Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eVirFdGeXm.exe

Overview

General Information

Sample name:eVirFdGeXm.exe
renamed because original name is a hash value
Original sample name:11e3134472c0035f17a22bfbd2f66416.exe
Analysis ID:1537103
MD5:11e3134472c0035f17a22bfbd2f66416
SHA1:073a4f5698987a9e1d36beadbec29570f9906d46
SHA256:ef2a8077afd8c42e52b49a2c4f7a1ca49f59f83ef9af4e508bf438b64bc36b11
Tags:64exe
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Binary contains a suspicious time stamp
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
PE file contains an invalid checksum
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • eVirFdGeXm.exe (PID: 4668 cmdline: "C:\Users\user\Desktop\eVirFdGeXm.exe" MD5: 11E3134472C0035F17A22BFBD2F66416)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: eVirFdGeXm.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: dccw.pdbGCTL source: eVirFdGeXm.exe
Source: Binary string: dccw.pdb source: eVirFdGeXm.exe
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC71EBC4 GetObjectW,GetLastError,GetWindowRect,GetLastError,GetDC,GetLastError,CreateCompatibleDC,GetLastError,SelectObject,CreateCompatibleDC,GetLastError,SetStretchBltMode,GetLastError,CreateCompatibleBitmap,GetLastError,SelectObject,StretchBlt,GetLastError,SendMessageW,DeleteObject,ReleaseDC,DeleteDC,DeleteDC,DeleteObject,0_2_00007FF6BC71EBC4
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC7111700_2_00007FF6BC711170
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC7141200_2_00007FF6BC714120
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC71EBC40_2_00007FF6BC71EBC4
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC7125180_2_00007FF6BC712518
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC71892C0_2_00007FF6BC71892C
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC71388C0_2_00007FF6BC71388C
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC712E8C0_2_00007FF6BC712E8C
Source: eVirFdGeXm.exeBinary or memory string: OriginalFilename vs eVirFdGeXm.exe
Source: eVirFdGeXm.exe, 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedccw.exej% vs eVirFdGeXm.exe
Source: eVirFdGeXm.exeBinary or memory string: OriginalFilenamedccw.exej% vs eVirFdGeXm.exe
Source: classification engineClassification label: clean4.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC720478 FormatMessageW,LocalFree,GetLastError,0_2_00007FF6BC720478
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC711780 CoCreateInstance,0_2_00007FF6BC711780
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC71E884 FindResourceW,GetLastError,LoadResource,GetLastError,SizeofResource,LockResource,GlobalAlloc,GetLastError,GlobalLock,GetLastError,memcpy,CreateStreamOnHGlobal,GlobalUnlock,GlobalFree,GlobalUnlock,GetLastError,GdipAlloc,GdipCreateBitmapFromStream,GdipCreateHBITMAPFromBitmap,GetObjectW,GetLastError,0_2_00007FF6BC71E884
Source: C:\Users\user\Desktop\eVirFdGeXm.exeMutant created: \Sessions\1\BaseNamedObjects\Local\DCCW Startup Mutex
Source: eVirFdGeXm.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\eVirFdGeXm.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\eVirFdGeXm.exeSection loaded: dxva2.dllJump to behavior
Source: C:\Users\user\Desktop\eVirFdGeXm.exeSection loaded: mscms.dllJump to behavior
Source: C:\Users\user\Desktop\eVirFdGeXm.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\eVirFdGeXm.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Users\user\Desktop\eVirFdGeXm.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\eVirFdGeXm.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\eVirFdGeXm.exeSection loaded: duser.dllJump to behavior
Source: C:\Users\user\Desktop\eVirFdGeXm.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\Desktop\eVirFdGeXm.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\eVirFdGeXm.exeSection loaded: textshaping.dllJump to behavior
Source: eVirFdGeXm.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: eVirFdGeXm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: eVirFdGeXm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: eVirFdGeXm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: eVirFdGeXm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: eVirFdGeXm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: eVirFdGeXm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: eVirFdGeXm.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: eVirFdGeXm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: dccw.pdbGCTL source: eVirFdGeXm.exe
Source: Binary string: dccw.pdb source: eVirFdGeXm.exe
Source: eVirFdGeXm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: eVirFdGeXm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: eVirFdGeXm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: eVirFdGeXm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: eVirFdGeXm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: eVirFdGeXm.exeStatic PE information: 0x9AF322B1 [Sat May 18 06:09:53 2052 UTC]
Source: eVirFdGeXm.exeStatic PE information: real checksum: 0x1f5dd should be: 0x90725
Source: C:\Users\user\Desktop\eVirFdGeXm.exeAPI coverage: 5.0 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC71F7DC GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,0_2_00007FF6BC71F7DC
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC721010 SetUnhandledExceptionFilter,0_2_00007FF6BC721010
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC720CE8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6BC720CE8
Source: C:\Users\user\Desktop\eVirFdGeXm.exeCode function: 0_2_00007FF6BC7211E4 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,0_2_00007FF6BC7211E4
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Timestomp
OS Credential Dumping1
System Time Discovery
Remote Services1
Screen Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory1
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1537103
Start date and time:2024-10-18 15:12:06 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 13s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:eVirFdGeXm.exe
renamed because original name is a hash value
Original Sample Name:11e3134472c0035f17a22bfbd2f66416.exe
Detection:CLEAN
Classification:clean4.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 9
  • Number of non-executed functions: 87
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • VT rate limit hit for: eVirFdGeXm.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):5.943086016037392
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:eVirFdGeXm.exe
File size:551'543 bytes
MD5:11e3134472c0035f17a22bfbd2f66416
SHA1:073a4f5698987a9e1d36beadbec29570f9906d46
SHA256:ef2a8077afd8c42e52b49a2c4f7a1ca49f59f83ef9af4e508bf438b64bc36b11
SHA512:806b4f3bfc0f012e79a43a08c5ef1dd8d480628d93a21b06241bac46ade1fb7255c5184fa31522681f812be4dc2eef2a74acccc565f0e8ae46ea778f86599602
SSDEEP:6144:FTC9J2tSpzsSTC9J2tSpzsnTC9J2tSpzsATC9J2tSpzsxTC9J2tSpzs:FTC3/pNTC3/pyTC3/plTC3/pcTC3/p
TLSH:68C4B44A22B928C4D1BB937DB50E4106D771F0322B2557DF06E0C27AAF27AD1AD37B52
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%0dkaQ.8aQ.8aQ.8h).8cQ.8u:.9bQ.8u:.9uQ.8u:.9gQ.8u:.9xQ.8aQ.8.Q.8u:.9MQ.8u:.8`Q.8u:.9`Q.8RichaQ.8........PE..d...."............"
Icon Hash:00928e8e8686b000
Entrypoint:0x140010b60
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0x9AF322B1 [Sat May 18 06:09:53 2052 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:f9bc8bd9a4625c4e4d51d3742b03ca20
Instruction
dec eax
sub esp, 28h
call 00007FB4AC9421B0h
dec eax
add esp, 28h
jmp 00007FB4AC9418B3h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
nop word ptr [eax+eax+00000000h]
dec eax
cmp ecx, dword ptr [00008521h]
jne 00007FB4AC941B42h
dec eax
rol ecx, 10h
test cx, FFFFh
jne 00007FB4AC941B33h
ret
dec eax
ror ecx, 10h
jmp 00007FB4AC941CB7h
int3
int3
int3
int3
int3
int3
jmp dword ptr [000030EEh]
int3
int3
int3
int3
int3
int3
jmp dword ptr [000030DAh]
int3
int3
int3
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
dec eax
mov eax, dword ptr [000090CCh]
dec eax
mov dword ptr [esp+38h], eax
dec eax
cmp eax, FFFFFFFFh
jne 00007FB4AC941B45h
dec eax
mov eax, dword ptr [00002FF2h]
call dword ptr [00003104h]
dec eax
add esp, 20h
pop ebx
ret
mov ecx, 00000008h
call 00007FB4AC94220Ah
nop
dec eax
mov eax, dword ptr [0000909Ch]
dec eax
mov dword ptr [esp+38h], eax
dec eax
mov eax, dword ptr [00009088h]
dec eax
mov dword ptr [esp+40h], eax
dec esp
lea eax, dword ptr [esp+40h]
dec eax
lea edx, dword ptr [esp+38h]
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x166e00x118.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1b0000xad8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1a0000xca8.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1c0000x520.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x159e00x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x134200x118.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x135380x7b8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x107de0x108008f020530bf64183b4598b3085a9f6b03False0.4820519649621212data5.991516424959198IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x120000x61640x62006cba640dbde64f8ce82d1a367478d73eFalse0.33434311224489793data4.632881930147428IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x190000xd380x600f926aefd7b803ed4d6a71efdd0c17930False0.310546875data2.588992496206584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x1a0000xca80xe005ba08379ab3fd2d06a07780194ffa0eeFalse0.4545200892857143PEX Binary Archive4.418455269512572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x1b0000xad80xc00bfe5089f87873e1649a803ed60174128False0.3961588541666667data4.42197713604801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1c0000x5200x6005d61936ce61eecf3201ed8c0c5114361False0.541015625data5.122423379011978IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
MUI0x1b9d00x108dataEnglishUnited States0.5681818181818182
RT_VERSION0x1b6400x390dataEnglishUnited States0.46271929824561403
RT_MANIFEST0x1b0f00x54fXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.41501103752759383
DLLImport
ADVAPI32.dllRegCloseKey, RegQueryInfoKeyW, RegEnumKeyExW, RegOpenKeyExW, RegSetValueExW, RegCreateKeyExW, RegDeleteValueW, EventRegister, EventUnregister, EventWrite, RegQueryValueExW
KERNEL32.dllWaitForSingleObject, CreateMutexW, HeapSetInformation, InitializeCriticalSection, GetModuleFileNameW, FindResourceExW, LoadResource, ReleaseMutex, MultiByteToWideChar, lstrcmpiW, GetModuleHandleW, LoadLibraryExW, GetProcAddress, FreeLibrary, GetLastError, CloseHandle, CreateFileW, GetTickCount, LockResource, FindResourceW, GlobalFree, GlobalUnlock, GlobalLock, GlobalAlloc, LocalFree, FormatMessageW, GetSystemDirectoryW, WriteFile, lstrlenW, WideCharToMultiByte, GetSystemTime, CopyFileW, SizeofResource, EnterCriticalSection, LeaveCriticalSection, RaiseException, DeleteCriticalSection, OutputDebugStringA, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, TerminateProcess, SetUnhandledExceptionFilter, HeapFree, VirtualFree, GetCurrentProcess, VirtualAlloc, LoadLibraryExA, EncodePointer, HeapAlloc, DecodePointer, GetProcessHeap, FlushInstructionCache, InterlockedPushEntrySList, InterlockedPopEntrySList, Sleep, GetStartupInfoW, UnhandledExceptionFilter, GetSystemTimeAsFileTime
GDI32.dllStretchBlt, CreateCompatibleBitmap, SetStretchBltMode, SelectObject, CreateCompatibleDC, GetObjectW, GetTextExtentPoint32W, SetDeviceGammaRamp, GetDeviceGammaRamp, GetStockObject, SetBkMode, SetBkColor, SetTextColor, CreateSolidBrush, GetDeviceCaps, CreateDCW, DeleteDC, DeleteObject
USER32.dllLoadStringW, GetWindowLongW, GetWindow, ShowWindow, MessageBoxW, ReleaseDC, GetWindowTextW, GetWindowTextLengthW, GetDC, KillTimer, SetTimer, SetWindowTextW, PostMessageW, MapDialogRect, EnumChildWindows, DisplayConfigGetDeviceInfo, QueryDisplayConfig, GetDisplayConfigBufferSizes, EnumDisplayDevicesW, ShowCursor, LoadCursorW, SetCursor, GetMonitorInfoW, EnumDisplayMonitors, MonitorFromWindow, GetParent, InvalidateRect, MapWindowPoints, GetWindowRect, GetDlgItem, DefWindowProcW, SendMessageW, CallWindowProcW, SetWindowPos, SetForegroundWindow, OpenIcon, SetWindowLongPtrW, GetWindowLongPtrW, MonitorFromRect, SendMessageTimeoutW, AllowSetForegroundWindow, GetWindowThreadProcessId, FindWindowW, RegisterWindowMessageW, GetActiveWindow, GetSystemMetrics, CharNextW, DestroyWindow, UnregisterClassA, MoveWindow
msvcrt.dlliswupper, towlower, _vsnwprintf, memset, ?terminate@@YAXXZ, realloc, _errno, _onexit, __dllonexit, _unlock, _lock, _commode, _fmode, _wcmdln, _initterm, __setusermatherr, _cexit, _exit, exit, __set_app_type, __wgetmainargs, _amsg_exit, _XcptFilter, _callnewh, swscanf_s, wcsstr, _wcsupr, _purecall, memcpy_s, malloc, wcsncpy_s, free, __C_specific_handler, memcpy, powf
ntdll.dllRtlLookupFunctionEntry, RtlCaptureContext, RtlVirtualUnwind, WinSqmAddToStream
dxva2.dllGetNumberOfPhysicalMonitorsFromHMONITOR, GetPhysicalMonitorsFromHMONITOR, DestroyPhysicalMonitors, GetMonitorBrightness, SetMonitorBrightness, GetMonitorContrast, SetMonitorContrast, SetVCPFeature, GetVCPFeatureAndVCPFeatureReply
mscms.dllGetColorProfileFromHandle, DccwReleaseDisplayProfileAssociationList, WcsCreateIccProfile, InstallColorProfileW, SetColorProfileElement, CloseColorProfile, DccwSetDisplayProfileAssociationList, WcsGetUsePerUserProfiles, WcsGetDefaultColorProfile, WcsOpenColorProfileW, DccwGetGamutSize, DccwCreateDisplayProfileAssociationList, SetColorProfileElementSize, WcsGetCalibrationManagementState, WcsDisassociateColorProfileFromDevice, WcsSetDefaultColorProfile, UninstallColorProfileW, DccwGetDisplayProfileAssociationList, GetColorDirectoryW, WcsSetCalibrationManagementState
SHELL32.dllShellExecuteW
GDIPLUS.dllGdipCreateHBITMAPFromBitmap, GdipDisposeImage, GdipCloneImage, GdipFree, GdipCreateLineBrushI, GdipFillRectangleI, GdipAlloc, GdipDeleteBrush, GdipCreateSolidFill, GdipDeleteGraphics, GdipCreateFromHDC, GdiplusShutdown, GdiplusStartup, GdipCreateBitmapFromStream
COMCTL32.dllTaskDialogIndirect, DestroyPropertySheetPage, CreatePropertySheetPageW, PropertySheetW
OLEAUT32.dllSysFreeString, VarUI4FromStr, SysAllocString
api-ms-win-core-com-l1-1-0.dllCoCreateInstance, StringFromCLSID, CreateStreamOnHGlobal, CoTaskMemRealloc, CoTaskMemFree, CoTaskMemAlloc
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:09:13:13
Start date:18/10/2024
Path:C:\Users\user\Desktop\eVirFdGeXm.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\eVirFdGeXm.exe"
Imagebase:0x7ff6bc710000
File size:551'543 bytes
MD5 hash:11E3134472C0035F17A22BFBD2F66416
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:6%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:23.8%
    Total number of Nodes:1574
    Total number of Limit Nodes:3
    execution_graph 4540 7ff6bc711bc0 4543 7ff6bc711d00 EnterCriticalSection 4540->4543 4542 7ff6bc711bd4 4554 7ff6bc711bf8 4543->4554 4546 7ff6bc711d48 DeleteCriticalSection 4547 7ff6bc711d5b 4546->4547 4548 7ff6bc711bf8 5 API calls 4547->4548 4549 7ff6bc711d64 4548->4549 4550 7ff6bc711d6d free 4549->4550 4551 7ff6bc711d7e 4549->4551 4550->4551 4552 7ff6bc711d87 free 4551->4552 4553 7ff6bc711d98 4551->4553 4552->4553 4553->4542 4555 7ff6bc711c49 4554->4555 4556 7ff6bc711c13 4554->4556 4557 7ff6bc711c61 4555->4557 4558 7ff6bc711c51 free 4555->4558 4556->4555 4559 7ff6bc711c92 4556->4559 4563 7ff6bc711c9c 4556->4563 4560 7ff6bc711c6a free 4557->4560 4561 7ff6bc711c7b LeaveCriticalSection 4557->4561 4558->4557 4568 7ff6bc713dd4 RaiseException 4559->4568 4560->4561 4561->4546 4561->4547 4569 7ff6bc713dd4 RaiseException 4563->4569 5313 7ff6bc7178c0 5314 7ff6bc717927 5313->5314 5315 7ff6bc7178ea GetMonitorInfoW 5313->5315 5317 7ff6bc720b90 7 API calls 5314->5317 5315->5314 5316 7ff6bc717907 CreateDCW 5315->5316 5316->5314 5318 7ff6bc717940 5317->5318 5335 7ff6bc71f2c0 GetParent PostMessageW GetParent SendMessageW 4573 7ff6bc71dbc0 4576 7ff6bc71e33c RegOpenKeyExW 4573->4576 4577 7ff6bc71e396 RegQueryValueExW 4576->4577 4578 7ff6bc71e405 4576->4578 4577->4578 4581 7ff6bc71e3c5 4577->4581 4579 7ff6bc71dbde 4578->4579 4580 7ff6bc71e413 RegCloseKey 4578->4580 4580->4579 4581->4578 4582 7ff6bc71e3d5 RegQueryValueExW 4581->4582 4582->4578 5319 7ff6bc71b6c0 5320 7ff6bc71b6e9 SendMessageW SendMessageW 5319->5320 5321 7ff6bc71b775 5320->5321 5322 7ff6bc71b7db 5321->5322 5323 7ff6bc71b77b SendMessageW SetTimer 5321->5323 5325 7ff6bc71e600 15 API calls 5322->5325 5328 7ff6bc7198c0 GetParent PostMessageW GetParent SendMessageW 5323->5328 5326 7ff6bc71b7d6 5325->5326 5328->5326 4583 7ff6bc7207c0 4584 7ff6bc7207d2 4583->4584 4590 7ff6bc721098 GetModuleHandleW 4584->4590 4586 7ff6bc720839 __set_app_type 4587 7ff6bc720876 4586->4587 4588 7ff6bc72088c 4587->4588 4589 7ff6bc72087f __setusermatherr 4587->4589 4589->4588 4591 7ff6bc7210ad 4590->4591 4591->4586 4592 7ff6bc71a9d0 4595 7ff6bc71adc4 4592->4595 4596 7ff6bc71adec 4595->4596 4597 7ff6bc71adf4 DeleteObject 4596->4597 4598 7ff6bc71ae0a 4596->4598 4597->4596 4599 7ff6bc720fd0 4600 7ff6bc720fdf 4599->4600 4601 7ff6bc721002 4599->4601 4600->4601 4602 7ff6bc720ffb ?terminate@ 4600->4602 4602->4601 5340 7ff6bc71c2d0 5341 7ff6bc71c5e0 2 API calls 5340->5341 5342 7ff6bc71c2ef 5341->5342 5343 7ff6bc71f0d0 GdipCloneImage 5344 7ff6bc71f0f8 5343->5344 5345 7ff6bc71f0fb GdipAlloc 5343->5345 5344->5345 5346 7ff6bc71f111 5345->5346 4603 7ff6bc7161e0 4606 7ff6bc7195c0 4603->4606 4605 7ff6bc7161f4 4607 7ff6bc7195df DeleteObject 4606->4607 4608 7ff6bc7195eb 4606->4608 4607->4608 4609 7ff6bc719619 4608->4609 4610 7ff6bc71faa8 8 API calls 4608->4610 4609->4605 4610->4609 4611 7ff6bc714de0 SendMessageW 4630 7ff6bc719de0 4631 7ff6bc719e19 4630->4631 4632 7ff6bc719e1f 4631->4632 4633 7ff6bc719e33 GetDlgItem SendMessageW 4631->4633 4636 7ff6bc71e600 15 API calls 4632->4636 4634 7ff6bc719e6c GetSystemDirectoryW 4633->4634 4635 7ff6bc719e2e 4633->4635 4634->4635 4639 7ff6bc719e95 4634->4639 4637 7ff6bc720b90 7 API calls 4635->4637 4636->4635 4638 7ff6bc719f06 4637->4638 4639->4635 4640 7ff6bc719ec3 ShellExecuteW 4639->4640 4640->4635 4612 7ff6bc71a3e0 4613 7ff6bc71a426 4612->4613 4614 7ff6bc71a439 4613->4614 4615 7ff6bc71a42c 4613->4615 4616 7ff6bc720234 2 API calls 4614->4616 4623 7ff6bc71b5a0 4615->4623 4621 7ff6bc71a465 4616->4621 4618 7ff6bc71a434 4619 7ff6bc720b90 7 API calls 4618->4619 4620 7ff6bc71a5b3 4619->4620 4621->4618 4621->4621 4622 7ff6bc71a4df EventWrite 4621->4622 4622->4618 4624 7ff6bc720234 2 API calls 4623->4624 4629 7ff6bc71b5ec 4624->4629 4625 7ff6bc71b685 4626 7ff6bc720b90 7 API calls 4625->4626 4627 7ff6bc71b69a 4626->4627 4627->4618 4628 7ff6bc71b634 EventWrite 4628->4625 4629->4625 4629->4628 5350 7ff6bc71f4e0 5351 7ff6bc71f57b 5350->5351 5354 7ff6bc71f511 5350->5354 5352 7ff6bc71f547 5352->5351 5353 7ff6bc7155c0 20 API calls 5352->5353 5353->5351 5354->5352 5356 7ff6bc71f5f0 5354->5356 5357 7ff6bc71f61a 5356->5357 5358 7ff6bc71f624 GetParent PostMessageW 5357->5358 5360 7ff6bc71f6c7 5357->5360 5359 7ff6bc71f655 GetWindowLongW 5358->5359 5361 7ff6bc71f683 GetWindow 5359->5361 5362 7ff6bc71f675 GetParent 5359->5362 5363 7ff6bc71e600 15 API calls 5360->5363 5364 7ff6bc71f694 5361->5364 5362->5364 5365 7ff6bc71f6c5 5363->5365 5364->5359 5366 7ff6bc71f69c ShowWindow 5364->5366 5365->5352 5366->5365 5367 7ff6bc71a8e0 5368 7ff6bc71a966 5367->5368 5369 7ff6bc71a912 5367->5369 5370 7ff6bc71a92b 5369->5370 5371 7ff6bc71a971 5369->5371 5376 7ff6bc71ae28 5370->5376 5372 7ff6bc71a93a 5371->5372 5384 7ff6bc71af24 5371->5384 5372->5368 5375 7ff6bc7155c0 20 API calls 5372->5375 5375->5368 5377 7ff6bc719628 3 API calls 5376->5377 5383 7ff6bc71ae55 5377->5383 5378 7ff6bc71aef8 5379 7ff6bc720b90 7 API calls 5378->5379 5381 7ff6bc71af07 5379->5381 5380 7ff6bc720234 2 API calls 5380->5383 5381->5372 5382 7ff6bc71aebe GetDlgItem SetWindowTextW 5382->5383 5383->5378 5383->5380 5383->5382 5385 7ff6bc71970c 11 API calls 5384->5385 5393 7ff6bc71af58 5385->5393 5386 7ff6bc71afa3 GetDlgItem 5387 7ff6bc71e884 21 API calls 5386->5387 5387->5393 5388 7ff6bc71afe7 GetWindowRect 5390 7ff6bc71b01c GetLastError 5388->5390 5391 7ff6bc71affe MapWindowPoints 5388->5391 5389 7ff6bc71b1c9 DeleteObject 5389->5393 5390->5393 5391->5393 5392 7ff6bc71b1e7 5394 7ff6bc720b90 7 API calls 5392->5394 5393->5386 5393->5388 5393->5389 5393->5392 5396 7ff6bc71b08b MoveWindow 5393->5396 5398 7ff6bc71ebc4 31 API calls 5393->5398 5399 7ff6bc71b0f0 InvalidateRect GetDlgItem GetWindowRect 5393->5399 5402 7ff6bc71b16f MoveWindow 5393->5402 5395 7ff6bc71b1f3 5394->5395 5395->5372 5396->5393 5397 7ff6bc71b0ae GetLastError 5396->5397 5397->5393 5398->5393 5400 7ff6bc71b151 GetLastError 5399->5400 5401 7ff6bc71b133 MapWindowPoints 5399->5401 5400->5393 5401->5393 5402->5393 5403 7ff6bc71b1b4 GetLastError 5402->5403 5403->5393 5404 7ff6bc71bee0 GetMonitorContrast 5405 7ff6bc71bf09 GetLastError 5404->5405 5406 7ff6bc71bf23 5404->5406 5405->5406 5407 7ff6bc71cae0 5408 7ff6bc71cb11 5407->5408 5409 7ff6bc71cb05 DeleteObject 5407->5409 5412 7ff6bc7158c8 5408->5412 5409->5408 5411 7ff6bc71cb19 5413 7ff6bc7158e7 DeleteObject 5412->5413 5414 7ff6bc7158f3 5412->5414 5413->5414 5415 7ff6bc71590b 5414->5415 5416 7ff6bc7158ff DeleteObject 5414->5416 5417 7ff6bc7195df DeleteObject 5415->5417 5418 7ff6bc7195eb 5415->5418 5416->5415 5417->5418 5419 7ff6bc719619 5418->5419 5420 7ff6bc71faa8 8 API calls 5418->5420 5419->5411 5420->5419 5421 7ff6bc71dae0 5422 7ff6bc71e33c 4 API calls 5421->5422 5423 7ff6bc71dafe 5422->5423 5424 7ff6bc714cf0 5425 7ff6bc714d1b ReleaseMutex CloseHandle 5424->5425 5426 7ff6bc714d42 5424->5426 5425->5426 5427 7ff6bc714d98 CallWindowProcW 5426->5427 5428 7ff6bc714d4a OpenIcon SetForegroundWindow SetWindowPos 5426->5428 5429 7ff6bc714db9 5427->5429 5428->5429 4644 7ff6bc71dff0 4647 7ff6bc71e43c RegOpenKeyExW 4644->4647 4648 7ff6bc71e4bd 4647->4648 4649 7ff6bc71e493 RegSetValueExW 4647->4649 4650 7ff6bc71e4c7 RegCloseKey 4648->4650 4651 7ff6bc71e017 4648->4651 4649->4648 4650->4651 4161 7ff6bc7208f0 GetStartupInfoW 4162 7ff6bc72092f 4161->4162 4163 7ff6bc720941 4162->4163 4164 7ff6bc72094a Sleep 4162->4164 4165 7ff6bc720966 _amsg_exit 4163->4165 4167 7ff6bc720974 4163->4167 4164->4162 4165->4167 4166 7ff6bc7209ea _initterm 4169 7ff6bc720a07 _IsNonwritableInCurrentImage 4166->4169 4167->4166 4168 7ff6bc7209cb 4167->4168 4167->4169 4169->4168 4175 7ff6bc711170 HeapSetInformation 4169->4175 4172 7ff6bc720ac8 exit 4173 7ff6bc720ad0 4172->4173 4173->4168 4174 7ff6bc720ad9 _cexit 4173->4174 4174->4168 4176 7ff6bc7111c7 GetCurrentThreadId 4175->4176 4234 7ff6bc72076c 4176->4234 4181 7ff6bc71130d GetSystemMetrics 4183 7ff6bc711352 4181->4183 4184 7ff6bc711322 4181->4184 4182 7ff6bc7112a5 4389 7ff6bc720234 4182->4389 4188 7ff6bc71143e 4183->4188 4238 7ff6bc71ef88 RegOpenKeyExW 4183->4238 4186 7ff6bc720234 2 API calls 4184->4186 4193 7ff6bc711342 4186->4193 4187 7ff6bc7112c5 4206 7ff6bc7112f4 4187->4206 4395 7ff6bc720478 FormatMessageW 4187->4395 4190 7ff6bc711442 GdiplusShutdown 4188->4190 4191 7ff6bc711453 4188->4191 4190->4191 4195 7ff6bc71146b EnterCriticalSection 4191->4195 4196 7ff6bc71145f EventUnregister 4191->4196 4193->4183 4200 7ff6bc71e50c 11 API calls 4193->4200 4203 7ff6bc7114aa 4195->4203 4204 7ff6bc7114f1 LeaveCriticalSection 4195->4204 4196->4195 4198 7ff6bc7113a9 4205 7ff6bc72076c malloc 4198->4205 4199 7ff6bc711375 4202 7ff6bc72076c malloc 4199->4202 4200->4183 4208 7ff6bc711383 4202->4208 4209 7ff6bc7114c9 4203->4209 4210 7ff6bc7114b0 DestroyWindow 4203->4210 4212 7ff6bc711514 4204->4212 4225 7ff6bc711544 4204->4225 4211 7ff6bc7113b7 4205->4211 4206->4181 4213 7ff6bc71138b memset 4208->4213 4222 7ff6bc7113a0 4208->4222 4209->4204 4218 7ff6bc7114d6 free 4209->4218 4219 7ff6bc7114e5 4209->4219 4210->4209 4214 7ff6bc7113bf memset 4211->4214 4211->4222 4215 7ff6bc71152b 4212->4215 4216 7ff6bc71151c free 4212->4216 4411 7ff6bc716280 4213->4411 4220 7ff6bc716280 5 API calls 4214->4220 4221 7ff6bc711534 free 4215->4221 4215->4225 4216->4215 4218->4219 4219->4204 4220->4222 4221->4225 4222->4188 4243 7ff6bc713f74 4222->4243 4385 7ff6bc713df0 4225->4385 4226 7ff6bc7113ff 4246 7ff6bc714120 CreateMutexExW 4226->4246 4229 7ff6bc711409 4230 7ff6bc711428 4229->4230 4231 7ff6bc71140f GetActiveWindow 4229->4231 4414 7ff6bc7140a8 4230->4414 4377 7ff6bc711638 4231->4377 4235 7ff6bc72078a malloc 4234->4235 4236 7ff6bc71120e EventRegister GdiplusStartup 4235->4236 4237 7ff6bc72077b 4235->4237 4236->4181 4236->4182 4237->4235 4237->4236 4239 7ff6bc71efd8 RegQueryValueExW 4238->4239 4242 7ff6bc71f00e 4238->4242 4239->4242 4240 7ff6bc71f028 RegCloseKey 4241 7ff6bc711371 4240->4241 4241->4198 4241->4199 4242->4240 4242->4241 4244 7ff6bc721492 4243->4244 4245 7ff6bc713fc2 memset 4244->4245 4245->4226 4247 7ff6bc71416b GetLastError 4246->4247 4248 7ff6bc714194 RegisterWindowMessageW 4246->4248 4247->4248 4249 7ff6bc71417e WaitForSingleObject 4247->4249 4250 7ff6bc720234 2 API calls 4248->4250 4249->4248 4251 7ff6bc7141d8 FindWindowW 4250->4251 4252 7ff6bc7141fc GetWindowThreadProcessId AllowSetForegroundWindow SendMessageTimeoutW 4251->4252 4253 7ff6bc714267 4251->4253 4252->4253 4254 7ff6bc714a87 4253->4254 4255 7ff6bc72076c malloc 4253->4255 4256 7ff6bc714a9a ReleaseMutex CloseHandle 4254->4256 4257 7ff6bc714ac1 4254->4257 4258 7ff6bc714ada 4254->4258 4259 7ff6bc7142a4 4255->4259 4256->4257 4257->4258 4262 7ff6bc71e600 15 API calls 4257->4262 4258->4229 4260 7ff6bc7142d1 4259->4260 4437 7ff6bc719468 memset 4259->4437 4441 7ff6bc714ed0 4260->4441 4262->4258 4265 7ff6bc72076c malloc 4266 7ff6bc7142fc 4265->4266 4267 7ff6bc714324 4266->4267 4268 7ff6bc719468 4 API calls 4266->4268 4269 7ff6bc714ed0 3 API calls 4267->4269 4268->4267 4270 7ff6bc71433d 4269->4270 4270->4254 4271 7ff6bc72076c malloc 4270->4271 4272 7ff6bc714355 4271->4272 4273 7ff6bc7143a8 4272->4273 4274 7ff6bc71ad2c 4 API calls 4272->4274 4275 7ff6bc714ed0 3 API calls 4273->4275 4274->4273 4276 7ff6bc7143c1 4275->4276 4276->4254 4277 7ff6bc72076c malloc 4276->4277 4278 7ff6bc7143d5 4277->4278 4279 7ff6bc714416 4278->4279 4450 7ff6bc71b4d0 4278->4450 4281 7ff6bc714ed0 3 API calls 4279->4281 4282 7ff6bc71442f 4281->4282 4282->4254 4283 7ff6bc72076c malloc 4282->4283 4284 7ff6bc714443 4283->4284 4285 7ff6bc71446b 4284->4285 4286 7ff6bc719468 4 API calls 4284->4286 4287 7ff6bc714ed0 3 API calls 4285->4287 4286->4285 4288 7ff6bc71448b 4287->4288 4288->4254 4289 7ff6bc72076c malloc 4288->4289 4290 7ff6bc71449d 4289->4290 4291 7ff6bc7144f3 4290->4291 4447 7ff6bc71ad2c 4290->4447 4293 7ff6bc714ed0 3 API calls 4291->4293 4294 7ff6bc71450c 4293->4294 4294->4254 4295 7ff6bc72076c malloc 4294->4295 4296 7ff6bc71451e 4295->4296 4297 7ff6bc714556 4296->4297 4453 7ff6bc715818 4296->4453 4299 7ff6bc714ed0 3 API calls 4297->4299 4300 7ff6bc71456f 4299->4300 4300->4254 4301 7ff6bc72076c malloc 4300->4301 4302 7ff6bc714581 4301->4302 4303 7ff6bc7145d7 4302->4303 4304 7ff6bc71ad2c 4 API calls 4302->4304 4305 7ff6bc714ed0 3 API calls 4303->4305 4304->4303 4306 7ff6bc7145f0 4305->4306 4306->4254 4307 7ff6bc72076c malloc 4306->4307 4308 7ff6bc714602 4307->4308 4309 7ff6bc71463b 4308->4309 4310 7ff6bc715818 4 API calls 4308->4310 4311 7ff6bc714ed0 3 API calls 4309->4311 4310->4309 4312 7ff6bc71465b 4311->4312 4312->4254 4313 7ff6bc72076c malloc 4312->4313 4314 7ff6bc714673 4313->4314 4315 7ff6bc7146b0 4314->4315 4316 7ff6bc71b4d0 5 API calls 4314->4316 4317 7ff6bc714ed0 3 API calls 4315->4317 4316->4315 4318 7ff6bc7146c9 4317->4318 4318->4254 4319 7ff6bc72076c malloc 4318->4319 4320 7ff6bc7146db 4319->4320 4321 7ff6bc714715 4320->4321 4322 7ff6bc71b4d0 5 API calls 4320->4322 4323 7ff6bc714ed0 3 API calls 4321->4323 4322->4321 4324 7ff6bc71472e 4323->4324 4324->4254 4325 7ff6bc72076c malloc 4324->4325 4326 7ff6bc714746 4325->4326 4327 7ff6bc71476d 4326->4327 4328 7ff6bc719468 4 API calls 4326->4328 4329 7ff6bc714ed0 3 API calls 4327->4329 4328->4327 4330 7ff6bc714786 4329->4330 4330->4254 4331 7ff6bc72076c malloc 4330->4331 4332 7ff6bc71479a 4331->4332 4333 7ff6bc7147d2 4332->4333 4334 7ff6bc715818 4 API calls 4332->4334 4335 7ff6bc714ed0 3 API calls 4333->4335 4334->4333 4336 7ff6bc7147fa 4335->4336 4336->4254 4337 7ff6bc72076c malloc 4336->4337 4338 7ff6bc71480c 4337->4338 4339 7ff6bc714834 4338->4339 4340 7ff6bc719468 4 API calls 4338->4340 4341 7ff6bc714ed0 3 API calls 4339->4341 4340->4339 4342 7ff6bc71484d 4341->4342 4342->4254 4343 7ff6bc72076c malloc 4342->4343 4344 7ff6bc714861 4343->4344 4345 7ff6bc714878 4344->4345 4456 7ff6bc71ca28 4344->4456 4347 7ff6bc714ed0 3 API calls 4345->4347 4348 7ff6bc714883 4347->4348 4348->4254 4349 7ff6bc72076c malloc 4348->4349 4350 7ff6bc71489b 4349->4350 4351 7ff6bc7148c5 4350->4351 4352 7ff6bc719468 4 API calls 4350->4352 4353 7ff6bc714ed0 3 API calls 4351->4353 4352->4351 4354 7ff6bc7148e8 4353->4354 4354->4254 4355 7ff6bc72076c malloc 4354->4355 4356 7ff6bc7148fa 4355->4356 4357 7ff6bc714921 4356->4357 4358 7ff6bc719468 4 API calls 4356->4358 4359 7ff6bc714ed0 3 API calls 4357->4359 4358->4357 4360 7ff6bc71494b 4359->4360 4360->4254 4361 7ff6bc72076c malloc 4360->4361 4362 7ff6bc71495f 4361->4362 4363 7ff6bc714987 4362->4363 4364 7ff6bc719468 4 API calls 4362->4364 4365 7ff6bc714ed0 3 API calls 4363->4365 4364->4363 4367 7ff6bc7149a0 4365->4367 4366 7ff6bc7149ba RegisterWindowMessageW 4366->4367 4368 7ff6bc7149ec GetLastError 4366->4368 4367->4254 4367->4366 4369 7ff6bc7149ea 4367->4369 4368->4369 4369->4254 4370 7ff6bc714a0b WcsGetCalibrationManagementState 4369->4370 4371 7ff6bc714a48 4370->4371 4372 7ff6bc714a22 GetLastError 4370->4372 4371->4254 4374 7ff6bc714a4f WcsSetCalibrationManagementState 4371->4374 4459 7ff6bc71e600 4372->4459 4374->4254 4375 7ff6bc714a61 GetLastError 4374->4375 4376 7ff6bc71e600 15 API calls 4375->4376 4376->4254 4378 7ff6bc711651 4377->4378 4379 7ff6bc711679 GetCurrentThreadId EnterCriticalSection LeaveCriticalSection PropertySheetW 4378->4379 4380 7ff6bc71171f 4378->4380 4381 7ff6bc7116ee free 4379->4381 4382 7ff6bc711702 4379->4382 4483 7ff6bc713dd4 RaiseException 4380->4483 4381->4382 4382->4230 4386 7ff6bc713e08 4385->4386 4387 7ff6bc7115cd 4385->4387 4388 7ff6bc713e59 DeleteCriticalSection 4386->4388 4387->4172 4387->4173 4388->4387 4390 7ff6bc72076c malloc 4389->4390 4393 7ff6bc720264 4390->4393 4391 7ff6bc720268 LoadStringW 4392 7ff6bc7202c5 4391->4392 4391->4393 4392->4187 4393->4391 4393->4392 4394 7ff6bc72076c malloc 4393->4394 4394->4393 4396 7ff6bc7204f9 GetLastError 4395->4396 4397 7ff6bc7204d2 4395->4397 4398 7ff6bc7112e4 4396->4398 4484 7ff6bc7200c8 4397->4484 4398->4206 4402 7ff6bc71e50c 4398->4402 4400 7ff6bc7204df 4400->4398 4401 7ff6bc7204eb LocalFree 4400->4401 4401->4398 4403 7ff6bc71e537 EventWrite 4402->4403 4405 7ff6bc720234 2 API calls 4403->4405 4406 7ff6bc71e5ae 4405->4406 4407 7ff6bc71e5cf 4406->4407 4408 7ff6bc71e5b2 MessageBoxW 4406->4408 4488 7ff6bc720b90 4407->4488 4408->4407 4497 7ff6bc718d40 4411->4497 4415 7ff6bc7140de 4414->4415 4416 7ff6bc7151ed 4415->4416 4419 7ff6bc71523a 4415->4419 4421 7ff6bc7151c8 DestroyPropertySheetPage 4415->4421 4417 7ff6bc7151f9 free 4416->4417 4418 7ff6bc71520d 4416->4418 4417->4418 4420 7ff6bc715229 4418->4420 4513 7ff6bc71faa8 4418->4513 4523 7ff6bc713dd4 RaiseException 4419->4523 4420->4188 4421->4415 4421->4416 4438 7ff6bc720234 2 API calls 4437->4438 4439 7ff6bc719555 CreateSolidBrush 4438->4439 4439->4260 4442 7ff6bc7142ea 4441->4442 4443 7ff6bc714ef3 4441->4443 4442->4254 4442->4265 4443->4442 4444 7ff6bc714f03 4443->4444 4477 7ff6bc715090 CreatePropertySheetPageW 4444->4477 4448 7ff6bc719468 4 API calls 4447->4448 4449 7ff6bc71ad56 4448->4449 4449->4291 4451 7ff6bc715818 4 API calls 4450->4451 4452 7ff6bc71b4fd CreateSolidBrush 4451->4452 4452->4279 4454 7ff6bc719468 4 API calls 4453->4454 4455 7ff6bc71583c 4454->4455 4455->4297 4457 7ff6bc715818 4 API calls 4456->4457 4458 7ff6bc71ca57 CreateSolidBrush 4457->4458 4458->4345 4460 7ff6bc71e637 4459->4460 4474 7ff6bc71e67d 4459->4474 4461 7ff6bc720234 2 API calls 4460->4461 4462 7ff6bc71e658 4461->4462 4463 7ff6bc71e671 4462->4463 4464 7ff6bc71e682 FormatMessageW 4462->4464 4462->4474 4465 7ff6bc71e50c 11 API calls 4463->4465 4466 7ff6bc71e6cc 4464->4466 4465->4474 4467 7ff6bc720234 2 API calls 4466->4467 4468 7ff6bc71e6ff 4467->4468 4469 7ff6bc71e75e 4468->4469 4470 7ff6bc71e703 FormatMessageW 4468->4470 4473 7ff6bc71e767 LocalFree 4469->4473 4469->4474 4471 7ff6bc71e749 4470->4471 4472 7ff6bc71e73d 4470->4472 4471->4469 4476 7ff6bc71e752 LocalFree 4471->4476 4475 7ff6bc71e50c 11 API calls 4472->4475 4473->4474 4474->4371 4475->4471 4476->4469 4478 7ff6bc7150bd 4477->4478 4479 7ff6bc714f0c 4477->4479 4480 7ff6bc7150c6 SendMessageW 4478->4480 4482 7ff6bc7150e5 4478->4482 4479->4442 4480->4482 4481 7ff6bc715174 DestroyPropertySheetPage 4481->4479 4482->4479 4482->4481 4485 7ff6bc7200fa 4484->4485 4487 7ff6bc720122 4484->4487 4486 7ff6bc72076c malloc 4485->4486 4486->4487 4487->4400 4489 7ff6bc720b99 4488->4489 4490 7ff6bc71e5e6 4489->4490 4491 7ff6bc720d30 RtlCaptureContext RtlLookupFunctionEntry 4489->4491 4490->4206 4492 7ff6bc720db7 4491->4492 4493 7ff6bc720d75 RtlVirtualUnwind 4491->4493 4496 7ff6bc720ce8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 4492->4496 4493->4492 4498 7ff6bc718d5e 4497->4498 4501 7ff6bc718d7a 4497->4501 4499 7ff6bc718d67 DestroyPhysicalMonitors 4498->4499 4498->4501 4499->4501 4500 7ff6bc718d9a 4503 7ff6bc718e2c DccwReleaseDisplayProfileAssociationList DccwReleaseDisplayProfileAssociationList 4500->4503 4504 7ff6bc718e52 4500->4504 4501->4500 4502 7ff6bc718d8e DeleteDC 4501->4502 4502->4500 4503->4504 4505 7ff6bc7200c8 malloc 4504->4505 4506 7ff6bc718e73 4505->4506 4507 7ff6bc7200c8 malloc 4506->4507 4508 7ff6bc718e82 4507->4508 4509 7ff6bc7200c8 malloc 4508->4509 4510 7ff6bc718e91 4509->4510 4511 7ff6bc7200c8 malloc 4510->4511 4512 7ff6bc718ea0 4511->4512 4514 7ff6bc71fb33 4513->4514 4516 7ff6bc71fab1 4513->4516 4514->4420 4515 7ff6bc71fb0e GetProcessHeap HeapFree 4515->4514 4516->4515 4517 7ff6bc71fac7 InterlockedPushEntrySList 4516->4517 4518 7ff6bc71fadc 4516->4518 4517->4515 4519 7ff6bc71fafa 4518->4519 4520 7ff6bc71fae5 DecodePointer 4518->4520 4524 7ff6bc71fd94 LoadLibraryExA 4519->4524 4521 7ff6bc71faff 4520->4521 4521->4515 4525 7ff6bc71fe4d 4524->4525 4526 7ff6bc71fdc1 4524->4526 4525->4521 4536 7ff6bc71f870 GetProcAddress 4526->4536 4529 7ff6bc71f870 2 API calls 4530 7ff6bc71fdf1 4529->4530 4530->4525 4531 7ff6bc71f870 2 API calls 4530->4531 4532 7ff6bc71fe0b 4531->4532 4532->4525 4533 7ff6bc71f870 2 API calls 4532->4533 4534 7ff6bc71fe25 4533->4534 4534->4525 4535 7ff6bc71fe29 DecodePointer 4534->4535 4535->4525 4537 7ff6bc71f88a EncodePointer 4536->4537 4538 7ff6bc71f89e 4536->4538 4537->4538 4538->4525 4538->4529 5430 7ff6bc71c6f0 5431 7ff6bc71c72a 5430->5431 5433 7ff6bc71c80f 5430->5433 5434 7ff6bc71e600 15 API calls 5431->5434 5435 7ff6bc71c7db 5431->5435 5436 7ff6bc71c78b 5431->5436 5432 7ff6bc7155c0 20 API calls 5432->5433 5434->5436 5435->5432 5435->5433 5436->5433 5436->5435 5437 7ff6bc71e600 15 API calls 5436->5437 5437->5435 4656 7ff6bc71cdf0 4657 7ff6bc71ce32 SendMessageW SendMessageW 4656->4657 4658 7ff6bc71cead 4657->4658 4659 7ff6bc71ceb5 SendMessageW 4658->4659 4667 7ff6bc71d07e 4658->4667 4660 7ff6bc71cefe SendMessageW SendMessageW 4659->4660 4661 7ff6bc71cf74 4660->4661 4662 7ff6bc71cf7c SendMessageW 4661->4662 4661->4667 4663 7ff6bc71cfc5 SendMessageW SendMessageW 4662->4663 4664 7ff6bc71d03b 4663->4664 4665 7ff6bc71d03f SendMessageW SetTimer 4664->4665 4664->4667 4668 7ff6bc7198c0 GetParent PostMessageW GetParent SendMessageW 4665->4668 4668->4667 4672 7ff6bc7215f0 4673 7ff6bc721660 4672->4673 4675 7ff6bc721603 DeleteCriticalSection 4672->4675 4675->4673 4676 7ff6bc711600 4679 7ff6bc716318 4676->4679 4678 7ff6bc711614 4680 7ff6bc718d40 5 API calls 4679->4680 4681 7ff6bc716335 4680->4681 4681->4678 5441 7ff6bc716100 5442 7ff6bc7161b2 5441->5442 5444 7ff6bc716135 5441->5444 5443 7ff6bc7155c0 20 API calls 5443->5442 5444->5442 5444->5443 4682 7ff6bc71c000 GetDeviceGammaRamp 4683 7ff6bc71c036 4682->4683 4684 7ff6bc71c01c GetLastError 4682->4684 4684->4683 5445 7ff6bc719d00 GetParent PostMessageW 5446 7ff6bc719d46 GetDlgItem SendMessageW 5445->5446 5448 7ff6bc719d7c 5445->5448 5446->5448 5447 7ff6bc71e600 15 API calls 5449 7ff6bc719dc1 5447->5449 5448->5447 5448->5449 5453 7ff6bc720b09 5454 7ff6bc720b18 _exit 5453->5454 5455 7ff6bc720b21 5453->5455 5454->5455 5456 7ff6bc720b36 5455->5456 5457 7ff6bc720b2a _cexit 5455->5457 5457->5456 4685 7ff6bc711010 4688 7ff6bc711db0 InitializeCriticalSection 4685->4688 4687 7ff6bc71102e 4689 7ff6bc711dd1 4688->4689 4689->4687 5458 7ff6bc717710 5459 7ff6bc717741 5458->5459 5459->5459 5460 7ff6bc71775b EventWrite 5459->5460 5461 7ff6bc7177a0 5460->5461 5462 7ff6bc7177b5 5461->5462 5463 7ff6bc71e600 15 API calls 5461->5463 5464 7ff6bc7177dd 5462->5464 5465 7ff6bc71e600 15 API calls 5462->5465 5463->5462 5466 7ff6bc71780a 5464->5466 5467 7ff6bc71e600 15 API calls 5464->5467 5465->5464 5468 7ff6bc720b90 7 API calls 5466->5468 5467->5466 5469 7ff6bc71781e 5468->5469 4690 7ff6bc71aa10 4691 7ff6bc71aa42 4690->4691 4700 7ff6bc71aa96 4690->4700 4692 7ff6bc71aa5b 4691->4692 4693 7ff6bc71aaa1 4691->4693 4701 7ff6bc71abe0 4692->4701 4695 7ff6bc71aa6a 4693->4695 4696 7ff6bc71aaa9 GetWindowLongPtrW 4693->4696 4695->4700 4710 7ff6bc7155c0 4695->4710 4698 7ff6bc71aacd SetTextColor SetBkMode 4696->4698 4699 7ff6bc71aaf2 GetStockObject 4696->4699 4698->4699 4699->4695 4725 7ff6bc719628 GetWindowLongPtrW 4701->4725 4703 7ff6bc71acc5 4703->4695 4704 7ff6bc71ac2d GetDlgItem 4707 7ff6bc71ac04 4704->4707 4706 7ff6bc71ac8b SendMessageW 4706->4707 4709 7ff6bc71aca7 DeleteObject 4706->4709 4707->4703 4707->4704 4707->4706 4731 7ff6bc71e884 FindResourceW 4707->4731 4757 7ff6bc71ebc4 4707->4757 4709->4707 4711 7ff6bc7155eb 4710->4711 4719 7ff6bc715604 4710->4719 4712 7ff6bc71561e 4711->4712 4713 7ff6bc7155f4 4711->4713 4715 7ff6bc71563e 4712->4715 4716 7ff6bc715624 4712->4716 4714 7ff6bc719628 3 API calls 4713->4714 4714->4719 4717 7ff6bc715647 SetTextColor SetBkColor 4715->4717 4718 7ff6bc715688 4715->4718 4800 7ff6bc71970c 4716->4800 4717->4719 4721 7ff6bc7156ae 4718->4721 4722 7ff6bc715691 4718->4722 4719->4700 4721->4719 4812 7ff6bc715df0 4721->4812 4809 7ff6bc71984c GetWindowLongPtrW 4722->4809 4799 7ff6bc71e86c 4725->4799 4727 7ff6bc71967a EnumChildWindows 4728 7ff6bc7196bd 4727->4728 4729 7ff6bc7196f3 4728->4729 4730 7ff6bc7196c9 EnumChildWindows 4728->4730 4729->4707 4730->4729 4732 7ff6bc71e8fb LoadResource 4731->4732 4733 7ff6bc71e8dd GetLastError 4731->4733 4735 7ff6bc71e92f 4732->4735 4736 7ff6bc71e915 GetLastError 4732->4736 4733->4732 4734 7ff6bc71e95c 4733->4734 4738 7ff6bc71e969 GlobalAlloc 4734->4738 4739 7ff6bc71eb37 4734->4739 4735->4734 4737 7ff6bc71e933 SizeofResource LockResource 4735->4737 4736->4735 4737->4734 4740 7ff6bc71e9a7 4738->4740 4741 7ff6bc71e988 GetLastError 4738->4741 4739->4707 4740->4739 4742 7ff6bc71e9b5 GlobalLock 4740->4742 4741->4740 4743 7ff6bc71e9cc GetLastError 4742->4743 4744 7ff6bc71e9e3 4742->4744 4743->4744 4744->4739 4745 7ff6bc71e9eb memcpy CreateStreamOnHGlobal 4744->4745 4746 7ff6bc71ea1a GlobalUnlock GlobalFree 4745->4746 4747 7ff6bc71ea3d GlobalUnlock 4745->4747 4746->4739 4748 7ff6bc71ea67 4747->4748 4749 7ff6bc71ea50 GetLastError 4747->4749 4748->4739 4750 7ff6bc71ea6f GdipAlloc 4748->4750 4749->4748 4751 7ff6bc71ea88 GdipCreateBitmapFromStream 4750->4751 4752 7ff6bc71eabc 4750->4752 4751->4752 4752->4739 4753 7ff6bc71ead1 GdipCreateHBITMAPFromBitmap 4752->4753 4754 7ff6bc71eaf6 4753->4754 4754->4739 4755 7ff6bc71eb1a GetObjectW 4754->4755 4755->4739 4756 7ff6bc71eb53 GetLastError 4755->4756 4756->4739 4758 7ff6bc71ef42 4757->4758 4759 7ff6bc71ec05 4757->4759 4760 7ff6bc720b90 7 API calls 4758->4760 4759->4758 4761 7ff6bc71ec17 GetObjectW 4759->4761 4764 7ff6bc71ef63 4760->4764 4762 7ff6bc71ec49 4761->4762 4763 7ff6bc71ec5e GetLastError 4761->4763 4765 7ff6bc71ec7c GetWindowRect 4762->4765 4763->4758 4763->4765 4764->4707 4766 7ff6bc71ecb6 GetLastError 4765->4766 4767 7ff6bc71ec94 4765->4767 4766->4767 4767->4758 4768 7ff6bc71ecd4 GetDC 4767->4768 4769 7ff6bc71eceb GetLastError 4768->4769 4770 7ff6bc71ed05 4768->4770 4769->4770 4771 7ff6bc71eee9 4770->4771 4772 7ff6bc71ed0d CreateCompatibleDC 4770->4772 4775 7ff6bc71eeee ReleaseDC 4771->4775 4776 7ff6bc71ef00 4771->4776 4773 7ff6bc71ed3e 4772->4773 4774 7ff6bc71ed24 GetLastError 4772->4774 4773->4771 4779 7ff6bc71ed46 SelectObject 4773->4779 4774->4773 4775->4776 4777 7ff6bc71ef05 DeleteDC 4776->4777 4778 7ff6bc71ef14 4776->4778 4777->4778 4780 7ff6bc71ef19 DeleteDC 4778->4780 4781 7ff6bc71ef28 4778->4781 4779->4771 4782 7ff6bc71ed6d CreateCompatibleDC 4779->4782 4780->4781 4781->4758 4786 7ff6bc71ef31 DeleteObject 4781->4786 4783 7ff6bc71ed9e 4782->4783 4784 7ff6bc71ed84 GetLastError 4782->4784 4783->4771 4785 7ff6bc71eda6 SetStretchBltMode 4783->4785 4784->4783 4787 7ff6bc71edd8 4785->4787 4788 7ff6bc71edbe GetLastError 4785->4788 4786->4758 4787->4771 4789 7ff6bc71ede0 CreateCompatibleBitmap 4787->4789 4788->4787 4790 7ff6bc71ee17 4789->4790 4791 7ff6bc71edfd GetLastError 4789->4791 4790->4771 4792 7ff6bc71ee1f SelectObject 4790->4792 4791->4790 4792->4771 4793 7ff6bc71ee44 StretchBlt 4792->4793 4794 7ff6bc71ee8b GetLastError 4793->4794 4795 7ff6bc71eea5 4793->4795 4794->4795 4795->4771 4796 7ff6bc71eea9 SendMessageW 4795->4796 4797 7ff6bc71eed5 4796->4797 4797->4771 4798 7ff6bc71eeda DeleteObject 4797->4798 4798->4771 4799->4727 4801 7ff6bc719749 4800->4801 4802 7ff6bc719732 MapDialogRect 4800->4802 4803 7ff6bc719759 GetWindowRect 4801->4803 4804 7ff6bc719831 4801->4804 4802->4801 4803->4804 4805 7ff6bc71977d 4803->4805 4806 7ff6bc720b90 7 API calls 4804->4806 4805->4804 4808 7ff6bc71979d EnumChildWindows InvalidateRect 4805->4808 4807 7ff6bc71983e 4806->4807 4807->4719 4808->4804 4810 7ff6bc719876 SetTextColor SetBkColor 4809->4810 4811 7ff6bc7198a4 4809->4811 4810->4811 4811->4719 4813 7ff6bc715e0e GetParent 4812->4813 4814 7ff6bc715e1f 4812->4814 4813->4814 4814->4719 4815 7ff6bc71b810 KillTimer 4816 7ff6bc71b83e 4815->4816 5474 7ff6bc71db10 5475 7ff6bc71e43c 3 API calls 5474->5475 5476 7ff6bc71db37 5475->5476 4820 7ff6bc721010 SetUnhandledExceptionFilter 4824 7ff6bc71c410 4827 7ff6bc71c5e0 GetVCPFeatureAndVCPFeatureReply 4824->4827 4828 7ff6bc71c607 GetLastError 4827->4828 4829 7ff6bc71c428 4827->4829 4828->4829 5477 7ff6bc715920 5478 7ff6bc720234 2 API calls 5477->5478 5481 7ff6bc71595f 5478->5481 5479 7ff6bc715989 EventWrite 5480 7ff6bc7159bb 5479->5480 5482 7ff6bc720b90 7 API calls 5480->5482 5481->5479 5481->5480 5481->5481 5483 7ff6bc7159d2 5482->5483 4831 7ff6bc719a20 GetWindowRect 4832 7ff6bc719a6e 4831->4832 4833 7ff6bc719a4d MapWindowPoints 4831->4833 4834 7ff6bc720b90 7 API calls 4832->4834 4833->4832 4835 7ff6bc719aac 4834->4835 5484 7ff6bc71c320 5485 7ff6bc71c32e 5484->5485 5486 7ff6bc71c335 SetVCPFeature 5484->5486 5486->5485 5487 7ff6bc71c35e GetLastError 5486->5487 5487->5485 5488 7ff6bc71d920 GetDC GetWindowTextLengthW 5489 7ff6bc71d98c 5488->5489 5490 7ff6bc71da0c ReleaseDC 5489->5490 5491 7ff6bc71d994 GetWindowTextW GetTextExtentPoint32W MoveWindow 5489->5491 5493 7ff6bc720760 5491->5493 5494 7ff6bc721722 UnregisterClassA 5495 7ff6bc72174c 5494->5495 5496 7ff6bc721711 5494->5496 5497 7ff6bc721758 free 5495->5497 5498 7ff6bc72176c DeleteCriticalSection 5495->5498 5496->5494 5497->5498 5499 7ff6bc7217a0 free 5498->5499 5500 7ff6bc7217b4 5498->5500 5499->5500 4836 7ff6bc717230 4837 7ff6bc717246 4836->4837 4838 7ff6bc71725b 4837->4838 4839 7ff6bc71e600 15 API calls 4837->4839 4839->4838 5501 7ff6bc711130 5502 7ff6bc713df0 DeleteCriticalSection 5501->5502 5503 7ff6bc71114e 5502->5503 4840 7ff6bc71be30 GetMonitorBrightness 4841 7ff6bc71be59 GetLastError 4840->4841 4842 7ff6bc71be73 4840->4842 4841->4842 4846 7ff6bc71e030 4847 7ff6bc71e33c 4 API calls 4846->4847 4848 7ff6bc71e06e 4847->4848 4849 7ff6bc71e33c 4 API calls 4848->4849 4851 7ff6bc71e11c 4848->4851 4872 7ff6bc71e313 4848->4872 4850 7ff6bc71e0a4 4849->4850 4852 7ff6bc71e33c 4 API calls 4850->4852 4850->4872 4853 7ff6bc71e33c 4 API calls 4851->4853 4856 7ff6bc71e178 4851->4856 4851->4872 4854 7ff6bc71e0cc 4852->4854 4855 7ff6bc71e150 4853->4855 4857 7ff6bc71e33c 4 API calls 4854->4857 4854->4872 4859 7ff6bc71e33c 4 API calls 4855->4859 4855->4872 4858 7ff6bc71e33c 4 API calls 4856->4858 4864 7ff6bc71e27c 4856->4864 4856->4872 4860 7ff6bc71e0f4 4857->4860 4861 7ff6bc71e1b4 4858->4861 4859->4856 4862 7ff6bc71e33c 4 API calls 4860->4862 4860->4872 4863 7ff6bc71e33c 4 API calls 4861->4863 4861->4872 4862->4851 4865 7ff6bc71e1dc 4863->4865 4866 7ff6bc71e33c 4 API calls 4864->4866 4864->4872 4868 7ff6bc71e33c 4 API calls 4865->4868 4865->4872 4867 7ff6bc71e2ef 4866->4867 4870 7ff6bc71e33c 4 API calls 4867->4870 4867->4872 4869 7ff6bc71e204 4868->4869 4871 7ff6bc71e33c 4 API calls 4869->4871 4869->4872 4870->4872 4873 7ff6bc71e22c 4871->4873 4873->4872 4874 7ff6bc71e33c 4 API calls 4873->4874 4875 7ff6bc71e254 4874->4875 4875->4872 4876 7ff6bc71e33c 4 API calls 4875->4876 4876->4864 5504 7ff6bc71ab30 5507 7ff6bc71ab68 5504->5507 5508 7ff6bc71ab8d 5507->5508 5509 7ff6bc71ab96 DeleteObject 5508->5509 5510 7ff6bc71abaa DeleteObject 5508->5510 5511 7ff6bc71abc1 5508->5511 5509->5508 5510->5508 4877 7ff6bc716d40 4878 7ff6bc716d71 4877->4878 4879 7ff6bc716db3 GetLastError 4878->4879 4880 7ff6bc716dd5 4878->4880 4882 7ff6bc716e33 4878->4882 4879->4880 4883 7ff6bc716eb1 4879->4883 4881 7ff6bc716e11 GetLastError 4880->4881 4880->4882 4881->4882 4881->4883 4882->4883 4885 7ff6bc718274 4882->4885 4886 7ff6bc718358 4885->4886 4887 7ff6bc720b90 7 API calls 4886->4887 4888 7ff6bc7183ea 4887->4888 4888->4883 5521 7ff6bc717840 5522 7ff6bc717859 5521->5522 5522->5522 5523 7ff6bc7178a6 5522->5523 5524 7ff6bc717873 DccwSetDisplayProfileAssociationList 5522->5524 5525 7ff6bc717885 5522->5525 5524->5523 5524->5525 5525->5523 5526 7ff6bc717891 DccwSetDisplayProfileAssociationList 5525->5526 5526->5523 4916 7ff6bc71f140 4917 7ff6bc71f277 4916->4917 4918 7ff6bc71f17d 4916->4918 4919 7ff6bc71f19b 4918->4919 4920 7ff6bc71f21a 4918->4920 4923 7ff6bc719628 3 API calls 4919->4923 4921 7ff6bc71f21f 4920->4921 4922 7ff6bc71f282 4920->4922 4924 7ff6bc71f23d 4921->4924 4933 7ff6bc720524 CoCreateInstance 4921->4933 4922->4924 4927 7ff6bc720524 4 API calls 4922->4927 4925 7ff6bc71f1a7 4923->4925 4924->4917 4926 7ff6bc7155c0 20 API calls 4924->4926 4925->4924 4929 7ff6bc71f1b7 GetWindowLongW 4925->4929 4932 7ff6bc71f1fe ShowWindow 4925->4932 4926->4917 4927->4924 4930 7ff6bc71f1d7 GetParent 4929->4930 4931 7ff6bc71f1e5 GetWindow 4929->4931 4930->4925 4931->4925 4932->4924 4934 7ff6bc720569 SysAllocString 4933->4934 4935 7ff6bc7205d3 SysFreeString 4933->4935 4934->4935 4936 7ff6bc72058e WinSqmAddToStream 4934->4936 4935->4924 4936->4935 4889 7ff6bc719b40 4890 7ff6bc719bb7 4889->4890 4892 7ff6bc719b4c 4889->4892 4891 7ff6bc719bbe 4905 7ff6bc713dd4 RaiseException 4891->4905 4892->4890 4892->4891 4894 7ff6bc719b68 GetCurrentThreadId EnterCriticalSection LeaveCriticalSection 4892->4894 4894->4890 4906 7ff6bc71bf40 SetMonitorContrast 4907 7ff6bc71bf76 4906->4907 4908 7ff6bc71bf5c GetLastError 4906->4908 4908->4907 4938 7ff6bc71f340 GetDC 4939 7ff6bc71f3ab GetLastError 4938->4939 4940 7ff6bc71f37a EnumDisplayMonitors ReleaseDC 4938->4940 4941 7ff6bc71f3cd 4939->4941 4942 7ff6bc71f4a6 4939->4942 4940->4941 4941->4942 4945 7ff6bc71f414 GetParent PostMessageW 4941->4945 4943 7ff6bc71e600 15 API calls 4942->4943 4944 7ff6bc71f4bb 4943->4944 4946 7ff6bc71f44b GetWindowLongW 4945->4946 4947 7ff6bc71f479 GetWindow 4946->4947 4948 7ff6bc71f46b GetParent 4946->4948 4949 7ff6bc71f48a 4947->4949 4948->4949 4949->4946 4950 7ff6bc71f492 ShowWindow 4949->4950 4950->4944 5530 7ff6bc711850 5531 7ff6bc711db0 InitializeCriticalSection 5530->5531 5548 7ff6bc7118c4 5531->5548 5532 7ff6bc711947 5533 7ff6bc711d00 10 API calls 5532->5533 5534 7ff6bc711953 5533->5534 5537 7ff6bc720b90 7 API calls 5534->5537 5536 7ff6bc711919 GetModuleFileNameW 5539 7ff6bc711942 5536->5539 5536->5548 5538 7ff6bc711964 5537->5538 5561 7ff6bc7120c8 GetLastError 5539->5561 5541 7ff6bc7119d8 GetModuleHandleW 5542 7ff6bc7119eb EnterCriticalSection 5541->5542 5541->5548 5543 7ff6bc711aa6 5542->5543 5562 7ff6bc711de0 5543->5562 5544 7ff6bc711a25 memcpy_s 5544->5532 5544->5548 5546 7ff6bc711ab7 LeaveCriticalSection 5546->5532 5547 7ff6bc711adf EnterCriticalSection 5546->5547 5550 7ff6bc711de0 5 API calls 5547->5550 5548->5530 5548->5532 5548->5536 5548->5541 5548->5544 5549 7ff6bc711a86 EnterCriticalSection 5548->5549 5555 7ff6bc711ff0 5548->5555 5627 7ff6bc720ea8 RtlCaptureContext RtlLookupFunctionEntry 5548->5627 5549->5543 5551 7ff6bc711b05 LeaveCriticalSection 5550->5551 5551->5532 5553 7ff6bc711b2a 5551->5553 5579 7ff6bc71388c LoadLibraryExW 5553->5579 5556 7ff6bc712012 5555->5556 5557 7ff6bc712055 5555->5557 5556->5557 5558 7ff6bc712017 EnterCriticalSection 5556->5558 5557->5548 5559 7ff6bc711de0 5 API calls 5558->5559 5560 7ff6bc712036 LeaveCriticalSection 5559->5560 5560->5557 5561->5532 5563 7ff6bc711e11 5562->5563 5565 7ff6bc711f08 5562->5565 5564 7ff6bc711e88 memcpy_s 5563->5564 5563->5565 5566 7ff6bc711ec8 memcpy_s 5564->5566 5570 7ff6bc711ea4 5564->5570 5565->5546 5566->5565 5567 7ff6bc711ee4 5566->5567 5568 7ff6bc711eed 5567->5568 5632 7ff6bc713dac 5567->5632 5568->5565 5573 7ff6bc713dac RaiseException 5568->5573 5575 7ff6bc711fd1 5568->5575 5570->5566 5570->5567 5570->5568 5570->5575 5571 7ff6bc713dac RaiseException 5572 7ff6bc711fdc 5571->5572 5574 7ff6bc712055 5572->5574 5576 7ff6bc712017 EnterCriticalSection 5572->5576 5573->5575 5574->5546 5575->5571 5577 7ff6bc711de0 RaiseException 5576->5577 5578 7ff6bc712036 LeaveCriticalSection 5577->5578 5578->5574 5580 7ff6bc7138f7 FindResourceExW 5579->5580 5581 7ff6bc7138eb 5579->5581 5583 7ff6bc713917 5580->5583 5584 7ff6bc713921 LoadResource 5580->5584 5636 7ff6bc7120c8 GetLastError 5581->5636 5637 7ff6bc7120c8 GetLastError 5583->5637 5584->5583 5587 7ff6bc71393b SizeofResource 5584->5587 5585 7ff6bc7138f0 5590 7ff6bc713a1d 5585->5590 5658 7ff6bc712078 free 5585->5658 5587->5585 5588 7ff6bc71395f 5587->5588 5589 7ff6bc71398f 5588->5589 5591 7ff6bc713978 5588->5591 5592 7ff6bc713a3d 5588->5592 5598 7ff6bc7139ac MultiByteToWideChar 5589->5598 5599 7ff6bc71391c FreeLibrary 5589->5599 5593 7ff6bc720b90 7 API calls 5590->5593 5591->5589 5638 7ff6bc712090 malloc 5591->5638 5597 7ff6bc713dac RaiseException 5592->5597 5596 7ff6bc713a2e 5593->5596 5596->5532 5622 7ff6bc713a47 5597->5622 5598->5583 5601 7ff6bc7139d4 5598->5601 5599->5585 5643 7ff6bc7136bc 5601->5643 5603 7ff6bc711db0 InitializeCriticalSection 5603->5622 5604 7ff6bc713b46 5605 7ff6bc711d00 10 API calls 5604->5605 5606 7ff6bc713b52 5605->5606 5608 7ff6bc720b90 7 API calls 5606->5608 5607 7ff6bc713b1b GetModuleFileNameW 5610 7ff6bc713b41 5607->5610 5607->5622 5611 7ff6bc713b63 5608->5611 5609 7ff6bc711ff0 7 API calls 5609->5622 5659 7ff6bc7120c8 GetLastError 5610->5659 5611->5532 5613 7ff6bc713bdf GetModuleHandleW 5614 7ff6bc713bf2 EnterCriticalSection 5613->5614 5613->5622 5615 7ff6bc713cb9 5614->5615 5617 7ff6bc711de0 5 API calls 5615->5617 5616 7ff6bc713c33 memcpy_s 5616->5604 5616->5622 5618 7ff6bc713cca LeaveCriticalSection 5617->5618 5618->5604 5619 7ff6bc713cf2 EnterCriticalSection 5618->5619 5620 7ff6bc711de0 5 API calls 5619->5620 5623 7ff6bc713d1b LeaveCriticalSection 5620->5623 5621 7ff6bc713c98 EnterCriticalSection 5621->5615 5622->5603 5622->5604 5622->5607 5622->5609 5622->5613 5622->5616 5622->5621 5624 7ff6bc720ea8 7 API calls 5622->5624 5623->5604 5625 7ff6bc713d40 5623->5625 5624->5622 5625->5604 5626 7ff6bc71388c 110 API calls 5625->5626 5626->5604 5628 7ff6bc720f27 5627->5628 5629 7ff6bc720ee5 RtlVirtualUnwind 5627->5629 5770 7ff6bc720ce8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5628->5770 5629->5628 5635 7ff6bc713dd4 RaiseException 5632->5635 5636->5585 5637->5599 5639 7ff6bc7120b7 5638->5639 5640 7ff6bc7120ad 5638->5640 5641 7ff6bc713dac RaiseException 5639->5641 5640->5589 5642 7ff6bc7120c1 5641->5642 5644 7ff6bc7136d6 5643->5644 5653 7ff6bc71370b 5644->5653 5660 7ff6bc712228 5644->5660 5646 7ff6bc713858 5647 7ff6bc720b90 7 API calls 5646->5647 5649 7ff6bc71386a 5647->5649 5648 7ff6bc713849 CoTaskMemFree 5648->5646 5649->5599 5650 7ff6bc713756 lstrcmpiW 5650->5653 5651 7ff6bc7137fa 5651->5648 5652 7ff6bc712ca0 7 API calls 5652->5653 5653->5646 5653->5648 5653->5650 5653->5651 5653->5652 5654 7ff6bc712e8c 87 API calls 5653->5654 5655 7ff6bc7137df 5653->5655 5657 7ff6bc713825 CharNextW 5653->5657 5654->5653 5687 7ff6bc712e8c 5655->5687 5657->5653 5659->5604 5661 7ff6bc71226d 5660->5661 5662 7ff6bc712263 5660->5662 5665 7ff6bc7122a3 CoTaskMemAlloc 5661->5665 5667 7ff6bc712481 CoTaskMemFree 5661->5667 5663 7ff6bc720b90 7 API calls 5662->5663 5664 7ff6bc7124c7 5663->5664 5664->5653 5665->5667 5676 7ff6bc7122be 5665->5676 5667->5662 5668 7ff6bc7122d6 CharNextW 5668->5676 5669 7ff6bc71230e CharNextW 5669->5676 5670 7ff6bc71233d CharNextW 5670->5676 5671 7ff6bc712370 wcsncpy_s 5672 7ff6bc7123b3 EnterCriticalSection 5671->5672 5671->5676 5673 7ff6bc7123d3 lstrcmpiW 5672->5673 5672->5676 5673->5676 5674 7ff6bc713dac RaiseException 5678 7ff6bc71250e 5674->5678 5675 7ff6bc7124f8 5677 7ff6bc713dac RaiseException 5675->5677 5676->5667 5676->5668 5676->5669 5676->5670 5676->5671 5676->5672 5676->5673 5676->5675 5679 7ff6bc712503 5676->5679 5680 7ff6bc712429 LeaveCriticalSection 5676->5680 5681 7ff6bc7124e3 5676->5681 5682 7ff6bc7124ed 5676->5682 5685 7ff6bc7120f4 20 API calls 5676->5685 5686 7ff6bc712465 CharNextW 5676->5686 5677->5679 5679->5674 5680->5667 5680->5676 5746 7ff6bc713dd4 RaiseException 5681->5746 5684 7ff6bc713dac RaiseException 5682->5684 5684->5675 5685->5676 5686->5676 5686->5686 5688 7ff6bc712eab 5687->5688 5747 7ff6bc712ca0 5688->5747 5690 7ff6bc713644 5692 7ff6bc720b90 7 API calls 5690->5692 5691 7ff6bc712efc lstrcmpiW lstrcmpiW 5731 7ff6bc712ee8 5691->5731 5694 7ff6bc713655 5692->5694 5693 7ff6bc713635 RegCloseKey 5693->5690 5694->5651 5695 7ff6bc713021 lstrcmpiW 5696 7ff6bc713053 lstrcmpiW 5695->5696 5695->5731 5696->5731 5697 7ff6bc71317c CharNextW 5697->5731 5698 7ff6bc7131ae RegOpenKeyExW 5701 7ff6bc713209 RegOpenKeyExW 5698->5701 5698->5731 5699 7ff6bc712f83 CharNextW 5699->5731 5700 7ff6bc71336a RegOpenKeyExW 5703 7ff6bc7133c9 wcsncpy_s 5700->5703 5700->5731 5705 7ff6bc71325b RegCreateKeyExW 5701->5705 5701->5731 5702 7ff6bc712fac lstrcmpiW 5702->5731 5703->5731 5704 7ff6bc7131e8 RegCloseKey 5704->5731 5708 7ff6bc713627 5705->5708 5705->5731 5706 7ff6bc7133a5 RegCloseKey 5706->5731 5707 7ff6bc71323e RegCloseKey 5707->5731 5708->5690 5708->5693 5709 7ff6bc712a48 17 API calls 5709->5731 5710 7ff6bc713695 5713 7ff6bc713dac RaiseException 5710->5713 5711 7ff6bc7132aa RegCloseKey 5711->5731 5712 7ff6bc712ca0 7 API calls 5712->5731 5716 7ff6bc71369f 5713->5716 5714 7ff6bc7136aa 5718 7ff6bc713dac RaiseException 5714->5718 5715 7ff6bc7130eb RegOpenKeyExW 5715->5708 5719 7ff6bc71311a RegDeleteValueW 5715->5719 5722 7ff6bc713dac RaiseException 5716->5722 5717 7ff6bc712998 15 API calls 5717->5731 5724 7ff6bc7136b5 5718->5724 5721 7ff6bc71366a 5719->5721 5719->5731 5720 7ff6bc712518 26 API calls 5720->5731 5721->5708 5725 7ff6bc713678 RegCloseKey 5721->5725 5722->5714 5723 7ff6bc713145 RegCloseKey 5723->5731 5726 7ff6bc712228 30 API calls 5724->5726 5741 7ff6bc71370b 5724->5741 5725->5708 5726->5741 5727 7ff6bc712e8c 59 API calls 5727->5731 5728 7ff6bc7134ce RegQueryInfoKeyW 5729 7ff6bc713575 RegQueryInfoKeyW 5728->5729 5728->5731 5729->5731 5730 7ff6bc713858 5732 7ff6bc720b90 7 API calls 5730->5732 5731->5690 5731->5691 5731->5695 5731->5696 5731->5697 5731->5698 5731->5699 5731->5700 5731->5701 5731->5702 5731->5703 5731->5704 5731->5705 5731->5706 5731->5707 5731->5708 5731->5709 5731->5710 5731->5711 5731->5712 5731->5714 5731->5715 5731->5716 5731->5717 5731->5720 5731->5723 5731->5727 5731->5728 5731->5729 5735 7ff6bc7135d3 RegCloseKey 5731->5735 5736 7ff6bc713529 lstrcmpiW 5731->5736 5761 7ff6bc712bac 5731->5761 5734 7ff6bc71386a 5732->5734 5733 7ff6bc713849 CoTaskMemFree 5733->5730 5734->5651 5735->5708 5735->5731 5736->5731 5738 7ff6bc713756 lstrcmpiW 5738->5741 5739 7ff6bc7137fa 5739->5733 5740 7ff6bc712ca0 7 API calls 5740->5741 5741->5730 5741->5733 5741->5738 5741->5739 5741->5740 5742 7ff6bc712e8c 59 API calls 5741->5742 5743 7ff6bc7137df 5741->5743 5745 7ff6bc713825 CharNextW 5741->5745 5742->5741 5744 7ff6bc712e8c 59 API calls 5743->5744 5744->5739 5745->5741 5748 7ff6bc712cbe 5747->5748 5749 7ff6bc712cf0 5748->5749 5750 7ff6bc712cdc CharNextW 5748->5750 5751 7ff6bc712e57 5749->5751 5752 7ff6bc712d12 CharNextW 5749->5752 5755 7ff6bc712dec 5749->5755 5750->5748 5751->5731 5760 7ff6bc712d2f 5752->5760 5753 7ff6bc712e02 CharNextW 5753->5751 5753->5755 5754 7ff6bc712dbe 5754->5751 5759 7ff6bc712dd4 CharNextW 5754->5759 5755->5751 5755->5753 5756 7ff6bc712d35 CharNextW 5756->5754 5756->5760 5757 7ff6bc712d50 CharNextW 5758 7ff6bc712d65 CharNextW 5757->5758 5758->5751 5758->5760 5759->5751 5760->5754 5760->5756 5760->5757 5760->5758 5762 7ff6bc712bc3 5761->5762 5764 7ff6bc712c35 5761->5764 5763 7ff6bc712bca GetModuleHandleW 5762->5763 5762->5764 5765 7ff6bc712bfe LoadLibraryExW 5763->5765 5766 7ff6bc712be2 GetProcAddress 5763->5766 5767 7ff6bc712c69 GetLastError 5764->5767 5769 7ff6bc712c3e 5764->5769 5765->5764 5768 7ff6bc712c1b GetProcAddress 5765->5768 5766->5764 5767->5769 5768->5764 5769->5731 5771 7ff6bc714e51 5772 7ff6bc714e7d WcsSetCalibrationManagementState 5771->5772 5773 7ff6bc714ec1 5772->5773 5774 7ff6bc714e93 GetLastError 5772->5774 5775 7ff6bc71e600 15 API calls 5774->5775 5775->5773 5776 7ff6bc71c050 SetDeviceGammaRamp 5777 7ff6bc71c086 5776->5777 5778 7ff6bc71c06c GetLastError 5776->5778 5778->5777 4954 7ff6bc721559 _XcptFilter 4955 7ff6bc720b60 4958 7ff6bc7211e4 4955->4958 4959 7ff6bc721210 6 API calls 4958->4959 4960 7ff6bc720b69 4958->4960 4959->4960 5786 7ff6bc71b260 5787 7ff6bc71b297 5786->5787 5788 7ff6bc71b31b 5786->5788 5789 7ff6bc71b326 5787->5789 5790 7ff6bc71b2b5 5787->5790 5791 7ff6bc71b2ef 5789->5791 5797 7ff6bc71b3b4 5789->5797 5792 7ff6bc715a14 26 API calls 5790->5792 5791->5788 5795 7ff6bc715730 76 API calls 5791->5795 5794 7ff6bc71b2c0 5792->5794 5794->5791 5796 7ff6bc71b2c8 GetDlgItem 5794->5796 5795->5788 5796->5791 5798 7ff6bc71b3bd 5797->5798 5803 7ff6bc71b4c1 5797->5803 5799 7ff6bc71b4b4 5798->5799 5800 7ff6bc715af8 40 API calls 5798->5800 5801 7ff6bc720b90 7 API calls 5799->5801 5802 7ff6bc71b3e8 GetWindowRect 5800->5802 5801->5803 5802->5799 5804 7ff6bc71b405 GetWindowRect 5802->5804 5803->5791 5804->5799 5805 7ff6bc71b425 GetWindowRect 5804->5805 5805->5799 5806 7ff6bc71b441 MoveWindow 5805->5806 5806->5799 4961 7ff6bc717570 CopyFileW 4962 7ff6bc7175d6 4961->4962 4963 7ff6bc7175b4 GetLastError 4961->4963 4977 7ff6bc718658 WcsSetCalibrationManagementState 4962->4977 4963->4962 4964 7ff6bc7176e8 4963->4964 4966 7ff6bc720b90 7 API calls 4964->4966 4968 7ff6bc7176f7 4966->4968 4973 7ff6bc717624 WcsSetCalibrationManagementState 4974 7ff6bc717639 GetLastError 4973->4974 4975 7ff6bc717653 4973->4975 4974->4975 4975->4964 4975->4975 4976 7ff6bc7176b6 EventWrite 4975->4976 4976->4964 4978 7ff6bc71869b GetLastError 4977->4978 4980 7ff6bc7186b6 4977->4980 4979 7ff6bc71870d 4978->4979 4978->4980 4981 7ff6bc71871a WcsGetUsePerUserProfiles 4979->4981 4982 7ff6bc7175e8 4979->4982 4980->4979 4984 7ff6bc7186cd WcsSetDefaultColorProfile 4980->4984 4983 7ff6bc718738 GetLastError 4981->4983 4987 7ff6bc71874f 4981->4987 4982->4964 4992 7ff6bc718804 4982->4992 4983->4987 4984->4979 4986 7ff6bc7186f6 GetLastError 4984->4986 4985 7ff6bc7187b5 4985->4982 4988 7ff6bc7187b9 WcsSetCalibrationManagementState 4985->4988 4986->4979 4987->4982 4987->4985 4987->4987 4990 7ff6bc718773 WcsSetDefaultColorProfile 4987->4990 4988->4982 4989 7ff6bc7187cb GetLastError 4988->4989 4989->4982 4990->4985 4991 7ff6bc71879e GetLastError 4990->4991 4991->4985 4993 7ff6bc71882e 4992->4993 5002 7ff6bc717601 4992->5002 4993->4993 4994 7ff6bc718844 WcsDisassociateColorProfileFromDevice 4993->4994 4993->5002 4995 7ff6bc718888 WcsGetUsePerUserProfiles 4994->4995 4996 7ff6bc71885a GetLastError 4994->4996 4998 7ff6bc7188a6 GetLastError 4995->4998 4999 7ff6bc7188c0 4995->4999 4996->4995 4997 7ff6bc71886d 4996->4997 4997->4995 4997->5002 4998->4999 5000 7ff6bc7188ca WcsDisassociateColorProfileFromDevice 4999->5000 4999->5002 5001 7ff6bc7188e6 GetLastError 5000->5001 5000->5002 5001->5002 5002->4964 5003 7ff6bc7185cc 5002->5003 5004 7ff6bc7185e7 5003->5004 5009 7ff6bc71761a 5003->5009 5005 7ff6bc718804 6 API calls 5004->5005 5004->5009 5006 7ff6bc7185fe 5005->5006 5007 7ff6bc718604 UninstallColorProfileW 5006->5007 5006->5009 5008 7ff6bc71861f GetLastError 5007->5008 5007->5009 5008->5009 5009->4964 5009->4973 5814 7ff6bc717270 5815 7ff6bc718658 WcsSetCalibrationManagementState 5814->5815 5816 7ff6bc7186b6 5815->5816 5817 7ff6bc71869b GetLastError 5815->5817 5818 7ff6bc71870d 5816->5818 5822 7ff6bc7186cd WcsSetDefaultColorProfile 5816->5822 5817->5816 5817->5818 5819 7ff6bc71871a WcsGetUsePerUserProfiles 5818->5819 5820 7ff6bc7187e2 5818->5820 5821 7ff6bc718738 GetLastError 5819->5821 5823 7ff6bc71874f 5819->5823 5821->5823 5822->5818 5825 7ff6bc7186f6 GetLastError 5822->5825 5823->5820 5824 7ff6bc7187b5 5823->5824 5828 7ff6bc718773 WcsSetDefaultColorProfile 5823->5828 5824->5820 5826 7ff6bc7187b9 WcsSetCalibrationManagementState 5824->5826 5825->5818 5826->5820 5827 7ff6bc7187cb GetLastError 5826->5827 5827->5820 5828->5824 5829 7ff6bc71879e GetLastError 5828->5829 5829->5824 5830 7ff6bc714070 5831 7ff6bc7140a8 42 API calls 5830->5831 5832 7ff6bc714084 5831->5832 5833 7ff6bc711070 5834 7ff6bc711db0 InitializeCriticalSection 5833->5834 5835 7ff6bc711080 5834->5835 5836 7ff6bc71f070 GdipDisposeImage 5837 7ff6bc71f0ad 5836->5837 5838 7ff6bc71f09e GdipFree 5836->5838 5838->5837 5016 7ff6bc715372 5017 7ff6bc715408 5016->5017 5018 7ff6bc71541c CallWindowProcW 5017->5018 5019 7ff6bc715440 GetWindowLongPtrW CallWindowProcW 5017->5019 5022 7ff6bc7154ba 5017->5022 5018->5022 5020 7ff6bc715487 GetWindowLongPtrW 5019->5020 5019->5022 5021 7ff6bc7154a1 SetWindowLongPtrW 5020->5021 5020->5022 5021->5022 5023 7ff6bc72157d _unlock 5024 7ff6bc715d80 MoveWindow 5025 7ff6bc711780 5026 7ff6bc71179e 5025->5026 5028 7ff6bc711797 5025->5028 5027 7ff6bc7117a9 CoCreateInstance 5026->5027 5026->5028 5027->5028 5839 7ff6bc716680 5840 7ff6bc71669c 5839->5840 5841 7ff6bc7166a6 5840->5841 5842 7ff6bc718274 7 API calls 5840->5842 5842->5841 5849 7ff6bc721680 DeleteCriticalSection 5850 7ff6bc7216b7 5849->5850 5851 7ff6bc7216a3 free 5849->5851 5851->5850 5036 7ff6bc715f8c 5037 7ff6bc715f92 5036->5037 5038 7ff6bc71608b SetWindowLongPtrW 5037->5038 5039 7ff6bc715f9a 5037->5039 5038->5039 5040 7ff6bc716790 5041 7ff6bc7167ac 5040->5041 5042 7ff6bc7167b6 5041->5042 5044 7ff6bc718410 5041->5044 5047 7ff6bc718459 5044->5047 5045 7ff6bc720b90 7 API calls 5046 7ff6bc7185a0 5045->5046 5046->5042 5048 7ff6bc71852b powf 5047->5048 5049 7ff6bc718463 5047->5049 5048->5048 5048->5049 5049->5045 5050 7ff6bc716390 MonitorFromWindow 5051 7ff6bc7163c9 5050->5051 5052 7ff6bc7163b9 LoadCursorW SetCursor ShowCursor 5050->5052 5054 7ff6bc717ca1 5052->5054 5058 7ff6bc717caf 5052->5058 5055 7ff6bc717f4a ShowCursor LoadCursorW SetCursor 5054->5055 5056 7ff6bc720b90 7 API calls 5055->5056 5057 7ff6bc717f89 5056->5057 5058->5055 5059 7ff6bc717cf4 GetNumberOfPhysicalMonitorsFromHMONITOR 5058->5059 5059->5055 5060 7ff6bc717d1a 5059->5060 5060->5055 5061 7ff6bc717d36 DeleteDC 5060->5061 5062 7ff6bc717d42 EnumDisplayMonitors 5060->5062 5061->5062 5062->5055 5063 7ff6bc717d7d GetDeviceCaps 5062->5063 5063->5055 5064 7ff6bc717da1 5063->5064 5084 7ff6bc717fa4 GetMonitorInfoW 5064->5084 5067 7ff6bc717db3 GetPhysicalMonitorsFromHMONITOR 5068 7ff6bc717dd3 5067->5068 5068->5055 5100 7ff6bc717958 WcsGetUsePerUserProfiles 5068->5100 5073 7ff6bc717e37 DccwCreateDisplayProfileAssociationList 5074 7ff6bc717e48 5073->5074 5074->5055 5075 7ff6bc717e50 DccwGetDisplayProfileAssociationList 5074->5075 5075->5055 5076 7ff6bc717e6f 5075->5076 5077 7ff6bc717e7b DccwCreateDisplayProfileAssociationList 5076->5077 5078 7ff6bc717e8c 5076->5078 5077->5078 5078->5055 5079 7ff6bc717e94 DccwGetDisplayProfileAssociationList 5078->5079 5079->5055 5080 7ff6bc717eb4 5079->5080 5125 7ff6bc718168 GetColorDirectoryW 5080->5125 5082 7ff6bc717ebc 5082->5055 5082->5082 5083 7ff6bc717f1b EventWrite 5082->5083 5083->5055 5085 7ff6bc718029 EnumDisplayDevicesW 5084->5085 5086 7ff6bc71800b GetLastError 5084->5086 5088 7ff6bc71804e GetLastError 5085->5088 5089 7ff6bc718064 5085->5089 5086->5085 5087 7ff6bc71811a 5086->5087 5091 7ff6bc718130 5087->5091 5092 7ff6bc718124 CoTaskMemFree 5087->5092 5088->5089 5089->5087 5090 7ff6bc71806c StringFromCLSID 5089->5090 5090->5087 5093 7ff6bc71808e _wcsupr wcsstr 5090->5093 5094 7ff6bc720b90 7 API calls 5091->5094 5092->5091 5093->5087 5095 7ff6bc7180cd 5093->5095 5096 7ff6bc717da9 5094->5096 5097 7ff6bc7200c8 malloc 5095->5097 5096->5055 5096->5067 5098 7ff6bc7180d9 5097->5098 5098->5087 5099 7ff6bc7180f9 swscanf_s 5098->5099 5099->5087 5101 7ff6bc7179bb GetLastError 5100->5101 5102 7ff6bc7179dd WcsGetDefaultColorProfile 5100->5102 5101->5102 5114 7ff6bc717adc 5101->5114 5103 7ff6bc717a38 5102->5103 5104 7ff6bc717a1e GetLastError 5102->5104 5105 7ff6bc717a40 WcsOpenColorProfileW 5103->5105 5103->5114 5104->5103 5108 7ff6bc717a89 GetLastError 5105->5108 5109 7ff6bc717aa3 5105->5109 5106 7ff6bc717b00 5110 7ff6bc720b90 7 API calls 5106->5110 5107 7ff6bc717af1 CloseColorProfile 5107->5106 5108->5109 5111 7ff6bc717aa7 DccwGetGamutSize 5109->5111 5109->5114 5112 7ff6bc717b12 5110->5112 5113 7ff6bc717ac1 5111->5113 5111->5114 5112->5055 5116 7ff6bc717b38 memset 5112->5116 5113->5114 5138 7ff6bc71e7ac memset TaskDialogIndirect 5113->5138 5114->5106 5114->5107 5140 7ff6bc71922c 5116->5140 5119 7ff6bc717b8a DisplayConfigGetDeviceInfo 5120 7ff6bc717bd2 5119->5120 5121 7ff6bc71e7ac 2 API calls 5120->5121 5123 7ff6bc717bfc 5120->5123 5121->5123 5122 7ff6bc720b90 7 API calls 5124 7ff6bc717c1c 5122->5124 5123->5122 5124->5055 5124->5073 5124->5074 5126 7ff6bc7181aa GetLastError 5125->5126 5127 7ff6bc7181cc 5125->5127 5126->5127 5137 7ff6bc718250 5126->5137 5166 7ff6bc720324 5127->5166 5129 7ff6bc7181e6 5132 7ff6bc720324 2 API calls 5129->5132 5129->5137 5130 7ff6bc720b90 7 API calls 5131 7ff6bc718264 5130->5131 5131->5082 5133 7ff6bc71820b 5132->5133 5134 7ff6bc720324 2 API calls 5133->5134 5133->5137 5135 7ff6bc71822b 5134->5135 5136 7ff6bc720324 2 API calls 5135->5136 5135->5137 5136->5137 5137->5130 5139 7ff6bc71e842 5138->5139 5139->5114 5155 7ff6bc720610 5140->5155 5143 7ff6bc71927f GetDisplayConfigBufferSizes 5144 7ff6bc7192a4 5143->5144 5152 7ff6bc7192c9 5143->5152 5147 7ff6bc7192fd QueryDisplayConfig 5144->5147 5144->5152 5145 7ff6bc720b90 7 API calls 5146 7ff6bc717b82 5145->5146 5146->5119 5146->5120 5148 7ff6bc719327 GetLastError 5147->5148 5151 7ff6bc719346 5147->5151 5148->5152 5149 7ff6bc719352 DisplayConfigGetDeviceInfo 5150 7ff6bc71938d EnumDisplayDevicesW 5149->5150 5149->5151 5150->5151 5151->5149 5151->5152 5153 7ff6bc720610 8 API calls 5151->5153 5154 7ff6bc7193c3 lstrcmpiW 5151->5154 5152->5145 5153->5151 5154->5151 5154->5152 5156 7ff6bc72063e 5155->5156 5161 7ff6bc719269 5155->5161 5157 7ff6bc720645 iswupper 5156->5157 5156->5161 5162 7ff6bc7206ad iswupper 5156->5162 5158 7ff6bc720662 towlower 5157->5158 5159 7ff6bc720674 iswupper 5157->5159 5158->5159 5159->5156 5160 7ff6bc720687 towlower 5159->5160 5160->5156 5161->5143 5161->5152 5163 7ff6bc7206d3 towlower 5162->5163 5164 7ff6bc7206e5 iswupper 5162->5164 5163->5164 5164->5156 5165 7ff6bc7206f8 towlower 5164->5165 5165->5156 5167 7ff6bc72076c malloc 5166->5167 5170 7ff6bc720358 5167->5170 5168 7ff6bc72041e 5168->5129 5169 7ff6bc720384 _vsnwprintf 5169->5170 5170->5168 5170->5169 5171 7ff6bc72076c malloc 5170->5171 5171->5170 5852 7ff6bc715890 5853 7ff6bc7158c8 11 API calls 5852->5853 5854 7ff6bc7158a4 5853->5854 5855 7ff6bc713e90 5856 7ff6bc713f40 5855->5856 5858 7ff6bc713ec9 5855->5858 5857 7ff6bc713ef2 5857->5856 5869 7ff6bc714f5c 5857->5869 5858->5857 5861 7ff6bc714b08 5858->5861 5864 7ff6bc714b3f 5861->5864 5868 7ff6bc714bd8 5861->5868 5862 7ff6bc720b90 7 API calls 5863 7ff6bc714cd4 5862->5863 5863->5857 5865 7ff6bc714b7d MonitorFromRect 5864->5865 5866 7ff6bc714c14 5864->5866 5865->5868 5867 7ff6bc714c57 MonitorFromRect 5866->5867 5866->5868 5867->5868 5868->5862 5870 7ff6bc714f89 5869->5870 5873 7ff6bc71500b 5869->5873 5871 7ff6bc714f97 CallWindowProcW 5870->5871 5874 7ff6bc715017 5870->5874 5872 7ff6bc714fca 5871->5872 5871->5873 5872->5873 5876 7ff6bc714fdb SendMessageW 5872->5876 5873->5856 5874->5873 5875 7ff6bc71503f SendMessageW 5874->5875 5875->5873 5876->5873 5877 7ff6bc714ffb DestroyWindow 5876->5877 5877->5873 5878 7ff6bc717290 5880 7ff6bc7185cc 5878->5880 5879 7ff6bc718630 5880->5879 5881 7ff6bc718804 6 API calls 5880->5881 5882 7ff6bc7185fe 5881->5882 5882->5879 5883 7ff6bc718604 UninstallColorProfileW 5882->5883 5883->5879 5884 7ff6bc71861f GetLastError 5883->5884 5884->5879 5172 7ff6bc71bf90 5173 7ff6bc71c5e0 GetVCPFeatureAndVCPFeatureReply 5172->5173 5174 7ff6bc71c607 GetLastError 5173->5174 5175 7ff6bc71c621 5173->5175 5174->5175 5885 7ff6bc71be90 SetMonitorBrightness 5886 7ff6bc71bec6 5885->5886 5887 7ff6bc71beac GetLastError 5885->5887 5887->5886 5888 7ff6bc71c490 5891 7ff6bc71c54c GetDeviceGammaRamp 5888->5891 5892 7ff6bc71c595 SetDeviceGammaRamp 5891->5892 5893 7ff6bc71c5ae 5891->5893 5892->5893 5894 7ff6bc720b90 7 API calls 5893->5894 5895 7ff6bc71c4e4 5894->5895 5899 7ff6bc720c94 5900 7ff6bc720c9c 5899->5900 5901 7ff6bc720cd1 realloc 5899->5901 5900->5901 5902 7ff6bc720caa 5900->5902 5906 7ff6bc72130c 5902->5906 5907 7ff6bc721318 RtlCaptureContext RtlLookupFunctionEntry 5906->5907 5908 7ff6bc72135c RtlVirtualUnwind 5907->5908 5909 7ff6bc721395 5907->5909 5910 7ff6bc7213b5 OutputDebugStringA 5908->5910 5909->5910 5911 7ff6bc720b90 7 API calls 5910->5911 5912 7ff6bc720cca 5911->5912 5913 7ff6bc7168a0 5914 7ff6bc7168bc 5913->5914 5915 7ff6bc7168c6 5914->5915 5916 7ff6bc718410 8 API calls 5914->5916 5916->5915 4539 7ff6bc7208a0 __wgetmainargs 5183 7ff6bc71a1a0 5184 7ff6bc71a1d9 5183->5184 5196 7ff6bc71a2b0 5183->5196 5185 7ff6bc71a257 5184->5185 5186 7ff6bc71a1f2 5184->5186 5188 7ff6bc71a25c 5185->5188 5189 7ff6bc71a2c2 5185->5189 5198 7ff6bc71b874 5186->5198 5207 7ff6bc71a670 5188->5207 5195 7ff6bc71a22a 5189->5195 5197 7ff6bc71a352 SendMessageW 5189->5197 5192 7ff6bc71a209 GetDlgItem 5194 7ff6bc71a230 SendMessageW 5192->5194 5192->5195 5194->5195 5195->5196 5216 7ff6bc719fc0 5195->5216 5197->5195 5237 7ff6bc715a14 5198->5237 5201 7ff6bc71b89d GetDlgItem 5202 7ff6bc71b8be GetDlgItem 5201->5202 5206 7ff6bc71b8fb 5201->5206 5204 7ff6bc71b8df GetWindowRect 5202->5204 5202->5206 5203 7ff6bc720b90 7 API calls 5205 7ff6bc71a201 5203->5205 5204->5206 5205->5192 5205->5195 5206->5203 5208 7ff6bc71a679 5207->5208 5209 7ff6bc71a8b7 5207->5209 5210 7ff6bc71a8aa 5208->5210 5211 7ff6bc71a6b4 GetWindowRect 5208->5211 5209->5195 5213 7ff6bc720b90 7 API calls 5210->5213 5211->5210 5212 7ff6bc71a6d0 GetWindowRect 5211->5212 5212->5210 5214 7ff6bc71a6f0 GetWindowRect 5212->5214 5213->5209 5214->5210 5215 7ff6bc71a710 6 API calls 5214->5215 5215->5210 5217 7ff6bc719ff9 5216->5217 5231 7ff6bc71a131 5216->5231 5218 7ff6bc71a017 5217->5218 5219 7ff6bc71a028 5217->5219 5220 7ff6bc71b874 36 API calls 5218->5220 5221 7ff6bc71a030 5219->5221 5222 7ff6bc71a053 5219->5222 5235 7ff6bc71a023 5220->5235 5246 7ff6bc71b934 5221->5246 5224 7ff6bc71a0c3 5222->5224 5229 7ff6bc71a05b 5222->5229 5225 7ff6bc71a0c8 5224->5225 5226 7ff6bc71a0f1 5224->5226 5254 7ff6bc71bac0 5225->5254 5228 7ff6bc71a0f6 5226->5228 5232 7ff6bc71a13a 5226->5232 5264 7ff6bc71bc3c 5228->5264 5234 7ff6bc71a0a3 SendMessageW 5229->5234 5229->5235 5231->5196 5232->5235 5236 7ff6bc71984c 3 API calls 5232->5236 5234->5235 5235->5231 5267 7ff6bc715730 5235->5267 5236->5235 5238 7ff6bc719628 3 API calls 5237->5238 5239 7ff6bc715a35 5238->5239 5240 7ff6bc715acd 5239->5240 5241 7ff6bc715a41 GetDlgItem 5239->5241 5240->5201 5240->5206 5241->5240 5242 7ff6bc715a62 5241->5242 5243 7ff6bc71e884 21 API calls 5242->5243 5244 7ff6bc715a8b 5243->5244 5244->5240 5245 7ff6bc715a9e GetDlgItem 5244->5245 5245->5240 5247 7ff6bc71baa1 5246->5247 5250 7ff6bc71b96c 5246->5250 5247->5235 5248 7ff6bc71b979 5248->5247 5249 7ff6bc71e600 15 API calls 5248->5249 5249->5247 5250->5247 5250->5248 5251 7ff6bc71ba0b 5250->5251 5252 7ff6bc71ba35 SendMessageW 5250->5252 5251->5248 5253 7ff6bc71ba10 SendMessageW 5251->5253 5252->5248 5253->5248 5255 7ff6bc71bac9 5254->5255 5256 7ff6bc71bc1d 5254->5256 5257 7ff6bc71bc10 5255->5257 5276 7ff6bc715af8 5255->5276 5256->5235 5259 7ff6bc720b90 7 API calls 5257->5259 5259->5256 5261 7ff6bc71bb20 GetWindowRect 5261->5257 5262 7ff6bc71bb40 GetWindowRect 5261->5262 5262->5257 5263 7ff6bc71bb60 MoveWindow MoveWindow 5262->5263 5263->5257 5265 7ff6bc71bd86 5264->5265 5266 7ff6bc71bc5f 8 API calls 5264->5266 5265->5235 5266->5265 5268 7ff6bc715762 5267->5268 5275 7ff6bc7157b6 5267->5275 5269 7ff6bc71577b 5268->5269 5270 7ff6bc7157c1 5268->5270 5272 7ff6bc715a14 26 API calls 5269->5272 5271 7ff6bc71578a 5270->5271 5273 7ff6bc715af8 40 API calls 5270->5273 5274 7ff6bc7155c0 20 API calls 5271->5274 5271->5275 5272->5271 5273->5271 5274->5275 5275->5231 5277 7ff6bc715b01 5276->5277 5283 7ff6bc715d54 GetWindowRect 5276->5283 5278 7ff6bc715d48 5277->5278 5279 7ff6bc715b3b GetWindowRect 5277->5279 5280 7ff6bc720b90 7 API calls 5278->5280 5281 7ff6bc715b57 GetWindowRect 5279->5281 5282 7ff6bc715d32 InvalidateRect 5279->5282 5280->5283 5281->5282 5284 7ff6bc715b76 GetWindowRect 5281->5284 5282->5278 5283->5257 5283->5261 5284->5282 5285 7ff6bc715b95 MapWindowPoints MapWindowPoints MapWindowPoints 5284->5285 5286 7ff6bc715c3d MoveWindow 5285->5286 5288 7ff6bc71ebc4 31 API calls 5286->5288 5289 7ff6bc715cf8 InvalidateRect 5288->5289 5289->5282 5290 7ff6bc71a3a0 5293 7ff6bc71b560 5290->5293 5294 7ff6bc71b58b 5293->5294 5295 7ff6bc71b57f DeleteObject 5293->5295 5295->5294 5921 7ff6bc71c8a0 5922 7ff6bc71c8d7 5921->5922 5923 7ff6bc71c9b3 5921->5923 5924 7ff6bc71c907 5922->5924 5925 7ff6bc71c8f6 5922->5925 5927 7ff6bc71c90f 5924->5927 5928 7ff6bc71c92e 5924->5928 5942 7ff6bc71d0a0 5925->5942 5947 7ff6bc71d1b4 5927->5947 5930 7ff6bc71c936 5928->5930 5931 7ff6bc71c944 5928->5931 5955 7ff6bc71d3e0 5930->5955 5932 7ff6bc71c949 5931->5932 5933 7ff6bc71c973 5931->5933 5963 7ff6bc71d4cc 5932->5963 5936 7ff6bc71c978 5933->5936 5940 7ff6bc71c9bc 5933->5940 5973 7ff6bc71d760 5936->5973 5938 7ff6bc71c902 5938->5923 5939 7ff6bc715730 76 API calls 5938->5939 5939->5923 5940->5938 5941 7ff6bc71984c 3 API calls 5940->5941 5941->5938 5943 7ff6bc715a14 26 API calls 5942->5943 5944 7ff6bc71d0b2 5943->5944 5945 7ff6bc71d0be 6 API calls 5944->5945 5946 7ff6bc71d16f 5944->5946 5945->5946 5946->5938 5949 7ff6bc71d1f6 5947->5949 5948 7ff6bc71e600 15 API calls 5953 7ff6bc71d3c4 5948->5953 5950 7ff6bc71d2c9 5949->5950 5951 7ff6bc71d30f SendMessageW 5949->5951 5952 7ff6bc71d2ce 5949->5952 5950->5952 5954 7ff6bc71d2f1 SendMessageW 5950->5954 5951->5952 5952->5948 5952->5953 5953->5938 5954->5952 5956 7ff6bc71d40e 5955->5956 5957 7ff6bc71d437 5956->5957 5958 7ff6bc71d417 SendMessageW 5956->5958 5959 7ff6bc71d477 5957->5959 5960 7ff6bc71d457 SendMessageW 5957->5960 5958->5957 5961 7ff6bc71d4b7 5959->5961 5962 7ff6bc71d497 SendMessageW 5959->5962 5960->5959 5961->5938 5962->5961 5964 7ff6bc71d4d5 5963->5964 5969 7ff6bc71d733 5963->5969 5965 7ff6bc71d726 5964->5965 5966 7ff6bc715af8 40 API calls 5964->5966 5967 7ff6bc720b90 7 API calls 5965->5967 5968 7ff6bc71d51e GetWindowRect 5966->5968 5967->5969 5968->5965 5970 7ff6bc71d53b GetWindowRect 5968->5970 5969->5938 5970->5965 5971 7ff6bc71d55b GetWindowRect 5970->5971 5971->5965 5972 7ff6bc71d57b 6 API calls 5971->5972 5972->5965 5974 7ff6bc71d78c 8 API calls 5973->5974 5974->5938 5979 7ff6bc7172b0 6008 7ff6bc71892c 5979->6008 5982 7ff6bc717335 5986 7ff6bc71733f GetColorProfileFromHandle 5982->5986 5987 7ff6bc717369 5982->5987 5983 7ff6bc7172f8 WcsCreateIccProfile 5984 7ff6bc717329 5983->5984 5985 7ff6bc717312 GetLastError 5983->5985 5984->5982 6034 7ff6bc718ec4 5984->6034 5985->5984 5986->5987 5988 7ff6bc717358 GetLastError 5986->5988 5989 7ff6bc71736d 5987->5989 5994 7ff6bc7173ac GetColorProfileFromHandle 5987->5994 5988->5987 5991 7ff6bc717524 5989->5991 5992 7ff6bc717514 CloseColorProfile 5989->5992 5993 7ff6bc717529 CloseColorProfile 5991->5993 5998 7ff6bc717538 5991->5998 5992->5991 5993->5998 5995 7ff6bc7173c6 GetLastError 5994->5995 5996 7ff6bc7173dd 5994->5996 5995->5996 5996->5989 5997 7ff6bc7173e5 CreateFileW 5996->5997 5999 7ff6bc71743e 5997->5999 6000 7ff6bc717424 GetLastError 5997->6000 6001 7ff6bc717446 WriteFile 5999->6001 6002 7ff6bc7174de 5999->6002 6000->5999 6004 7ff6bc717479 GetLastError 6001->6004 6005 7ff6bc71746a 6001->6005 6002->5989 6003 7ff6bc7174fe CloseHandle 6002->6003 6003->5989 6004->6005 6005->6002 6006 7ff6bc717497 CloseHandle InstallColorProfileW 6005->6006 6006->6002 6007 7ff6bc7174c4 GetLastError 6006->6007 6007->6002 6009 7ff6bc720234 2 API calls 6008->6009 6010 7ff6bc7189a5 6009->6010 6011 7ff6bc7189cc 6010->6011 6012 7ff6bc720234 2 API calls 6010->6012 6013 7ff6bc7189f6 6011->6013 6014 7ff6bc720234 2 API calls 6011->6014 6012->6011 6016 7ff6bc720234 2 API calls 6013->6016 6018 7ff6bc718a2b 6013->6018 6014->6013 6015 7ff6bc718a4e GetSystemTime 6017 7ff6bc720324 2 API calls 6015->6017 6016->6018 6019 7ff6bc718a9b 6017->6019 6018->6015 6023 7ff6bc718cc6 6018->6023 6020 7ff6bc720478 4 API calls 6019->6020 6019->6023 6021 7ff6bc718acf 6020->6021 6022 7ff6bc718af4 powf powf powf 6021->6022 6021->6023 6030 7ff6bc718c09 6021->6030 6024 7ff6bc720324 2 API calls 6022->6024 6026 7ff6bc720b90 7 API calls 6023->6026 6027 7ff6bc718bf1 6024->6027 6025 7ff6bc71fe90 malloc 6028 7ff6bc718c30 6025->6028 6029 7ff6bc7172ea 6026->6029 6027->6030 6055 7ff6bc71fe90 6027->6055 6028->6023 6032 7ff6bc718c52 WcsOpenColorProfileW 6028->6032 6029->5982 6029->5983 6030->6023 6030->6025 6032->6023 6033 7ff6bc718cac GetLastError 6032->6033 6033->6023 6035 7ff6bc720234 2 API calls 6034->6035 6036 7ff6bc718f0a 6035->6036 6037 7ff6bc718f30 6036->6037 6038 7ff6bc720234 2 API calls 6036->6038 6039 7ff6bc718f54 6037->6039 6040 7ff6bc720234 2 API calls 6037->6040 6038->6037 6041 7ff6bc718fb7 6039->6041 6042 7ff6bc718f67 WideCharToMultiByte 6039->6042 6040->6039 6044 7ff6bc718fd8 WideCharToMultiByte 6041->6044 6045 7ff6bc719025 6041->6045 6042->6041 6043 7ff6bc718f9d GetLastError 6042->6043 6043->6041 6044->6045 6046 7ff6bc71900b GetLastError 6044->6046 6045->6045 6047 7ff6bc7191e6 6045->6047 6048 7ff6bc719093 memset memcpy lstrlenW 6045->6048 6046->6045 6047->5982 6050 7ff6bc7190e5 6048->6050 6049 7ff6bc719161 SetColorProfileElementSize 6051 7ff6bc719188 GetLastError 6049->6051 6052 7ff6bc7191a2 6049->6052 6050->6049 6050->6050 6051->6052 6052->6047 6053 7ff6bc7191a6 SetColorProfileElement 6052->6053 6053->6047 6054 7ff6bc7191cc GetLastError 6053->6054 6054->6047 6056 7ff6bc71fec8 6055->6056 6058 7ff6bc71ff05 6055->6058 6056->6056 6057 7ff6bc72076c malloc 6056->6057 6057->6058 6058->6030 5306 7ff6bc71bfb0 SetVCPFeature 5307 7ff6bc71bfee 5306->5307 5308 7ff6bc71bfd4 GetLastError 5306->5308 5308->5307 5312 7ff6bc71f5b0 GetParent PostMessageW

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff6bc714120-7ff6bc714169 CreateMutexExW 1 7ff6bc71416b-7ff6bc71417c GetLastError 0->1 2 7ff6bc714194-7ff6bc7141f6 RegisterWindowMessageW call 7ff6bc720234 FindWindowW 0->2 1->2 3 7ff6bc71417e-7ff6bc71418f WaitForSingleObject 1->3 6 7ff6bc7141fc-7ff6bc714265 GetWindowThreadProcessId AllowSetForegroundWindow SendMessageTimeoutW 2->6 7 7ff6bc71427d-7ff6bc714290 2->7 3->2 6->7 8 7ff6bc714267-7ff6bc714273 6->8 9 7ff6bc714296-7ff6bc7142b1 call 7ff6bc72076c 7->9 10 7ff6bc714a8e-7ff6bc714a98 7->10 8->7 11 7ff6bc714275-7ff6bc71427a 8->11 20 7ff6bc7142dd 9->20 21 7ff6bc7142b3-7ff6bc7142cc call 7ff6bc719468 9->21 13 7ff6bc714a9a-7ff6bc714ab9 ReleaseMutex CloseHandle 10->13 14 7ff6bc714ac1-7ff6bc714ac4 10->14 11->7 13->14 15 7ff6bc714ac6-7ff6bc714ac9 14->15 16 7ff6bc714ada-7ff6bc714afe call 7ff6bc71fe5c 14->16 15->16 18 7ff6bc714acb-7ff6bc714ad5 call 7ff6bc71e600 15->18 18->16 24 7ff6bc7142df-7ff6bc7142ee call 7ff6bc714ed0 20->24 26 7ff6bc7142d1-7ff6bc7142db 21->26 24->10 29 7ff6bc7142f4-7ff6bc714302 call 7ff6bc72076c 24->29 26->24 32 7ff6bc714330 29->32 33 7ff6bc714304-7ff6bc71432e call 7ff6bc719468 29->33 35 7ff6bc714332-7ff6bc714341 call 7ff6bc714ed0 32->35 33->35 35->10 39 7ff6bc714347-7ff6bc71435b call 7ff6bc72076c 35->39 42 7ff6bc71435d-7ff6bc7143b2 call 7ff6bc71ad2c 39->42 43 7ff6bc7143b4 39->43 45 7ff6bc7143b6-7ff6bc7143c5 call 7ff6bc714ed0 42->45 43->45 45->10 49 7ff6bc7143cb-7ff6bc7143e1 call 7ff6bc72076c 45->49 52 7ff6bc714422 49->52 53 7ff6bc7143e3-7ff6bc714420 call 7ff6bc71b4d0 49->53 54 7ff6bc714424-7ff6bc714433 call 7ff6bc714ed0 52->54 53->54 54->10 59 7ff6bc714439-7ff6bc714449 call 7ff6bc72076c 54->59 62 7ff6bc714477-7ff6bc714479 59->62 63 7ff6bc71444b-7ff6bc714475 call 7ff6bc719468 59->63 65 7ff6bc714480-7ff6bc71448f call 7ff6bc714ed0 62->65 63->65 65->10 69 7ff6bc714495-7ff6bc7144a3 call 7ff6bc72076c 65->69 72 7ff6bc7144ff 69->72 73 7ff6bc7144a5-7ff6bc7144ee call 7ff6bc71ad2c 69->73 75 7ff6bc714501-7ff6bc714510 call 7ff6bc714ed0 72->75 76 7ff6bc7144f3-7ff6bc7144fd 73->76 75->10 79 7ff6bc714516-7ff6bc714524 call 7ff6bc72076c 75->79 76->75 82 7ff6bc714526-7ff6bc714560 call 7ff6bc715818 79->82 83 7ff6bc714562 79->83 85 7ff6bc714564-7ff6bc714573 call 7ff6bc714ed0 82->85 83->85 85->10 89 7ff6bc714579-7ff6bc714587 call 7ff6bc72076c 85->89 92 7ff6bc714589-7ff6bc7145e1 call 7ff6bc71ad2c 89->92 93 7ff6bc7145e3 89->93 95 7ff6bc7145e5-7ff6bc7145f4 call 7ff6bc714ed0 92->95 93->95 95->10 99 7ff6bc7145fa-7ff6bc71460e call 7ff6bc72076c 95->99 102 7ff6bc714647-7ff6bc714649 99->102 103 7ff6bc714610-7ff6bc714645 call 7ff6bc715818 99->103 105 7ff6bc714650-7ff6bc71465f call 7ff6bc714ed0 102->105 103->105 105->10 109 7ff6bc714665-7ff6bc714679 call 7ff6bc72076c 105->109 112 7ff6bc71467b-7ff6bc7146ba call 7ff6bc71b4d0 109->112 113 7ff6bc7146bc 109->113 115 7ff6bc7146be-7ff6bc7146cd call 7ff6bc714ed0 112->115 113->115 115->10 119 7ff6bc7146d3-7ff6bc7146e1 call 7ff6bc72076c 115->119 122 7ff6bc714721 119->122 123 7ff6bc7146e3-7ff6bc71471f call 7ff6bc71b4d0 119->123 125 7ff6bc714723-7ff6bc714732 call 7ff6bc714ed0 122->125 123->125 125->10 129 7ff6bc714738-7ff6bc71474c call 7ff6bc72076c 125->129 132 7ff6bc714779 129->132 133 7ff6bc71474e-7ff6bc714777 call 7ff6bc719468 129->133 134 7ff6bc71477b-7ff6bc71478a call 7ff6bc714ed0 132->134 133->134 134->10 139 7ff6bc714790-7ff6bc7147a0 call 7ff6bc72076c 134->139 142 7ff6bc7147e6-7ff6bc7147e8 139->142 143 7ff6bc7147a2-7ff6bc7147e4 call 7ff6bc715818 139->143 145 7ff6bc7147ef-7ff6bc7147fe call 7ff6bc714ed0 142->145 143->145 145->10 149 7ff6bc714804-7ff6bc714812 call 7ff6bc72076c 145->149 152 7ff6bc714840 149->152 153 7ff6bc714814-7ff6bc71483e call 7ff6bc719468 149->153 155 7ff6bc714842-7ff6bc714851 call 7ff6bc714ed0 152->155 153->155 155->10 159 7ff6bc714857-7ff6bc714864 call 7ff6bc72076c 155->159 162 7ff6bc714866-7ff6bc714873 call 7ff6bc71ca28 159->162 163 7ff6bc714878-7ff6bc714887 call 7ff6bc714ed0 159->163 162->163 163->10 167 7ff6bc71488d-7ff6bc7148a5 call 7ff6bc72076c 163->167 170 7ff6bc7148a7-7ff6bc7148d9 call 7ff6bc719468 167->170 171 7ff6bc7148db 167->171 173 7ff6bc7148dd-7ff6bc7148ec call 7ff6bc714ed0 170->173 171->173 173->10 177 7ff6bc7148f2-7ff6bc714900 call 7ff6bc72076c 173->177 180 7ff6bc714937-7ff6bc714939 177->180 181 7ff6bc714902-7ff6bc714935 call 7ff6bc719468 177->181 182 7ff6bc714940-7ff6bc71494f call 7ff6bc714ed0 180->182 181->182 182->10 187 7ff6bc714955-7ff6bc714965 call 7ff6bc72076c 182->187 190 7ff6bc714967-7ff6bc714982 call 7ff6bc719468 187->190 191 7ff6bc714993 187->191 194 7ff6bc714987-7ff6bc714991 190->194 193 7ff6bc714995-7ff6bc7149a4 call 7ff6bc714ed0 191->193 193->10 197 7ff6bc7149aa-7ff6bc7149b3 193->197 194->193 198 7ff6bc7149ba-7ff6bc7149d4 RegisterWindowMessageW 197->198 199 7ff6bc7149d6-7ff6bc7149e8 198->199 200 7ff6bc7149ec-7ff6bc714a00 GetLastError 198->200 199->198 201 7ff6bc7149ea 199->201 202 7ff6bc714a03-7ff6bc714a05 200->202 201->202 202->10 203 7ff6bc714a0b-7ff6bc714a20 WcsGetCalibrationManagementState 202->203 204 7ff6bc714a4b-7ff6bc714a4d 203->204 205 7ff6bc714a22-7ff6bc714a48 GetLastError call 7ff6bc71e600 203->205 204->10 207 7ff6bc714a4f-7ff6bc714a5f WcsSetCalibrationManagementState 204->207 205->204 209 7ff6bc714a8a-7ff6bc714a8c 207->209 210 7ff6bc714a61-7ff6bc714a87 GetLastError call 7ff6bc71e600 207->210 209->10 209->16 210->209
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$ErrorLast$Message$CalibrationCreateManagementMutexRegisterState$AllowBrushCloseFindForegroundHandleObjectProcessReleaseSendSingleSolidThreadTimeoutWaitmallocmemset
    • String ID: A$F$Local\DCCW Startup Mutex$Microsoft.Windows.ICM.DCCW.Activate$NativeHWNDHost$dccw$strg
    • API String ID: 506832570-4174002938
    • Opcode ID: 880fce475d726c71b8c1d90ba3ae6b59f6f9329bd1a1e61e96336bbe0ea2cbc5
    • Instruction ID: 4a74536498e401d0f6d58f46687acc6a1e6b11d566ece18ad430b8719f784388
    • Opcode Fuzzy Hash: 880fce475d726c71b8c1d90ba3ae6b59f6f9329bd1a1e61e96336bbe0ea2cbc5
    • Instruction Fuzzy Hash: 90427C31B09B5287EB549B6EA4602BAB7A4FF89B84F544034DB4ECB785DF3CE6158700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 213 7ff6bc711170-7ff6bc7111c5 HeapSetInformation 214 7ff6bc7111e6-7ff6bc7111e9 213->214 215 7ff6bc7111c7-7ff6bc7111cd 214->215 216 7ff6bc7111eb-7ff6bc711214 GetCurrentThreadId call 7ff6bc72076c 214->216 218 7ff6bc7111cf-7ff6bc7111db 215->218 219 7ff6bc7111e2 215->219 222 7ff6bc711216-7ff6bc711228 216->222 223 7ff6bc71122a-7ff6bc71122d 216->223 218->219 219->214 224 7ff6bc711234-7ff6bc7112a3 EventRegister GdiplusStartup 222->224 223->224 225 7ff6bc71130d-7ff6bc711320 GetSystemMetrics 224->225 226 7ff6bc7112a5-7ff6bc7112c7 call 7ff6bc720234 224->226 227 7ff6bc711361-7ff6bc711366 225->227 228 7ff6bc711322-7ff6bc711344 call 7ff6bc720234 225->228 236 7ff6bc7112c9-7ff6bc7112e6 call 7ff6bc720478 226->236 237 7ff6bc7112fe-7ff6bc711308 call 7ff6bc71fe5c 226->237 232 7ff6bc71136c-7ff6bc711373 call 7ff6bc71ef88 227->232 233 7ff6bc71143e-7ff6bc711440 227->233 242 7ff6bc711346-7ff6bc71134d call 7ff6bc71e50c 228->242 243 7ff6bc711352-7ff6bc71135c call 7ff6bc71fe5c 228->243 249 7ff6bc7113a9-7ff6bc7113bd call 7ff6bc72076c 232->249 250 7ff6bc711375-7ff6bc711389 call 7ff6bc72076c 232->250 238 7ff6bc711442-7ff6bc71144e GdiplusShutdown 233->238 239 7ff6bc711453-7ff6bc71145d 233->239 259 7ff6bc7112e8-7ff6bc7112ef call 7ff6bc71e50c 236->259 260 7ff6bc7112f4-7ff6bc7112f9 call 7ff6bc71fe5c 236->260 237->225 238->239 245 7ff6bc71146b-7ff6bc711471 239->245 246 7ff6bc71145f-7ff6bc711466 EventUnregister 239->246 242->243 243->227 247 7ff6bc711487-7ff6bc7114a8 EnterCriticalSection 245->247 248 7ff6bc711473-7ff6bc71147e 245->248 246->245 255 7ff6bc7114aa-7ff6bc7114ae 247->255 256 7ff6bc7114f1-7ff6bc711512 LeaveCriticalSection 247->256 248->247 272 7ff6bc7113e0 249->272 274 7ff6bc7113bf-7ff6bc7113d4 memset call 7ff6bc716280 249->274 271 7ff6bc71138b-7ff6bc7113a7 memset call 7ff6bc716280 250->271 250->272 264 7ff6bc7114c9-7ff6bc7114cc 255->264 265 7ff6bc7114b0-7ff6bc7114c2 DestroyWindow 255->265 267 7ff6bc711550-7ff6bc71155a 256->267 268 7ff6bc711514-7ff6bc71151a 256->268 259->260 260->237 264->256 273 7ff6bc7114ce-7ff6bc7114d4 264->273 265->264 269 7ff6bc71155c 267->269 270 7ff6bc71158d-7ff6bc71159b 267->270 275 7ff6bc71152b-7ff6bc711532 268->275 276 7ff6bc71151c-7ff6bc711528 free 268->276 278 7ff6bc711588-7ff6bc71158b 269->278 282 7ff6bc7115bc-7ff6bc7115bf 270->282 298 7ff6bc7113db-7ff6bc7113de 271->298 277 7ff6bc7113e3-7ff6bc7113f0 272->277 280 7ff6bc7114d6-7ff6bc7114e2 free 273->280 281 7ff6bc7114e5-7ff6bc7114ec call 7ff6bc720754 273->281 274->298 284 7ff6bc711544-7ff6bc71154b call 7ff6bc720754 275->284 285 7ff6bc711534-7ff6bc711540 free 275->285 276->275 277->233 286 7ff6bc7113f2-7ff6bc71140d call 7ff6bc713f74 call 7ff6bc714120 277->286 278->270 292 7ff6bc71155e-7ff6bc711565 278->292 280->281 281->256 288 7ff6bc71159d-7ff6bc7115a3 282->288 289 7ff6bc7115c1-7ff6bc7115eb call 7ff6bc713df0 282->289 284->267 285->284 307 7ff6bc71142a-7ff6bc711430 286->307 308 7ff6bc71140f-7ff6bc711423 GetActiveWindow call 7ff6bc711638 286->308 299 7ff6bc7115b8 288->299 300 7ff6bc7115a5-7ff6bc7115b1 288->300 296 7ff6bc711567-7ff6bc71156a 292->296 297 7ff6bc711574-7ff6bc711584 292->297 296->297 297->278 298->277 299->282 300->299 310 7ff6bc711434-7ff6bc711439 call 7ff6bc7140a8 307->310 311 7ff6bc711428 308->311 310->233 311->310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$CriticalSectionfree$Thread$CurrentEnterEventGdiplusLeaveMessageRegistermemset$ActiveAllowCreateDestroyErrorFindForegroundHeapInformationLastMetricsMutexObjectProcessPropertySendSheetShutdownSingleStartupSystemTimeoutUnregisterWait
    • String ID: strg
    • API String ID: 2231437722-3320446829
    • Opcode ID: 29b999820bd207e3dfc09787f2ebd763114e3b650abaee725bbe52b6a6442c37
    • Instruction ID: d7fbc23696c144d7afb18c150897cd49d56cda3ae09f1be573458a59964ac238
    • Opcode Fuzzy Hash: 29b999820bd207e3dfc09787f2ebd763114e3b650abaee725bbe52b6a6442c37
    • Instruction Fuzzy Hash: D3D13B35A18A5682EA149F2DE4601B9B7A4FF8AB80F489035DF5E8B765DF3CE644C700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 313 7ff6bc7208f0-7ff6bc72092c GetStartupInfoW 314 7ff6bc72092f-7ff6bc72093a 313->314 315 7ff6bc720957 314->315 316 7ff6bc72093c-7ff6bc72093f 314->316 317 7ff6bc72095c-7ff6bc720964 315->317 318 7ff6bc72094a-7ff6bc720955 Sleep 316->318 319 7ff6bc720941-7ff6bc720948 316->319 320 7ff6bc720966-7ff6bc720972 _amsg_exit 317->320 321 7ff6bc720974-7ff6bc72097c 317->321 318->314 319->317 322 7ff6bc7209e0-7ff6bc7209e8 320->322 323 7ff6bc72097e-7ff6bc72099a 321->323 324 7ff6bc7209d5 321->324 325 7ff6bc720a07-7ff6bc720a09 322->325 326 7ff6bc7209ea-7ff6bc7209fd _initterm 322->326 327 7ff6bc72099e-7ff6bc7209a1 323->327 328 7ff6bc7209db 324->328 329 7ff6bc720a0b-7ff6bc720a0e 325->329 330 7ff6bc720a15-7ff6bc720a1c 325->330 326->325 331 7ff6bc7209c7-7ff6bc7209c9 327->331 332 7ff6bc7209a3-7ff6bc7209a5 327->332 328->322 329->330 333 7ff6bc720a48-7ff6bc720a55 330->333 334 7ff6bc720a1e-7ff6bc720a2c call 7ff6bc721150 330->334 331->328 336 7ff6bc7209cb-7ff6bc7209d0 331->336 335 7ff6bc7209a7-7ff6bc7209aa 332->335 332->336 340 7ff6bc720a57-7ff6bc720a5c 333->340 341 7ff6bc720a61-7ff6bc720a66 333->341 334->333 345 7ff6bc720a2e-7ff6bc720a3e 334->345 338 7ff6bc7209bc-7ff6bc7209c5 335->338 339 7ff6bc7209ac-7ff6bc7209b8 335->339 342 7ff6bc720b36-7ff6bc720b53 336->342 338->327 339->338 340->342 344 7ff6bc720a6a-7ff6bc720a71 341->344 347 7ff6bc720ae7-7ff6bc720aeb 344->347 348 7ff6bc720a73-7ff6bc720a76 344->348 345->333 349 7ff6bc720afb-7ff6bc720b04 347->349 350 7ff6bc720aed-7ff6bc720af7 347->350 351 7ff6bc720a78-7ff6bc720a7a 348->351 352 7ff6bc720a7c-7ff6bc720a82 348->352 349->344 350->349 351->347 351->352 353 7ff6bc720a92-7ff6bc720ac6 call 7ff6bc711170 352->353 354 7ff6bc720a84-7ff6bc720a90 352->354 357 7ff6bc720ac8-7ff6bc720aca exit 353->357 358 7ff6bc720ad0-7ff6bc720ad7 353->358 354->352 357->358 359 7ff6bc720ad9-7ff6bc720adf _cexit 358->359 360 7ff6bc720ae5 358->360 359->360 360->342
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CurrentImageInfoNonwritableSleepStartup_amsg_exit_cexit_inittermexit
    • String ID:
    • API String ID: 642454821-0
    • Opcode ID: 6c1e11f1ebf1920713f8c1fc65071ad98dd96a502b8230403199e6c74c4cd5c1
    • Instruction ID: 0baaa53b4f75314f300d861ac6b417498d0b9b9ee564b415e2aa51bc1022a631
    • Opcode Fuzzy Hash: 6c1e11f1ebf1920713f8c1fc65071ad98dd96a502b8230403199e6c74c4cd5c1
    • Instruction Fuzzy Hash: 2C612335A0864686FB609F2DE86027977E4FB46780F544036DB8EDB6A4DF3CEB818710

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 361 7ff6bc71ef88-7ff6bc71efd6 RegOpenKeyExW 362 7ff6bc71efd8-7ff6bc71f00c RegQueryValueExW 361->362 363 7ff6bc71f01f-7ff6bc71f026 361->363 362->363 364 7ff6bc71f00e-7ff6bc71f012 362->364 365 7ff6bc71f028-7ff6bc71f02f RegCloseKey 363->365 366 7ff6bc71f034-7ff6bc71f04c 363->366 367 7ff6bc71f01a 364->367 368 7ff6bc71f014-7ff6bc71f018 364->368 365->366 367->363 368->363 368->367
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CloseOpenQueryValue
    • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\DCCW\Simulator$UseSimulator
    • API String ID: 3677997916-1182467772
    • Opcode ID: 324c6c47381fdb6126d5e04ba265083ed8e80dfd715c38f96470452bf5792154
    • Instruction ID: 3f1ea86f917ccd62b7494e190ff02b4b85ec25862367369d56e7b965ee45f763
    • Opcode Fuzzy Hash: 324c6c47381fdb6126d5e04ba265083ed8e80dfd715c38f96470452bf5792154
    • Instruction Fuzzy Hash: 7A219D37604B52CEE7208F29E8901A87BA4FB4939DF491235EB0E87B54EF38D585C740

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CriticalSection$CurrentEnterLeavePropertySheetThreadfree
    • String ID:
    • API String ID: 422299603-0
    • Opcode ID: beff49f172d0528a608b0f057ddb429f9fbb632655c9bfd8846fd3a0e38d1527
    • Instruction ID: 202c9eed69d4837008f5aeb879f58c9167a6c6cbb4ac8acbe885fcef872f4c4e
    • Opcode Fuzzy Hash: beff49f172d0528a608b0f057ddb429f9fbb632655c9bfd8846fd3a0e38d1527
    • Instruction Fuzzy Hash: 61211932A15B868BDB408F29E5643B8B7B0FB4AB59F188134CB5D8B764DF39D15AC700

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: BrushCreateSolidmemset
    • String ID:
    • API String ID: 1302505579-0
    • Opcode ID: 2e1c53eced954e63c49af98b94018f358c8e14bfdaeb3a53d9e4906ac26c8afa
    • Instruction ID: 41366aa4a5e713062df2eba009fe3a5b4b3965512eb5d4d9081e9cf2bafdf2bf
    • Opcode Fuzzy Hash: 2e1c53eced954e63c49af98b94018f358c8e14bfdaeb3a53d9e4906ac26c8afa
    • Instruction Fuzzy Hash: BE310432615B858BE3648B29F4943AAB7B4F708758F108139C7EE4AB60DF7DE199C740

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: LoadStringmalloc
    • String ID:
    • API String ID: 905986743-0
    • Opcode ID: 4c6ff5139db4d972557f54c97b4cdf57c119e39ac3b0321e5bfc280501f11e71
    • Instruction ID: 3f707584ba5a0f5e784e0eb376d8f4fc7ba67c5835dcfe97fbe043d18059b285
    • Opcode Fuzzy Hash: 4c6ff5139db4d972557f54c97b4cdf57c119e39ac3b0321e5bfc280501f11e71
    • Instruction Fuzzy Hash: 1121D531B0D64282EE149F6AA4602795BD0BF4ABD4F048239EF6D9FBC2DE3CD6418750

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 403 7ff6bc7208a0-7ff6bc7208e8 __wgetmainargs
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: __wgetmainargs
    • String ID:
    • API String ID: 1709950718-0
    • Opcode ID: 7794cf88437b67fb74ca6628a44354258c93d0fbee989022b65bbec9e1e19274
    • Instruction ID: b6083040816897bfe61f57f0025ab884787012a10a9fd8c88c15bb1576aa417e
    • Opcode Fuzzy Hash: 7794cf88437b67fb74ca6628a44354258c93d0fbee989022b65bbec9e1e19274
    • Instruction Fuzzy Hash: E4E07574E0964BD6EB008B18E8608A037E1BB16304F880132CA2C9A730DE3DA349CB44

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 404 7ff6bc72076c-7ff6bc720779 405 7ff6bc72078a-7ff6bc720795 malloc 404->405 406 7ff6bc720797-7ff6bc7207a4 405->406 407 7ff6bc72077b-7ff6bc720785 call 7ff6bc720fbc 405->407 407->406 410 7ff6bc720787 407->410 410->405
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: malloc
    • String ID:
    • API String ID: 2803490479-0
    • Opcode ID: 409a51d12d4346e0ccf929c9ba02bb5b589005c5bcbd961b2aa3be7f1e686cfc
    • Instruction ID: 11838bd8a90a257b9b274dcffb7ad587ca6c6f9e13db92f742c0d8a350c1e082
    • Opcode Fuzzy Hash: 409a51d12d4346e0ccf929c9ba02bb5b589005c5bcbd961b2aa3be7f1e686cfc
    • Instruction Fuzzy Hash: 1AD0C220B0D64640FD145B3A62A027947504F4ABC0F084030DF4D8E796EE2CE6828F20
    APIs
      • Part of subcall function 00007FF6BC712CA0: CharNextW.USER32(00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712CDF
      • Part of subcall function 00007FF6BC712CA0: CharNextW.USER32(00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712D15
      • Part of subcall function 00007FF6BC712CA0: CharNextW.USER32 ref: 00007FF6BC712DDB
    • lstrcmpiW.KERNEL32(?,?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?), ref: 00007FF6BC712F0E
    • lstrcmpiW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712F2F
    • CharNextW.USER32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712F83
    • lstrcmpiW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712FB2
    • lstrcmpiW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC71302B
    • lstrcmpiW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC71305D
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC713106
    • RegDeleteValueW.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC713129
    • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC713148
    • CharNextW.USER32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC71317C
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC7131CF
    • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC7131EB
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC713227
    • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC713241
    • RegCreateKeyExW.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC71328D
    • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC7132AD
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC713388
    • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC7133A8
    • wcsncpy_s.MSVCRT ref: 00007FF6BC7133E8
    • RegQueryInfoKeyW.ADVAPI32 ref: 00007FF6BC71350A
    • lstrcmpiW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC713530
    • RegQueryInfoKeyW.ADVAPI32 ref: 00007FF6BC7135B1
    • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC7135D6
    • RegCloseKey.ADVAPI32(?,?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?), ref: 00007FF6BC713638
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Close$lstrcmpi$CharNext$Open$InfoQuery$CreateDeleteValuewcsncpy_s
    • String ID: Delete$ForceRemove$NoRemove$Val$fRt 1)
    • API String ID: 1824292420-735408262
    • Opcode ID: 9c8114f7b109bc2cfec2f099707de75b4727bb0cf6a25533f7cb13d4532c693c
    • Instruction ID: f196efc2843fc5fe9f1127b12d7368a3da20f5cc0c24124c7e7ed47795d69559
    • Opcode Fuzzy Hash: 9c8114f7b109bc2cfec2f099707de75b4727bb0cf6a25533f7cb13d4532c693c
    • Instruction Fuzzy Hash: FF427021A08B6287FB149B6EA46027AA7A5FF89B94F409131DF4DC7B94DF3CE6458700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 629 7ff6bc71ebc4-7ff6bc71ebff 630 7ff6bc71ef4e 629->630 631 7ff6bc71ec05-7ff6bc71ec08 629->631 632 7ff6bc71ef53-7ff6bc71ef7d call 7ff6bc720b90 630->632 631->630 633 7ff6bc71ec0e-7ff6bc71ec11 631->633 633->630 635 7ff6bc71ec17-7ff6bc71ec47 GetObjectW 633->635 636 7ff6bc71ec49-7ff6bc71ec5c 635->636 637 7ff6bc71ec5e-7ff6bc71ec76 GetLastError 635->637 639 7ff6bc71ec7c-7ff6bc71ec92 GetWindowRect 636->639 637->639 640 7ff6bc71ef42-7ff6bc71ef4c 637->640 641 7ff6bc71ecb6-7ff6bc71ecc9 GetLastError 639->641 642 7ff6bc71ec94-7ff6bc71ecb4 639->642 640->632 643 7ff6bc71eccc-7ff6bc71ecce 641->643 642->643 643->640 644 7ff6bc71ecd4-7ff6bc71ece9 GetDC 643->644 645 7ff6bc71eceb-7ff6bc71ed02 GetLastError 644->645 646 7ff6bc71ed05-7ff6bc71ed07 644->646 645->646 647 7ff6bc71eee9-7ff6bc71eeec 646->647 648 7ff6bc71ed0d-7ff6bc71ed22 CreateCompatibleDC 646->648 651 7ff6bc71eeee-7ff6bc71eefb ReleaseDC 647->651 652 7ff6bc71ef00-7ff6bc71ef03 647->652 649 7ff6bc71ed3e-7ff6bc71ed40 648->649 650 7ff6bc71ed24-7ff6bc71ed3b GetLastError 648->650 649->647 655 7ff6bc71ed46-7ff6bc71ed67 SelectObject 649->655 650->649 651->652 653 7ff6bc71ef05-7ff6bc71ef0f DeleteDC 652->653 654 7ff6bc71ef14-7ff6bc71ef17 652->654 653->654 656 7ff6bc71ef19-7ff6bc71ef23 DeleteDC 654->656 657 7ff6bc71ef28-7ff6bc71ef2a 654->657 655->647 658 7ff6bc71ed6d-7ff6bc71ed82 CreateCompatibleDC 655->658 656->657 657->640 659 7ff6bc71ef2c-7ff6bc71ef2f 657->659 660 7ff6bc71ed9e-7ff6bc71eda0 658->660 661 7ff6bc71ed84-7ff6bc71ed9b GetLastError 658->661 659->640 663 7ff6bc71ef31-7ff6bc71ef40 DeleteObject 659->663 660->647 662 7ff6bc71eda6-7ff6bc71edbc SetStretchBltMode 660->662 661->660 664 7ff6bc71edd8-7ff6bc71edda 662->664 665 7ff6bc71edbe-7ff6bc71edd5 GetLastError 662->665 663->640 664->647 666 7ff6bc71ede0-7ff6bc71edfb CreateCompatibleBitmap 664->666 665->664 667 7ff6bc71ee17-7ff6bc71ee19 666->667 668 7ff6bc71edfd-7ff6bc71ee14 GetLastError 666->668 667->647 669 7ff6bc71ee1f-7ff6bc71ee3e SelectObject 667->669 668->667 669->647 670 7ff6bc71ee44-7ff6bc71ee89 StretchBlt 669->670 671 7ff6bc71ee8b-7ff6bc71eea2 GetLastError 670->671 672 7ff6bc71eea5-7ff6bc71eea7 670->672 671->672 672->647 673 7ff6bc71eea9-7ff6bc71eed8 SendMessageW call 7ff6bc71e86c 672->673 673->647 676 7ff6bc71eeda-7ff6bc71eee4 DeleteObject 673->676 676->647
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ErrorLast$Object$Delete$CompatibleCreate$SelectStretch$BitmapMessageModeRectReleaseSendWindow
    • String ID: $SendMessage(STM_SETIMAGE, 0x%08x) returned 0x%08x$fRt 1)
    • API String ID: 1596057509-4091570535
    • Opcode ID: 256468c35a5c333182ec0d9b5386298bcb3ba475755d42762c654f0558f1f5e9
    • Instruction ID: 4783e97da4f6b2ab05da2c0f2029d943f1508d8aee0c6bc7669110f910d5bd28
    • Opcode Fuzzy Hash: 256468c35a5c333182ec0d9b5386298bcb3ba475755d42762c654f0558f1f5e9
    • Instruction Fuzzy Hash: 3BA15131A087528BF7509B6EA46437ABBE8FF8AB95F448134DF4E86750DF3DE5048A10

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 677 7ff6bc71388c-7ff6bc7138e9 LoadLibraryExW 678 7ff6bc7138f7-7ff6bc713915 FindResourceExW 677->678 679 7ff6bc7138eb-7ff6bc7138f2 call 7ff6bc7120c8 677->679 681 7ff6bc713917-7ff6bc71391c call 7ff6bc7120c8 678->681 682 7ff6bc713921-7ff6bc713939 LoadResource 678->682 686 7ff6bc713a07-7ff6bc713a11 679->686 692 7ff6bc7139f6 681->692 682->681 685 7ff6bc71393b-7ff6bc713953 SizeofResource 682->685 688 7ff6bc71395f-7ff6bc713963 685->688 689 7ff6bc713955-7ff6bc71395a 685->689 693 7ff6bc713a1d-7ff6bc713a3b call 7ff6bc720b90 686->693 694 7ff6bc713a13-7ff6bc713a18 call 7ff6bc712078 686->694 690 7ff6bc713996-7ff6bc71399b 688->690 691 7ff6bc713965-7ff6bc713972 688->691 689->686 698 7ff6bc7139a0-7ff6bc7139a3 690->698 695 7ff6bc713978-7ff6bc713983 691->695 696 7ff6bc713a3d-7ff6bc713a47 call 7ff6bc713dac 691->696 699 7ff6bc7139f8-7ff6bc713a02 FreeLibrary 692->699 694->693 695->690 701 7ff6bc713985-7ff6bc713994 call 7ff6bc712090 695->701 710 7ff6bc713a50-7ff6bc713ac8 call 7ff6bc711db0 696->710 704 7ff6bc7139ac-7ff6bc7139ce MultiByteToWideChar 698->704 705 7ff6bc7139a5-7ff6bc7139aa 698->705 699->686 701->698 704->681 708 7ff6bc7139d4-7ff6bc7139f1 call 7ff6bc7136bc 704->708 705->699 708->692 714 7ff6bc713b46 710->714 715 7ff6bc713aca-7ff6bc713ad2 710->715 716 7ff6bc713b48-7ff6bc713b79 call 7ff6bc711d00 call 7ff6bc720b90 714->716 717 7ff6bc713af3-7ff6bc713b19 715->717 718 7ff6bc713ad4 715->718 717->716 724 7ff6bc713b1b-7ff6bc713b3f GetModuleFileNameW 717->724 720 7ff6bc713aeb-7ff6bc713af1 718->720 720->717 723 7ff6bc713ad6-7ff6bc713ae7 call 7ff6bc711ff0 720->723 723->720 727 7ff6bc713b7b-7ff6bc713b7d 724->727 728 7ff6bc713b41 call 7ff6bc7120c8 724->728 732 7ff6bc713b86-7ff6bc713b8d 727->732 733 7ff6bc713b7f-7ff6bc713b84 727->733 728->714 734 7ff6bc713b93-7ff6bc713b9b 732->734 733->716 735 7ff6bc713b9d-7ff6bc713bac 734->735 736 7ff6bc713bcf-7ff6bc713bdd 734->736 737 7ff6bc713bae-7ff6bc713bb4 735->737 738 7ff6bc713bc1-7ff6bc713bcd 735->738 739 7ff6bc713c0f-7ff6bc713c26 736->739 740 7ff6bc713bdf-7ff6bc713bf0 GetModuleHandleW 736->740 737->738 741 7ff6bc713bb6-7ff6bc713bb8 737->741 738->734 738->736 743 7ff6bc713c29-7ff6bc713c31 739->743 740->739 742 7ff6bc713bf2-7ff6bc713c0a EnterCriticalSection 740->742 741->738 744 7ff6bc713cb9-7ff6bc713cec call 7ff6bc711de0 LeaveCriticalSection 742->744 743->743 745 7ff6bc713c33-7ff6bc713c5c memcpy_s 743->745 744->716 751 7ff6bc713cf2-7ff6bc713d3a EnterCriticalSection call 7ff6bc711de0 LeaveCriticalSection 744->751 746 7ff6bc713c68 745->746 747 7ff6bc713c5e-7ff6bc713c63 745->747 750 7ff6bc713c6f-7ff6bc713c77 746->750 747->716 750->750 752 7ff6bc713c79-7ff6bc713c92 750->752 751->714 758 7ff6bc713d40-7ff6bc713d43 751->758 754 7ff6bc713c98-7ff6bc713cb2 EnterCriticalSection 752->754 755 7ff6bc713d85-7ff6bc713da0 call 7ff6bc720ea8 752->755 754->744 755->710 760 7ff6bc713d54-7ff6bc713d57 758->760 761 7ff6bc713d45-7ff6bc713d48 758->761 763 7ff6bc713d7b-7ff6bc713d80 760->763 764 7ff6bc713d59 760->764 762 7ff6bc713d4a-7ff6bc713d52 761->762 761->763 765 7ff6bc713d5e-7ff6bc713d76 call 7ff6bc71388c 762->765 763->716 764->765 765->714
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Library$ErrorFindFreeLastLoadResource
    • String ID: APPID$Module$Module_Raw$REGISTRY$fRt 1)
    • API String ID: 3418355812-1571938973
    • Opcode ID: 90801f9c52664019273394f5020d6b8e6cfbc601308a39d8e4dabb760c36f2cc
    • Instruction ID: 1fcce44c8786e55c55d367452fd5748353376b5d0fa942170bf3a51c54b9edc7
    • Opcode Fuzzy Hash: 90801f9c52664019273394f5020d6b8e6cfbc601308a39d8e4dabb760c36f2cc
    • Instruction Fuzzy Hash: 5CD1C522B18A9297EB108F2DE4602B9A7A4FB49B94F545235DB4EC7794EF3CD744C700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 823 7ff6bc71e884-7ff6bc71e8db FindResourceW 824 7ff6bc71e8fb-7ff6bc71e913 LoadResource 823->824 825 7ff6bc71e8dd-7ff6bc71e8f9 GetLastError 823->825 827 7ff6bc71e92f-7ff6bc71e931 824->827 828 7ff6bc71e915-7ff6bc71e92c GetLastError 824->828 825->824 826 7ff6bc71e95c-7ff6bc71e963 825->826 830 7ff6bc71e969-7ff6bc71e986 GlobalAlloc 826->830 831 7ff6bc71eb9a-7ff6bc71ebb9 826->831 827->826 829 7ff6bc71e933-7ff6bc71e957 SizeofResource LockResource 827->829 828->827 829->826 832 7ff6bc71e9a7 830->832 833 7ff6bc71e988-7ff6bc71e9a5 GetLastError 830->833 834 7ff6bc71e9ad-7ff6bc71e9af 832->834 833->834 835 7ff6bc71eb6a-7ff6bc71eb72 834->835 836 7ff6bc71e9b5-7ff6bc71e9ca GlobalLock 834->836 839 7ff6bc71eb81-7ff6bc71eb84 835->839 840 7ff6bc71eb74-7ff6bc71eb77 835->840 837 7ff6bc71e9cc-7ff6bc71e9e0 GetLastError 836->837 838 7ff6bc71e9e3-7ff6bc71e9e5 836->838 837->838 838->835 842 7ff6bc71e9eb-7ff6bc71ea18 memcpy CreateStreamOnHGlobal 838->842 839->831 841 7ff6bc71eb86-7ff6bc71eb91 839->841 840->839 841->831 843 7ff6bc71ea1a-7ff6bc71ea38 GlobalUnlock GlobalFree 842->843 844 7ff6bc71ea3d-7ff6bc71ea4e GlobalUnlock 842->844 843->835 845 7ff6bc71ea67-7ff6bc71ea69 844->845 846 7ff6bc71ea50-7ff6bc71ea64 GetLastError 844->846 845->835 847 7ff6bc71ea6f-7ff6bc71ea86 GdipAlloc 845->847 846->845 848 7ff6bc71ea88-7ff6bc71eaba GdipCreateBitmapFromStream 847->848 849 7ff6bc71eabc 847->849 850 7ff6bc71eabe-7ff6bc71eacb 848->850 849->850 850->835 851 7ff6bc71ead1-7ff6bc71eaf4 GdipCreateHBITMAPFromBitmap 850->851 852 7ff6bc71eaf6-7ff6bc71eaf9 851->852 853 7ff6bc71eafb 851->853 854 7ff6bc71eafd-7ff6bc71eaff 852->854 853->854 855 7ff6bc71eb0c-7ff6bc71eb0e 854->855 856 7ff6bc71eb01-7ff6bc71eb09 854->856 855->835 857 7ff6bc71eb10-7ff6bc71eb13 855->857 856->855 858 7ff6bc71eb1a-7ff6bc71eb35 GetObjectW 857->858 859 7ff6bc71eb15-7ff6bc71eb18 857->859 860 7ff6bc71eb37-7ff6bc71eb3a 858->860 861 7ff6bc71eb53-7ff6bc71eb67 GetLastError 858->861 859->835 859->858 862 7ff6bc71eb3c-7ff6bc71eb40 860->862 863 7ff6bc71eb44-7ff6bc71eb47 860->863 861->835 862->863 863->835 864 7ff6bc71eb49-7ff6bc71eb51 863->864 864->835
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ErrorGlobalLast$Resource$CreateGdip$AllocBitmapFromLockStreamUnlock$FindFreeLoadObjectSizeofmemcpy
    • String ID:
    • API String ID: 4269010864-0
    • Opcode ID: 34cc1bb78437ef507faa5e9d081eb9913bc9026a120fc61a3abe12c9706583ce
    • Instruction ID: 8602e290fb7fcde6534584da09aea1c007fd164e86fdff23eeeb5536f098e16f
    • Opcode Fuzzy Hash: 34cc1bb78437ef507faa5e9d081eb9913bc9026a120fc61a3abe12c9706583ce
    • Instruction Fuzzy Hash: 6F913B72608B5287EB504B2E9868679BBE5FF8AF91F058135DF4E87390DF3CE6058600
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: powf$ColorErrorLastLoadOpenProfileStringSystemTime_vsnwprintf
    • String ID: </cdm:Calibration></cdm:ColorDeviceModel>$<cal:AdapterGammaConfiguration><cal:ParameterizedCurves><wcs:RedTRC Gamma="%f" Gain="%f" Offset1="0.0"/><wcs:GreenT$%4d-%02d-%02dT%02d:%02d:%02d$<?xml version="1.0" encoding="utf-16"?><cdm:ColorDeviceModel%txmlns:cdm="http://schemas.microsoft.com/windows/2005/02/color/Colo$D65.camp$fRt 1)$strg$strg$strg
    • API String ID: 853045475-1474963839
    • Opcode ID: 30428f47329bbed1be8f2258951527f5bce59d329196f4d18e643bae5999475b
    • Instruction ID: ba8393fe51b595234e8a5cc60a63915280e8ea74e6b929cf717966a2c7bade4f
    • Opcode Fuzzy Hash: 30428f47329bbed1be8f2258951527f5bce59d329196f4d18e643bae5999475b
    • Instruction Fuzzy Hash: 11B1CD32A18B9686E701DF2DE4905AA7BA4FF4A784F404336EF4D97665DF38E641C700
    APIs
      • Part of subcall function 00007FF6BC712CA0: CharNextW.USER32(00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712CDF
      • Part of subcall function 00007FF6BC712CA0: CharNextW.USER32(00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712D15
      • Part of subcall function 00007FF6BC712CA0: CharNextW.USER32 ref: 00007FF6BC712DDB
    • lstrcmpiW.KERNEL32(?,00000000,00000001,00000000,00000000,?,00000000,?,?,?,?,00000000,?,?,00000000,00000000), ref: 00007FF6BC712584
    • CharNextW.USER32(?,00000000,?,?,?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000), ref: 00007FF6BC7125D1
    • CharNextW.USER32(?,00000000,?,?,?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000), ref: 00007FF6BC712694
    • CharNextW.USER32(?,00000000,?,?,?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000), ref: 00007FF6BC7126B6
    • RegSetValueExW.ADVAPI32(?,00000000,?,?,?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000), ref: 00007FF6BC712722
      • Part of subcall function 00007FF6BC712CA0: CharNextW.USER32 ref: 00007FF6BC712D35
      • Part of subcall function 00007FF6BC712CA0: CharNextW.USER32 ref: 00007FF6BC712D53
      • Part of subcall function 00007FF6BC712CA0: CharNextW.USER32 ref: 00007FF6BC712D68
      • Part of subcall function 00007FF6BC712CA0: CharNextW.USER32(00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712E05
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CharNext$Valuelstrcmpi
    • String ID: fRt 1)
    • API String ID: 4139903544-1967341498
    • Opcode ID: 0d9dc5bc92d5043922235264c6d298780074dfb5e9f2cb1316378155485a9d56
    • Instruction ID: a88c0e1cd2f3a677ec17dceef46565e997513a46ed76a4b27be5e9f9ae8fade3
    • Opcode Fuzzy Hash: 0d9dc5bc92d5043922235264c6d298780074dfb5e9f2cb1316378155485a9d56
    • Instruction Fuzzy Hash: 57C1D632A086A286EB609F2DD474279A7A1FB85BA1F804131EB5DC7BD4DF7CE645C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID: fRt 1)
    • API String ID: 4104442557-1967341498
    • Opcode ID: 65dc1b7222ee4bc63c0c8e5d9ed277b49e7a5b34b0b1713c0f847b39d273f1e5
    • Instruction ID: f70fe598cd8e9d42d20dcb0c2137fb01c7492288d93ab2d219a365d1b0941607
    • Opcode Fuzzy Hash: 65dc1b7222ee4bc63c0c8e5d9ed277b49e7a5b34b0b1713c0f847b39d273f1e5
    • Instruction Fuzzy Hash: 81112E26B04B458BEB10DF79E8642A833E4FB0A758F441A35EB6D8B754DF7CD6A48340
    APIs
    • GetProcessHeap.KERNEL32(?,?,?,00007FF6BC71F70F,?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F7F8
    • HeapAlloc.KERNEL32(?,?,?,00007FF6BC71F70F,?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F810
    • GetProcessHeap.KERNEL32(?,?,?,00007FF6BC71F70F,?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F82E
    • HeapFree.KERNEL32(?,?,?,00007FF6BC71F70F,?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F842
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Heap$Process$AllocFree
    • String ID:
    • API String ID: 756756679-0
    • Opcode ID: 299feaa0420b7858bdce015f6d0638767cce41464ea664b4bbc8ca619658b0b7
    • Instruction ID: 69ed173c95f281c871a73a0a9c165df2224c8caa57d013084193bbee45642ac4
    • Opcode Fuzzy Hash: 299feaa0420b7858bdce015f6d0638767cce41464ea664b4bbc8ca619658b0b7
    • Instruction Fuzzy Hash: E401E831605B45D7EB458B2AE810279BBE4FB4EB95F489138CE0D8B354EF39D990CB50
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ErrorFormatFreeLastLocalMessage
    • String ID:
    • API String ID: 1365068426-0
    • Opcode ID: 07a143f27d637a182613afe3872ed03f0372d4f24c26b0b94736ed47b6b82a84
    • Instruction ID: 85f6a1b906f781fed160433c79569ce22677296577d2b77ca5f73b3dc1e21fc1
    • Opcode Fuzzy Hash: 07a143f27d637a182613afe3872ed03f0372d4f24c26b0b94736ed47b6b82a84
    • Instruction Fuzzy Hash: 7A117072714B01CAEB108B25E4987BDB7E8FB5A751F514234CB5D8A340DF39DA54C750
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CreateInstance
    • String ID:
    • API String ID: 542301482-0
    • Opcode ID: ec3cbdc53d36a99e4103560137412fffa0eb78cc167c5e6028a12185ec617cc2
    • Instruction ID: 2b74fc6293b7762ffab0260aa8168907f8f5e8f841a751e6960e670cabc7a010
    • Opcode Fuzzy Hash: ec3cbdc53d36a99e4103560137412fffa0eb78cc167c5e6028a12185ec617cc2
    • Instruction Fuzzy Hash: 2101713A608A5683E7108F2DE460069B7B5FB84BC4B54C032DB4D87728DF3CD656C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: a76db6f9ecfeb1ddcb4407d13828a342284b2f33d4def26b4bb5199a2fa0a3d9
    • Instruction ID: c84c7cfcb64c82c418ccea073168b4286e8efb2c249850d435eda3bc4c78154e
    • Opcode Fuzzy Hash: a76db6f9ecfeb1ddcb4407d13828a342284b2f33d4def26b4bb5199a2fa0a3d9
    • Instruction Fuzzy Hash: DDB01220F65442C3D604BF26DCA506413E0BF9D300FC00430C20DCC124DE1CD39B8710

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 768 7ff6bc716390-7ff6bc7163b7 MonitorFromWindow 769 7ff6bc7163c9-7ff6bc7163d3 768->769 770 7ff6bc7163b9-7ff6bc717c9f LoadCursorW SetCursor ShowCursor 768->770 772 7ff6bc717caf-7ff6bc717cb3 770->772 773 7ff6bc717ca1-7ff6bc717caa 770->773 775 7ff6bc717cce-7ff6bc717ce4 772->775 776 7ff6bc717cb5-7ff6bc717ccc 772->776 774 7ff6bc717f4a-7ff6bc717f9b ShowCursor LoadCursorW SetCursor call 7ff6bc720b90 773->774 781 7ff6bc717ce8-7ff6bc717cee 775->781 776->775 776->781 781->774 782 7ff6bc717cf4-7ff6bc717d14 GetNumberOfPhysicalMonitorsFromHMONITOR 781->782 782->774 783 7ff6bc717d1a-7ff6bc717d27 782->783 783->774 784 7ff6bc717d2d-7ff6bc717d34 783->784 785 7ff6bc717d36-7ff6bc717d3d DeleteDC 784->785 786 7ff6bc717d42-7ff6bc717d77 EnumDisplayMonitors 784->786 785->786 786->774 787 7ff6bc717d7d-7ff6bc717d9b GetDeviceCaps 786->787 787->774 788 7ff6bc717da1-7ff6bc717dad call 7ff6bc717fa4 787->788 788->774 791 7ff6bc717db3-7ff6bc717dd1 GetPhysicalMonitorsFromHMONITOR 788->791 792 7ff6bc717deb-7ff6bc717df2 791->792 793 7ff6bc717dd3-7ff6bc717de9 791->793 794 7ff6bc717dff-7ff6bc717e01 792->794 793->794 794->774 796 7ff6bc717e07-7ff6bc717e13 call 7ff6bc717958 794->796 796->774 799 7ff6bc717e19-7ff6bc717e25 call 7ff6bc717b38 796->799 799->774 802 7ff6bc717e2b-7ff6bc717e35 799->802 803 7ff6bc717e37-7ff6bc717e46 DccwCreateDisplayProfileAssociationList 802->803 804 7ff6bc717e48-7ff6bc717e4a 802->804 803->804 804->774 805 7ff6bc717e50-7ff6bc717e69 DccwGetDisplayProfileAssociationList 804->805 805->774 806 7ff6bc717e6f-7ff6bc717e79 805->806 807 7ff6bc717e7b-7ff6bc717e8a DccwCreateDisplayProfileAssociationList 806->807 808 7ff6bc717e8c-7ff6bc717e8e 806->808 807->808 808->774 809 7ff6bc717e94-7ff6bc717eae DccwGetDisplayProfileAssociationList 808->809 809->774 810 7ff6bc717eb4-7ff6bc717ec0 call 7ff6bc718168 809->810 810->774 813 7ff6bc717ec6-7ff6bc717edd 810->813 813->774 815 7ff6bc717edf-7ff6bc717ef6 813->815 815->774 817 7ff6bc717ef8-7ff6bc717eff 815->817 818 7ff6bc717f18 817->818 819 7ff6bc717f01 817->819 821 7ff6bc717f1b-7ff6bc717f45 EventWrite 818->821 820 7ff6bc717f05-7ff6bc717f0c 819->820 820->820 822 7ff6bc717f0e-7ff6bc717f16 820->822 821->774 822->821
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Cursor$FromMonitors$DisplayLoadPhysicalShow$AssociationCapsCreateDccwDeleteDeviceEnumListMonitorNumberProfileWindow
    • String ID: fRt 1)
    • API String ID: 1515302180-1967341498
    • Opcode ID: d59255762fc596ecea68111d695f0a055db75ebb4911d35f6ece792140594a71
    • Instruction ID: 8b4476cf8bd1d8689b67aa6b41c83817b52b3c9d3bdbc9c8de91796baa086fb7
    • Opcode Fuzzy Hash: d59255762fc596ecea68111d695f0a055db75ebb4911d35f6ece792140594a71
    • Instruction Fuzzy Hash: 1EA15F31B08B5387EB148F6EA4A1179ABA8FB8AB90F445135DF4E87750DF3CE6568700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 865 7ff6bc7172b0-7ff6bc7172f6 call 7ff6bc71892c 868 7ff6bc717337-7ff6bc71733d 865->868 869 7ff6bc7172f8-7ff6bc717310 WcsCreateIccProfile 865->869 872 7ff6bc71733f-7ff6bc717356 GetColorProfileFromHandle 868->872 873 7ff6bc717384-7ff6bc717388 868->873 870 7ff6bc717329-7ff6bc71732b 869->870 871 7ff6bc717312-7ff6bc717326 GetLastError 869->871 870->868 874 7ff6bc71732d-7ff6bc717335 call 7ff6bc718ec4 870->874 871->870 872->873 875 7ff6bc717358-7ff6bc717367 GetLastError 872->875 876 7ff6bc71750d-7ff6bc717512 873->876 877 7ff6bc71738e-7ff6bc7173a6 call 7ff6bc7207ac 873->877 874->868 875->873 881 7ff6bc717369-7ff6bc71736b 875->881 879 7ff6bc717524-7ff6bc717527 876->879 880 7ff6bc717514-7ff6bc71751f CloseColorProfile 876->880 877->876 890 7ff6bc7173ac-7ff6bc7173c4 GetColorProfileFromHandle 877->890 884 7ff6bc717538-7ff6bc71755e call 7ff6bc720760 call 7ff6bc71fe5c 879->884 885 7ff6bc717529-7ff6bc717533 CloseColorProfile 879->885 880->879 886 7ff6bc717379-7ff6bc717381 881->886 887 7ff6bc71736d-7ff6bc717374 881->887 885->884 886->873 887->876 891 7ff6bc7173c6-7ff6bc7173da GetLastError 890->891 892 7ff6bc7173dd-7ff6bc7173df 890->892 891->892 892->876 894 7ff6bc7173e5-7ff6bc717422 CreateFileW 892->894 896 7ff6bc71743e-7ff6bc717440 894->896 897 7ff6bc717424-7ff6bc71743b GetLastError 894->897 899 7ff6bc717446-7ff6bc717468 WriteFile 896->899 900 7ff6bc7174f8-7ff6bc7174fc 896->900 897->896 902 7ff6bc717479-7ff6bc717490 GetLastError 899->902 903 7ff6bc71746a-7ff6bc717470 899->903 900->876 901 7ff6bc7174fe-7ff6bc717508 CloseHandle 900->901 901->876 905 7ff6bc717493-7ff6bc717495 902->905 904 7ff6bc717472-7ff6bc717477 903->904 903->905 904->905 905->900 906 7ff6bc717497-7ff6bc7174c2 CloseHandle InstallColorProfileW 905->906 907 7ff6bc7174de-7ff6bc7174e0 906->907 908 7ff6bc7174c4-7ff6bc7174db GetLastError 906->908 907->876 909 7ff6bc7174e2-7ff6bc7174f6 907->909 908->907 909->900
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ErrorLastProfile$Color$CloseHandle$CreateFileFrom$InstallSystemTimeWrite
    • String ID: strg
    • API String ID: 3772428985-3320446829
    • Opcode ID: 18ee14e70dc7c17f7d28d135e43027df69b2e4ad680ac93a5a5052a0c232d38c
    • Instruction ID: 942a016d9992b1da1baa1d1999bb2ef954662d8cb5d07975d580aeb5fdc4d955
    • Opcode Fuzzy Hash: 18ee14e70dc7c17f7d28d135e43027df69b2e4ad680ac93a5a5052a0c232d38c
    • Instruction Fuzzy Hash: 7C717132604A6287F7105F2D94243B9ABA5FF8ABA5F464231DF2EC7790DF3CD5458610
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ErrorLast$Window$Rect$Resource$GlobalInvalidateItemLockMovePoints$AllocChildDeleteDialogEnumFindLoadObjectSizeofWindowsmemcpy
    • String ID: fRt 1)
    • API String ID: 3272798517-1967341498
    • Opcode ID: 2c537e02b8859332e34ba3de272a0cd0033032187a92642127ef4a28d88d561b
    • Instruction ID: 516bb66ab24630cd06298976a39ef26f85bae5f01df8053cf7bf4bbf046362f6
    • Opcode Fuzzy Hash: 2c537e02b8859332e34ba3de272a0cd0033032187a92642127ef4a28d88d561b
    • Instruction Fuzzy Hash: 68815972B14A528BE710CF79E4546ADBBB4FB4AB88F408231DF0A97654CF38E645CB40
    APIs
    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF6BC717335), ref: 00007FF6BC718F8A
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF6BC717335), ref: 00007FF6BC718F9D
    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF6BC717335), ref: 00007FF6BC718FFB
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF6BC717335), ref: 00007FF6BC71900B
    • memset.MSVCRT ref: 00007FF6BC71909B
      • Part of subcall function 00007FF6BC720234: LoadStringW.USER32 ref: 00007FF6BC720274
    • memcpy.MSVCRT ref: 00007FF6BC7190C1
    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF6BC717335), ref: 00007FF6BC7190D0
    • SetColorProfileElementSize.MSCMS(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF6BC717335), ref: 00007FF6BC719178
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF6BC717335), ref: 00007FF6BC719188
    • SetColorProfileElement.MSCMS(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF6BC717335), ref: 00007FF6BC7191BC
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF6BC717335), ref: 00007FF6BC7191CC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ErrorLast$ByteCharColorElementMultiProfileWide$LoadSizeStringlstrlenmemcpymemset
    • String ID: csed$strg
    • API String ID: 658256186-994031623
    • Opcode ID: 74895fc5265322c011d18fc8d1ceb18fd9ce42abd742992fd9784cc63d00f51e
    • Instruction ID: fb9b766ec8072a1a221f431115dee349dd171cd42b206a1d5db400b6f827be71
    • Opcode Fuzzy Hash: 74895fc5265322c011d18fc8d1ceb18fd9ce42abd742992fd9784cc63d00f51e
    • Instruction Fuzzy Hash: 6491E432E04A628AE7109F2D98242B96BA4FB4ABE4F054234DF5ED7794DF3CD545C350
    APIs
      • Part of subcall function 00007FF6BC711DB0: InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,00007FF6BC71102E), ref: 00007FF6BC711DB4
    • GetModuleFileNameW.KERNEL32 ref: 00007FF6BC711932
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CriticalFileInitializeModuleNameSection
    • String ID: APPID$Module$Module_Raw$REGISTRY$fRt 1)
    • API String ID: 867279363-1571938973
    • Opcode ID: a0d5b1299a812fab3d06bc3ae251e4010f43a90b9c47b7608e2cbb004c1e17e1
    • Instruction ID: 68f43fcaaa1c603ff20319cc964a2fd8c87b54e2df8c1dacbce503f42cd3a94b
    • Opcode Fuzzy Hash: a0d5b1299a812fab3d06bc3ae251e4010f43a90b9c47b7608e2cbb004c1e17e1
    • Instruction Fuzzy Hash: EA81E522B28A9697EB108F2CE4602F9A7A4FF95758F405235DB4E8B794EF7CD244C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ErrorLast$DevicesDisplayEnumFreeFromInfoMonitorStringTask_wcsuprswscanf_swcsstr
    • String ID: %04d$fRt 1)$h
    • API String ID: 4201562086-345513037
    • Opcode ID: 209c7a5670a4b3daa481664d0a544e8291762fe8d2151f43cac6e2786236de3d
    • Instruction ID: 8b0fcee35750324728303fe0de5cae7ccb915671bbb0bd8940a3eb791fe63a17
    • Opcode Fuzzy Hash: 209c7a5670a4b3daa481664d0a544e8291762fe8d2151f43cac6e2786236de3d
    • Instruction Fuzzy Hash: A0419332704B96C6E7108F29E8A42B9BBA4FB89B94F814275DF4E87350DF38D605C710
    APIs
    • CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(00000002,?,?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000), ref: 00007FF6BC7122A5
    • CharNextW.USER32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC7122D9
    • CharNextW.USER32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712311
    • CharNextW.USER32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712340
    • wcsncpy_s.MSVCRT ref: 00007FF6BC71237F
    • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC7123BB
    • lstrcmpiW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC7123DF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CharNext$AllocCriticalEnterSectionTasklstrcmpiwcsncpy_s
    • String ID: fRt 1)
    • API String ID: 1163771381-1967341498
    • Opcode ID: 7dd8356095bd221745c62d516dae8cc70c03e980f949df3011462a31d4d8d254
    • Instruction ID: 15ef55ccb009666ef8d85cd79c0bedb70cc7867b450d93535e7c7c8d4812a439
    • Opcode Fuzzy Hash: 7dd8356095bd221745c62d516dae8cc70c03e980f949df3011462a31d4d8d254
    • Instruction Fuzzy Hash: 3081A072B08A5286EB648F5EE46027C67A4FB49B65F518235CF6EC77D0DE3CDA418300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$Move$Rect$Invalidate
    • String ID: VUUU$fRt 1)
    • API String ID: 1073283866-2126614922
    • Opcode ID: dc7ebb7c3b751ccec863f153c438df20f1d0b4bf0f6f0267bb1b78b73d031641
    • Instruction ID: 7c360d13d13fbd6673f12858fd4a48c6f0ae9c6226eab087dbb4f2f98530ca22
    • Opcode Fuzzy Hash: dc7ebb7c3b751ccec863f153c438df20f1d0b4bf0f6f0267bb1b78b73d031641
    • Instruction Fuzzy Hash: 8B51D2327146558BC750CF29E4589AABBA9FB89B94F058235EF4D83B14CF39E945CF00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ErrorLast$CalibrationColorDefaultManagementProfileState$ProfilesUser
    • String ID: rtnm
    • API String ID: 2534168751-2079796299
    • Opcode ID: b6672c1d9691e88341621d4b322fa2c6210088fb5cec0679313760fe48dfae33
    • Instruction ID: 93375ce21dc76a0d115ffe18f99b428ebe645f5b8fe32f0f3846679fd8cddfda
    • Opcode Fuzzy Hash: b6672c1d9691e88341621d4b322fa2c6210088fb5cec0679313760fe48dfae33
    • Instruction Fuzzy Hash: AC41AC71A08B628BF7105F7DA89013AABE8FB49B91F054275EF5986690DF3CE6408620
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$Rect$Points$Invalidate$Move
    • String ID: fRt 1)
    • API String ID: 2372563702-1967341498
    • Opcode ID: b5e42835b65b5714dee55272bbcddf71df76dded149d3ad740da8efdff0d8173
    • Instruction ID: 88071e501e2656f9f0a25def35d89d069bde880d7420663f3de9932d5ff414b3
    • Opcode Fuzzy Hash: b5e42835b65b5714dee55272bbcddf71df76dded149d3ad740da8efdff0d8173
    • Instruction Fuzzy Hash: 0761D332B156568AE755CF3AD8506ACBB60FB4AB84F448232DF4EA7710DF38E555CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$MoveRect$Points
    • String ID: fRt 1)
    • API String ID: 3814651327-1967341498
    • Opcode ID: 6de4dd33fd5e914a2d99448d9529bb0ccb490a421b64d3f9f903543980557cd2
    • Instruction ID: d0d3dc2beb0af3b552485e58d49b78a7eaadc96d85e58b42275483e864709031
    • Opcode Fuzzy Hash: 6de4dd33fd5e914a2d99448d9529bb0ccb490a421b64d3f9f903543980557cd2
    • Instruction Fuzzy Hash: BD61C332A146858BD7518F2AE450669BBA8FF8EB94F059335EE4DA7720DF38E544CF00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ColorErrorLastProfile$CloseDccwDefaultGamutOpenProfilesSizeUser
    • String ID: fRt 1)$rtnm
    • API String ID: 1332131993-2054933478
    • Opcode ID: 5c43d64f98effe6da1e2c8069a68113787f86015f51c19e9e0da06ec9c17c809
    • Instruction ID: a30d240497397831d474d9ef9f10a36c6a4f7f593ede5269abb023f52bb10801
    • Opcode Fuzzy Hash: 5c43d64f98effe6da1e2c8069a68113787f86015f51c19e9e0da06ec9c17c809
    • Instruction Fuzzy Hash: 39416332608B828BE7508F69A49426AFBE4FB89B90F504235DF8D97714DF7DD645CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: iswuppertowlower
    • String ID: {4D36E96E-E325-11CE-BFC1-08002BE10318}
    • API String ID: 2404469642-206008433
    • Opcode ID: 563ddadf80f7de0fbb6dbf25a669bed17193fc76f8038d0d5a2e51552778707c
    • Instruction ID: 48a6bc87152353609df494e4c46e5f8012d3eae7fa7c354bea98f6b82afa9fe6
    • Opcode Fuzzy Hash: 563ddadf80f7de0fbb6dbf25a669bed17193fc76f8038d0d5a2e51552778707c
    • Instruction Fuzzy Hash: C0315032D047A296EB509F2AA464039BFE0FB46B82B498135DF898B680DF3CD644D720
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: AddressProc$ErrorHandleLastLibraryLoadModule
    • String ID: API-MS-Win-Core-LocalRegistry-L1-1-0.dll$RegDeleteKeyExW$RegDeleteKeyW$advapi32.dll
    • API String ID: 856554993-2654589138
    • Opcode ID: c1bfc09b0fb2b6c5194e534f89997beb9cd58ed6d0cca4cbd513029e47de3b92
    • Instruction ID: 04f2c47d9f476a9db17d5871a8bade3105b64f5eddff230ff4ba6df2a76b7d6d
    • Opcode Fuzzy Hash: c1bfc09b0fb2b6c5194e534f89997beb9cd58ed6d0cca4cbd513029e47de3b92
    • Instruction Fuzzy Hash: B3211821A09B5682EF148F2DE4A4378A7A0FF4EF85F598435CB4E8A354DF3CE6448600
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Message$Send$Parent$PostTimer
    • String ID:
    • API String ID: 1672226202-0
    • Opcode ID: ca5a3957e2fdce0ee4560c8256c5fb09fe481c8488b61be5a40724cb0d1e8577
    • Instruction ID: 4230b24df95c9cc6984dd161cb3445c26c77f5e94e7dc3485045979cd4818676
    • Opcode Fuzzy Hash: ca5a3957e2fdce0ee4560c8256c5fb09fe481c8488b61be5a40724cb0d1e8577
    • Instruction Fuzzy Hash: 06614936704A99C3D7148F2AE8646BABB64F78AF85F458036CB5E87724CF38E145C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$Parent$DisplayEnumErrorLastLongMessageMonitorsPostReleaseShow
    • String ID:
    • API String ID: 459077176-0
    • Opcode ID: e46bbc2574ad347921db876fdcdf812524d8b3d323288188b84672f3afe7f0fb
    • Instruction ID: ebc26cc45f46049f56c3c15cdcd6fbd490fd56d2e102293a7eae00f420ccbf14
    • Opcode Fuzzy Hash: e46bbc2574ad347921db876fdcdf812524d8b3d323288188b84672f3afe7f0fb
    • Instruction Fuzzy Hash: 7D417122608B52C7E7049F5EA464179ABA0FB8EB65F488131DF6E87390DF3CE9458240
    APIs
      • Part of subcall function 00007FF6BC720610: iswupper.MSVCRT(?,00000001,?,00007FF6BC719269), ref: 00007FF6BC720652
      • Part of subcall function 00007FF6BC720610: towlower.MSVCRT(?,00007FF6BC719269), ref: 00007FF6BC720665
      • Part of subcall function 00007FF6BC720610: iswupper.MSVCRT(?,00007FF6BC719269), ref: 00007FF6BC720677
      • Part of subcall function 00007FF6BC720610: towlower.MSVCRT(?,00007FF6BC719269), ref: 00007FF6BC72068A
      • Part of subcall function 00007FF6BC720610: iswupper.MSVCRT(?,00007FF6BC719269), ref: 00007FF6BC7206C3
      • Part of subcall function 00007FF6BC720610: towlower.MSVCRT(?,00007FF6BC719269), ref: 00007FF6BC7206D6
      • Part of subcall function 00007FF6BC720610: iswupper.MSVCRT(?,00007FF6BC719269), ref: 00007FF6BC7206E8
      • Part of subcall function 00007FF6BC720610: towlower.MSVCRT(?,00007FF6BC719269), ref: 00007FF6BC7206FB
    • GetDisplayConfigBufferSizes.USER32 ref: 00007FF6BC719290
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: iswuppertowlower$BufferConfigDisplaySizes
    • String ID: T$fRt 1)
    • API String ID: 3551102313-1262330307
    • Opcode ID: 0d707571cffa7e7f14a53604cf7930673be2afe00d14126f899496c2402a5b65
    • Instruction ID: 80f8d0c91fa5d77d0d04a40036eb2fd7936ad12db4329cea100cf98653159149
    • Opcode Fuzzy Hash: 0d707571cffa7e7f14a53604cf7930673be2afe00d14126f899496c2402a5b65
    • Instruction Fuzzy Hash: 8A51C432A1968287EB218F2DE4547BAB7A0FB89794F404234DF5E87780DF3CE6468700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$Rect$Points$Move
    • String ID: VUUU$fRt 1)
    • API String ID: 1829183498-2126614922
    • Opcode ID: fecf5a2456b7f029a469970d7321628e87bbefcce9d7ec21ace3412258f14f29
    • Instruction ID: 4ec853fe6833fe87360606a5ff93a16b24672bdc6ef2dd79f4108faf742b9290
    • Opcode Fuzzy Hash: fecf5a2456b7f029a469970d7321628e87bbefcce9d7ec21ace3412258f14f29
    • Instruction Fuzzy Hash: 3E418E32714A85CBD7208F2DE8506A9BBA5F789B84F445131EB4D87B58CF38E644CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ErrorLast$ColorDeviceDisassociateFromProfile$ProfilesUser
    • String ID: rtnm
    • API String ID: 2382097621-2079796299
    • Opcode ID: c652882f58854bc14bdc5bc9bc34118772c24ee11bda7732498b04ac48ea0347
    • Instruction ID: 95471f8e6421807845cc754db33dac32ecd298998406a582ba0b28da16eaedb9
    • Opcode Fuzzy Hash: c652882f58854bc14bdc5bc9bc34118772c24ee11bda7732498b04ac48ea0347
    • Instruction Fuzzy Hash: 6E31E531A04B9287E7101B6EA454279BFE4FF89B90F558275DB6EC3390DF3CE9018220
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: DirectoryExecuteItemMessageSendShellSystem
    • String ID: CTTune.exe$fRt 1)$open
    • API String ID: 2938676387-192630430
    • Opcode ID: cb874b20edd749bce99f2c7ab0612aff82f4437cd797591c8e11be2d46af0fd0
    • Instruction ID: a9308dc8239b2566489c83b5b652e93dacde0b27d9deacec7816ad145702b039
    • Opcode Fuzzy Hash: cb874b20edd749bce99f2c7ab0612aff82f4437cd797591c8e11be2d46af0fd0
    • Instruction Fuzzy Hash: 67314F32718A9286E7609B2DE8643BA67A4FB89B44F805035DB5ECB754CF3CE649C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$CallCloseForegroundHandleIconMutexOpenProcRelease
    • String ID: dccw
    • API String ID: 1295780963-1595938506
    • Opcode ID: 03ffaee57d747bab8e01ba1dbbe1cbc3f2e85c525dba98c1716d424acc1d6664
    • Instruction ID: 506b28c4b589d56dbf0633dfe9c1e8660e477c2af9dc58c87662af46dff81f02
    • Opcode Fuzzy Hash: 03ffaee57d747bab8e01ba1dbbe1cbc3f2e85c525dba98c1716d424acc1d6664
    • Instruction Fuzzy Hash: 5121CC35918B42C7EB108F1AF865279BB64FB8AB95F589171DB8E87714CF3CD1448B00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Gdip$BrushCreateDeleteFill$Rectangle$FromGraphicsLineSolid
    • String ID:
    • API String ID: 1713370201-0
    • Opcode ID: 305c7895e1ae9107b0811e31dae8082fb42cd4769c84d7fec64c31bed545858e
    • Instruction ID: c827ffaf52f66447db07afeeb8ed02b6386e4e95046e339305010d9a441ce883
    • Opcode Fuzzy Hash: 305c7895e1ae9107b0811e31dae8082fb42cd4769c84d7fec64c31bed545858e
    • Instruction Fuzzy Hash: 06415C72604A41CBD724CF69E858BAC7BA9F78DB99F458235DF0A87B18CF38D5458B00
    APIs
    • GdipCreateFromHDC.GDIPLUS(?,?,?,?,?,?,?,00007FF6BC71A105), ref: 00007FF6BC71BC6D
    • GdipCreateSolidFill.GDIPLUS(?,?,?,?,?,?,?,00007FF6BC71A105), ref: 00007FF6BC71BC8A
    • GdipFillRectangleI.GDIPLUS(?,?,?,?,?,?,?,00007FF6BC71A105), ref: 00007FF6BC71BCC2
    • GdipCreateLineBrushI.GDIPLUS(?,?,?,?,?,?,?,00007FF6BC71A105), ref: 00007FF6BC71BD0B
    • GdipFillRectangleI.GDIPLUS(?,?,?,?,?,?,?,00007FF6BC71A105), ref: 00007FF6BC71BD4D
    • GdipDeleteBrush.GDIPLUS(?,?,?,?,?,?,?,00007FF6BC71A105), ref: 00007FF6BC71BD5C
    • GdipDeleteBrush.GDIPLUS(?,?,?,?,?,?,?,00007FF6BC71A105), ref: 00007FF6BC71BD6B
    • GdipDeleteGraphics.GDIPLUS(?,?,?,?,?,?,?,00007FF6BC71A105), ref: 00007FF6BC71BD7A
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Gdip$BrushCreateDeleteFill$Rectangle$FromGraphicsLineSolid
    • String ID:
    • API String ID: 1713370201-0
    • Opcode ID: 784bbbcdff2f6bdf5bea241e12e044093f5952970fb30e5de84a13180cb43276
    • Instruction ID: bc913517ba8f9051f43a0a36cc293673a666eb1c840efd9b6dc463d223b281c1
    • Opcode Fuzzy Hash: 784bbbcdff2f6bdf5bea241e12e044093f5952970fb30e5de84a13180cb43276
    • Instruction Fuzzy Hash: 05311A72A04A41DFD7248F69E8548ACBF78F74EB99B459265EE0A47B08CF38D545CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CharNext
    • String ID:
    • API String ID: 3213498283-0
    • Opcode ID: 93a3f1f8908d4afb299c742935aab6fdb0b643a7c6d025abd797d03cfcaa7e3f
    • Instruction ID: 05add7d5b5f04d9ce4d17b04d645643e90b6db01f470475ab27f78ba4b842f62
    • Opcode Fuzzy Hash: 93a3f1f8908d4afb299c742935aab6fdb0b643a7c6d025abd797d03cfcaa7e3f
    • Instruction Fuzzy Hash: 5B515036B19AA286EB248F1DD42417877A5FB59F82F448032DB4E87754EF3CDA568304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$Long$CallProc
    • String ID: 8
    • API String ID: 513923721-4194326291
    • Opcode ID: 354cf88fa4be489d31bfcd03446ff328b2f0db7b2f3e9e42136fd0cae314b07e
    • Instruction ID: a21b2e139fbe24dad51cf3ea1c72d7ffba979f764e8425cbfb8190d06646c8e0
    • Opcode Fuzzy Hash: 354cf88fa4be489d31bfcd03446ff328b2f0db7b2f3e9e42136fd0cae314b07e
    • Instruction Fuzzy Hash: 6C414832A04B50CAE7508F2AE85426C77B8F749F99F148235DE9D9BB58CF39CA52C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Message$FormatFreeLocal$EventWrite
    • String ID: strg$strg
    • API String ID: 3780319976-3117884289
    • Opcode ID: a04c8770deb543ec97a1be9886b5f51c88836da2e6f4a2ec76660b089775088a
    • Instruction ID: 63d880f5a9359ec6fd290d72a2a9ba2614cdd004273c919c5edfe9a2b74d04e6
    • Opcode Fuzzy Hash: a04c8770deb543ec97a1be9886b5f51c88836da2e6f4a2ec76660b089775088a
    • Instruction Fuzzy Hash: 47419D32B04B218AFB108B29E8A46AD77B4FB49784F445135EF4E97B58DF38D641C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ErrorLast$CalibrationCopyEventFileManagementStateWrite
    • String ID: fRt 1)
    • API String ID: 4173155175-1967341498
    • Opcode ID: 52c41e660492b1f9c46799f6bb78ce9a21a042d81271af6c1ca98465aee8dd0f
    • Instruction ID: 7ca4bcd68778a9f1e99a544028f8cbe1b27db1a9af560b04dd9f184306b990b9
    • Opcode Fuzzy Hash: 52c41e660492b1f9c46799f6bb78ce9a21a042d81271af6c1ca98465aee8dd0f
    • Instruction Fuzzy Hash: 96419F71B08B5286EB148B2DA5A027AB7A0FB8ABD4F404231DF5DC7794DF3DE2118B10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Close$EnumOpen
    • String ID: fRt 1)
    • API String ID: 138425441-1967341498
    • Opcode ID: fcc75acab5664485096b839409b67691493508688e218170a450ae212a980972
    • Instruction ID: ffdf93a50651caf41715214493920161961e3ccd9481cb4a60de48f621afb24a
    • Opcode Fuzzy Hash: fcc75acab5664485096b839409b67691493508688e218170a450ae212a980972
    • Instruction Fuzzy Hash: 30419132608B8686E7208F59F4A43BAB7B0FB8AB85F544131DB4D8AA54DF3CD644CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ColorDirectoryErrorLast
    • String ID: %s\%s$CalibratedDisplayProfile-%d-Temp.icc$CalibratedDisplayProfile-%d.icc$fRt 1)
    • API String ID: 3534830153-3332179164
    • Opcode ID: 295f6d6d43a81ea9da509c125966d27f02527dcff106f25ccd3350642bc93633
    • Instruction ID: 371fa6940a6b0bfe8a260f62c56c5d8ceeee1dc57a6d9b31395ee9e0e8aa93af
    • Opcode Fuzzy Hash: 295f6d6d43a81ea9da509c125966d27f02527dcff106f25ccd3350642bc93633
    • Instruction Fuzzy Hash: 31210C31714A8787EB519F29A8746F963A0FB86B48F845036DB4DCB199DE38D609C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: String$AllocCreateFreeInstanceStream
    • String ID: COLOR_MANAGEMENT_CALIBRATE_DISPLAY$mshelp://windows/?id=27a2764a-ad05-4a52-96f4-eac32ae3c9e1
    • API String ID: 148082582-1466657646
    • Opcode ID: e70f9497615a0087b04c6fcef08ffa40f79f47e2d7a3d8dd0d863143300300c5
    • Instruction ID: 418ec6cd725dcb07966d87c6d4abc35b7986847c9a43e3505dc766a890a04f2c
    • Opcode Fuzzy Hash: e70f9497615a0087b04c6fcef08ffa40f79f47e2d7a3d8dd0d863143300300c5
    • Instruction Fuzzy Hash: AF213D36718B46C7E7008F1AE894679B7A4FB89B90F918132DB1E87764CF79DA48C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ChildEnumWindows$LongWindow
    • String ID: IDD = %d: m_bIsRtl = %s$false$true
    • API String ID: 92254136-2899959848
    • Opcode ID: b92b9d19439ad2494f69601789a170c79adcb754724acc663b9636ddb8709558
    • Instruction ID: 2aefd388ac5bd7cc896b74696496ae637cca59e2e545cf9995ca269670722e58
    • Opcode Fuzzy Hash: b92b9d19439ad2494f69601789a170c79adcb754724acc663b9636ddb8709558
    • Instruction Fuzzy Hash: 7D215E31604A83C6EB008B2DE4603B87760FB46B59F485231DB6E8E395DF3CD64AC310
    APIs
    • LoadLibraryExA.KERNEL32(?,?,00000000,00007FF6BC71F975,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71FC19
      • Part of subcall function 00007FF6BC71F870: GetProcAddress.KERNEL32(?,?,00000000,00007FF6BC71FDD7,?,?,?,00007FF6BC71FAFF,?,?,?,00007FF6BC715229), ref: 00007FF6BC71F879
      • Part of subcall function 00007FF6BC71F870: EncodePointer.KERNEL32(?,?,00000000,00007FF6BC71FDD7,?,?,?,00007FF6BC71FAFF,?,?,?,00007FF6BC715229), ref: 00007FF6BC71F88D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: AddressEncodeLibraryLoadPointerProc
    • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
    • API String ID: 1836850294-1745123996
    • Opcode ID: a45addfb00c366bd3982274187ddfea4e8fe2f12e3c8fd08f6cdaebf70e9698f
    • Instruction ID: 9e2b84bb6fb8ccbf66af459f6273da09e166e56293fb59ebdfa69cd8299f9769
    • Opcode Fuzzy Hash: a45addfb00c366bd3982274187ddfea4e8fe2f12e3c8fd08f6cdaebf70e9698f
    • Instruction Fuzzy Hash: 01115E65E1D64A91FB45DB5ED8702F02790AF467A0F880032CF4DCA291AF3DEB89D380
    APIs
    • LoadLibraryExA.KERNEL32(?,?,00000000,00007FF6BC71F8EF,?,?,?,00007FF6BC7152B4), ref: 00007FF6BC71FB51
      • Part of subcall function 00007FF6BC71F870: GetProcAddress.KERNEL32(?,?,00000000,00007FF6BC71FDD7,?,?,?,00007FF6BC71FAFF,?,?,?,00007FF6BC715229), ref: 00007FF6BC71F879
      • Part of subcall function 00007FF6BC71F870: EncodePointer.KERNEL32(?,?,00000000,00007FF6BC71FDD7,?,?,?,00007FF6BC71FAFF,?,?,?,00007FF6BC715229), ref: 00007FF6BC71F88D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: AddressEncodeLibraryLoadPointerProc
    • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
    • API String ID: 1836850294-1745123996
    • Opcode ID: 5604a0a84585cc6c1c696b0629681a59622625ad6788879ae97d7f5805bf7934
    • Instruction ID: c13aad4beb6cba4d5f406e0a4a399e9e9a0a476bfe2627055342cfd6f30c648e
    • Opcode Fuzzy Hash: 5604a0a84585cc6c1c696b0629681a59622625ad6788879ae97d7f5805bf7934
    • Instruction Fuzzy Hash: 8F112165E1D65691FB51DB2ED8702F02791AF86750F884072CB4DDA291AF3CEB86C280
    APIs
    • LoadLibraryExA.KERNEL32(?,?,?,00007FF6BC71FAFF,?,?,?,00007FF6BC715229), ref: 00007FF6BC71FDA9
      • Part of subcall function 00007FF6BC71F870: GetProcAddress.KERNEL32(?,?,00000000,00007FF6BC71FDD7,?,?,?,00007FF6BC71FAFF,?,?,?,00007FF6BC715229), ref: 00007FF6BC71F879
      • Part of subcall function 00007FF6BC71F870: EncodePointer.KERNEL32(?,?,00000000,00007FF6BC71FDD7,?,?,?,00007FF6BC71FAFF,?,?,?,00007FF6BC715229), ref: 00007FF6BC71F88D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: AddressEncodeLibraryLoadPointerProc
    • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
    • API String ID: 1836850294-1745123996
    • Opcode ID: a97bc39d5e686c2ee0481e45ba44346645baee52c9adc324c3a2bc3c81a7301a
    • Instruction ID: 4f729db877aee829f0cb7a10d2b9792c52dd77065c1cc0a737a79a1cf8167eea
    • Opcode Fuzzy Hash: a97bc39d5e686c2ee0481e45ba44346645baee52c9adc324c3a2bc3c81a7301a
    • Instruction Fuzzy Hash: 6C117364E0D64691FB51DB2ED8702F02794AF4A750F880436CB4CDA291EF3DEB89C380
    APIs
    • LoadLibraryExA.KERNEL32(?,?,?,00007FF6BC71FA77,?,?,?,00007FF6BC7152AB), ref: 00007FF6BC71FCE1
      • Part of subcall function 00007FF6BC71F870: GetProcAddress.KERNEL32(?,?,00000000,00007FF6BC71FDD7,?,?,?,00007FF6BC71FAFF,?,?,?,00007FF6BC715229), ref: 00007FF6BC71F879
      • Part of subcall function 00007FF6BC71F870: EncodePointer.KERNEL32(?,?,00000000,00007FF6BC71FDD7,?,?,?,00007FF6BC71FAFF,?,?,?,00007FF6BC715229), ref: 00007FF6BC71F88D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: AddressEncodeLibraryLoadPointerProc
    • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
    • API String ID: 1836850294-1745123996
    • Opcode ID: 4433701769e2d4165ca05da55ae652ee0f368b50fa5700177a30dd84d6bf462a
    • Instruction ID: 85ee367bc43fe2efc968611752491f17840f80ee4315d94185ee3e919e632606
    • Opcode Fuzzy Hash: 4433701769e2d4165ca05da55ae652ee0f368b50fa5700177a30dd84d6bf462a
    • Instruction Fuzzy Hash: 11112465D1D65691FB41DB1DD8712F02791AF4A760F884032CB8DDA295DF3CEB85C680
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CaptureContextDebugEntryFunctionLookupOutputStringUnwindVirtual
    • String ID: Invalid parameter passed to C runtime function.$fRt 1)
    • API String ID: 711593133-1217894009
    • Opcode ID: 65f05955836b6ad00e5a0705551acb6f93f5cba8257d08c0eaa574472f830083
    • Instruction ID: 6aee746001feb6ec1f425a0bc9e5d03f9e170477f2ad562908415a8292abcd97
    • Opcode Fuzzy Hash: 65f05955836b6ad00e5a0705551acb6f93f5cba8257d08c0eaa574472f830083
    • Instruction Fuzzy Hash: 7711FE3661CF8592DA608B19F8A03ABB365FB89755F541135DB8D8AB94EF3CD284CF00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: DestroyPagePropertySheetfree
    • String ID:
    • API String ID: 75348250-0
    • Opcode ID: a501d7a06c700a00791920ad37270b21661e3087ce96e879347e952117b93a86
    • Instruction ID: bd6ed4a9c02e307f2936d2508c420296f46806d56c53ff8547dfaff21d42265e
    • Opcode Fuzzy Hash: a501d7a06c700a00791920ad37270b21661e3087ce96e879347e952117b93a86
    • Instruction Fuzzy Hash: F7516B32A09B9186EB448F29E4603B977A0FB89F99F188135DB5D8B799CF38D645C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$Parent$LongMessagePostShow
    • String ID:
    • API String ID: 3500748212-0
    • Opcode ID: bf41d0b00489db893d5f80c4116ba7e9a7d2d6becdd5d9d7274ca2ffb029caeb
    • Instruction ID: 7ec277cea020f41af066205726d5cfd306459b97e936f24d5c9173d2f8031bf7
    • Opcode Fuzzy Hash: bf41d0b00489db893d5f80c4116ba7e9a7d2d6becdd5d9d7274ca2ffb029caeb
    • Instruction Fuzzy Hash: 09217832608B82C7EB048B2EE46417DBBA0FB8AF84B448531DF5E87764CF38E9418700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Item
    • String ID:
    • API String ID: 3207170592-0
    • Opcode ID: 0d4906199eddd417610d9637573d8079676d96d169cddfe168b1fadfa14e4adc
    • Instruction ID: 3328e5b13ebd4d486e28555de638533de7ccab27f05213057ba17cc0ce6c1f01
    • Opcode Fuzzy Hash: 0d4906199eddd417610d9637573d8079676d96d169cddfe168b1fadfa14e4adc
    • Instruction Fuzzy Hash: 3F212E31905F81C2E7558F28E4542A8B7A5F78AFA9F198230CF5D4B788DF39D490C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: FromMonitorRect
    • String ID: Current display is 0x%08x$New rect (%d, %d, %d, %d) is on display 0x%08x$fRt 1)
    • API String ID: 2578442757-360643689
    • Opcode ID: c144f971c02ea4fcf4e3ab1791330c53da1d81cc1387930055153d6b87eb5a95
    • Instruction ID: 3f5666b29cbe4de10dd5f077717418b56f02c1c98e6487f73a55277325ad9ffa
    • Opcode Fuzzy Hash: c144f971c02ea4fcf4e3ab1791330c53da1d81cc1387930055153d6b87eb5a95
    • Instruction Fuzzy Hash: 1C512476B14A118BEB14CF2AD8646AD7774FB88B84B148536CF1D97B68CF38E545CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Rect$ChildDialogEnumInvalidateWindowWindows
    • String ID: fRt 1)
    • API String ID: 102734436-1967341498
    • Opcode ID: 67e608d1668fcd2e05b84ba607845e57a82d6db35225d93ffc45fa2c42f71712
    • Instruction ID: 4acd571070097060ecceebe235f7975a620d4ce53380c9e17b6d044b2cf5cc69
    • Opcode Fuzzy Hash: 67e608d1668fcd2e05b84ba607845e57a82d6db35225d93ffc45fa2c42f71712
    • Instruction Fuzzy Hash: F831A87261858287D7208F3DD4147A97BA0F799B48F488230DF8DCB648DF78E685CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
    • String ID: fRt 1)
    • API String ID: 140117192-1967341498
    • Opcode ID: c9b49c1ba67d949dc36895266a5f69cb5620672250b45e487ba1d0df3559b863
    • Instruction ID: 1f7443223863c8766cae8f8bc0aaeeea683acf41a6058bff5fca30c74d613ce9
    • Opcode Fuzzy Hash: c9b49c1ba67d949dc36895266a5f69cb5620672250b45e487ba1d0df3559b863
    • Instruction Fuzzy Hash: 3641BA35A09B4981EB508F1CF8A03A5B3A4FB8A754F945035DB9D8B7A4DF3DE654C700
    APIs
    Strings
    • SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\DCCW\Simulator, xrefs: 00007FF6BC71E365
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: QueryValue$CloseOpen
    • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\DCCW\Simulator
    • API String ID: 1586453840-1252446219
    • Opcode ID: e89b2486e9b9178f228b10d11138ba9c9377e09a9522b9f6059df1ba8fc37b53
    • Instruction ID: 334d515ee5f99130d33bfeab71af0843562d77326cff95367ab406137c3ca945
    • Opcode Fuzzy Hash: e89b2486e9b9178f228b10d11138ba9c9377e09a9522b9f6059df1ba8fc37b53
    • Instruction Fuzzy Hash: B0316932A14B519BE7508F69D8587BC77A4FB09798F404235EF1D86B54EF38D685C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$Rect$Points$Move
    • String ID: fRt 1)
    • API String ID: 1829183498-1967341498
    • Opcode ID: d853eb77c1993bc72c43a56b7ffb0fd35e61071e5af087d4e7a00167afceb475
    • Instruction ID: 5f58d159de64ba5c6903b3c4d1bb4fb44482e18f0bbdfd40a68dcbf67c607fa3
    • Opcode Fuzzy Hash: d853eb77c1993bc72c43a56b7ffb0fd35e61071e5af087d4e7a00167afceb475
    • Instruction Fuzzy Hash: 25214F716285968BDB548B3EE450669BBA0FB89B85F449130EF5E87B54DF3CEA04CF00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: TextWindow$ExtentLengthMovePoint32
    • String ID:
    • API String ID: 2192411186-0
    • Opcode ID: c1693cb014175f5d756a270371ebaa844625c5a66db525acb07682540776ffab
    • Instruction ID: 507ce0d042235e109d0239f1baaac85aa6ce9493ff3c38f27eee2b05d6e0869d
    • Opcode Fuzzy Hash: c1693cb014175f5d756a270371ebaa844625c5a66db525acb07682540776ffab
    • Instruction Fuzzy Hash: 3C213B36609A4187DB00CF2AA8145B9BBA1F78EFD5F484235EF9E8B795DF38D1058B40
    APIs
    • InterlockedPopEntrySList.KERNEL32(?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F71A
      • Part of subcall function 00007FF6BC71F7DC: GetProcessHeap.KERNEL32(?,?,?,00007FF6BC71F70F,?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F7F8
      • Part of subcall function 00007FF6BC71F7DC: HeapAlloc.KERNEL32(?,?,?,00007FF6BC71F70F,?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F810
      • Part of subcall function 00007FF6BC71F7DC: GetProcessHeap.KERNEL32(?,?,?,00007FF6BC71F70F,?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F82E
      • Part of subcall function 00007FF6BC71F7DC: HeapFree.KERNEL32(?,?,?,00007FF6BC71F70F,?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F842
    • VirtualAlloc.KERNEL32(?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F74D
    • InterlockedPopEntrySList.KERNEL32(?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F76E
    • VirtualFree.KERNEL32(?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F78D
    • InterlockedPushEntrySList.KERNEL32(?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F7AF
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Heap$EntryInterlockedList$AllocFreeProcessVirtual$Push
    • String ID:
    • API String ID: 2531268086-0
    • Opcode ID: d296f0fe4961c95ed08eb5d4380052970f27871fef40dc15be9dffc1221b50f0
    • Instruction ID: a5d4862b4f2a069197b14f7f1d59e797371cef3bb288214903ac658ef37ae7c0
    • Opcode Fuzzy Hash: d296f0fe4961c95ed08eb5d4380052970f27871fef40dc15be9dffc1221b50f0
    • Instruction Fuzzy Hash: EA214521A19B5686FA159B7EE420179A790FF8AF90F499135CB0ECB750DF3CE6408750
    APIs
    • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F922
    • HeapAlloc.KERNEL32(?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F93A
    • DecodePointer.KERNEL32(?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F962
    • GetProcessHeap.KERNEL32(?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F9A0
    • HeapFree.KERNEL32(?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F9B4
      • Part of subcall function 00007FF6BC71FC04: LoadLibraryExA.KERNEL32(?,?,00000000,00007FF6BC71F975,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71FC19
      • Part of subcall function 00007FF6BC71F6F4: InterlockedPopEntrySList.KERNEL32(?,?,?,00007FF6BC71F997,?,?,00000000,00007FF6BC715294), ref: 00007FF6BC71F71A
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Heap$Process$AllocDecodeEntryFreeInterlockedLibraryListLoadPointer
    • String ID:
    • API String ID: 1550753294-0
    • Opcode ID: db8cca7276de10053edb699f8cb4e8d03232566dfa5a8fe2afb51f2de96b0956
    • Instruction ID: 87ccaeaffe3bf6ffd616163328e9545fe72c3a1bc0db0d63deb0007accf10ab9
    • Opcode Fuzzy Hash: db8cca7276de10053edb699f8cb4e8d03232566dfa5a8fe2afb51f2de96b0956
    • Instruction Fuzzy Hash: 05113321A19B5797EB15AB6E9430178AFE5EF4AB41F098135CB0ECA350DF3CEA848750
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: free$CriticalSection$DeleteEnterLeave
    • String ID:
    • API String ID: 3880800478-0
    • Opcode ID: 45cd7fc0d88c7475b441ccf9348f0eec5900d0605fa82b777ce22087e7d42000
    • Instruction ID: 583fdc97cb8646d57a738233cb2e2ef754992f0b93c7bb051f57e576ec381b19
    • Opcode Fuzzy Hash: 45cd7fc0d88c7475b441ccf9348f0eec5900d0605fa82b777ce22087e7d42000
    • Instruction Fuzzy Hash: C4114F32614A92DBEB048F29D0A537CBB60FB4AF49F448130CB5E4A654CF3CD659C740
    APIs
    • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC71375E
    • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC71384C
      • Part of subcall function 00007FF6BC712E8C: lstrcmpiW.KERNEL32(?,?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?), ref: 00007FF6BC712F0E
      • Part of subcall function 00007FF6BC712E8C: lstrcmpiW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712F2F
      • Part of subcall function 00007FF6BC712E8C: lstrcmpiW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000,?,?,00000000,00000000,?,00007FF6BC7139F6), ref: 00007FF6BC712FB2
    • CharNextW.USER32(?,?,00000002,?,?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000), ref: 00007FF6BC713828
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: lstrcmpi$CharFreeNextTask
    • String ID: fRt 1)
    • API String ID: 1985931122-1967341498
    • Opcode ID: 2505f4c42a60053815f7288d65b686d317b6ada75733889c74faae781fe5974a
    • Instruction ID: a1f6db1c5978940ee873f497b3150131ae43696aa33b9d882e15fb33a06d6bf7
    • Opcode Fuzzy Hash: 2505f4c42a60053815f7288d65b686d317b6ada75733889c74faae781fe5974a
    • Instruction Fuzzy Hash: CC41A062F087A287FB205B1EA864679A7A4FB49B80F409031DF4D87B45DF3CEA41C310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ConfigDisplay$BufferDeviceInfoSizesmemset
    • String ID: $fRt 1)
    • API String ID: 4257415688-1663516329
    • Opcode ID: a3a2e229b9deeafa57497ce574d3fa45393e5bfdbfaa5e1f11468031fb68ff97
    • Instruction ID: 059b2bd757f8f31c9825875e32dea12d68b1220d5273b1eb853bc9d0753c8a02
    • Opcode Fuzzy Hash: a3a2e229b9deeafa57497ce574d3fa45393e5bfdbfaa5e1f11468031fb68ff97
    • Instruction Fuzzy Hash: 98214B32708B9686EB209B2DE46036AB7E4FB88744F504136EB9DC3655DF7CEA058B40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ChildEnumWindowWindows$ItemLongText
    • String ID: fRt 1)$strg
    • API String ID: 2822888986-3294959808
    • Opcode ID: 852a61d4e620c2b1a17f04eafa77e09c3eb1f4200b5a6c68634e2b02e2252a0a
    • Instruction ID: 4812e1de641318e58eb539e72d614603c5f62a2e6d86ec9dd38b561aad4c5896
    • Opcode Fuzzy Hash: 852a61d4e620c2b1a17f04eafa77e09c3eb1f4200b5a6c68634e2b02e2252a0a
    • Instruction Fuzzy Hash: C2212532B14A568AEB00CF6AE8501AC77B5FB49B88F444139DF1C97B08CF38E651CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: EventMessageWrite
    • String ID: fRt 1)$strg
    • API String ID: 2344367845-3294959808
    • Opcode ID: f7f4fc336de24d43ba5f6c6d845824287026bcdd3a9ef2e8057735fe543ca7ba
    • Instruction ID: f75d6739945306b4613633aa3cb1e8590b56798230678a0adc0d30dd07a1cae6
    • Opcode Fuzzy Hash: f7f4fc336de24d43ba5f6c6d845824287026bcdd3a9ef2e8057735fe543ca7ba
    • Instruction Fuzzy Hash: F2217431618A5582EA108F1DF46416ABBB0FB89B94F444231EBAD8B7A4DF3CD2418B40
    APIs
    Strings
    • SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\DCCW\Simulator, xrefs: 00007FF6BC71E470
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CloseOpenValue
    • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\DCCW\Simulator
    • API String ID: 779948276-1252446219
    • Opcode ID: b5da6085f2d64a0a0ada41293d81bd7aca40904baa9a4b265a8a6e988cc5638b
    • Instruction ID: 458b3550be9728f6d97973711d6712f8d79714c628ee5f1066107d0e432eb839
    • Opcode Fuzzy Hash: b5da6085f2d64a0a0ada41293d81bd7aca40904baa9a4b265a8a6e988cc5638b
    • Instruction Fuzzy Hash: 8111B232714B9086D7008B1AF854729B7A8FB49BD0F554131EFAC87714DF79D944C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Item$RectWindow
    • String ID: fRt 1)
    • API String ID: 3676387299-1967341498
    • Opcode ID: b2514bd4a331ad49d821909f22d79921733673efac123469af8e30cfc6b050bc
    • Instruction ID: 7ddb9e9144bff871e1e2254537f5555a57dd2a1e05f4d6b2ab8f50c084efe318
    • Opcode Fuzzy Hash: b2514bd4a331ad49d821909f22d79921733673efac123469af8e30cfc6b050bc
    • Instruction Fuzzy Hash: 5D113371609B82D7EA548B1DE46026DBBA0FF89B64F044634DBAD87794DF3CE5618B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CreateInfoMonitor
    • String ID: fRt 1)$h
    • API String ID: 3263162237-1528038527
    • Opcode ID: 6ba843ee36406657eaea8e5f0b9d036495acd5a989d86a4cceeda31b6847bf78
    • Instruction ID: 163e460da213081f43eb0413abc3f682f63e251e93417a63b0af0aa23ce90a6a
    • Opcode Fuzzy Hash: 6ba843ee36406657eaea8e5f0b9d036495acd5a989d86a4cceeda31b6847bf78
    • Instruction Fuzzy Hash: A8011A23608B8587EA609F19F5613AAB7A4FB9A784F855135CB8D86A14CF3CD258CA00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: memcpy_s
    • String ID:
    • API String ID: 1502251526-0
    • Opcode ID: 984e15d3f6d58c3db374fb7819415dd98e0202ca8e3c7aa63692510e6444bbc9
    • Instruction ID: d93cc295562198ac634bbec9cf4daac9cf07e63cdc2a2963a3fb6fdb8477893f
    • Opcode Fuzzy Hash: 984e15d3f6d58c3db374fb7819415dd98e0202ca8e3c7aa63692510e6444bbc9
    • Instruction Fuzzy Hash: 9351F225A19B5287EE249F1EE464279A7A4EF4ABD0F184534EF5DCBB95CF3CE6408300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CriticalSection$CurrentEnterLeaveLongThreadWindow
    • String ID:
    • API String ID: 3550545212-0
    • Opcode ID: 66c63f4ec5f38d52d2f1e18288e5d3978d2b9e7677e0354247e7a029493c451f
    • Instruction ID: 4b9c2789a30a6a6907563993193f1be5aeab79f46b3b00437925240be87e02f3
    • Opcode Fuzzy Hash: 66c63f4ec5f38d52d2f1e18288e5d3978d2b9e7677e0354247e7a029493c451f
    • Instruction Fuzzy Hash: 1C316D31A18B5686EA149F2EA860178B7A4FB8AFC0F594035CF5D87794DE3CE642C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$ChildEnumLongStringWindows$AllocCreateFreeInstanceParentShowStream
    • String ID:
    • API String ID: 4193537704-0
    • Opcode ID: fcbdc9ca71afc6ad04da2f95da1fe6c578162f14402b1af35b5d41485b905bb9
    • Instruction ID: 136a7f7d30b0b0018eb867c4d414fceaa949814f07ddc4eda9b61200751d77e3
    • Opcode Fuzzy Hash: fcbdc9ca71afc6ad04da2f95da1fe6c578162f14402b1af35b5d41485b905bb9
    • Instruction Fuzzy Hash: 7B41C336A08791CAF6108F1EA4146BD77A4FB4AB94F558130DF59C7794DF38EA42CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: MessageSend$Timer
    • String ID:
    • API String ID: 3847069531-0
    • Opcode ID: 952d937b3b9c5cfe163483b8612ff935b941efc20580cbab3a38b28a3273c66c
    • Instruction ID: d6fdf68dc4e9f2725206de5b23bfdbff07e809cdded24d2c8cffabd877ea493e
    • Opcode Fuzzy Hash: 952d937b3b9c5cfe163483b8612ff935b941efc20580cbab3a38b28a3273c66c
    • Instruction Fuzzy Hash: 6731613670469587D700CF2EE8546BABBA0E78AF95F454035DF4D8B758CE38D941CB10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: MessageSendWindow$CallDestroyProc
    • String ID:
    • API String ID: 3326080945-0
    • Opcode ID: 1200654fa35afaf75797bd83765577c863e3610782fb01ed2173d0674c359eba
    • Instruction ID: a7f7fef49ee2e51fd4496cbcf30cea839dd932098d40c44b00b224955e3cf430
    • Opcode Fuzzy Hash: 1200654fa35afaf75797bd83765577c863e3610782fb01ed2173d0674c359eba
    • Instruction Fuzzy Hash: 92319232B18B528AEB648F59E06067AB7A4F785B80F154031DF4E47B50DF79E9418B40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: AssociationDccwDisplayListProfileRelease$DeleteDestroyMonitorsPhysical
    • String ID:
    • API String ID: 896183022-0
    • Opcode ID: 760934e03d699396dfe7a0f670bcc6449b8ebf4b5bf17b6e0d1801f9eb0fee6e
    • Instruction ID: 6aed045b719b4e0fb2f81848eb0a602acc5681b439336ddd434f2832700ebf70
    • Opcode Fuzzy Hash: 760934e03d699396dfe7a0f670bcc6449b8ebf4b5bf17b6e0d1801f9eb0fee6e
    • Instruction Fuzzy Hash: 7941E632514B9185E750CF28E8502EC77A9FB49F88F588136DF898BB88CF348656C760
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ColorItemLongModeObjectStockTextWindow
    • String ID:
    • API String ID: 3442870416-0
    • Opcode ID: 1f8d087893418f67aa9a7923c0f3dba43f6769cae607a8512cf14a9126b06e51
    • Instruction ID: 654c9b734aac6db96fd9d9f3cf61efc8eb4fcd31a72801f1ff09167760c6760d
    • Opcode Fuzzy Hash: 1f8d087893418f67aa9a7923c0f3dba43f6769cae607a8512cf14a9126b06e51
    • Instruction Fuzzy Hash: B4218631608791CAE7608F1AA41076ABBA5FB85BA5F448130DF8987794CF3CD6418B00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Message$ItemParentPostSend
    • String ID:
    • API String ID: 3857695281-0
    • Opcode ID: f732d57b81738436f8381d25c53ea4e0c620ded6d1b2c46fc134829a262a17e3
    • Instruction ID: ff34d561811a104dc043aee20ac35857fa15247896f813fb5a75c113d85916cf
    • Opcode Fuzzy Hash: f732d57b81738436f8381d25c53ea4e0c620ded6d1b2c46fc134829a262a17e3
    • Instruction Fuzzy Hash: 4C117C32708A86D7E7448B2AE4657B9BB60FB8AF89F548035CF5E87750CF38D5918740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
    • String ID:
    • API String ID: 140117192-0
    • Opcode ID: 5e200e1c01bc124c9eb2180146da26f8c608149072e225a40b8ebdcc3de3a973
    • Instruction ID: 67825dea8be035377b28785a75d92abd89e05e4cbe5ba6928afd649fb8b89db8
    • Opcode Fuzzy Hash: 5e200e1c01bc124c9eb2180146da26f8c608149072e225a40b8ebdcc3de3a973
    • Instruction Fuzzy Hash: 4421B935A09B4986E7108F18F8A07A9B3B4FB86754F541035DB9D8B764DF7DE294CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: free$ClassCriticalDeleteSectionUnregister
    • String ID:
    • API String ID: 46291987-0
    • Opcode ID: 8b446e1c58f0a2a6c8cb766c3dfc84a308263afb6678daee419b153277a9abc1
    • Instruction ID: 0e38250e35e15ebcdf01ce350cb2b33ffba95712649e2de7cdbe98bf186c054f
    • Opcode Fuzzy Hash: 8b446e1c58f0a2a6c8cb766c3dfc84a308263afb6678daee419b153277a9abc1
    • Instruction Fuzzy Hash: 6111FE31A19A468BE7008B1AE4A43747760FF57766F481134C76ECE2A4DF7DA6448700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Heap$DecodeEntryFreeInterlockedListPointerProcessPush
    • String ID:
    • API String ID: 815838099-0
    • Opcode ID: ef3aa70d54d759817c3593ffa80fcac5a0a57ce52dda818df6f546d7609f0b82
    • Instruction ID: e000c1128a19fae7a8f78c7d3285ad1d9abd576ffb8d21afcb1c2a0a87578647
    • Opcode Fuzzy Hash: ef3aa70d54d759817c3593ffa80fcac5a0a57ce52dda818df6f546d7609f0b82
    • Instruction Fuzzy Hash: FA011261909546C7FB159B6ED834178A7A1FF8AB41F188031CB0EC92A0CF3CEA81C640
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: MessageParent$PostSend
    • String ID:
    • API String ID: 2241083247-0
    • Opcode ID: 7bea99c9abf0adcca23cf8905648386d8a1d22ce1bad1a89d8c639bf77f946db
    • Instruction ID: e34aa8a6e2912c1d6c95e4b7562d1509a24fea1639686636e3869209e46edaf8
    • Opcode Fuzzy Hash: 7bea99c9abf0adcca23cf8905648386d8a1d22ce1bad1a89d8c639bf77f946db
    • Instruction Fuzzy Hash: C5F0FE71615945DBE7005B55E825678AF60FB9FF49F499130DF4E87710CF3C85868B40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: MessageParent$PostSend
    • String ID:
    • API String ID: 2241083247-0
    • Opcode ID: 24c5a789098b731075dc03a80d2238898d2c43ad0da075f53a215b9c85bb989d
    • Instruction ID: 4472b6bdc8b02476bb0aeff89ffcf9dbed2303128b34927ef237171f96eed690
    • Opcode Fuzzy Hash: 24c5a789098b731075dc03a80d2238898d2c43ad0da075f53a215b9c85bb989d
    • Instruction Fuzzy Hash: 51F0FE71615945DBE7005B55E824678AF64FB9FF49F499130DF4E87710CF3C85868B40
    APIs
    • CoTaskMemRealloc.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,?,?,00007FF6BC712306,?,?,00000000,?,?,00000000,00000000,00007FF6BC713804,?,00000000), ref: 00007FF6BC712164
    • memcpy_s.MSVCRT ref: 00007FF6BC7121A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: ReallocTaskmemcpy_s
    • String ID: fRt 1)
    • API String ID: 2795195975-1967341498
    • Opcode ID: 728fb521fc1f2e8d419dfdd8d9b6aa8224949cfc1aac56b6021d205d8cc08c93
    • Instruction ID: 97921a265236c9bc952f4b167d57765f01cf8c61aab475d0efbff9dc39c98abd
    • Opcode Fuzzy Hash: 728fb521fc1f2e8d419dfdd8d9b6aa8224949cfc1aac56b6021d205d8cc08c93
    • Instruction Fuzzy Hash: 0941B322B0465297EB14CF5DD9A027C63A0EB49BA5F14853ADF1DC7795DE38EAA18300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: EventWrite
    • String ID: fRt 1)$strg
    • API String ID: 2971232827-3294959808
    • Opcode ID: 924c9954dad6284f97d1bf93618481a05af1498efd2aea678fde0d9f41d0004f
    • Instruction ID: f549d40074444e71a2192cf1c98c04ce3a7356f9242920ca10bcc858b651f319
    • Opcode Fuzzy Hash: 924c9954dad6284f97d1bf93618481a05af1498efd2aea678fde0d9f41d0004f
    • Instruction Fuzzy Hash: F0611836604F8599EB60CF29E8903EA37A4F748B48F541136CB9C8B7A8DF39D245CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: EventWrite
    • String ID: fRt 1)$strg
    • API String ID: 2971232827-3294959808
    • Opcode ID: 0abfb52bc590658364f266ec1905afc0d88fc6d4dc44940ff25638c491dda9d1
    • Instruction ID: a6d6a3c31237afa74abe3356be3a5de089673142800f9a9a51872a8cad1142e1
    • Opcode Fuzzy Hash: 0abfb52bc590658364f266ec1905afc0d88fc6d4dc44940ff25638c491dda9d1
    • Instruction Fuzzy Hash: 0C514E36604F8589EB20CF29E8543EA37A4FB48B98F540236DB5C8B798DF39D645CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: EventWrite
    • String ID: fRt 1)$strg
    • API String ID: 2971232827-3294959808
    • Opcode ID: 7712e33f6c9ecaca0f6b512fcdd7c5736550fe698e494bdd79443ce4307c1f61
    • Instruction ID: 7872bff2a9ef62778b4a25a5df9a6846b60f1c8fda6d13b5edfd6afcfc140978
    • Opcode Fuzzy Hash: 7712e33f6c9ecaca0f6b512fcdd7c5736550fe698e494bdd79443ce4307c1f61
    • Instruction Fuzzy Hash: D031F772B04B1699EB00CB69D8602AD77B4BB58B98F540236CF2D977A8DF38D245C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: EventWrite
    • String ID: fRt 1)$strg
    • API String ID: 2971232827-3294959808
    • Opcode ID: 059b31899c832e4a1c3ca13a35e82460b859c697ea3d3eff519d509b95b48207
    • Instruction ID: c1f3a8f6214cf71405172ccbc3fc94ea76ead9281433b52876b9f1aa9d437f0e
    • Opcode Fuzzy Hash: 059b31899c832e4a1c3ca13a35e82460b859c697ea3d3eff519d509b95b48207
    • Instruction Fuzzy Hash: D111A731A18A4686EA60CB1DE461169B770FB99764F400232DBADC77A4DF3DD301CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: Window$PointsRect
    • String ID: fRt 1)
    • API String ID: 83551929-1967341498
    • Opcode ID: d23c44b5e9fd1836d14184b6333dc7a258be3239e40f8e806cb5aa9db7607f54
    • Instruction ID: 22ff7d18b414df184e2ab4879ec4d1417d07c6423162cd8bdae3ee51abb7d174
    • Opcode Fuzzy Hash: d23c44b5e9fd1836d14184b6333dc7a258be3239e40f8e806cb5aa9db7607f54
    • Instruction Fuzzy Hash: 38017572A18A8687EB608F29D8217B977A0FB49B49F049531DF4E8A354EF3CD644CB10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: DeviceGammaRamp
    • String ID: fRt 1)
    • API String ID: 982816047-1967341498
    • Opcode ID: b60c0378e74a21a047e839b6486dc3643ce2f72ff769aecc7d321cc621edc6a2
    • Instruction ID: b00f4efcfd72a9c869769d12e3a899e9099541435a7f08cf1efa52d98c689237
    • Opcode Fuzzy Hash: b60c0378e74a21a047e839b6486dc3643ce2f72ff769aecc7d321cc621edc6a2
    • Instruction Fuzzy Hash: A1016232714A8586EB608F29E4213AAB7A1FBCDB84F844131CB4D8B654DF3DD615CB44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1514843063.00007FF6BC711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BC710000, based on PE: true
    • Associated: 00000000.00000002.1514821011.00007FF6BC710000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514870707.00007FF6BC722000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514888762.00007FF6BC729000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1514905406.00007FF6BC72A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bc710000_eVirFdGeXm.jbxd
    Similarity
    • API ID: CriticalSectionfree$EnterLeave
    • String ID:
    • API String ID: 2088343094-0
    • Opcode ID: e68614f39c478d410cc6f70b69c0e32401fcef85c15813319dc20719b095f813
    • Instruction ID: bfd0ce8c97b72b71ddfd9da0900c1bd9beec78406ba01b0f50ee991ba79d9415
    • Opcode Fuzzy Hash: e68614f39c478d410cc6f70b69c0e32401fcef85c15813319dc20719b095f813
    • Instruction Fuzzy Hash: 4F214A32A14A5187EB048F69E0A037DA7A0FF89F88F458131DB5E9B755CF38D9518740