130 5d137b-5d137e 96->130 98->92 99->47 116 5d12ac-5d12b1 101->116 131 5d1323-5d1326 101->131 102->101 107 5d12b6-5d12bb 104->107 108 5d1283-5d1286 104->108 114 5d12c5-5d12d8 call 5d24cb call 5d2f3a 105->114 107->47 108->116 117 5d1288-5d128a 108->117 124 5d1290-5d12a7 call 5d24cb call 5d2f3a 109->124 134 5d135f-5d1366 109->134 114->37 116->47 117->33 117->124 127 5d11db-5d11e0 120->127 128 5d1196 120->128 124->88 127->47 128->92 148 5d13e4-5d13e7 129->148 149 5d1493-5d14a4 call 5d3060 129->149 130->39 137 5d1384-5d138b call 5d1754 130->137 131->107 138 5d1328-5d132c 131->138 141 5d132f-5d1331 134->141 137->124 155 5d1391 137->155 138->141 141->37 153 5d13e9-5d13ee 148->153 154 5d13f3-5d13f6 148->154 160 5d14bb-5d14cc call 5d3060 149->160 161 5d14a6-5d14a9 149->161 153->47 154->39 157 5d13fc-5d1406 154->157 158 5d139d-5d13a9 call 5d1759 155->158 159 5d1393-5d1398 155->159 162 5d140e-5d141e call 5d1795 157->162 163 5d1408-5d140b 157->163 158->124 169 5d13af-5d13c8 call 5d2df0 158->169 159->114 175 5d1597-5d159f call 5d2df0 160->175 176 5d14d2-5d14d5 160->176 161->39 166 5d14af-5d14b4 call 5d174f 161->166 162->116 177 5d1424-5d1427 162->177 163->162 166->160 169->33 185 5d15a4 175->185 181 5d14d7-5d14dc 176->181 182 5d14e1-5d14e4 176->182 177->107 178 5d142d-5d142f 177->178 183 5d143b 178->183 184 5d1431-5d1436 178->184 181->47 182->39 186 5d14ea-5d14f4 182->186 183->124 189 5d1441-5d1443 183->189 184->114 185->185 187 5d14fc-5d1522 call 5d315d call 5d2ec0 call 5d175e 186->187 188 5d14f6-5d14f9 186->188 205 5d1535-5d1538 187->205 206 5d1524-5d1533 call 5d2df0 187->206 188->187 191 5d145c-5d1474 call 5d315d call 5d17be 189->191 192 5d1445-5d1459 call 5d269e 189->192 191->124 204 5d147a-5d148e call 5d2df0 call 5d30e8 191->204 192->191 204->33 205->105 209 5d153e-5d1541 205->209 216 5d158c-5d1592 call 5d30e8 206->216 212 5d154a-5d154d 209->212 213 5d1543-5d1548 209->213 218 5d154f 212->218 219 5d1568-5d156b 212->219 217 5d1579-5d1589 call 5d24cb call 5d2f3a 213->217 216->175 233 5d158b 217->233 220 5d1554-5d1566 call 5d24cb call 5d2f3a 218->220 221 5d156d-5d1572 219->221 222 5d1574 219->222 220->233 221->220 222->217 233->216
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: _printf$_fprintf$__ftbuf__output_l__stbuf__wassert_memset
            • String ID: arh -appLocation <appid> (<pubid>)?$ arh -appVersion <appid> (<pubid>)?$ arh -help$ arh -installAppSilent { (-location <loc>) -desktopShortcut -programMenu } <file>$ arh -isAppInstalled <appid> (<pubid>)?$ arh -isRuntimeInstalled$ arh -runtimeVersion$ arh -uninstallAppSilent <appid> (<pubid>)?$ arh -updateUserState$ arh -version$%d.%d.%d.%d$%s$-appLocation$-appVersion$-desktopShortcut$-help$-installAppSilent$-isAppInstalled$-isRuntimeInstalled$-location$-programMenu$-runtimeVersion$-uninstallAppSilent$-updateUserState$-version$..\..\Deployment\RedistributionHelper\RedistributionHelper.cpp$3.5.0.0$AIR is not installed$Adobe (R) AIR (R) Redistribution Helper (ARH)$Adobe AIR not installed$Copyright (c) 2008-2011 Adobe Systems Incorporated. All rights reserved.$Version %s$application is not installed$application not installed$argument -appLocation requires <appid> parameter$argument -appVersion requires <appID> parameter$argument -desktopShortcut already specified$argument -isAppInstalled requires <appid> parameter$argument -location already specified$argument -location requires a value$argument -programMenu already specified$argument -uninstallAppSilent requires <appid> parameter$bad parameters$invalid appid$invalid pubid$missing required argument <file>$result > 0$too many arguments$too many arguments$unexpected argument %s$unknown error$usage:
            • API String ID: 2890418644-195186187
            • Opcode ID: 9f18d8e17cdd10e617d8669c75b4e41808a93afcca651e8e73948d66a61d2145
            • Instruction ID: f3aa070131011c6aed7a6dda926e3969a110dd208db187212a6d518d613e52c5
            • Opcode Fuzzy Hash: 9f18d8e17cdd10e617d8669c75b4e41808a93afcca651e8e73948d66a61d2145
            • Instruction Fuzzy Hash: 07D14D35548F43BADB3877EE9D4BA3E2ED5BB91720F20091BF581D13C1EAB19880561E

            Control-flow Graph

            APIs
              • Part of subcall function 005D315D: _malloc.LIBCMT ref: 005D3177
            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 005D15F8
              • Part of subcall function 005D315D: std::bad_alloc::bad_alloc.LIBCMT ref: 005D319A
              • Part of subcall function 005D315D: std::bad_exception::bad_exception.LIBCMT ref: 005D31AE
            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 005D1618
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: ByteCharMultiWide$_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
            • String ID:
            • API String ID: 4062004971-0
            • Opcode ID: a35d736b4a6e9c08bfb30ee18fe80382a0dddacac685e15531b2fac8e3d32a64
            • Instruction ID: b90b202f13203e12340b9b218aad9ce0abf26598049e6886177b2bc38f91eafe
            • Opcode Fuzzy Hash: a35d736b4a6e9c08bfb30ee18fe80382a0dddacac685e15531b2fac8e3d32a64
            • Instruction Fuzzy Hash: 7B218475A00215BFDB24AFACDC4687EBBADEF84360B20451BF815E7391DA71AD408B54

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 251 5d4043-5d4054 call 5d4018 ExitProcess
            APIs
            • ___crtCorExitProcess.LIBCMT ref: 005D404B
              • Part of subcall function 005D4018: GetModuleHandleW.KERNEL32(mscoree.dll,?,005D4050,?,?,005D655A,000000FF,0000001E,?,005D3E52,?,00000001,?,?,005D43FD,00000018), ref: 005D4022
              • Part of subcall function 005D4018: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005D4032
            • ExitProcess.KERNEL32 ref: 005D4054
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: ExitProcess$AddressHandleModuleProc___crt
            • String ID:
            • API String ID: 2427264223-0
            • Opcode ID: 90783c5a67da387f44b95becf9d55dfed7018f3986320c96115ccfa6eb29ae2d
            • Instruction ID: 88873b549842df5f4013c14702175f67f097ea0f655feadb83bb0a36d862984f
            • Opcode Fuzzy Hash: 90783c5a67da387f44b95becf9d55dfed7018f3986320c96115ccfa6eb29ae2d
            • Instruction Fuzzy Hash: 79B04C3100110C7B9B212B15DC0E8493F19EA802507514012B508491219B719995A990

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 254 5d7326-5d7348 HeapCreate 255 5d734c-5d7355 254->255 256 5d734a-5d734b 254->256
            APIs
            • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 005D733B
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: CreateHeap
            • String ID:
            • API String ID: 10892065-0
            • Opcode ID: 369af11a9297f7c9c3e2087a11d7cf3da95fc964b4bd5cd9618aaa11f5376ff0
            • Instruction ID: 9ea3a2e59d18687dde27bd4dd0e84768c3bdc45cbdb360470b08cb40d918ced8
            • Opcode Fuzzy Hash: 369af11a9297f7c9c3e2087a11d7cf3da95fc964b4bd5cd9618aaa11f5376ff0
            • Instruction Fuzzy Hash: 48D05E725543485ADB149F75AC0D7663BDC9394795F008437B94DCA190F570C644EA40

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 257 5d425f-5d426b call 5d4133 259 5d4270-5d4274 257->259
            APIs
            • _doexit.LIBCMT ref: 005D426B
              • Part of subcall function 005D4133: __lock.LIBCMT ref: 005D4141
              • Part of subcall function 005D4133: __decode_pointer.LIBCMT ref: 005D4178
              • Part of subcall function 005D4133: __decode_pointer.LIBCMT ref: 005D418D
              • Part of subcall function 005D4133: __decode_pointer.LIBCMT ref: 005D41B7
              • Part of subcall function 005D4133: __decode_pointer.LIBCMT ref: 005D41CD
              • Part of subcall function 005D4133: __decode_pointer.LIBCMT ref: 005D41DA
              • Part of subcall function 005D4133: __initterm.LIBCMT ref: 005D4209
              • Part of subcall function 005D4133: __initterm.LIBCMT ref: 005D4219
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: __decode_pointer$__initterm$__lock_doexit
            • String ID:
            • API String ID: 1597249276-0
            • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
            • Instruction ID: 9a01ce31730c96d16642584fe2742a69bc590029bb79107d7ea602d7788550dc
            • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
            • Instruction Fuzzy Hash: AEB0923298020C33DA202586AC0BF063E0997D0B60E240022BA0C192A1A9A2A9A18889

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 716 5d1906-5d1945 CryptAcquireContextW 717 5d194b-5d1967 CryptCreateHash 716->717 718 5d1a32-5d1a35 716->718 720 5d196d-5d196f 717->720 721 5d1a43-5d1a50 CryptReleaseContext 717->721 719 5d1ade-5d1aec call 5d24bc 718->719 724 5d1972-5d1977 720->724 721->718 722 5d1a52-5d1ac5 call 5d357c #205 721->722 733 5d1adc 722->733 734 5d1ac7-5d1ada 722->734 724->724 727 5d1979-5d198e CryptHashData 724->727 729 5d1a0b-5d1a15 727->729 730 5d1990-5d1992 727->730 729->718 731 5d1a17-5d1a30 CryptGetHashParam 729->731 732 5d1995-5d199a 730->732 731->718 735 5d1a3a-5d1a3d CryptDestroyHash 731->735 732->732 736 5d199c-5d199e 732->736 733->719 734->719 735->721 736->729 737 5d19a0-5d19a3 736->737 737->729 738 5d19a5-5d19c7 call 5d2ec0 call 5d380e 737->738 738->729 743 5d19c9-5d19d8 call 5d37f7 738->743 743->729 746 5d19da-5d19ec CryptHashData 743->746 746->729 747 5d19ee-5d19f1 746->747 748 5d19f4-5d19f9 747->748 748->748 749 5d19fb-5d1a08 CryptHashData 748->749 749->729
            APIs
            • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000040,?,00000000,?), ref: 005D193D
            • CryptCreateHash.ADVAPI32(?,00008004,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,005D2182), ref: 005D195C
            • CryptHashData.ADVAPI32(?,00000100,00000101,00000000,?,?,?,?,?,?,?,?,?,?,005D2182,?), ref: 005D1987
            • _memset.LIBCMT ref: 005D19AF
            • CryptHashData.ADVAPI32(?,005DE408,00000001,00000000), ref: 005D19E5
            • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 005D1A06
            • CryptGetHashParam.ADVAPI32(?,00000002,?,00000014,00000000), ref: 005D1A25
            • CryptDestroyHash.ADVAPI32(?), ref: 005D1A3D
            • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,?,?,005D2182,?,?,?), ref: 005D1A47
            • __snwprintf_s.LIBCMT ref: 005D1AAE
            • #205.MSI(?,00000000,00000000,?), ref: 005D1ABE
            Strings
            • {%0.2hhX%0.2hhX%0.2hhX%0.2hhX-%0.2hhX%0.2hhX-%0.2hhX%0.2hhX-%0.2hhX%0.2hhX-%0.2hhX%0.2hhX%0.2hhX%0.2hhX%0.2hhX%0.2hhX}, xrefs: 005D1AA2
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: Crypt$Hash$Data$Context$#205AcquireCreateDestroyParamRelease__snwprintf_s_memset
            • String ID: {%0.2hhX%0.2hhX%0.2hhX%0.2hhX-%0.2hhX%0.2hhX-%0.2hhX%0.2hhX-%0.2hhX%0.2hhX-%0.2hhX%0.2hhX%0.2hhX%0.2hhX%0.2hhX%0.2hhX}
            • API String ID: 2329699298-3412396576
            • Opcode ID: 3cb019b087ffef87a87a9aea5f65d7cae7d06edd48bbe7fc59e9696a657be79e
            • Instruction ID: 575dbdcff261d92003d3731d5860fb76ad164ad3eb00fe3a5272821f83b86cf3
            • Opcode Fuzzy Hash: 3cb019b087ffef87a87a9aea5f65d7cae7d06edd48bbe7fc59e9696a657be79e
            • Instruction Fuzzy Hash: 7951BFB2901199BEDF31DBE88C95ABEBFBCAB08301F140467F251E6280D6749A459B60
            APIs
            • IsDebuggerPresent.KERNEL32 ref: 005D3BA2
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 005D3BB7
            • UnhandledExceptionFilter.KERNEL32(005DE880), ref: 005D3BC2
            • GetCurrentProcess.KERNEL32(C0000409), ref: 005D3BDE
            • TerminateProcess.KERNEL32(00000000), ref: 005D3BE5
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
            • String ID:
            • API String ID: 2579439406-0
            • Opcode ID: 2427f0f1af7208f256661610455dde7635580433a430f068e64d55389913565e
            • Instruction ID: dff337bad20ce7612d69aa9029b83410331f35f5d3000167eeab6a28aa725279
            • Opcode Fuzzy Hash: 2427f0f1af7208f256661610455dde7635580433a430f068e64d55389913565e
            • Instruction Fuzzy Hash: C621C2B4901384DBD718EF19E8CE6547BA4BB38310F40849AE5898F360E7B45B4CEF56
            APIs
            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,005D2114,?), ref: 005D1C89
            • GetProcessHeap.KERNEL32(00000000,?,?,?,?,005D2114,?), ref: 005D1C95
            • HeapFree.KERNEL32(00000000,?,?,?,005D2114,?), ref: 005D1C9C
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: Heap$ByteCharFreeMultiProcessWide
            • String ID:
            • API String ID: 678249979-0
            • Opcode ID: 856b4eecdb1ba04e4d26355b4165813f9716a482a92a643cb272c242fde40deb
            • Instruction ID: 1f4d0dc52a792c143ad999ce8c0c3817c819df3680c86681222a07bca65dfcac
            • Opcode Fuzzy Hash: 856b4eecdb1ba04e4d26355b4165813f9716a482a92a643cb272c242fde40deb
            • Instruction Fuzzy Hash: 01F03C31A56524BB8B32DB9ADD0CC9F7F69EE867B07200553F415DA2A0D6708E40E6E4
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(Function_0000666E), ref: 005D66B5
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: cf2dce9d4378da12a1773f42b46e20af3a424bcdf504c401757352cd86a9fdf2
            • Instruction ID: c4b8e5dd914ca1b6c8d5e9835c2aceb728abbd162a702715dfc38bf2949a5878
            • Opcode Fuzzy Hash: cf2dce9d4378da12a1773f42b46e20af3a424bcdf504c401757352cd86a9fdf2
            • Instruction Fuzzy Hash: DC90026065610096872037B56C8E8096EA06A5860274144936001C9194DFA08019E923

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 657 5d175e-5d176c call 5d1657 660 5d176e-5d1772 657->660 661 5d1773-5d177e call 5d16b3 657->661 664 5d1785-5d1789 661->664 665 5d1780 661->665 666 5d178f-5d218d call 5d2ec0 * 2 call 5d1906 664->666 667 5d178b-5d178d 664->667 668 5d1782-5d1784 665->668 676 5d23e9-5d2400 call 5d24bc 666->676 677 5d2193-5d21e3 call 5d2ec0 * 2 MultiByteToWideChar 666->677 667->668 684 5d21ef-5d21f5 677->684 685 5d21e5 677->685 686 5d21f7-5d21fd 684->686 687 5d2223-5d2229 684->687 685->684 686->676 688 5d2203-5d2217 MultiByteToWideChar 686->688 687->676 689 5d222f-5d2267 call 5d1e8b 687->689 688->689 690 5d2219 688->690 693 5d226c-5d22ad GetProcessHeap HeapAlloc call 5d1e1b * 2 689->693 694 5d2269 689->694 690->687 699 5d22af-5d22cb call 5d1e1b * 2 693->699 700 5d22d0-5d2302 RegOpenKeyExW 693->700 694->693 699->700 701 5d23cf 700->701 702 5d2308-5d232d RegQueryValueExW 700->702 706 5d23d9-5d23e3 GetProcessHeap HeapFree 701->706 704 5d23c1-5d23cd RegCloseKey 702->704 705 5d2333-5d233a 702->705 704->706 709 5d233c-5d2342 705->709 710 5d23b7 705->710 706->676 709->710 711 5d2344-5d234d 709->711 710->704 711->710 712 5d234f-5d237a GetProcessHeap HeapAlloc RegQueryValueExW 711->712 713 5d237c-5d239d WideCharToMultiByte 712->713 714 5d23a5-5d23b5 GetProcessHeap HeapFree 712->714 713->714 715 5d239f 713->715 714->704 715->714
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: _strspn
            • String ID: DisplayVersion$Software\Microsoft\Windows\CurrentVersion\Uninstall\
            • API String ID: 3684824311-2009758878
            • Opcode ID: b212cc914c0722d89e8bde08594786c53b2db52db5a994a57d1ec4809f98c3bc
            • Instruction ID: 31270ecd3ddfce54b0c3d760bc6892232a5217351085835840139f877be2353d
            • Opcode Fuzzy Hash: b212cc914c0722d89e8bde08594786c53b2db52db5a994a57d1ec4809f98c3bc
            • Instruction Fuzzy Hash: 1D817C71802629AADF30AB68CC4DEAE7F78FF54761F100697F51CA6290D6308E84DF64
            APIs
              • Part of subcall function 005D18C8: PathAppendW.SHLWAPI(74C63B59,\Versions\1.0\Adobe AIR Application Installer.exe,00000005,00000000,005D1B05,?,00000000), ref: 005D18FB
            • _memset.LIBCMT ref: 005D1B37
            • __wcsdup.LIBCMT ref: 005D1B42
            • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000001,00000000,00000000,00000000,?,000000FF,?,00000005,?,00000000), ref: 005D1B5F
              • Part of subcall function 005D38C3: __lock.LIBCMT ref: 005D38E1
              • Part of subcall function 005D38C3: ___sbh_find_block.LIBCMT ref: 005D38EC
              • Part of subcall function 005D38C3: ___sbh_free_block.LIBCMT ref: 005D38FB
              • Part of subcall function 005D38C3: HeapFree.KERNEL32(00000000,?,005E0B08,0000000C,005D7041,00000000,?,005D3E52,?,00000001,?,?,005D43FD,00000018,005E0BA8,0000000C), ref: 005D392B
              • Part of subcall function 005D38C3: GetLastError.KERNEL32(?,005D3E52,?,00000001,?,?,005D43FD,00000018,005E0BA8,0000000C,005D448E,?,00000000,?,005D25F9,?), ref: 005D393C
            • WaitForSingleObject.KERNEL32(000000FF,000000FF,?,00000005,?,00000000), ref: 005D1B82
            • GetExitCodeProcess.KERNEL32(000000FF,?), ref: 005D1B9C
            • CloseHandle.KERNEL32(000000FF,?,00000005,?,00000000), ref: 005D1BB2
            • CloseHandle.KERNEL32(000000FF,?,00000005,?,00000000), ref: 005D1BB7
            • GetProcessHeap.KERNEL32(00000000,?,?,00000005,?,00000000), ref: 005D1BBD
            • HeapFree.KERNEL32(00000000,?,00000005,?,00000000), ref: 005D1BC4
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: HeapProcess$CloseFreeHandle$AppendCodeCreateErrorExitLastObjectPathSingleWait___sbh_find_block___sbh_free_block__lock__wcsdup_memset
            • String ID:
            • API String ID: 632834283-0
            • Opcode ID: a213503b4c99958c3fcd29594af32150c79f94623249fc6f24170cda67de73a1
            • Instruction ID: ed517d9f92a59e8bc5e90448b591f5f77020a011bd3b3063c335e7e8cc2af3b8
            • Opcode Fuzzy Hash: a213503b4c99958c3fcd29594af32150c79f94623249fc6f24170cda67de73a1
            • Instruction Fuzzy Hash: 55317E71901518BADB31ABE8DC49DEFBF78FF85760F200157F210A61A0D6704A81EBA1
            APIs
            • GetProcessHeap.KERNEL32(00000000,00008000,00000002,?,-installAppSilent,?,005D11FD,?,?,?,?), ref: 005D1F7E
            • HeapAlloc.KERNEL32(00000000,?,-installAppSilent,?,005D11FD,?,?,?,?), ref: 005D1F85
            • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00004000,"Adobe AIR Application Installer.exe" -silent ,?,?,-installAppSilent,?,005D11FD,?,?,?,?), ref: 005D2022
            • HeapFree.KERNEL32(00000000,?,?,-installAppSilent,?,005D11FD,?,?,?,?), ref: 005D2029
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: Heap$Process$AllocFree
            • String ID: "Adobe AIR Application Installer.exe" -silent $-desktopShortcut $-installAppSilent$-location $-programMenu
            • API String ID: 756756679-3611887749
            • Opcode ID: f54f06da261e3e78e3e9076d580bad3546ba8565dea412b584eac9ff3d4e99c4
            • Instruction ID: 98f08bf159165f3f2ffa03b83b176f830d2da8ed3efba95bf203a13cce60b306
            • Opcode Fuzzy Hash: f54f06da261e3e78e3e9076d580bad3546ba8565dea412b584eac9ff3d4e99c4
            • Instruction Fuzzy Hash: B521A17150660976CF317BA99C8EB6F3F7CFB61750F10842BF9049A300D6709844DAAA
            APIs
            • #90.MSI({DC74C3C6-CAB8-4C49-BE18-5B1DCD0D197E},00000000,00000000,\Versions\1.0\Adobe AIR Application Installer.exe,?,?,005D18ED,005D1B05,\Versions\1.0\Adobe AIR Application Installer.exe,00000005,00000000,005D1B05,?), ref: 005D1868
            • GetProcessHeap.KERNEL32(00000000,?,005D1B05,{DC74C3C6-CAB8-4C49-BE18-5B1DCD0D197E},00000000,00000000,\Versions\1.0\Adobe AIR Application Installer.exe,?,?,005D18ED,005D1B05,\Versions\1.0\Adobe AIR Application Installer.exe,00000005,00000000,005D1B05,?), ref: 005D1894
            • HeapAlloc.KERNEL32(00000000,?,005D18ED,005D1B05,\Versions\1.0\Adobe AIR Application Installer.exe,00000005,00000000,005D1B05,?), ref: 005D189B
            • #90.MSI({DC74C3C6-CAB8-4C49-BE18-5B1DCD0D197E},00000000,00000000,?,005D18ED,005D1B05,\Versions\1.0\Adobe AIR Application Installer.exe,00000005,00000000,005D1B05,?), ref: 005D18B5
            • PathRemoveFileSpecW.SHLWAPI(?,{DC74C3C6-CAB8-4C49-BE18-5B1DCD0D197E},00000000,00000000,?,005D18ED,005D1B05,\Versions\1.0\Adobe AIR Application Installer.exe,00000005,00000000,005D1B05,?), ref: 005D18BC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: Heap$AllocFilePathProcessRemoveSpec
            • String ID: \Versions\1.0\Adobe AIR Application Installer.exe${DC74C3C6-CAB8-4C49-BE18-5B1DCD0D197E}
            • API String ID: 1966661001-493346412
            • Opcode ID: a9a805044d46cee8165f0d26ba66c412066711a8a10d6406f3b4a4f2e8b08738
            • Instruction ID: 113148ebc46a7ace4b67c1c5dc09290ceddf0f4fdb66756d1670bb818fa6b92f
            • Opcode Fuzzy Hash: a9a805044d46cee8165f0d26ba66c412066711a8a10d6406f3b4a4f2e8b08738
            • Instruction Fuzzy Hash: EB014CB6600109BFDB20EF98DC4ABAE7BB9FB45351F200517F801DA290DA709A44EB64
            APIs
            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,?), ref: 005D1D69
            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 005D1D7F
            • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?), ref: 005D1D94
            • HeapAlloc.KERNEL32(00000000,?,?,?), ref: 005D1D97
            • GetFileVersionInfoW.VERSION(?,00000000,?,00000000,?,?,?), ref: 005D1DAD
            • VerQueryValueW.VERSION(?,005DE484,?,?,?,00000000,?,00000000,?,?,?), ref: 005D1DC9
            • GetProcessHeap.KERNEL32(00000000,?,?,00000000,?,00000000,?,?,?), ref: 005D1DF7
            • HeapFree.KERNEL32(00000000,?,?,?), ref: 005D1DFA
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: Heap$FileInfoProcessVersion$AllocByteCharFreeMultiQuerySizeValueWide
            • String ID:
            • API String ID: 3579981898-0
            • Opcode ID: f6c80f96c42f6d9cd859ab86a89cedc17fc8cc2b4a148005997717ff9494a7c7
            • Instruction ID: 847d5c8569172c27a4aea4231dd9475291bf95246068edeb985c7191cdfecfef
            • Opcode Fuzzy Hash: f6c80f96c42f6d9cd859ab86a89cedc17fc8cc2b4a148005997717ff9494a7c7
            • Instruction Fuzzy Hash: BA3106B1901208AFDB30EFA9DC899EEBBBCFB08310F10452BE955DB291D7749944CB20
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: __calloc_crt
            • String ID: =^$Assertion failed: %s, file %s, line %d$p ^
            • API String ID: 3494438863-3626934911
            • Opcode ID: 61c24bda07d06aad646ea601d8800c1ed5e1531d270cdcafe18cc0ef57321998
            • Instruction ID: 85635eade5b4fb3ba22dfa3b44fe1da0f335bbd74d1c0db0879c077a60f496fd
            • Opcode Fuzzy Hash: 61c24bda07d06aad646ea601d8800c1ed5e1531d270cdcafe18cc0ef57321998
            • Instruction Fuzzy Hash: 2611253270425247EB3D8E1DBCA8E622F96FBE8724F24422BEA01CF3D4E630CD415A45
            APIs
            • _malloc.LIBCMT ref: 005D3177
              • Part of subcall function 005D6521: __FF_MSGBANNER.LIBCMT ref: 005D6544
              • Part of subcall function 005D6521: __NMSG_WRITE.LIBCMT ref: 005D654B
              • Part of subcall function 005D6521: HeapAlloc.KERNEL32(00000000,?,00000001,00000000,00000000,?,005D3E52,?,00000001,?,?,005D43FD,00000018,005E0BA8,0000000C,005D448E), ref: 005D6598
            • std::bad_alloc::bad_alloc.LIBCMT ref: 005D319A
              • Part of subcall function 005D30F3: std::exception::exception.LIBCMT ref: 005D30FF
            • std::bad_exception::bad_exception.LIBCMT ref: 005D31AE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: AllocHeap_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
            • String ID: Pa4$/^
            • API String ID: 3322389099-1429830951
            • Opcode ID: 5139be16657d4d3221de3946f6112e1e30cfaa9a677fe8b13d6ac33fea03fc57
            • Instruction ID: 3049fb18765d23afc988caf2d79ed13772ea8e566209369219c6f44d3daaf6aa
            • Opcode Fuzzy Hash: 5139be16657d4d3221de3946f6112e1e30cfaa9a677fe8b13d6ac33fea03fc57
            • Instruction Fuzzy Hash: 97F0E23160028762CB38A7ADFC0BD4D3F6CBB80314F04002BF85659399DFA0DB46D282
            APIs
            • __getptd.LIBCMT ref: 005D9376
              • Part of subcall function 005D7050: __getptd_noexit.LIBCMT ref: 005D7053
              • Part of subcall function 005D7050: __amsg_exit.LIBCMT ref: 005D7060
            • __getptd.LIBCMT ref: 005D938D
            • __amsg_exit.LIBCMT ref: 005D939B
            • __lock.LIBCMT ref: 005D93AB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: __amsg_exit__getptd$__getptd_noexit__lock
            • String ID: 8,^
            • API String ID: 3521780317-1624996455
            • Opcode ID: b665d9b72f090ca69c273605b75358fe6d75dead008a547b7e5533cef6fb896e
            • Instruction ID: 43362b3b3affe13364d15cb2102d6942394537b8da1cf751d6b6f43e09ccd0d5
            • Opcode Fuzzy Hash: b665d9b72f090ca69c273605b75358fe6d75dead008a547b7e5533cef6fb896e
            • Instruction Fuzzy Hash: 0BF01D32900706DBD730FBBD880E74D7AA07F84710F51594BA494AB3D1CB759941DB92
            APIs
            • __getptd.LIBCMT ref: 005D8C0A
              • Part of subcall function 005D7050: __getptd_noexit.LIBCMT ref: 005D7053
              • Part of subcall function 005D7050: __amsg_exit.LIBCMT ref: 005D7060
            • __amsg_exit.LIBCMT ref: 005D8C2A
            • __lock.LIBCMT ref: 005D8C3A
            • InterlockedDecrement.KERNEL32(?), ref: 005D8C57
            • InterlockedIncrement.KERNEL32(00802CF0), ref: 005D8C82
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
            • String ID:
            • API String ID: 4271482742-0
            • Opcode ID: 2fe11d2b063bff2c1a535f617a0fc0bb7db621474ddcf688060134f2025c8fc4
            • Instruction ID: 25f685f23f3fd42f2a0efccd27e1fba031d823de7aaa5ac7d76c2aaba173ccbf
            • Opcode Fuzzy Hash: 2fe11d2b063bff2c1a535f617a0fc0bb7db621474ddcf688060134f2025c8fc4
            • Instruction Fuzzy Hash: 4B01CB32912A22DBCB31AB6D880A72D7FA0BF00710F100007E8106F3A0CFB46D46DBE2
            APIs
            • __lock.LIBCMT ref: 005D38E1
              • Part of subcall function 005D4473: __mtinitlocknum.LIBCMT ref: 005D4489
              • Part of subcall function 005D4473: __amsg_exit.LIBCMT ref: 005D4495
              • Part of subcall function 005D4473: EnterCriticalSection.KERNEL32(00000000,00000000,?,005D25F9,?,?,005D2E39,00000001,00000000,005E0A10,0000000C,005D104D,usage:), ref: 005D449D
            • ___sbh_find_block.LIBCMT ref: 005D38EC
            • ___sbh_free_block.LIBCMT ref: 005D38FB
            • HeapFree.KERNEL32(00000000,?,005E0B08,0000000C,005D7041,00000000,?,005D3E52,?,00000001,?,?,005D43FD,00000018,005E0BA8,0000000C), ref: 005D392B
            • GetLastError.KERNEL32(?,005D3E52,?,00000001,?,?,005D43FD,00000018,005E0BA8,0000000C,005D448E,?,00000000,?,005D25F9,?), ref: 005D393C
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
            • String ID:
            • API String ID: 2714421763-0
            • Opcode ID: 9740a74a4a88c8a1858aa34794a40f64b5146ba5785d3ef0caaf0086b77253d2
            • Instruction ID: 2eec9d232938c8ad94b4105f012e912cb75c1bc9cfb2c00938867d4850851325
            • Opcode Fuzzy Hash: 9740a74a4a88c8a1858aa34794a40f64b5146ba5785d3ef0caaf0086b77253d2
            • Instruction Fuzzy Hash: 22018471801706AADF307FB9AC1EB4E3F64BF50760F10401BF0806A2D0DBB48A40DA96
            APIs
            • ___addlocaleref.LIBCMT ref: 005D933E
              • Part of subcall function 005D9204: InterlockedIncrement.KERNEL32(?), ref: 005D9216
              • Part of subcall function 005D9204: InterlockedIncrement.KERNEL32(?), ref: 005D9223
              • Part of subcall function 005D9204: InterlockedIncrement.KERNEL32(?), ref: 005D9230
              • Part of subcall function 005D9204: InterlockedIncrement.KERNEL32(?), ref: 005D923D
              • Part of subcall function 005D9204: InterlockedIncrement.KERNEL32(?), ref: 005D924A
              • Part of subcall function 005D9204: InterlockedIncrement.KERNEL32(?), ref: 005D9266
              • Part of subcall function 005D9204: InterlockedIncrement.KERNEL32(00000000), ref: 005D9276
              • Part of subcall function 005D9204: InterlockedIncrement.KERNEL32(?), ref: 005D928C
            • ___removelocaleref.LIBCMT ref: 005D9349
              • Part of subcall function 005D9293: InterlockedDecrement.KERNEL32(00000000), ref: 005D92AD
              • Part of subcall function 005D9293: InterlockedDecrement.KERNEL32(?), ref: 005D92BA
              • Part of subcall function 005D9293: InterlockedDecrement.KERNEL32(?), ref: 005D92C7
              • Part of subcall function 005D9293: InterlockedDecrement.KERNEL32(?), ref: 005D92D4
              • Part of subcall function 005D9293: InterlockedDecrement.KERNEL32(?), ref: 005D92E1
              • Part of subcall function 005D9293: InterlockedDecrement.KERNEL32(?), ref: 005D92FD
              • Part of subcall function 005D9293: InterlockedDecrement.KERNEL32(?), ref: 005D930D
              • Part of subcall function 005D9293: InterlockedDecrement.KERNEL32(?), ref: 005D9323
            • ___freetlocinfo.LIBCMT ref: 005D935D
              • Part of subcall function 005D90BB: ___free_lconv_mon.LIBCMT ref: 005D9101
              • Part of subcall function 005D90BB: ___free_lconv_num.LIBCMT ref: 005D9122
              • Part of subcall function 005D90BB: ___free_lc_time.LIBCMT ref: 005D91A7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
            • String ID: 8,^
            • API String ID: 467427115-1624996455
            • Opcode ID: 18b545b2b6c79256e052da1b7b1b5fba61d8b12abdc9691487f57d513326a94c
            • Instruction ID: 70da7734da01bdee896ceed475c43f88ca833577091e675dcc3f029bd7fffeb2
            • Opcode Fuzzy Hash: 18b545b2b6c79256e052da1b7b1b5fba61d8b12abdc9691487f57d513326a94c
            • Instruction Fuzzy Hash: 0AE08636501DA266CA39251CB4846AEAE9C7FC2711B29095BF8D4A73C4DB288D818191
            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 005DC470
            • __isleadbyte_l.LIBCMT ref: 005DC4A4
            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000000,?,00000000,00000000,?,?,?,?,00000000,00000000,00000020), ref: 005DC4D5
            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000000,00000001,00000000,00000000,?,?,?,?,00000000,00000000,00000020), ref: 005DC543
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: 36b3ed747f40cbbfe9b0a8900e952fe8cde7657a889baadf45e1d1ef4de3f63c
            • Instruction ID: 5ba28de54427b09476ac9756f23e1dba63a70f77790d2a0ae23e6a1adc545171
            • Opcode Fuzzy Hash: 36b3ed747f40cbbfe9b0a8900e952fe8cde7657a889baadf45e1d1ef4de3f63c
            • Instruction Fuzzy Hash: 46319C31A00257EFDF30DFA8C894ABA7FA5BF01322F1589ABE4618B291D730D940DB51
            APIs
              • Part of subcall function 005D1906: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000040,?,00000000,?), ref: 005D193D
              • Part of subcall function 005D1906: CryptCreateHash.ADVAPI32(?,00008004,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,005D2182), ref: 005D195C
              • Part of subcall function 005D1906: CryptHashData.ADVAPI32(?,00000100,00000101,00000000,?,?,?,?,?,?,?,?,?,?,005D2182,?), ref: 005D1987
              • Part of subcall function 005D1906: _memset.LIBCMT ref: 005D19AF
              • Part of subcall function 005D1906: CryptHashData.ADVAPI32(?,005DE408,00000001,00000000), ref: 005D19E5
            • #173.MSI(?,?,00000000,?), ref: 005D2082
            • GetProcessHeap.KERNEL32(00000000,?,?,?,00000000,?), ref: 005D209C
            • HeapAlloc.KERNEL32(00000000), ref: 005D20A3
            • #173.MSI(?,?,00000000,?), ref: 005D20B8
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: Crypt$Hash$#173DataHeap$AcquireAllocContextCreateProcess_memset
            • String ID:
            • API String ID: 3048589869-0
            • Opcode ID: 2dcc4bd76690f88e972af6007319ee2a341a22209577790816f6f5e796c2cadc
            • Instruction ID: 08c00e0000e385f0121e996b5b7e3a8fb716139061a6d5d4b544c46f9764e9b8
            • Opcode Fuzzy Hash: 2dcc4bd76690f88e972af6007319ee2a341a22209577790816f6f5e796c2cadc
            • Instruction Fuzzy Hash: 6A115EB2910109AFDB24EFA8DD49EFE77F8BB28314F24061BF555D3291EA24D904CB61
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: _strspn
            • String ID: 0123456789ABCDEFabcdef$D]
            • API String ID: 3684824311-1356279687
            • Opcode ID: b8b3366a8f8729dc7d3fa5977d6b1b72b13cca4e1c94eb2b7dda6078d4bff957
            • Instruction ID: ecfaa4d1059e716f6758af0cab27b3fd0780b4bcc24fa9e5280c43c2c1bb20e8
            • Opcode Fuzzy Hash: b8b3366a8f8729dc7d3fa5977d6b1b72b13cca4e1c94eb2b7dda6078d4bff957
            • Instruction Fuzzy Hash: 93F05927214B25378B39097C6C999AA2F9EFA82B1132D8553F844CF314E812D98483CC
            APIs
            • StrDupW.SHLWAPI("Adobe AIR Application Installer.exe" -updateUserState,?,?,005D14B4), ref: 005D1C36
            • LocalFree.KERNEL32(00000000,?,?,005D14B4), ref: 005D1C4C
            Strings
            • "Adobe AIR Application Installer.exe" -updateUserState, xrefs: 005D1C31
            Memory Dump Source
            • Source File: 00000000.00000002.2034017200.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
            • Associated: 00000000.00000002.2033993716.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034075734.00000000005DE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034218544.00000000005E2000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2034267706.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_5d0000_1.jbxd
            Similarity
            • API ID: FreeLocal
            • String ID: "Adobe AIR Application Installer.exe" -updateUserState
            • API String ID: 2826327444-1294534410
            • Opcode ID: 3486b60132d4d4c93139d5696c9085705874068b0c0259474921e38c2ed83069
            • Instruction ID: f4a0d4008b1f330ed3aa91468a6a638eb69f0a482a1e46708e083bae2ad70520
            • Opcode Fuzzy Hash: 3486b60132d4d4c93139d5696c9085705874068b0c0259474921e38c2ed83069
            • Instruction Fuzzy Hash: 61D05E36743920739530326D7C0ED4B5F54EBC57217060433F9009A35089608C0684E8