Windows Analysis Report
SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe

Overview

General Information

Sample name: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe
Analysis ID: 1543328
MD5: c7fb8710586c0af80155f2b048c0cfee
SHA1: 4d7e5fa6705ccf2acd88199a2ebf9f796bd97ceb
SHA256: 4158c1e717c6adf267b9dc1b6ecf790f593e83bb7c7a45c61407c077ec5efb95
Tags: exe
Infos:

Detection

Score: 64
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to query CPU information (cpuid)
Detected potential crypto function
OS version to string mapping found (often used in BOTs)
One or more processes crash
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Avira: detected
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe ReversingLabs: Detection: 31%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Joe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Amcache.hve.4.dr String found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe String found in binary or memory: http://www.clamav.net
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_004630AD 0_2_004630AD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_0044E26D 0_2_0044E26D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_00411277 0_2_00411277
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_0044C3CF 0_2_0044C3CF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_004574D0 0_2_004574D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_004604A5 0_2_004604A5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_004444AB 0_2_004444AB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_0044E641 0_2_0044E641
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_0045A782 0_2_0045A782
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_004609E7 0_2_004609E7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_004629ED 0_2_004629ED
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_0044EA4D 0_2_0044EA4D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_00408A5C 0_2_00408A5C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_00458A3B 0_2_00458A3B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_00411B24 0_2_00411B24
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_00444B8F 0_2_00444B8F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_00440D18 0_2_00440D18
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_0044DDD8 0_2_0044DDD8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_00429E57 0_2_00429E57
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_0044EE6D 0_2_0044EE6D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_00435E70 0_2_00435E70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_0045FF63 0_2_0045FF63
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_00455F3A 0_2_00455F3A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7068 -s 232
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Static PE information: No import functions for PE file found
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engine Classification label: mal64.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7068
Source: C:\Windows\SysWOW64\WerFault.exe File created: C:\ProgramData\Microsoft\Windows\WER\Temp\491d9910-4255-4407-9a3c-636144736531 Jump to behavior
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe ReversingLabs: Detection: 31%
Source: unknown Process created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7068 -s 232
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_00454141 push ecx; ret 0_2_00454154
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: Amcache.hve.4.dr Binary or memory string: VMware
Source: Amcache.hve.4.dr Binary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.dr Binary or memory string: vmci.syshbin
Source: Amcache.hve.4.dr Binary or memory string: VMware, Inc.
Source: Amcache.hve.4.dr Binary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.dr Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.dr Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.dr Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.dr Binary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.4.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.dr Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.dr Binary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.dr Binary or memory string: vmci.sys
Source: Amcache.hve.4.dr Binary or memory string: vmci.syshbin`
Source: Amcache.hve.4.dr Binary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.dr Binary or memory string: VMware20,1
Source: Amcache.hve.4.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.dr Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.dr Binary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.dr Binary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.dr Binary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.dr Binary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_0045282D LdrInitializeThunk, 0_2_0045282D
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Binary or memory string: #includeRun Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the fileUnterminated string#notrayicon#requireadmin#include-onceCannot parse #include#comments-start#csUnterminated group of comments#comments-end#ce>>>AUTOIT SCRIPT<<<Ue@ASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALT0409000208090710050EASC 0%dupdownonoff0%duser32.dllSendInputShell_TrayWndVirtualAllocExVirtualFreeExExitScript Pausedblankinfoquestionstopwarning
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Binary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Code function: 0_2_0045FC94 cpuid 0_2_0045FC94
Source: Amcache.hve.4.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.dr Binary or memory string: msmpeng.exe
Source: Amcache.hve.4.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.dr Binary or memory string: MsMpEng.exe
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Binary or memory string: WIN_XP
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Binary or memory string: WIN_VISTA
Source: SecuriteInfo.com.Trojan.Siggen29.34516.28390.4482.exe Binary or memory string: %.2d%.3dProgramFilesDirSOFTWARE\Microsoft\Windows\CurrentVersionCommonFilesDirPersonalSOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon AppDataCommon DesktopDesktopCommon DocumentsCommon FavoritesFavoritesCommon ProgramsProgramsCommon Start MenuStart MenuCommon StartupStartupAppDataX86IA64X64UNKN%dWIN32_NTWIN32_WINDOWSWIN_LONGHORNWIN_VISTAWIN_2003WIN_XPWIN_2000WIN_NT4WIN_95WIN_98WIN_MEInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\Language.DEFAULT\Control Panel\Desktop\ResourceLocale3, 2, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINnulbyteubyteshortshort_ptrushortdwordudwordintlongint_ptruintlong_ptrptrstrstringwstrwstringhwndfloatidispatchidispatch_ptr:cdeclwinapistdcallnonecharwcharint64uint64double;Advapi32.dllCreateProcessWithLogonW64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_BINARY+.-.+-diouxXeEfgGsISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINEGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEmsctls_statusbar321tooltips_class32MonitorFromPointSetLayeredWindowAttributesGetMonitorInfoWAutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DROPID@GUI_DRAGID@GUI_DRAGFILECOMBOBOXEDIT
No contacted IP infos