Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AutoClicker-3.0.exe

Overview

General Information

Sample name:AutoClicker-3.0.exe
Analysis ID:1558831
MD5:7ecfc8cd7455dd9998f7dad88f2a8a9d
SHA1:1751d9389adb1e7187afa4938a3559e58739dce6
SHA256:2e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to detect sleep reduction / modifications
Found stalling execution ending in API Sleep call
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • AutoClicker-3.0.exe (PID: 6596 cmdline: "C:\Users\user\Desktop\AutoClicker-3.0.exe" MD5: 7ECFC8CD7455DD9998F7DAD88F2A8A9D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: AutoClicker-3.0.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0044289D InternetQueryDataAvailable,InternetReadFile,0_2_0044289D
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046C5D0
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00459FFF
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046C5D0
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00456354 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,0_2_00456354
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C08E
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00434D50: GetFullPathNameW,__swprintf,_wcslen,_wcslen,_wcslen,CreateDirectoryW,CreateFileW,_memset,_wcslen,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00434D50
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004461ED _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_004461ED
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0047E1FA0_2_0047E1FA
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00409A400_2_00409A40
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004120380_2_00412038
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004271610_2_00427161
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004212BE0_2_004212BE
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004433900_2_00443390
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004433910_2_00443391
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0041A46B0_2_0041A46B
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0041240C0_2_0041240C
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004465660_2_00446566
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004045E00_2_004045E0
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0041D7500_2_0041D750
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004037E00_2_004037E0
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004278590_2_00427859
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004128180_2_00412818
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0040F8900_2_0040F890
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0042397B0_2_0042397B
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00411B630_2_00411B63
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0047CBF00_2_0047CBF0
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0044EBBC0_2_0044EBBC
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00412C380_2_00412C38
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0044ED9A0_2_0044ED9A
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00423EBF0_2_00423EBF
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00424F700_2_00424F70
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0041AF0D0_2_0041AF0D
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: String function: 00445975 appears 65 times
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: String function: 0041171A appears 37 times
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: String function: 0041718C appears 45 times
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: String function: 0040E6D0 appears 35 times
Source: AutoClicker-3.0.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.evad.winEXE@1/4@0/0
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0044AF5C GetLastError,FormatMessageW,0_2_0044AF5C
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464422
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0045D517 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D517
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0043701F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,__wcsicoll,CloseHandle,0_2_0043701F
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0047A999 OleInitialize,CLSIDFromProgID,CoCreateInstance,CoInitializeSecurity,_memset,_wcslen,_memset,CoCreateInstanceEx,CoSetProxyBlanket,0_2_0047A999
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0043614F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043614F
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeFile created: C:\Users\user\Desktop\ACLibJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeFile created: C:\Users\user\AppData\Local\Temp\edityrvJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCommand line argument: #v0_2_0040D7F0
Source: AutoClicker-3.0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeFile read: C:\Users\user\Desktop\AutoClicker-3.0.exeJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeWindow found: window name: msctls_updown32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeWindow detected: Number of UI elements: 27
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004171D1 push ecx; ret 0_2_004171E4
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_004772DE

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004440780_2_00444078
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeStalling execution: Execution stalls by calling Sleepgraph_0-86009
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeWindow / User API: threadDelayed 7061Jump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeWindow / User API: foregroundWindowGot 1454Jump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeEvaded block: after key decisiongraph_0-85820
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeAPI coverage: 5.6 %
Source: C:\Users\user\Desktop\AutoClicker-3.0.exe TID: 1616Thread sleep time: -70610s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeThread sleep count: Count: 7061 delay: -10Jump to behavior
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0045A259 BlockInput,0_2_0045A259
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00426DA1 CreateFileW,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00426DA1
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0042202E SetUnhandledExceptionFilter,0_2_0042202E
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004230F5
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00417D93
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00421FA7
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0043916A LogonUserW,0_2_0043916A
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00436431 __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_00436431
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00445DD3 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00445DD3
Source: AutoClicker-3.0.exeBinary or memory string: Shell_TrayWnd
Source: AutoClicker-3.0.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_00410D10 cpuid 0_2_00410D10
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004223BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004223BC
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004711D2 GetUserNameW,0_2_004711D2
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0042039F __invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,0_2_0042039F
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
Source: AutoClicker-3.0.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 6, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonestrwstrintbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoubleptrhwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32}S
Source: AutoClicker-3.0.exeBinary or memory string: WIN_XP
Source: AutoClicker-3.0.exeBinary or memory string: WIN_XPe
Source: AutoClicker-3.0.exeBinary or memory string: WIN_VISTA
Source: AutoClicker-3.0.exeBinary or memory string: WIN_7
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_004741BB
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,0_2_0046483C
Source: C:\Users\user\Desktop\AutoClicker-3.0.exeCode function: 0_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0047AD92
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
2
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
1
DLL Side-Loading
NTDS15
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
Process Injection
1
Masquerading
LSA Secrets12
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Valid Accounts
Cached Domain Credentials21
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Virtualization/Sandbox Evasion
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
AutoClicker-3.0.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1558831
Start date and time:2024-11-19 20:59:04 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 30s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:AutoClicker-3.0.exe
Detection:MAL
Classification:mal48.evad.winEXE@1/4@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 70
  • Number of non-executed functions: 295
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • VT rate limit hit for: AutoClicker-3.0.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\AutoClicker-3.0.exe
File Type:ASCII text, with very long lines (65536), with no line terminators
Category:dropped
Size (bytes):132173
Entropy (8bit):3.473892643095965
Encrypted:false
SSDEEP:1536:kh533pnOBa6b6uUI6GyO8f686jMTM7ME6YpHZewYMSMgBSfqtHZOnMCSHJQfbmHW:kKHpgk6QdfyD6DpLz4mdrE+DaOu6zL
MD5:639672958DA0757DE2FD63C1F5686D74
SHA1:22DCB0769E95FAE7979F53D1AAEA22D5C495DD8A
SHA-256:D41B2AA7A6A3CD2C42AE669AF4496A97ED21D2FD0F17B9C1790E248E8374FDF8
SHA-512:CB6242B509E380DD76DBF3808128292E9B4DDFDE07B8C4FB1D45E5B78F9A59B5F844FFA96383399D68AAA0E5C0EDE4395BAF78FC0188CFE5F95D9A9DA0CA1F07
Malicious:false
Reputation:moderate, very likely benign file
Preview:203220[84Do4175746F49742E4572726F72[84Do726573746172745F4F505F4175746F5F436C69636B65725F416476616E6365645F335F305F30[84Do2035303020[84Do203120[84Do203220[84Do203420[84Do203820[84Do20313620[84Do20333220[84Do20363420[84Do2031323820[84Do2032353620[84Do2035313220[84Do203130323420[84Do203230343820[84Do203230333537313120[84Do203020[84Do203120[84Do203020[84Do203120[84Do203220[84Do203020[84Do203120[84Do203220[84Do20313620[84Do20333220[84Do20333220[84Do20363420[84Do2031323820[84Do2032353620[84Do203120[84Do203120[84Do203220[84Do203420[84Do203820[84Do20313620[84Do203120[84Do203220[84Do203320[84Do203420[84Do203520[84Do203120[84Do203020[84Do203120[84Do203220[84Do203120[84Do203220[84Do203420[84Do20313620[84Do20333220[84Do20363420[84Do2031323820[84Do2032353620[84Do2035313220[84Do203130323420[84Do203230343820[84Do203430393620[84Do203831393220[84Do20313633383420[84Do203120[84Do203220[84Do203420[84Do2032363834333534353620[84Do2035333638373039313220[84Do203130373337343138323420[84Do202D323134373438333634
Process:C:\Users\user\Desktop\AutoClicker-3.0.exe
File Type:MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
Category:dropped
Size (bytes):4286
Entropy (8bit):2.9470864945499518
Encrypted:false
SSDEEP:24:suY3ByPA9DWC431S75OSoTaQHDOB07Qq9+EmMj4ASx4:+RyPjCk1S1OSTQjOB07QqgEm+4A
MD5:A20254EA7F9EF810C1681FA314EDAA28
SHA1:FDD3040411043FA1D93EFD4298DB8668458B6FB8
SHA-256:5375290E66A20BFF81FB4D80346756F2D442184789681297CD1B84446A3FE80D
SHA-512:4C52A7F77930E6F1BFAA1FEE7E39133F74675A8666902C71BE752758A29D8D167157E34F89F729AB29855990BC41757A11031ADC7560C4D6B9CD77000BBCF87C
Malicious:false
Reputation:moderate, very likely benign file
Preview:...... .... .........(... ...@..... .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................222.222.222.222.222.............................................................................................................222..a=}.o@..^
Process:C:\Users\user\Desktop\AutoClicker-3.0.exe
File Type:MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
Category:dropped
Size (bytes):4286
Entropy (8bit):4.082654097650245
Encrypted:false
SSDEEP:48:+8Zjqe+hlcUmCmXGyGC0Uh/2Zr4gvtfyocfR1/mrlR:54Fchp0CuZv44L
MD5:1111E06679F96FF28C1E229B06CE7B41
SHA1:9FE5A6C6014B561060A640D0DB02A303A35B8832
SHA-256:59D5E9106E907FA61A560294A51C14ABCDE024FDD690E41A7F4D6C88DB7287A6
SHA-512:077AFF77BBF827B9920CF53DFF38427475E590C07AB8901FC34CE7B7FB9E9409207E53AFF06FA7D1E3984BCF127507D0FC19284D8E7203C76D67C9B98C1C8F37
Malicious:false
Reputation:moderate, very likely benign file
Preview:...... .... .........(... ...@..... ...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!/..JM'&]]++b_%%ZU..<9...................................................................................................G/3..KP..`e..mo..ww..uu..jk..TT..!!Xk...%...............................................................................;(1..>N..Oa..Ve..al..kr..w|..................bc..22si..)...................................................................>O&4..(C
Process:C:\Users\user\Desktop\AutoClicker-3.0.exe
File Type:MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
Category:dropped
Size (bytes):4286
Entropy (8bit):1.560408932201576
Encrypted:false
SSDEEP:12:suYNoooooooooooooooooXHHHHHHHHHHHHHHHHHIooooooooooooooooo:suY
MD5:7824CEFAD2522BE614AE5B7BDBF88339
SHA1:A0DE5C71AC3CD42CA19EE2E4658D95B3F9082C60
SHA-256:9E869F60EA0A0DE06C7D562FF56D1AC53C534849C919E4B12344E73513649483
SHA-512:6D377731BBDA34F1875CD14E8EE896C9B8CB0AEB4133A5BC5FF460138B8B3A1B6647D3869B14A9F6949601FA37694BC38C764BF660FD877033296D9CCB0B6342
Malicious:false
Reputation:moderate, very likely benign file
Preview:...... .... .........(... ...@..... ....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................?...........................................................................?..................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.998009948506824
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:AutoClicker-3.0.exe
File size:864'317 bytes
MD5:7ecfc8cd7455dd9998f7dad88f2a8a9d
SHA1:1751d9389adb1e7187afa4938a3559e58739dce6
SHA256:2e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e
SHA512:cb05e82b17c0f7444d1259b661f0c1e6603d8a959da7475f35078a851d528c630366916c17a37db1a2490af66e5346309177c9e31921d09e7e795492868e678d
SSDEEP:12288:GaWzgMg7v3qnCiWErQohh0F49CJ8lnybQg9BFg9UmTRHlM:BaHMv6CGrjBnybQg+mmhG
TLSH:0805BF11B2D680B5DF9635F01536E316AB357D196222CE8797F03E628E30193DE263AF
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
Icon Hash:1769555509d26513
Entrypoint:0x416310
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
DLL Characteristics:TERMINAL_SERVER_AWARE
Time Stamp:0x5C8AB314 [Thu Mar 14 20:01:24 2019 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:aaaa8913c89c8aa4a5d93f06853894da
Instruction
call 00007F050867BFBCh
jmp 00007F050866FD8Eh
int3
int3
int3
int3
int3
int3
push ebp
mov ebp, esp
push edi
push esi
mov esi, dword ptr [ebp+0Ch]
mov ecx, dword ptr [ebp+10h]
mov edi, dword ptr [ebp+08h]
mov eax, ecx
mov edx, ecx
add eax, esi
cmp edi, esi
jbe 00007F050866FF1Ah
cmp edi, eax
jc 00007F05086700BAh
cmp ecx, 00000100h
jc 00007F050866FF31h
cmp dword ptr [004A94E0h], 00000000h
je 00007F050866FF28h
push edi
push esi
and edi, 0Fh
and esi, 0Fh
cmp edi, esi
pop esi
pop edi
jne 00007F050866FF1Ah
pop esi
pop edi
pop ebp
jmp 00007F050867037Ah
test edi, 00000003h
jne 00007F050866FF27h
shr ecx, 02h
and edx, 03h
cmp ecx, 08h
jc 00007F050866FF3Ch
rep movsd
jmp dword ptr [00416494h+edx*4]
nop
mov eax, edi
mov edx, 00000003h
sub ecx, 04h
jc 00007F050866FF1Eh
and eax, 03h
add ecx, eax
jmp dword ptr [004163A8h+eax*4]
jmp dword ptr [004164A4h+ecx*4]
nop
jmp dword ptr [00416428h+ecx*4]
nop
mov eax, E4004163h
arpl word ptr [ecx+00h], ax
or byte ptr [ecx+eax*2+00h], ah
and edx, ecx
mov al, byte ptr [esi]
mov byte ptr [edi], al
mov al, byte ptr [esi+01h]
mov byte ptr [edi+01h], al
mov al, byte ptr [esi+02h]
shr ecx, 02h
mov byte ptr [edi+02h], al
add esi, 03h
add edi, 03h
cmp ecx, 08h
jc 00007F050866FEDEh
Programming Language:
  • [ASM] VS2008 SP1 build 30729
  • [ C ] VS2008 SP1 build 30729
  • [C++] VS2008 SP1 build 30729
  • [ C ] VS2005 build 50727
  • [IMP] VS2005 build 50727
  • [ASM] VS2008 build 21022
  • [RES] VS2008 build 21022
  • [LNK] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000xacfc.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x800170x802004cacf40f5b8744322e60b58491a8bfbdFalse0.5603525152439024data6.634888595150821IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x820000xd95c0xda00522a52e97bfbc18e18821cc173d2fabaFalse0.3634783543577982data4.88308417524979IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x900000x1a5180x6800b95ceab539c4f9131d3294ebba341700False0.1600060096153846data2.2019861745767044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xab0000xacfc0xae000d5b23c6979ab2ffc46b23ba2963b693False0.12497755028735633data3.4145259189739807IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xab4d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
RT_ICON0xab6000x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
RT_ICON0xab7280x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
RT_ICON0xab8500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.149822695035461
RT_ICON0xabcb80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.07809568480300187
RT_ICON0xacd600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.08257261410788382
RT_ICON0xaf3080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishGreat Britain0.050129900803023146
RT_MENU0xb35300x50dataEnglishGreat Britain0.9
RT_DIALOG0xb35800xfcdataEnglishGreat Britain0.6507936507936508
RT_STRING0xb367c0x530dataEnglishGreat Britain0.33960843373493976
RT_STRING0xb3bac0x690dataEnglishGreat Britain0.26964285714285713
RT_STRING0xb423c0x43adataEnglishGreat Britain0.3733826247689464
RT_STRING0xb46780x5fcdataEnglishGreat Britain0.3087467362924282
RT_STRING0xb4c740x65cdataEnglishGreat Britain0.34336609336609336
RT_STRING0xb52d00x388dataEnglishGreat Britain0.377212389380531
RT_STRING0xb56580x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
RT_GROUP_ICON0xb57b00x3edataEnglishGreat Britain0.8387096774193549
RT_GROUP_ICON0xb57f00x14dataEnglishGreat Britain1.15
RT_GROUP_ICON0xb58040x14dataEnglishGreat Britain1.25
RT_GROUP_ICON0xb58180x14dataEnglishGreat Britain1.25
RT_VERSION0xb582c0x264dataEnglishUnited States0.4624183006535948
RT_MANIFEST0xb5a900x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
DLLImport
WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
Language of compilation systemCountry where language is spokenMap
EnglishGreat Britain
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:14:59:52
Start date:19/11/2024
Path:C:\Users\user\Desktop\AutoClicker-3.0.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\AutoClicker-3.0.exe"
Imagebase:0x400000
File size:864'317 bytes
MD5 hash:7ECFC8CD7455DD9998F7DAD88F2A8A9D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:3.5%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:7.5%
    Total number of Nodes:2000
    Total number of Limit Nodes:71
    execution_graph 83974 467046 83975 46705d 83974->83975 83985 467136 83974->83985 83976 4671a0 83975->83976 83977 46710d 83975->83977 83978 467199 83975->83978 83987 46706e 83975->83987 83980 41171a 75 API calls 83976->83980 83981 41171a 75 API calls 83977->83981 84008 40e380 VariantClear moneypunct 83978->84008 83993 4670f3 _memcpy_s 83980->83993 83981->83993 83982 4670d2 83984 41171a 75 API calls 83982->83984 83983 41171a 75 API calls 83983->83985 83986 4670d8 83984->83986 84006 443466 75 API calls 83986->84006 83992 4670a9 moneypunct 83987->83992 83994 41171a 83987->83994 83990 4670e8 84007 45efe7 77 API calls moneypunct 83990->84007 83992->83976 83992->83982 83992->83993 83993->83983 83996 411724 83994->83996 83997 41173e 83996->83997 84001 411740 std::bad_alloc::bad_alloc 83996->84001 84009 4138ba 83996->84009 84027 411afc 6 API calls __decode_pointer 83996->84027 83997->83992 83999 411766 84031 4116fd 67 API calls std::exception::exception 83999->84031 84001->83999 84028 411421 84001->84028 84002 411770 84032 41805b RaiseException 84002->84032 84005 41177e 84006->83990 84007->83993 84008->83976 84010 41396d 84009->84010 84019 4138cc 84009->84019 84040 411afc 6 API calls __decode_pointer 84010->84040 84012 413973 84041 417f23 67 API calls __getptd_noexit 84012->84041 84017 413929 RtlAllocateHeap 84017->84019 84018 4138dd 84018->84019 84033 418252 67 API calls 2 library calls 84018->84033 84034 4180a7 67 API calls 7 library calls 84018->84034 84035 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84018->84035 84019->84017 84019->84018 84021 413959 84019->84021 84024 41395e 84019->84024 84026 413965 84019->84026 84036 41386b 67 API calls 4 library calls 84019->84036 84037 411afc 6 API calls __decode_pointer 84019->84037 84038 417f23 67 API calls __getptd_noexit 84021->84038 84039 417f23 67 API calls __getptd_noexit 84024->84039 84026->83996 84027->83996 84042 4113e5 84028->84042 84030 41142e 84030->83999 84031->84002 84032->84005 84033->84018 84034->84018 84036->84019 84037->84019 84038->84024 84039->84026 84040->84012 84041->84026 84043 4113f1 __getstream 84042->84043 84050 41181b 84043->84050 84049 411412 __getstream 84049->84030 84076 418407 84050->84076 84052 4113f6 84053 4112fa 84052->84053 84141 4169e9 TlsGetValue 84053->84141 84056 4169e9 __decode_pointer 6 API calls 84057 41131e 84056->84057 84058 4113a1 84057->84058 84151 4170e7 68 API calls 5 library calls 84057->84151 84073 41141b 84058->84073 84060 41133c 84061 411388 84060->84061 84064 411357 84060->84064 84065 411366 84060->84065 84062 41696e __encode_pointer 6 API calls 84061->84062 84063 411396 84062->84063 84067 41696e __encode_pointer 6 API calls 84063->84067 84152 417047 73 API calls _realloc 84064->84152 84065->84058 84066 411360 84065->84066 84066->84065 84070 41137c 84066->84070 84153 417047 73 API calls _realloc 84066->84153 84067->84058 84154 41696e TlsGetValue 84070->84154 84071 411376 84071->84058 84071->84070 84166 411824 84073->84166 84077 41841c 84076->84077 84078 41842f EnterCriticalSection 84076->84078 84083 418344 84077->84083 84078->84052 84080 418422 84080->84078 84111 4117af 67 API calls 3 library calls 84080->84111 84082 41842e 84082->84078 84084 418350 __getstream 84083->84084 84085 418360 84084->84085 84086 418378 84084->84086 84112 418252 67 API calls 2 library calls 84085->84112 84092 418386 __getstream 84086->84092 84115 416fb6 84086->84115 84088 418365 84113 4180a7 67 API calls 7 library calls 84088->84113 84092->84080 84093 41836c 84114 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84093->84114 84094 4183a7 84098 418407 __lock 67 API calls 84094->84098 84095 418398 84121 417f23 67 API calls __getptd_noexit 84095->84121 84099 4183ae 84098->84099 84101 4183e2 84099->84101 84102 4183b6 84099->84102 84104 413a88 __read_nolock 67 API calls 84101->84104 84122 4189e6 InitializeCriticalSectionAndSpinCount __getstream 84102->84122 84110 4183d3 84104->84110 84105 4183c1 84105->84110 84123 413a88 84105->84123 84108 4183cd 84136 417f23 67 API calls __getptd_noexit 84108->84136 84137 4183fe LeaveCriticalSection _doexit 84110->84137 84111->84082 84112->84088 84113->84093 84118 416fbf 84115->84118 84116 4138ba _malloc 66 API calls 84116->84118 84117 416ff5 84117->84094 84117->84095 84118->84116 84118->84117 84119 416fd6 Sleep 84118->84119 84120 416feb 84119->84120 84120->84117 84120->84118 84121->84092 84122->84105 84124 413a94 __getstream 84123->84124 84126 418407 __lock 65 API calls 84124->84126 84130 413b0d _realloc __getstream 84124->84130 84135 413ad3 84124->84135 84125 413ae8 RtlFreeHeap 84127 413afa 84125->84127 84125->84130 84132 413aab ___sbh_find_block 84126->84132 84140 417f23 67 API calls __getptd_noexit 84127->84140 84129 413aff GetLastError 84129->84130 84130->84108 84131 413ac5 84139 413ade LeaveCriticalSection _doexit 84131->84139 84132->84131 84138 419f9d __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 84132->84138 84135->84125 84135->84130 84136->84110 84137->84092 84138->84131 84139->84135 84140->84129 84142 416a01 84141->84142 84143 416a22 GetModuleHandleW 84141->84143 84142->84143 84144 416a0b TlsGetValue 84142->84144 84145 416a32 84143->84145 84146 416a3d GetProcAddress 84143->84146 84149 416a16 84144->84149 84164 41177f Sleep GetModuleHandleW 84145->84164 84147 41130e 84146->84147 84147->84056 84149->84143 84149->84147 84150 416a38 84150->84146 84150->84147 84151->84060 84152->84066 84153->84071 84155 4169a7 GetModuleHandleW 84154->84155 84156 416986 84154->84156 84157 4169c2 GetProcAddress 84155->84157 84158 4169b7 84155->84158 84156->84155 84159 416990 TlsGetValue 84156->84159 84161 41699f 84157->84161 84165 41177f Sleep GetModuleHandleW 84158->84165 84163 41699b 84159->84163 84161->84061 84162 4169bd 84162->84157 84162->84161 84163->84155 84163->84161 84164->84150 84165->84162 84169 41832d LeaveCriticalSection 84166->84169 84168 411420 84168->84049 84169->84168 84170 40d540 84177 40c760 84170->84177 84172 40d552 84173 40d55a timeGetTime 84172->84173 84174 431a7f Sleep 84172->84174 84175 40c760 78 API calls 84173->84175 84176 40d570 84175->84176 84178 4297d5 84177->84178 84179 40c76c 84177->84179 84180 429806 84178->84180 84183 41341b 78 API calls __wcstoi64 84178->84183 84179->84172 84180->84172 84182 429827 84182->84172 84183->84182 84184 403d40 84185 403da9 84184->84185 84186 403d4c 84184->84186 84190 40e190 SetFilePointerEx 84185->84190 84188 403d6e 84186->84188 84189 403d7c ReadFile 84186->84189 84189->84186 84189->84188 84190->84186 84191 44c245 84197 4452d0 75 API calls 84191->84197 84193 44c28a 84195 44c257 84195->84193 84198 4443d4 ReadFile SetFilePointerEx 84195->84198 84199 44c1d4 84195->84199 84197->84195 84198->84195 84200 44c1df 84199->84200 84201 44c1e3 84200->84201 84202 44c21c 84200->84202 84212 437bb9 75 API calls 84201->84212 84208 44c0a5 84202->84208 84205 44c1ef 84206 41171a 75 API calls 84205->84206 84207 44c204 _memcpy_s 84206->84207 84207->84195 84209 44c0bb 84208->84209 84211 44c1a8 _memcpy_s moneypunct 84208->84211 84210 41171a 75 API calls 84209->84210 84210->84211 84211->84207 84212->84205 84213 444343 84216 444326 84213->84216 84215 44434e WriteFile 84217 444340 84216->84217 84218 4442c7 84216->84218 84217->84215 84223 40e190 SetFilePointerEx 84218->84223 84220 4442e0 SetFilePointerEx 84224 40e190 SetFilePointerEx 84220->84224 84222 4442ff 84222->84215 84223->84220 84224->84222 84225 45b782 84227 45b7a1 84225->84227 84230 45b7bf 84225->84230 84228 453081 111 API calls 84227->84228 84227->84230 84228->84230 84229 45b834 84231 40c760 78 API calls 84229->84231 84232 40c760 78 API calls 84230->84232 84233 45b7e3 84230->84233 84234 45b83c 84231->84234 84232->84233 84235 40c760 78 API calls 84233->84235 84240 45b812 84233->84240 84249 4556f8 84234->84249 84237 45b801 84235->84237 84238 40c760 78 API calls 84237->84238 84238->84240 84239 45b842 84271 4092c0 84239->84271 84243 453081 84240->84243 84242 45b84d 84244 45308c 84243->84244 84245 4530aa 84243->84245 84246 4530a1 84244->84246 84275 452e2a 111 API calls 5 library calls 84244->84275 84245->84229 84246->84229 84248 453098 84248->84229 84251 455713 84249->84251 84250 455717 84250->84239 84251->84250 84252 4557d6 84251->84252 84253 4558de 84251->84253 84259 4557f5 84252->84259 84260 455806 CreateWindowExW 84252->84260 84254 4558e2 DestroyWindow 84253->84254 84255 4558e9 CreateWindowExW 84253->84255 84254->84255 84256 455936 SendMessageW 84255->84256 84257 455853 84255->84257 84276 4021e0 84256->84276 84257->84239 84262 4557ff DestroyWindow 84259->84262 84263 4558aa SendMessageW 84259->84263 84260->84257 84264 45585f 84260->84264 84261 455957 GetDesktopWindow GetWindowRect SendMessageW 84265 455980 SendMessageW 84261->84265 84266 45598e 84261->84266 84262->84260 84268 4021e0 75 API calls 84263->84268 84267 4021e0 75 API calls 84264->84267 84265->84266 84266->84239 84269 455883 SendMessageW 84267->84269 84270 4558cf 84268->84270 84269->84263 84270->84239 84272 4092c8 moneypunct 84271->84272 84273 429db0 VariantClear 84272->84273 84274 4092d5 moneypunct 84272->84274 84273->84274 84274->84242 84275->84248 84277 42a598 84276->84277 84279 4021f1 _wcslen 84276->84279 84292 40c740 84277->84292 84281 402205 84279->84281 84282 402226 84279->84282 84280 42a5a2 84288 404020 75 API calls moneypunct 84281->84288 84289 4013e0 84282->84289 84286 40220c _memcpy_s 84286->84261 84287 41171a 75 API calls 84287->84286 84288->84286 84290 41171a 75 API calls 84289->84290 84291 4013e7 84290->84291 84291->84280 84291->84287 84293 40c752 84292->84293 84294 40c747 84292->84294 84293->84280 84294->84293 84297 402ae0 84294->84297 84296 42a572 _memcpy_s 84296->84280 84298 42a06a 84297->84298 84299 402aef 84297->84299 84300 4013e0 75 API calls 84298->84300 84299->84296 84301 42a072 84300->84301 84302 41171a 75 API calls 84301->84302 84303 42a095 _memcpy_s 84302->84303 84303->84296 84304 46f90e GetWindowLongW 84305 46f98c 84304->84305 84306 46f91b LoadImageW 84304->84306 84307 46fa0b ExtractIconExW 84305->84307 84309 46f99a LoadImageW 84305->84309 84308 46f939 SendMessageW 84306->84308 84330 46ffde 84306->84330 84313 46fa2b DestroyIcon SendMessageW 84307->84313 84307->84330 84311 46f956 84308->84311 84312 46f94f DeleteObject 84308->84312 84314 46ffd2 84309->84314 84315 46f9b8 SendMessageW 84309->84315 84310 4092c0 VariantClear 84316 46fffc 84310->84316 84317 46f964 84311->84317 84318 46f95d DestroyIcon 84311->84318 84312->84311 84325 46fa67 DeleteObject 84313->84325 84326 46fa6e 84313->84326 84324 4092c0 VariantClear 84314->84324 84322 46f9d5 84315->84322 84323 46f9ce DeleteObject 84315->84323 84321 4092c0 VariantClear 84317->84321 84318->84317 84327 46f97a 84321->84327 84328 46f9e3 84322->84328 84329 46f9dc DestroyIcon 84322->84329 84323->84322 84324->84330 84325->84326 84331 46fa75 DestroyIcon 84326->84331 84332 46fa78 84326->84332 84333 4092c0 VariantClear 84328->84333 84329->84328 84330->84310 84331->84332 84334 4092c0 VariantClear 84332->84334 84335 46f9f9 84333->84335 84336 46fa8e 84334->84336 84337 401108 84338 401130 84337->84338 84339 40110d DefWindowProcW 84337->84339 84341 401147 84338->84341 84343 401230 84338->84343 84344 401241 _memset 84343->84344 84345 4012c5 84343->84345 84358 401e70 84344->84358 84345->84341 84347 40126b 84348 4012ae KillTimer SetTimer 84347->84348 84349 42aa61 84347->84349 84350 401298 84347->84350 84348->84345 84351 42aa8b Shell_NotifyIconW 84349->84351 84352 42aa69 Shell_NotifyIconW 84349->84352 84353 4012a2 84350->84353 84354 42aaac 84350->84354 84351->84348 84352->84348 84353->84348 84357 42aaf8 Shell_NotifyIconW 84353->84357 84355 42aad7 Shell_NotifyIconW 84354->84355 84356 42aab5 Shell_NotifyIconW 84354->84356 84355->84348 84356->84348 84357->84348 84359 401e8b 84358->84359 84360 401f6e 84358->84360 84380 401400 75 API calls 84359->84380 84360->84347 84362 401e9b 84363 42a9a0 LoadStringW 84362->84363 84364 401ea8 84362->84364 84366 42a9bb 84363->84366 84365 4021e0 75 API calls 84364->84365 84367 401ebd 84365->84367 84382 40df50 84366->84382 84369 401eca 84367->84369 84370 42a9cd 84367->84370 84369->84366 84371 401ed4 84369->84371 84386 40d330 75 API calls 2 library calls 84370->84386 84381 40d330 75 API calls 2 library calls 84371->84381 84374 42a9dc 84375 42a9f0 84374->84375 84377 401ee3 _memset _wcscpy _wcsncpy 84374->84377 84387 40d330 75 API calls 2 library calls 84375->84387 84379 401f52 Shell_NotifyIconW 84377->84379 84378 42a9fe 84379->84360 84380->84362 84381->84377 84383 40df61 84382->84383 84384 40df56 84382->84384 84383->84377 84388 404080 75 API calls _memcpy_s 84384->84388 84386->84374 84387->84378 84388->84383 84389 47b54a 84421 44849c 84389->84421 84391 47b566 84392 47b6ab 84391->84392 84394 47b6e7 84391->84394 84430 451c22 VariantClear 84392->84430 84393 47b765 84396 47b88a 84393->84396 84398 47b783 GetDC SendMessageW SelectObject 84393->84398 84394->84393 84402 47b742 84394->84402 84400 47b89a 84396->84400 84433 4336c7 6 API calls 84396->84433 84397 47b6b6 84399 47b22c 84397->84399 84404 47b6d3 84397->84404 84432 43609c 68 API calls 2 library calls 84398->84432 84403 4092c0 VariantClear 84399->84403 84406 47b8d5 84400->84406 84407 47b8ce 84400->84407 84431 441561 12 API calls 84402->84431 84409 47b231 84403->84409 84410 4092c0 VariantClear 84404->84410 84413 47b8e4 84406->84413 84414 47b8dd 84406->84414 84434 449063 10 API calls 84407->84434 84415 47b6d8 84410->84415 84411 47b7c1 SelectObject ReleaseDC 84420 47b7e6 MoveWindow 84411->84420 84417 4092c0 VariantClear 84413->84417 84435 448daf 91 API calls 84414->84435 84419 47b8ed 84417->84419 84420->84396 84424 4484c9 _memset 84421->84424 84422 4485f6 84422->84391 84423 4484d1 84423->84422 84427 4485bc InsertMenuItemW 84423->84427 84424->84422 84424->84423 84425 448577 IsMenu 84424->84425 84426 44854e GetMenuItemInfoW 84424->84426 84425->84422 84425->84423 84426->84422 84428 448570 84426->84428 84427->84422 84429 4485da KiUserCallbackDispatcher 84427->84429 84428->84425 84429->84391 84430->84397 84431->84393 84432->84411 84433->84400 84434->84406 84435->84413 84436 429212 84441 410b90 84436->84441 84439 411421 __cinit 74 API calls 84440 42922f 84439->84440 84442 410b9a __write_nolock 84441->84442 84443 41171a 75 API calls 84442->84443 84444 410c31 GetModuleFileNameW 84443->84444 84458 413db0 84444->84458 84446 410c66 _wcsncat 84461 413e3c 84446->84461 84449 41171a 75 API calls 84450 410ca3 _wcscpy 84449->84450 84451 410cd1 RegOpenKeyExW 84450->84451 84452 429bc3 RegQueryValueExW 84451->84452 84453 410cf7 84451->84453 84454 429cd9 RegCloseKey 84452->84454 84455 429bf2 _wcscat _wcslen _wcsncpy 84452->84455 84453->84439 84456 41171a 75 API calls 84455->84456 84457 429cd8 84455->84457 84456->84455 84457->84454 84464 413b95 84458->84464 84494 41abec 84461->84494 84465 413bae 84464->84465 84466 413c2f 84464->84466 84465->84466 84479 413c1d 84465->84479 84486 41ab19 67 API calls __mbstowcs_s_l 84465->84486 84467 413d60 84466->84467 84468 413d7b 84466->84468 84490 417f23 67 API calls __getptd_noexit 84467->84490 84492 417f23 67 API calls __getptd_noexit 84468->84492 84471 413d65 84473 413cfb 84471->84473 84491 417ebb 6 API calls 2 library calls 84471->84491 84473->84446 84475 413d03 84475->84466 84475->84473 84477 413d8e 84475->84477 84476 413cb9 84476->84466 84478 413cd6 84476->84478 84488 41ab19 67 API calls __mbstowcs_s_l 84476->84488 84493 41ab19 67 API calls __mbstowcs_s_l 84477->84493 84478->84466 84478->84473 84481 413cef 84478->84481 84479->84466 84485 413c9b 84479->84485 84487 41ab19 67 API calls __mbstowcs_s_l 84479->84487 84489 41ab19 67 API calls __mbstowcs_s_l 84481->84489 84485->84475 84485->84476 84486->84479 84487->84485 84488->84478 84489->84473 84490->84471 84492->84471 84493->84473 84495 41ac02 84494->84495 84496 41abfd 84494->84496 84503 417f23 67 API calls __getptd_noexit 84495->84503 84496->84495 84497 41ac22 84496->84497 84501 410c99 84497->84501 84505 417f23 67 API calls __getptd_noexit 84497->84505 84501->84449 84502 41ac07 84504 417ebb 6 API calls 2 library calls 84502->84504 84503->84502 84505->84502 84506 40f110 RegOpenKeyExW 84507 40f13c RegQueryValueExW RegCloseKey 84506->84507 84508 40f15f 84506->84508 84507->84508 84509 47b4d5 84541 450c09 84509->84541 84511 47b4e7 84512 47b6ab 84511->84512 84514 47b6e7 84511->84514 84552 451c22 VariantClear 84512->84552 84513 47b765 84516 47b88a 84513->84516 84518 47b783 GetDC SendMessageW SelectObject 84513->84518 84514->84513 84522 47b742 84514->84522 84520 47b89a 84516->84520 84555 4336c7 6 API calls 84516->84555 84517 47b6b6 84519 47b22c 84517->84519 84524 47b6d3 84517->84524 84554 43609c 68 API calls 2 library calls 84518->84554 84523 4092c0 VariantClear 84519->84523 84526 47b8d5 84520->84526 84527 47b8ce 84520->84527 84553 441561 12 API calls 84522->84553 84529 47b231 84523->84529 84530 4092c0 VariantClear 84524->84530 84533 47b8e4 84526->84533 84534 47b8dd 84526->84534 84556 449063 10 API calls 84527->84556 84535 47b6d8 84530->84535 84531 47b7c1 SelectObject ReleaseDC 84536 47b7e6 MoveWindow 84531->84536 84538 4092c0 VariantClear 84533->84538 84557 448daf 91 API calls 84534->84557 84536->84516 84540 47b8ed 84538->84540 84542 450c1d 84541->84542 84558 4491cb 84542->84558 84547 450c57 84547->84511 84549 450c78 84550 450c5f DestroyWindow 84549->84550 84551 450cc6 SendMessageW SendMessageW 84549->84551 84550->84511 84551->84511 84552->84517 84553->84513 84554->84531 84555->84520 84556->84526 84557->84533 84559 4491f5 84558->84559 84560 4491e9 84558->84560 84562 43362d 84559->84562 84573 441533 GetWindowLongW 84560->84573 84563 433648 84562->84563 84564 43364d CreateWindowExW 84562->84564 84563->84564 84565 4336c0 84564->84565 84566 43368a 84564->84566 84565->84547 84570 413f97 84565->84570 84567 433691 GetStockObject SendMessageW 84566->84567 84568 4336a5 84566->84568 84567->84568 84568->84565 84569 4336b7 ShowWindow 84568->84569 84569->84565 84574 413f0b 84570->84574 84573->84559 84586 411438 84574->84586 84577 413f51 84582 413f69 _wcslen 84577->84582 84596 4190c9 78 API calls 2 library calls 84577->84596 84578 413f29 84594 417f23 67 API calls __getptd_noexit 84578->84594 84581 413f2e 84595 417ebb 6 API calls 2 library calls 84581->84595 84597 41ade0 67 API calls 3 library calls 84582->84597 84585 413f3e 84585->84549 84587 41144b 84586->84587 84593 411498 84586->84593 84598 416c72 67 API calls 2 library calls 84587->84598 84589 411450 84590 411478 84589->84590 84599 417d0e 75 API calls 5 library calls 84589->84599 84590->84593 84600 4175a2 69 API calls 6 library calls 84590->84600 84593->84577 84593->84578 84594->84581 84596->84577 84597->84585 84598->84589 84599->84590 84600->84593 84601 416193 84638 41718c 84601->84638 84603 41619f GetStartupInfoW 84605 4161c2 84603->84605 84639 41aa31 HeapCreate 84605->84639 84607 416212 84641 416e29 GetModuleHandleW 84607->84641 84611 416223 __RTC_Initialize 84675 41b669 84611->84675 84614 416231 84615 41623d GetCommandLineW 84614->84615 84743 4117af 67 API calls 3 library calls 84614->84743 84690 42235f GetEnvironmentStringsW 84615->84690 84618 41623c 84618->84615 84619 41624c 84696 4222b1 GetModuleFileNameW 84619->84696 84621 416256 84622 416261 84621->84622 84744 4117af 67 API calls 3 library calls 84621->84744 84700 422082 84622->84700 84626 416272 84713 41186e 84626->84713 84629 416279 84631 416284 __wwincmdln 84629->84631 84746 4117af 67 API calls 3 library calls 84629->84746 84719 40d7f0 84631->84719 84638->84603 84640 416206 84639->84640 84640->84607 84741 41616a 67 API calls 3 library calls 84640->84741 84642 416e44 84641->84642 84643 416e3d 84641->84643 84645 416fac 84642->84645 84646 416e4e GetProcAddress GetProcAddress GetProcAddress GetProcAddress 84642->84646 84749 41177f Sleep GetModuleHandleW 84643->84749 84759 416ad5 70 API calls 2 library calls 84645->84759 84648 416e97 TlsAlloc 84646->84648 84647 416e43 84647->84642 84651 416218 84648->84651 84652 416ee5 TlsSetValue 84648->84652 84651->84611 84742 41616a 67 API calls 3 library calls 84651->84742 84652->84651 84653 416ef6 84652->84653 84750 411a69 6 API calls 4 library calls 84653->84750 84655 416efb 84656 41696e __encode_pointer 6 API calls 84655->84656 84657 416f06 84656->84657 84658 41696e __encode_pointer 6 API calls 84657->84658 84659 416f16 84658->84659 84660 41696e __encode_pointer 6 API calls 84659->84660 84661 416f26 84660->84661 84662 41696e __encode_pointer 6 API calls 84661->84662 84663 416f36 84662->84663 84751 41828b InitializeCriticalSectionAndSpinCount __getstream 84663->84751 84665 416f43 84665->84645 84666 4169e9 __decode_pointer 6 API calls 84665->84666 84667 416f57 84666->84667 84667->84645 84752 416ffb 84667->84752 84670 4169e9 __decode_pointer 6 API calls 84671 416f8a 84670->84671 84671->84645 84672 416f91 84671->84672 84758 416b12 67 API calls 5 library calls 84672->84758 84674 416f99 GetCurrentThreadId 84674->84651 84778 41718c 84675->84778 84677 41b675 GetStartupInfoA 84678 416ffb __calloc_crt 67 API calls 84677->84678 84679 41b696 84678->84679 84680 41b8b4 __getstream 84679->84680 84681 41b7fb 84679->84681 84684 416ffb __calloc_crt 67 API calls 84679->84684 84686 41b77e 84679->84686 84680->84614 84681->84680 84682 41b831 GetStdHandle 84681->84682 84683 41b896 SetHandleCount 84681->84683 84685 41b843 GetFileType 84681->84685 84780 4189e6 InitializeCriticalSectionAndSpinCount __getstream 84681->84780 84682->84681 84683->84680 84684->84679 84685->84681 84686->84680 84686->84681 84687 41b7a7 GetFileType 84686->84687 84779 4189e6 InitializeCriticalSectionAndSpinCount __getstream 84686->84779 84687->84686 84691 422370 84690->84691 84692 422374 84690->84692 84691->84619 84693 416fb6 __malloc_crt 67 API calls 84692->84693 84694 422395 _memcpy_s 84693->84694 84695 42239c FreeEnvironmentStringsW 84694->84695 84695->84619 84698 4222e6 _wparse_cmdline 84696->84698 84697 422329 _wparse_cmdline 84697->84621 84698->84697 84699 416fb6 __malloc_crt 67 API calls 84698->84699 84699->84697 84701 42209a _wcslen 84700->84701 84705 416267 84700->84705 84702 416ffb __calloc_crt 67 API calls 84701->84702 84708 4220be _wcslen 84702->84708 84703 422123 84704 413a88 __read_nolock 67 API calls 84703->84704 84704->84705 84705->84626 84745 4117af 67 API calls 3 library calls 84705->84745 84706 416ffb __calloc_crt 67 API calls 84706->84708 84707 422149 84709 413a88 __read_nolock 67 API calls 84707->84709 84708->84703 84708->84705 84708->84706 84708->84707 84711 422108 84708->84711 84781 426349 67 API calls __mbstowcs_s_l 84708->84781 84709->84705 84711->84708 84782 417d93 10 API calls 3 library calls 84711->84782 84714 41187c __IsNonwritableInCurrentImage 84713->84714 84783 418486 84714->84783 84716 41189a __initterm_e 84717 411421 __cinit 74 API calls 84716->84717 84718 4118b9 __IsNonwritableInCurrentImage __initterm 84716->84718 84717->84718 84718->84629 84720 431bcb 84719->84720 84721 40d80c 84719->84721 84722 4092c0 VariantClear 84721->84722 84723 40d847 84722->84723 84787 40eb50 84723->84787 84728 40d888 84791 411b24 67 API calls __mbstowcs_s_l 84728->84791 84730 40d891 84792 40f370 SystemParametersInfoW SystemParametersInfoW 84730->84792 84731 40d877 84790 411ac6 67 API calls 4 library calls 84731->84790 84733 40d89f 84793 40d6d0 GetCurrentDirectoryW 84733->84793 84741->84607 84742->84611 84743->84618 84744->84622 84745->84626 84746->84631 84749->84647 84750->84655 84751->84665 84754 417004 84752->84754 84755 416f70 84754->84755 84756 417022 Sleep 84754->84756 84760 422452 84754->84760 84755->84645 84755->84670 84757 417037 84756->84757 84757->84754 84757->84755 84758->84674 84759->84651 84761 42245e __getstream 84760->84761 84762 422476 84761->84762 84770 422495 _memset 84761->84770 84773 417f23 67 API calls __getptd_noexit 84762->84773 84764 42247b 84774 417ebb 6 API calls 2 library calls 84764->84774 84766 422507 HeapAlloc 84766->84770 84767 418407 __lock 66 API calls 84767->84770 84768 42248b __getstream 84768->84754 84770->84766 84770->84767 84770->84768 84775 41a74c 5 API calls 2 library calls 84770->84775 84776 42254e LeaveCriticalSection _doexit 84770->84776 84777 411afc 6 API calls __decode_pointer 84770->84777 84773->84764 84775->84770 84776->84770 84777->84770 84778->84677 84779->84686 84780->84681 84781->84708 84782->84711 84784 41848c 84783->84784 84785 41696e __encode_pointer 6 API calls 84784->84785 84786 4184a4 84784->84786 84785->84784 84786->84716 84831 40eb70 84787->84831 84790->84728 84791->84730 84792->84733 84835 401f80 84793->84835 84830 40eba0 LoadLibraryA GetProcAddress 84830->84731 84832 40d86e 84831->84832 84833 40eb76 LoadLibraryA 84831->84833 84832->84731 84832->84830 84833->84832 84834 40eb87 GetProcAddress 84833->84834 84834->84832 84938 40e680 84835->84938 84839 401fa2 GetModuleFileNameW 84956 40ff90 84839->84956 84841 401fbd 84968 4107b0 84841->84968 84844 401b70 75 API calls 84845 401fe4 84844->84845 84971 4019e0 84845->84971 84847 401ff2 84848 4092c0 VariantClear 84847->84848 84849 402002 84848->84849 84850 401b70 75 API calls 84849->84850 84851 40201c 84850->84851 84852 4019e0 76 API calls 84851->84852 84853 40202c 84852->84853 84939 40c060 75 API calls 84938->84939 84940 401f90 84939->84940 84941 402940 84940->84941 84942 40294a __write_nolock 84941->84942 84943 4021e0 75 API calls 84942->84943 84945 402972 84943->84945 84954 4029a4 84945->84954 85038 401be0 84945->85038 84946 402ae0 75 API calls 84946->84954 84947 402a8c 84948 401b70 75 API calls 84947->84948 84953 402abe 84947->84953 84950 402ab3 84948->84950 84949 401b70 75 API calls 84949->84954 85042 40d970 75 API calls 2 library calls 84950->85042 84953->84839 84954->84946 84954->84947 84954->84949 84955 401be0 75 API calls 84954->84955 85041 40d970 75 API calls 2 library calls 84954->85041 84955->84954 85043 40f5e0 84956->85043 84959 40ffa6 84959->84841 84961 42b6e6 84964 413a88 __read_nolock 67 API calls 84961->84964 84962 42b6d8 84962->84961 85099 434fe1 84962->85099 84965 42b6f5 84964->84965 84966 434fe1 106 API calls 84965->84966 84967 42b702 84966->84967 84967->84841 84969 41171a 75 API calls 84968->84969 84970 401fd6 84969->84970 84970->84844 84972 401a03 84971->84972 84974 4019e5 84971->84974 84973 401a1a 84972->84973 84972->84974 85709 404260 76 API calls 84973->85709 84976 4019ff 84974->84976 85708 404260 76 API calls 84974->85708 84976->84847 84977 401a26 84977->84847 85039 402ae0 75 API calls 85038->85039 85040 401be7 85039->85040 85040->84945 85041->84954 85042->84953 85103 40f580 85043->85103 85045 40f5f8 _strcat moneypunct 85111 40f6d0 85045->85111 85050 42b2ee 85140 4151b0 85050->85140 85052 40f679 85052->85050 85053 40f681 85052->85053 85127 414e94 85053->85127 85057 40f68b 85057->84959 85062 452574 85057->85062 85059 42b31d 85146 415484 85059->85146 85061 42b33d 85063 41557c _fseek 105 API calls 85062->85063 85064 4525df 85063->85064 85647 4523ce 85064->85647 85067 4525fc 85067->84962 85068 4151b0 __fread_nolock 81 API calls 85069 45261d 85068->85069 85070 4151b0 __fread_nolock 81 API calls 85069->85070 85071 45262e 85070->85071 85072 4151b0 __fread_nolock 81 API calls 85071->85072 85073 452649 85072->85073 85074 4151b0 __fread_nolock 81 API calls 85073->85074 85075 452666 85074->85075 85076 41557c _fseek 105 API calls 85075->85076 85077 452682 85076->85077 85078 4138ba _malloc 67 API calls 85077->85078 85100 434ff1 85099->85100 85101 434feb 85099->85101 85100->84961 85102 414e94 __fcloseall 106 API calls 85101->85102 85102->85100 85104 429440 85103->85104 85105 40f589 _wcslen 85103->85105 85106 40f58f WideCharToMultiByte 85105->85106 85107 40f5d8 85106->85107 85108 40f5ad 85106->85108 85107->85045 85109 41171a 75 API calls 85108->85109 85110 40f5bb WideCharToMultiByte 85109->85110 85110->85045 85112 40f6dd _strlen 85111->85112 85159 40f790 85112->85159 85115 414e06 85178 414d40 85115->85178 85117 40f666 85117->85050 85118 40f450 85117->85118 85119 40f45a _strcat _memcpy_s __write_nolock 85118->85119 85120 4151b0 __fread_nolock 81 API calls 85119->85120 85122 42936d 85119->85122 85126 40f531 85119->85126 85261 41557c 85119->85261 85120->85119 85123 41557c _fseek 105 API calls 85122->85123 85124 429394 85123->85124 85125 4151b0 __fread_nolock 81 API calls 85124->85125 85125->85126 85126->85052 85128 414ea0 __getstream 85127->85128 85129 414ed1 85128->85129 85130 414eb4 85128->85130 85133 415965 __lock_file 68 API calls 85129->85133 85135 414ec9 __getstream 85129->85135 85400 417f23 67 API calls __getptd_noexit 85130->85400 85132 414eb9 85401 417ebb 6 API calls 2 library calls 85132->85401 85136 414ee9 85133->85136 85135->85057 85384 414e1d 85136->85384 85469 41511a 85140->85469 85142 4151c8 85143 44afdc 85142->85143 85640 4431e0 85143->85640 85145 44affd 85145->85059 85147 415490 __getstream 85146->85147 85148 4154bb 85147->85148 85149 41549e 85147->85149 85151 415965 __lock_file 68 API calls 85148->85151 85644 417f23 67 API calls __getptd_noexit 85149->85644 85153 4154c3 85151->85153 85152 4154a3 85645 417ebb 6 API calls 2 library calls 85152->85645 85155 4152e7 __ftell_nolock 71 API calls 85153->85155 85156 4154cf 85155->85156 85646 4154e8 LeaveCriticalSection LeaveCriticalSection _fprintf 85156->85646 85158 4154b3 __getstream 85158->85061 85160 40f7ae _memset 85159->85160 85162 40f628 85160->85162 85163 415258 85160->85163 85162->85115 85164 415285 85163->85164 85165 415268 85163->85165 85164->85165 85167 41528c 85164->85167 85174 417f23 67 API calls __getptd_noexit 85165->85174 85176 41c551 103 API calls 14 library calls 85167->85176 85168 41526d 85175 417ebb 6 API calls 2 library calls 85168->85175 85171 4152b2 85172 41527d 85171->85172 85177 4191c9 101 API calls 7 library calls 85171->85177 85172->85160 85174->85168 85176->85171 85177->85172 85179 414d4c __getstream 85178->85179 85180 414d5f 85179->85180 85182 414d95 85179->85182 85230 417f23 67 API calls __getptd_noexit 85180->85230 85197 41e28c 85182->85197 85183 414d64 85231 417ebb 6 API calls 2 library calls 85183->85231 85186 414d9a 85188 414da1 85186->85188 85189 414dae 85186->85189 85187 414d74 @_EH4_CallFilterFunc@8 __getstream 85187->85117 85232 417f23 67 API calls __getptd_noexit 85188->85232 85191 414dd6 85189->85191 85192 414db6 85189->85192 85215 41dfd8 85191->85215 85233 417f23 67 API calls __getptd_noexit 85192->85233 85198 41e298 __getstream 85197->85198 85199 418407 __lock 67 API calls 85198->85199 85212 41e2a6 85199->85212 85200 41e31b 85235 41e3bb 85200->85235 85201 41e322 85203 416fb6 __malloc_crt 67 API calls 85201->85203 85204 41e32c 85203->85204 85204->85200 85240 4189e6 InitializeCriticalSectionAndSpinCount __getstream 85204->85240 85205 41e3b0 __getstream 85205->85186 85207 418344 __mtinitlocknum 67 API calls 85207->85212 85209 41e351 85210 41e35c 85209->85210 85211 41e36f EnterCriticalSection 85209->85211 85213 413a88 __read_nolock 67 API calls 85210->85213 85211->85200 85212->85200 85212->85201 85212->85207 85238 4159a6 68 API calls __lock 85212->85238 85239 415a14 LeaveCriticalSection LeaveCriticalSection _doexit 85212->85239 85213->85200 85224 41dffb __wopenfile 85215->85224 85216 41e015 85245 417f23 67 API calls __getptd_noexit 85216->85245 85218 41e1e9 85218->85216 85220 41e247 85218->85220 85219 41e01a 85246 417ebb 6 API calls 2 library calls 85219->85246 85242 425db0 85220->85242 85224->85216 85224->85218 85247 4136bc 79 API calls 2 library calls 85224->85247 85226 41e1e2 85226->85218 85248 4136bc 79 API calls 2 library calls 85226->85248 85228 41e201 85228->85218 85249 4136bc 79 API calls 2 library calls 85228->85249 85230->85183 85232->85187 85233->85187 85234 414dfc LeaveCriticalSection LeaveCriticalSection _fprintf 85234->85187 85241 41832d LeaveCriticalSection 85235->85241 85237 41e3c2 85237->85205 85238->85212 85239->85212 85240->85209 85241->85237 85250 425ce4 85242->85250 85244 414de1 85244->85234 85245->85219 85247->85226 85248->85228 85249->85218 85251 425cf0 __getstream 85250->85251 85252 425d03 85251->85252 85254 425d41 85251->85254 85253 417f23 __mbstowcs_s_l 67 API calls 85252->85253 85255 425d08 85253->85255 85256 4255c4 __tsopen_nolock 132 API calls 85254->85256 85257 417ebb __mbstowcs_s_l 6 API calls 85255->85257 85258 425d5b 85256->85258 85260 425d17 __getstream 85257->85260 85259 425d82 __sopen_helper LeaveCriticalSection 85258->85259 85259->85260 85260->85244 85264 415588 __getstream 85261->85264 85262 415596 85292 417f23 67 API calls __getptd_noexit 85262->85292 85263 4155c4 85274 415965 85263->85274 85264->85262 85264->85263 85267 41559b 85293 417ebb 6 API calls 2 library calls 85267->85293 85273 4155ab __getstream 85273->85119 85275 415977 85274->85275 85276 415999 EnterCriticalSection 85274->85276 85275->85276 85277 41597f 85275->85277 85278 4155cc 85276->85278 85279 418407 __lock 67 API calls 85277->85279 85280 4154f2 85278->85280 85279->85278 85281 415502 85280->85281 85283 415512 85280->85283 85349 417f23 67 API calls __getptd_noexit 85281->85349 85287 415524 85283->85287 85295 4152e7 85283->85295 85284 415507 85294 4155f7 LeaveCriticalSection LeaveCriticalSection _fprintf 85284->85294 85312 41486c 85287->85312 85292->85267 85294->85273 85296 41531a 85295->85296 85297 4152fa 85295->85297 85299 41453a __fileno 67 API calls 85296->85299 85350 417f23 67 API calls __getptd_noexit 85297->85350 85301 415320 85299->85301 85300 4152ff 85351 417ebb 6 API calls 2 library calls 85300->85351 85303 41efd4 __locking 71 API calls 85301->85303 85304 415335 85303->85304 85305 415364 85304->85305 85306 4153a9 85304->85306 85311 41530f 85304->85311 85308 41efd4 __locking 71 API calls 85305->85308 85305->85311 85352 417f23 67 API calls __getptd_noexit 85306->85352 85309 415404 85308->85309 85310 41efd4 __locking 71 API calls 85309->85310 85309->85311 85310->85311 85311->85287 85313 4148a7 85312->85313 85314 414885 85312->85314 85318 41453a 85313->85318 85314->85313 85315 41453a __fileno 67 API calls 85314->85315 85316 4148a0 85315->85316 85353 41c3cf 101 API calls 6 library calls 85316->85353 85319 41455e 85318->85319 85320 414549 85318->85320 85324 41efd4 85319->85324 85354 417f23 67 API calls __getptd_noexit 85320->85354 85322 41454e 85355 417ebb 6 API calls 2 library calls 85322->85355 85325 41efe0 __getstream 85324->85325 85326 41efe8 85325->85326 85329 41f003 85325->85329 85376 417f36 67 API calls __getptd_noexit 85326->85376 85328 41f011 85378 417f36 67 API calls __getptd_noexit 85328->85378 85329->85328 85332 41f052 85329->85332 85330 41efed 85377 417f23 67 API calls __getptd_noexit 85330->85377 85356 41ba3b 85332->85356 85334 41f016 85379 417f23 67 API calls __getptd_noexit 85334->85379 85337 41f058 85339 41f065 85337->85339 85340 41f07b 85337->85340 85338 41f01d 85380 417ebb 6 API calls 2 library calls 85338->85380 85366 41ef5f 85339->85366 85381 417f23 67 API calls __getptd_noexit 85340->85381 85342 41eff5 __getstream 85342->85284 85346 41f080 85382 417f36 67 API calls __getptd_noexit 85346->85382 85349->85284 85350->85300 85352->85311 85353->85313 85354->85322 85357 41ba47 __getstream 85356->85357 85358 41baa2 85357->85358 85361 418407 __lock 67 API calls 85357->85361 85359 41bac4 __getstream 85358->85359 85360 41baa7 EnterCriticalSection 85358->85360 85359->85337 85360->85359 85362 41ba73 85361->85362 85363 4189e6 __getstream InitializeCriticalSectionAndSpinCount 85362->85363 85365 41ba8a 85362->85365 85363->85365 85364 41bad2 ___lock_fhandle LeaveCriticalSection 85364->85358 85365->85364 85367 41b9c4 __commit 67 API calls 85366->85367 85376->85330 85377->85342 85378->85334 85379->85338 85381->85346 85385 414e31 85384->85385 85386 414e4d 85384->85386 85430 417f23 67 API calls __getptd_noexit 85385->85430 85388 414e46 85386->85388 85390 41486c __flush 101 API calls 85386->85390 85402 414f08 LeaveCriticalSection LeaveCriticalSection _fprintf 85388->85402 85389 414e36 85431 417ebb 6 API calls 2 library calls 85389->85431 85392 414e59 85390->85392 85403 41e680 85392->85403 85395 41453a __fileno 67 API calls 85396 414e67 85395->85396 85407 41e5b3 85396->85407 85398 414e6d 85398->85388 85399 413a88 __read_nolock 67 API calls 85398->85399 85399->85388 85400->85132 85402->85135 85404 41e690 85403->85404 85405 414e61 85403->85405 85404->85405 85406 413a88 __read_nolock 67 API calls 85404->85406 85405->85395 85406->85405 85408 41e5bf __getstream 85407->85408 85409 41e5e2 85408->85409 85410 41e5c7 85408->85410 85412 41e5f0 85409->85412 85416 41e631 85409->85416 85447 417f36 67 API calls __getptd_noexit 85410->85447 85449 417f36 67 API calls __getptd_noexit 85412->85449 85414 41e5cc 85448 417f23 67 API calls __getptd_noexit 85414->85448 85415 41e5f5 85450 417f23 67 API calls __getptd_noexit 85415->85450 85419 41ba3b ___lock_fhandle 68 API calls 85416->85419 85422 41e637 85419->85422 85420 41e5d4 __getstream 85420->85398 85421 41e5fc 85451 417ebb 6 API calls 2 library calls 85421->85451 85424 41e652 85422->85424 85425 41e644 85422->85425 85452 417f23 67 API calls __getptd_noexit 85424->85452 85432 41e517 85425->85432 85428 41e64c 85430->85389 85454 41b9c4 85432->85454 85447->85414 85448->85420 85449->85415 85450->85421 85452->85428 85456 41b9e9 85454->85456 85470 415126 __getstream 85469->85470 85471 41513a _memset 85470->85471 85472 41516f 85470->85472 85473 415164 __getstream 85470->85473 85498 417f23 67 API calls __getptd_noexit 85471->85498 85474 415965 __lock_file 68 API calls 85472->85474 85473->85142 85475 415177 85474->85475 85482 414f10 85475->85482 85478 415154 85499 417ebb 6 API calls 2 library calls 85478->85499 85483 414f4c 85482->85483 85486 414f2e _memset 85482->85486 85500 4151a6 LeaveCriticalSection LeaveCriticalSection _fprintf 85483->85500 85484 414f37 85551 417f23 67 API calls __getptd_noexit 85484->85551 85486->85483 85486->85484 85488 414f8b 85486->85488 85488->85483 85491 41453a __fileno 67 API calls 85488->85491 85493 4150d5 _memset 85488->85493 85495 4150a9 _memset 85488->85495 85501 41ed9e 85488->85501 85531 41e6b1 85488->85531 85553 41ee9b 67 API calls 3 library calls 85488->85553 85491->85488 85555 417f23 67 API calls __getptd_noexit 85493->85555 85554 417f23 67 API calls __getptd_noexit 85495->85554 85497 414f3c 85552 417ebb 6 API calls 2 library calls 85497->85552 85498->85478 85500->85473 85502 41edaa __getstream 85501->85502 85503 41edb2 85502->85503 85504 41edcd 85502->85504 85625 417f36 67 API calls __getptd_noexit 85503->85625 85506 41eddb 85504->85506 85510 41ee1c 85504->85510 85627 417f36 67 API calls __getptd_noexit 85506->85627 85507 41edb7 85626 417f23 67 API calls __getptd_noexit 85507->85626 85509 41ede0 85628 417f23 67 API calls __getptd_noexit 85509->85628 85513 41ee29 85510->85513 85514 41ee3d 85510->85514 85630 417f36 67 API calls __getptd_noexit 85513->85630 85517 41ba3b ___lock_fhandle 68 API calls 85514->85517 85515 41ede7 85629 417ebb 6 API calls 2 library calls 85515->85629 85519 41ee43 85517->85519 85518 41ee2e 85631 417f23 67 API calls __getptd_noexit 85518->85631 85520 41ee50 85519->85520 85521 41ee66 85519->85521 85556 41e7dc 85520->85556 85632 417f23 67 API calls __getptd_noexit 85521->85632 85524 41edbf __getstream 85524->85488 85527 41ee5e 85634 41ee91 LeaveCriticalSection __unlock_fhandle 85527->85634 85528 41ee6b 85633 417f36 67 API calls __getptd_noexit 85528->85633 85532 41e6c1 85531->85532 85537 41e6de 85531->85537 85638 417f23 67 API calls __getptd_noexit 85532->85638 85534 41e6d6 85534->85488 85535 41e6c6 85639 417ebb 6 API calls 2 library calls 85535->85639 85537->85534 85538 41e713 85537->85538 85635 423600 85537->85635 85540 41453a __fileno 67 API calls 85538->85540 85541 41e727 85540->85541 85542 41ed9e __read 79 API calls 85541->85542 85543 41e72e 85542->85543 85543->85534 85544 41453a __fileno 67 API calls 85543->85544 85545 41e751 85544->85545 85545->85534 85546 41453a __fileno 67 API calls 85545->85546 85547 41e75d 85546->85547 85547->85534 85548 41453a __fileno 67 API calls 85547->85548 85549 41e769 85548->85549 85550 41453a __fileno 67 API calls 85549->85550 85550->85534 85551->85497 85553->85488 85554->85497 85555->85497 85557 41e813 85556->85557 85558 41e7f8 85556->85558 85560 41e822 85557->85560 85562 41e849 85557->85562 85559 417f36 __read_nolock 67 API calls 85558->85559 85561 41e7fd 85559->85561 85563 417f36 __read_nolock 67 API calls 85560->85563 85565 417f23 __mbstowcs_s_l 67 API calls 85561->85565 85564 41e868 85562->85564 85578 41e87c 85562->85578 85566 41e827 85563->85566 85567 417f36 __read_nolock 67 API calls 85564->85567 85579 41e805 85565->85579 85569 417f23 __mbstowcs_s_l 67 API calls 85566->85569 85571 41e86d 85567->85571 85568 41e8d4 85570 417f36 __read_nolock 67 API calls 85568->85570 85572 41e82e 85569->85572 85573 41e8d9 85570->85573 85574 417f23 __mbstowcs_s_l 67 API calls 85571->85574 85575 417ebb __mbstowcs_s_l 6 API calls 85572->85575 85576 417f23 __mbstowcs_s_l 67 API calls 85573->85576 85577 41e874 85574->85577 85575->85579 85576->85577 85582 417ebb __mbstowcs_s_l 6 API calls 85577->85582 85578->85568 85578->85579 85580 41e8b0 85578->85580 85581 41e8f5 85578->85581 85579->85527 85580->85568 85587 41e8bb ReadFile 85580->85587 85584 416fb6 __malloc_crt 67 API calls 85581->85584 85582->85579 85588 41e90b 85584->85588 85585 41ed62 GetLastError 85589 41ebe8 85585->85589 85590 41ed6f 85585->85590 85586 41e9e7 85586->85585 85593 41e9fb 85586->85593 85587->85585 85587->85586 85591 41e931 85588->85591 85592 41e913 85588->85592 85599 417f49 __dosmaperr 67 API calls 85589->85599 85605 41eb6d 85589->85605 85595 417f23 __mbstowcs_s_l 67 API calls 85590->85595 85594 423462 __lseeki64_nolock 69 API calls 85591->85594 85596 417f23 __mbstowcs_s_l 67 API calls 85592->85596 85593->85605 85607 41ec2d 85593->85607 85609 41ea17 85593->85609 85599->85605 85603 413a88 __read_nolock 67 API calls 85603->85579 85604 41eafa 85604->85605 85605->85579 85605->85603 85606 41eca5 ReadFile 85607->85605 85607->85606 85609->85604 85610 41ea7d ReadFile 85609->85610 85625->85507 85626->85524 85627->85509 85628->85515 85630->85518 85631->85515 85632->85528 85633->85527 85634->85524 85636 416fb6 __malloc_crt 67 API calls 85635->85636 85637 423615 85636->85637 85637->85538 85638->85535 85643 414cef GetSystemTimeAsFileTime __aulldiv 85640->85643 85642 4431ef 85642->85145 85643->85642 85644->85152 85646->85158 85652 4523e1 _wcscpy 85647->85652 85648 4151b0 81 API calls __fread_nolock 85648->85652 85649 44afdc GetSystemTimeAsFileTime 85649->85652 85650 452553 85650->85067 85650->85068 85651 41557c 105 API calls _fseek 85651->85652 85652->85648 85652->85649 85652->85650 85652->85651 85708->84976 85709->84977 85794 45e397 85795 45e3a1 __write_nolock 85794->85795 85796 453081 111 API calls 85795->85796 85797 45e3b6 85796->85797 85798 40ffb0 76 API calls 85797->85798 85799 45e3c1 85798->85799 85800 453081 111 API calls 85799->85800 85801 45e3e5 85800->85801 85802 453081 111 API calls 85801->85802 85803 45e3ec 85802->85803 85804 453081 111 API calls 85803->85804 85805 45e3f3 GetPrivateProfileStringW 85804->85805 85808 40e6d0 85805->85808 85809 4092c0 VariantClear 85808->85809 85810 40e6d8 85809->85810 85811 41171a 75 API calls 85810->85811 85812 40e6e6 85811->85812 85813 42a3ea 85812->85813 85814 401b70 75 API calls 85812->85814 85815 40e6f8 85814->85815 85816 47bf14 85819 47bb2b 85816->85819 85818 47bf26 85820 47bb7c 85819->85820 85821 47bbb8 85819->85821 85820->85821 85822 47bb80 85820->85822 85823 47bbff 85821->85823 85824 47bbeb 85821->85824 85825 47bbcf 85821->85825 85826 47bc2c 85821->85826 85827 47bc7b 85821->85827 85829 4092c0 VariantClear 85822->85829 85835 453081 111 API calls 85823->85835 85828 47bcd0 85824->85828 85833 40c760 78 API calls 85824->85833 85832 453081 111 API calls 85825->85832 85869 409210 VariantClear 85826->85869 85830 40c760 78 API calls 85827->85830 85834 47bce8 85828->85834 85842 40c760 78 API calls 85828->85842 85831 47bb88 85829->85831 85837 47bc8d 85830->85837 85849 4092c0 VariantClear 85831->85849 85841 47bbe4 85832->85841 85833->85828 85838 47bd00 85834->85838 85845 40c760 78 API calls 85834->85845 85839 47bc1e 85835->85839 85870 41353a 103 API calls 3 library calls 85837->85870 85850 40c760 78 API calls 85838->85850 85851 47bd18 85838->85851 85846 40fff0 75 API calls 85839->85846 85840 47bc49 85847 453081 111 API calls 85840->85847 85844 40fff0 75 API calls 85841->85844 85842->85834 85844->85824 85845->85838 85846->85824 85853 47bc57 85847->85853 85848 47bc9d 85854 40fff0 75 API calls 85848->85854 85855 47bbac 85849->85855 85850->85851 85852 47bd34 85851->85852 85856 40c760 78 API calls 85851->85856 85858 47bd49 85852->85858 85859 47bd30 85852->85859 85857 40fff0 75 API calls 85853->85857 85854->85824 85855->85818 85856->85859 85857->85824 85871 47b1d0 226 API calls 85858->85871 85859->85852 85860 40c760 78 API calls 85859->85860 85860->85858 85862 47bd88 85863 4092c0 VariantClear 85862->85863 85864 47bd92 85863->85864 85865 40c760 78 API calls 85864->85865 85867 47bda2 moneypunct 85865->85867 85866 4092c0 VariantClear 85868 47bdd0 85866->85868 85867->85866 85868->85818 85869->85840 85870->85848 85871->85862 85872 45a2d3 85873 453081 111 API calls 85872->85873 85874 45a2e2 SetWindowTextW 85873->85874 85875 40ab16 85876 40ab50 85875->85876 85877 41171a 75 API calls 85876->85877 85896 40ab9e moneypunct 85877->85896 85878 40ac10 85879 42f332 85878->85879 85886 40ac53 moneypunct 85878->85886 85916 45e62e 116 API calls 3 library calls 85879->85916 85880 40ac5f moneypunct 85882 40af91 85899 409210 VariantClear 85882->85899 85884 4092c0 VariantClear 85884->85886 85885 41171a 75 API calls 85885->85896 85886->85880 85886->85884 85888 42ebac VariantClear 85888->85896 85890 42f3ae 85891 42ee49 VariantClear 85891->85896 85892 401b70 75 API calls 85892->85896 85893 42f2bd 85917 44b92e VariantClear 85893->85917 85894 40e380 VariantClear 85894->85896 85895 40c000 76 API calls 85895->85896 85896->85878 85896->85882 85896->85885 85896->85888 85896->85891 85896->85892 85896->85893 85896->85894 85896->85895 85900 409030 85896->85900 85914 452d91 VariantClear 85896->85914 85915 452d55 76 API calls 85896->85915 85899->85886 85918 409110 117 API calls 85900->85918 85902 42ceb6 85933 410ae0 VariantClear moneypunct 85902->85933 85904 40906e 85904->85902 85906 42cea9 85904->85906 85908 4090a4 85904->85908 85905 42cebf 85932 45e62e 116 API calls 3 library calls 85906->85932 85919 404160 85908->85919 85910 4090b6 85910->85902 85913 4090be moneypunct 85910->85913 85911 4090f0 moneypunct 85911->85896 85912 4092c0 VariantClear 85912->85913 85913->85911 85913->85912 85914->85896 85915->85896 85916->85893 85917->85890 85918->85904 85920 4092c0 VariantClear 85919->85920 85921 40416e 85920->85921 85934 404120 85921->85934 85923 40419b 85927 4041c6 85923->85927 85938 4366be 85923->85938 85952 40e0d0 85923->85952 85959 40e190 SetFilePointerEx 85923->85959 85960 40df70 85923->85960 85965 40efe0 85923->85965 85973 40d900 85923->85973 85977 436b22 85923->85977 85927->85910 85932->85902 85933->85905 85935 40412e 85934->85935 85936 4092c0 VariantClear 85935->85936 85937 404138 85936->85937 85937->85923 85939 4366d8 _wcslen 85938->85939 85940 4366fa GetFileAttributesW 85939->85940 85941 43670f GetLastError 85940->85941 85944 43672d 85940->85944 85942 436720 CreateDirectoryW 85941->85942 85943 436737 85941->85943 85942->85943 85942->85944 85943->85944 85945 40fff0 75 API calls 85943->85945 85944->85927 85947 436747 _wcsrchr 85945->85947 85946 436758 moneypunct 85946->85927 85947->85946 85948 4366be 75 API calls 85947->85948 85949 436779 moneypunct 85948->85949 85950 436796 85949->85950 85951 436788 CreateDirectoryW 85949->85951 85950->85927 85951->85950 85958 40e0de 85952->85958 85953 40e152 SetFilePointerEx 85980 40e190 SetFilePointerEx 85953->85980 85954 429467 85981 40e190 SetFilePointerEx 85954->85981 85957 40e12c 85957->85927 85958->85953 85958->85954 85958->85957 85959->85927 85961 41171a 75 API calls 85960->85961 85962 40df83 85961->85962 85963 40d900 CloseHandle 85962->85963 85964 40df8e 85963->85964 85964->85927 85966 40eff5 CreateFileW 85965->85966 85967 4299bf 85965->85967 85968 40f017 85966->85968 85967->85968 85969 4299c4 CreateFileW 85967->85969 85968->85927 85969->85968 85970 4299ea 85969->85970 85971 40e0d0 2 API calls 85970->85971 85972 4299f5 85971->85972 85972->85968 85974 40d917 85973->85974 85975 40d909 85973->85975 85974->85975 85976 40d91c CloseHandle 85974->85976 85975->85927 85976->85927 85982 436ade GetFileAttributesW 85977->85982 85979 436b2c 85979->85927 85980->85957 85981->85957 85983 436afa FindFirstFileW 85982->85983 85984 436b1d 85982->85984 85985 436b12 FindClose 85983->85985 85986 436b0b 85983->85986 85984->85979 85985->85984 85986->85979 85987 431914 85988 431920 85987->85988 85989 431928 85988->85989 85990 43193d 85988->85990 86181 45e62e 116 API calls 3 library calls 85989->86181 86182 47f2b4 174 API calls 85990->86182 85993 43194a 86032 4095b0 moneypunct 85993->86032 86183 45e62e 116 API calls 3 library calls 85993->86183 85994 409708 85996 4095d4 PeekMessageW 85996->86032 85998 4097af 85998->85994 86170 40d590 VariantClear 85998->86170 86000 4315b8 WaitForSingleObject 86004 4315d6 GetExitCodeProcess CloseHandle 86000->86004 86000->86032 86003 431623 Sleep 86008 43163b timeGetTime 86003->86008 86026 431547 86003->86026 86175 40d590 VariantClear 86004->86175 86005 4098f1 TranslateMessage DispatchMessageW 86005->86032 86008->86026 86009 40986e Sleep 86011 409880 timeGetTime 86009->86011 86009->86032 86011->86032 86012 431673 CloseHandle 86012->86026 86013 43170c GetExitCodeProcess CloseHandle 86013->86026 86016 46dd22 133 API calls 86016->86032 86017 46e641 134 API calls 86017->86026 86018 404120 VariantClear 86020 431781 Sleep 86018->86020 86020->86032 86023 40d590 VariantClear 86023->86032 86026->86012 86026->86013 86026->86017 86026->86018 86026->86020 86031 4092c0 VariantClear 86026->86031 86026->86032 86172 447e59 75 API calls 86026->86172 86173 453b07 77 API calls 86026->86173 86174 4646a2 76 API calls 86026->86174 86176 40d590 VariantClear 86026->86176 86177 444233 88 API calls _wcslen 86026->86177 86178 457509 VariantClear 86026->86178 86179 4717e3 VariantClear 86026->86179 86180 436272 6 API calls 86026->86180 86027 409030 129 API calls 86027->86032 86029 45e62e 116 API calls 86029->86032 86030 4319c9 VariantClear 86030->86032 86031->86026 86032->85994 86032->85996 86032->85998 86032->86000 86032->86003 86032->86005 86032->86009 86032->86016 86032->86023 86032->86026 86032->86027 86032->86029 86032->86030 86033 4092c0 VariantClear 86032->86033 86035 40d280 86032->86035 86040 40d2a0 86032->86040 86046 40b380 119 API calls moneypunct 86032->86046 86047 409a40 86032->86047 86171 409340 174 API calls moneypunct 86032->86171 86184 40e380 VariantClear moneypunct 86032->86184 86033->86032 86036 4292e3 86035->86036 86037 40d28c 86035->86037 86038 429323 86036->86038 86039 4292fd TranslateAcceleratorW 86036->86039 86037->86032 86038->86032 86039->86037 86041 4296d0 86040->86041 86044 40d2af 86040->86044 86041->86032 86042 42972a IsDialogMessageW 86043 40d2bc 86042->86043 86042->86044 86043->86032 86044->86042 86044->86043 86185 4340ec GetClassLongW 86044->86185 86046->86032 86048 409a66 _wcslen 86047->86048 86049 41171a 75 API calls 86048->86049 86110 40aade _memcpy_s moneypunct 86048->86110 86050 409a9c _memcpy_s 86049->86050 86052 41171a 75 API calls 86050->86052 86051 4013e0 75 API calls 86054 42cee9 86051->86054 86053 409abd 86052->86053 86055 409aeb CharUpperBuffW 86053->86055 86059 409b09 moneypunct 86053->86059 86053->86110 86056 41171a 75 API calls 86054->86056 86055->86059 86064 42cf10 _memcpy_s 86056->86064 86096 409b88 moneypunct 86059->86096 86187 47d10e 150 API calls 86059->86187 86060 4092c0 VariantClear 86061 42e5e0 86060->86061 86221 410ae0 VariantClear moneypunct 86061->86221 86063 42e5f2 86220 45e62e 116 API calls 3 library calls 86064->86220 86065 409e4a 86065->86064 86067 41171a 75 API calls 86065->86067 86071 409ea4 86065->86071 86066 40aa5b 86068 41171a 75 API calls 86066->86068 86067->86071 86089 40aa81 _memcpy_s moneypunct 86068->86089 86069 409ed0 86073 42d50d 86069->86073 86131 409ef8 _memcpy_s moneypunct 86069->86131 86200 40b800 VariantClear VariantClear moneypunct 86069->86200 86070 40c3e0 75 API calls 86070->86096 86071->86069 86072 41171a 75 API calls 86071->86072 86074 42d480 86072->86074 86079 42d527 86073->86079 86201 40b800 VariantClear VariantClear moneypunct 86073->86201 86078 42d491 86074->86078 86197 44b3f6 75 API calls 86074->86197 86075 42d195 VariantClear 86075->86096 86076 40a3a7 86080 40a415 86076->86080 86133 42db5c 86076->86133 86085 40df50 75 API calls 86078->86085 86079->86131 86202 40e2e0 VariantClear moneypunct 86079->86202 86084 41171a 75 API calls 86080->86084 86081 4092c0 VariantClear 86081->86096 86102 40a41c 86084->86102 86091 42d4a6 86085->86091 86087 41171a 75 API calls 86087->86096 86095 41171a 75 API calls 86089->86095 86198 4530b3 75 API calls 86091->86198 86093 42db96 86207 45e62e 116 API calls 3 library calls 86093->86207 86095->86110 86096->86064 86096->86065 86096->86066 86096->86070 86096->86075 86096->86081 86096->86087 86096->86089 86098 42d128 86096->86098 86101 42d20c 86096->86101 86108 42dbb9 86096->86108 86188 40c620 118 API calls 86096->86188 86190 40be00 86096->86190 86196 40e380 VariantClear moneypunct 86096->86196 86100 4092c0 VariantClear 86098->86100 86099 42d4d7 86199 4530b3 75 API calls 86099->86199 86104 42d131 86100->86104 86101->86032 86118 40a481 86102->86118 86208 40c8a0 VariantClear moneypunct 86102->86208 86189 410ae0 VariantClear moneypunct 86104->86189 86108->86060 86110->86051 86111 41171a 75 API calls 86111->86131 86112 44b3f6 75 API calls 86112->86131 86114 402cc0 75 API calls 86114->86131 86115 40aa22 moneypunct 86115->86032 86116 4092c0 VariantClear 86127 40a534 _memcpy_s moneypunct 86116->86127 86117 411421 74 API calls __cinit 86117->86131 86120 40a4ed 86118->86120 86121 42dc1e VariantClear 86118->86121 86118->86127 86119 40a053 86119->86032 86125 40a4ff moneypunct 86120->86125 86209 40e380 VariantClear moneypunct 86120->86209 86121->86125 86124 41171a 75 API calls 86124->86127 86125->86124 86125->86127 86126 4019e0 76 API calls 86126->86131 86127->86116 86130 42deb6 VariantClear 86127->86130 86132 40e380 VariantClear 86127->86132 86134 42e237 86127->86134 86135 40a73c 86127->86135 86136 42dfe9 VariantClear 86127->86136 86137 42df47 VariantClear 86127->86137 86143 41171a 75 API calls 86127->86143 86144 41171a 75 API calls 86127->86144 86210 46e9cd 75 API calls 86127->86210 86211 409210 VariantClear 86127->86211 86212 44cc6c VariantClear moneypunct 86127->86212 86130->86127 86131->86076 86131->86093 86131->86110 86131->86111 86131->86112 86131->86114 86131->86117 86131->86119 86131->86126 86131->86133 86203 45ee98 75 API calls 86131->86203 86204 404260 76 API calls 86131->86204 86205 409210 VariantClear 86131->86205 86132->86127 86206 4721e5 VariantClear 86133->86206 86213 46e709 VariantClear VariantClear moneypunct 86134->86213 86135->86134 86139 40a76b 86135->86139 86136->86127 86137->86127 86138 40a7a2 86150 40a7ad moneypunct 86138->86150 86214 40b800 VariantClear VariantClear moneypunct 86138->86214 86139->86138 86163 40a800 moneypunct 86139->86163 86186 40b800 VariantClear VariantClear moneypunct 86139->86186 86143->86127 86148 42dd10 VariantInit VariantCopy 86144->86148 86145 40a8b0 86156 40a8c2 moneypunct 86145->86156 86216 40e380 VariantClear moneypunct 86145->86216 86146 42e312 86147 42e337 VariantClear 86146->86147 86146->86156 86147->86156 86148->86127 86149 42dd30 VariantClear 86148->86149 86149->86127 86151 40a7ee 86150->86151 86155 42e2a7 VariantClear 86150->86155 86150->86163 86151->86163 86215 40e380 VariantClear moneypunct 86151->86215 86153 42e3b2 86158 42e3da VariantClear 86153->86158 86164 40a91a moneypunct 86153->86164 86155->86163 86156->86153 86157 40a908 86156->86157 86157->86164 86217 40e380 VariantClear moneypunct 86157->86217 86158->86164 86160 42e47f 86165 42e4a3 VariantClear 86160->86165 86169 40a957 moneypunct 86160->86169 86161 40a945 86161->86169 86218 40e380 VariantClear moneypunct 86161->86218 86163->86145 86163->86146 86164->86160 86164->86161 86165->86169 86167 42e559 VariantClear 86167->86169 86169->86115 86169->86167 86219 40e380 VariantClear moneypunct 86169->86219 86170->85994 86171->86032 86172->86026 86173->86026 86174->86026 86175->86026 86176->86026 86177->86026 86178->86026 86179->86026 86180->86026 86181->86032 86182->85993 86183->86032 86184->86032 86185->86044 86186->86138 86187->86059 86188->86096 86189->86115 86192 40be36 86190->86192 86195 40be08 _memcpy_s moneypunct 86190->86195 86191 41171a 75 API calls 86194 40be0f 86191->86194 86193 41171a 75 API calls 86192->86193 86193->86195 86194->86096 86195->86191 86196->86096 86197->86078 86198->86099 86199->86069 86200->86073 86201->86079 86202->86131 86203->86131 86204->86131 86205->86131 86206->86093 86207->86108 86208->86102 86209->86125 86210->86127 86211->86127 86212->86127 86213->86138 86214->86150 86215->86163 86216->86156 86217->86164 86218->86169 86219->86169 86220->86108 86221->86063 86222 45bb5c 86223 40c060 75 API calls 86222->86223 86224 45bb70 86223->86224 86225 45bb8f 86224->86225 86269 453063 86224->86269 86227 453081 111 API calls 86225->86227 86229 45bba2 86227->86229 86231 40c760 78 API calls 86229->86231 86230 40df50 75 API calls 86230->86225 86232 45bbaa 86231->86232 86237 44920c 86232->86237 86234 45bbb0 86235 4092c0 VariantClear 86234->86235 86236 45bbba 86235->86236 86241 449216 __write_nolock 86237->86241 86238 4492fe 86238->86234 86239 449486 86244 449491 86239->86244 86245 4494b8 SetWindowTextW SendMessageW 86239->86245 86240 4494f6 86274 435a35 79 API calls 2 library calls 86240->86274 86241->86238 86241->86239 86241->86240 86242 4493e8 86241->86242 86243 4492fa 86241->86243 86247 449861 86241->86247 86248 4492ec 86241->86248 86250 413f97 78 API calls 86242->86250 86243->86238 86249 44930e SendMessageW 86243->86249 86244->86245 86254 449497 SendMessageW 86244->86254 86245->86234 86247->86238 86256 449869 SetWindowTextW 86247->86256 86248->86238 86248->86239 86248->86240 86248->86242 86248->86243 86251 449324 SendMessageW 86249->86251 86252 44934b 86249->86252 86253 4493f0 SendMessageW 86250->86253 86273 43401c GetWindowRect ScreenToClient ScreenToClient InvalidateRect 86251->86273 86258 449360 CharNextW 86252->86258 86261 44937c 86252->86261 86253->86234 86254->86234 86255 449505 SendMessageW 86263 44951b 86255->86263 86256->86238 86260 449879 86256->86260 86262 449374 SendMessageW 86258->86262 86275 43401c GetWindowRect ScreenToClient ScreenToClient InvalidateRect 86260->86275 86261->86262 86266 4493a8 86261->86266 86262->86261 86263->86234 86265 449886 86263->86265 86265->86234 86266->86265 86267 4493b7 SendMessageW 86266->86267 86267->86265 86268 4493cb SendMessageW 86267->86268 86268->86234 86270 45306e 86269->86270 86271 45307a 86269->86271 86270->86271 86276 452e2a 111 API calls 5 library calls 86270->86276 86271->86230 86273->86238 86274->86255 86275->86265 86276->86271 86277 42919b 86282 40ef10 86277->86282 86280 411421 __cinit 74 API calls 86281 4291aa 86280->86281 86283 41171a 75 API calls 86282->86283 86284 40ef17 86283->86284 86285 42ad48 86284->86285 86290 40ef40 74 API calls __cinit 86284->86290 86287 40ef2a 86291 40e470 86287->86291 86290->86287 86292 40c060 75 API calls 86291->86292 86293 40e483 GetVersionExW 86292->86293 86294 4021e0 75 API calls 86293->86294 86295 40e4bb 86294->86295 86317 40e600 86295->86317 86302 42accc 86303 42ad28 GetSystemInfo 86302->86303 86306 42ad38 GetSystemInfo 86303->86306 86304 40e557 GetCurrentProcess 86337 40ee30 LoadLibraryA GetProcAddress 86304->86337 86309 40e5c9 86334 40eea0 86309->86334 86311 40e56c 86311->86306 86330 40eee0 86311->86330 86313 40e5e0 86315 40e5f1 FreeLibrary 86313->86315 86316 40e5f4 86313->86316 86314 40e5dd FreeLibrary 86314->86313 86315->86316 86316->86280 86318 40e60b 86317->86318 86319 40c740 75 API calls 86318->86319 86320 40e4c2 86319->86320 86321 40e620 86320->86321 86323 40e62a 86321->86323 86322 42ac93 86323->86322 86324 40c740 75 API calls 86323->86324 86325 40e4ce 86324->86325 86325->86302 86326 40ee70 86325->86326 86327 40e551 86326->86327 86328 40ee76 LoadLibraryA 86326->86328 86327->86304 86327->86311 86328->86327 86329 40ee87 GetProcAddress 86328->86329 86329->86327 86331 40e5bf 86330->86331 86332 40eee6 LoadLibraryA 86330->86332 86331->86303 86331->86309 86332->86331 86333 40eef7 GetProcAddress 86332->86333 86333->86331 86338 40eec0 LoadLibraryA GetProcAddress 86334->86338 86336 40e5d3 GetNativeSystemInfo 86336->86313 86336->86314 86337->86311 86338->86336 86339 47b51d 86371 448602 86339->86371 86341 47b534 86342 47b6e7 86341->86342 86343 47b6ab 86341->86343 86346 47b765 86342->86346 86352 47b742 86342->86352 86383 451c22 VariantClear 86343->86383 86345 47b783 GetDC SendMessageW SelectObject 86385 43609c 68 API calls 2 library calls 86345->86385 86346->86345 86349 47b88a 86346->86349 86347 47b6b6 86348 47b22c 86347->86348 86354 47b6d3 86347->86354 86353 4092c0 VariantClear 86348->86353 86350 47b89a 86349->86350 86386 4336c7 6 API calls 86349->86386 86356 47b8d5 86350->86356 86357 47b8ce 86350->86357 86384 441561 12 API calls 86352->86384 86359 47b231 86353->86359 86360 4092c0 VariantClear 86354->86360 86363 47b8e4 86356->86363 86364 47b8dd 86356->86364 86387 449063 10 API calls 86357->86387 86365 47b6d8 86360->86365 86361 47b7c1 SelectObject ReleaseDC 86366 47b7e6 MoveWindow 86361->86366 86368 4092c0 VariantClear 86363->86368 86388 448daf 91 API calls 86364->86388 86366->86349 86370 47b8ed 86368->86370 86372 44862a _memset 86371->86372 86373 448632 86372->86373 86377 448666 86372->86377 86374 44863c CreateMenu KiUserCallbackDispatcher 86373->86374 86375 44865e 86373->86375 86374->86375 86376 4486f5 CreatePopupMenu 86375->86376 86378 44867f 86376->86378 86379 448705 InsertMenuItemW KiUserCallbackDispatcher 86376->86379 86377->86378 86380 4486e7 IsMenu 86377->86380 86381 4486c2 GetMenuItemInfoW 86377->86381 86378->86341 86379->86341 86380->86376 86380->86378 86381->86378 86382 4486e0 86381->86382 86382->86380 86383->86347 86384->86346 86385->86361 86386->86350 86387->86356 86388->86363 86389 45c41e 86390 453081 111 API calls 86389->86390 86391 45c42d SetCurrentDirectoryW 86390->86391 86392 45c442 86391->86392 86393 45c438 86391->86393 86394 4092c0 VariantClear 86393->86394 86394->86392 86395 42e89e 86402 40c000 86395->86402 86397 42e8ac 86398 409a40 165 API calls 86397->86398 86399 42e8ca 86398->86399 86413 44b92e VariantClear 86399->86413 86401 42f3ae 86403 40c014 86402->86403 86404 40c007 86402->86404 86406 40c01a 86403->86406 86407 40c02c 86403->86407 86414 409210 VariantClear 86404->86414 86415 409210 VariantClear 86406->86415 86410 41171a 75 API calls 86407->86410 86408 40c00f 86408->86397 86412 40c033 86410->86412 86411 40c023 86411->86397 86412->86397 86413->86401 86414->86408 86415->86411 86416 401161 86417 4011c1 SetTimer RegisterWindowMessageW 86416->86417 86418 401175 KillTimer 86416->86418 86419 40110d DefWindowProcW 86416->86419 86422 401147 86417->86422 86423 4011ee CreatePopupMenu 86417->86423 86425 401000 Shell_NotifyIconW _memset 86418->86425 86424 401188 PostQuitMessage 86425->86424 86426 45bc22 86427 40c760 78 API calls 86426->86427 86428 45bc35 86427->86428 86429 40c760 78 API calls 86428->86429 86430 45bc3d 86429->86430 86435 448759 86430->86435 86432 45bc43 86433 4092c0 VariantClear 86432->86433 86434 45bc4e 86433->86434 86437 448783 86435->86437 86436 448787 86436->86432 86437->86436 86438 4487e9 86437->86438 86478 441c1e 86437->86478 86440 448818 86438->86440 86441 4487f9 SetWindowPos 86438->86441 86440->86436 86442 448974 GetWindowLongW 86440->86442 86443 448b33 86440->86443 86444 448a2a GetMenuItemInfoW 86440->86444 86445 44892b 86440->86445 86458 448b77 86440->86458 86441->86440 86451 4489bf SendMessageW 86442->86451 86452 4489b8 86442->86452 86449 448b41 86443->86449 86450 448c78 86443->86450 86444->86436 86464 448a5c 86444->86464 86455 448948 86445->86455 86445->86458 86446 448c6b 86446->86432 86447 448bb5 86454 448bb9 EnableWindow 86447->86454 86467 448bcb 86447->86467 86448 448ba3 KiUserCallbackDispatcher 86448->86447 86456 448b46 SendMessageW 86449->86456 86457 448b5c SendMessageW 86449->86457 86453 4489df SendMessageW 86451->86453 86459 4489f0 86451->86459 86452->86451 86453->86459 86454->86467 86483 441077 6 API calls 86455->86483 86456->86458 86457->86458 86458->86446 86458->86447 86458->86448 86459->86458 86463 441c1e 2 API calls 86459->86463 86461 448962 86461->86458 86462 448a9b SetMenuItemInfoW 86465 448ac2 GetMenuItemInfoW 86462->86465 86470 448abd 86462->86470 86466 448a14 SendMessageW 86463->86466 86464->86436 86464->86462 86469 448af0 DrawMenuBar 86465->86469 86465->86470 86466->86458 86467->86446 86471 448c34 ShowWindow 86467->86471 86472 448c39 86467->86472 86468 448ae6 SetMenuDefaultItem 86468->86469 86469->86458 86470->86468 86470->86469 86471->86472 86473 448c40 ShowWindow 86472->86473 86474 448c5e 86472->86474 86473->86474 86475 448c4c 86473->86475 86484 43401c GetWindowRect ScreenToClient ScreenToClient InvalidateRect 86474->86484 86475->86474 86477 448c55 EnableWindow 86475->86477 86477->86474 86479 441c30 86478->86479 86482 441c6b 86478->86482 86480 441c78 PostMessageW 86479->86480 86479->86482 86481 441c97 PostMessageW 86480->86481 86480->86482 86481->86482 86482->86438 86483->86461 86484->86446 86485 46d22f 86488 46d098 86485->86488 86487 46d241 86489 46d0b5 86488->86489 86490 46d115 86489->86490 86491 46d0b9 86489->86491 86535 45c216 78 API calls 86490->86535 86492 41171a 75 API calls 86491->86492 86494 46d0c0 86492->86494 86497 46d0cc 86494->86497 86532 40d940 76 API calls 86494->86532 86495 46d126 86496 46d0f8 86495->86496 86503 46d142 86495->86503 86498 4092c0 VariantClear 86496->86498 86500 453063 111 API calls 86497->86500 86501 46d0fd 86498->86501 86502 46d0dd 86500->86502 86501->86487 86533 40dfa0 83 API calls 86502->86533 86504 46d1c8 86503->86504 86506 46d158 86503->86506 86540 4676a3 78 API calls 86504->86540 86509 453063 111 API calls 86506->86509 86507 46d0ea 86507->86503 86510 46d0ee 86507->86510 86519 46d15e 86509->86519 86510->86496 86534 44ade5 CloseHandle moneypunct 86510->86534 86511 46d1ce 86541 4444c2 SetFilePointerEx SetFilePointerEx WriteFile 86511->86541 86512 46d18d 86536 467fce 82 API calls 86512->86536 86516 46d196 86537 401400 75 API calls 86516->86537 86517 46d1e7 86521 4092c0 VariantClear 86517->86521 86530 46d194 86517->86530 86519->86512 86519->86516 86520 46d1a2 86522 40df50 75 API calls 86520->86522 86521->86530 86523 46d1ac 86522->86523 86538 40d330 75 API calls 2 library calls 86523->86538 86525 46d224 86525->86487 86526 46d1b8 86539 467fce 82 API calls 86526->86539 86527 40d900 CloseHandle 86529 46d216 86527->86529 86542 44ade5 CloseHandle moneypunct 86529->86542 86530->86525 86530->86527 86532->86497 86533->86507 86534->86496 86535->86495 86536->86530 86537->86520 86538->86526 86539->86530 86540->86511 86541->86517 86542->86525 86543 4720ac 86544 4720e0 86543->86544 86545 472100 86544->86545 86546 40c760 78 API calls 86544->86546 86547 472114 86545->86547 86548 40c760 78 API calls 86545->86548 86546->86545 86549 472128 86547->86549 86550 40c760 78 API calls 86547->86550 86548->86547 86551 47213c 86549->86551 86553 40c760 78 API calls 86549->86553 86550->86549 86552 472150 86551->86552 86554 40c760 78 API calls 86551->86554 86555 472162 86552->86555 86556 40c760 78 API calls 86552->86556 86553->86551 86554->86552 86557 453081 111 API calls 86555->86557 86556->86555 86558 47218a 86557->86558 86567 4700b0 86558->86567 86560 472190 86561 4721c7 86560->86561 86562 472196 86560->86562 86563 4092c0 VariantClear 86561->86563 86565 4092c0 VariantClear 86562->86565 86564 4721d0 86563->86564 86566 4721b2 86565->86566 86568 41171a 75 API calls 86567->86568 86569 4700cd 86568->86569 86571 4700da 86569->86571 86639 46e891 75 API calls 86569->86639 86574 470105 86571->86574 86640 434343 75 API calls 2 library calls 86571->86640 86573 470240 86578 470290 86573->86578 86579 470260 SystemParametersInfoW GetSystemMetrics 86573->86579 86574->86573 86575 4701a2 86574->86575 86641 4340b2 86574->86641 86575->86560 86581 470295 SystemParametersInfoW GetSystemMetrics 86578->86581 86582 4702de SetRect AdjustWindowRectEx CreateWindowExW 86578->86582 86579->86578 86581->86582 86585 4702cd GetSystemMetrics 86581->86585 86582->86575 86583 47034e SetWindowLongW GetClientRect GetStockObject SendMessageW 86582->86583 86598 456354 GetCursorPos ScreenToClient 86583->86598 86584 470236 GetSystemMetrics 86584->86573 86585->86582 86588 4703cf 86611 441533 GetWindowLongW 86588->86611 86589 4703b9 SetTimer 86589->86588 86591 4703eb 86592 47040a 86591->86592 86593 470416 86591->86593 86594 470401 86591->86594 86592->86560 86644 4419a8 GetWindowLongW DestroyWindow 86593->86644 86612 4417bc 86594->86612 86597 47041e 86597->86560 86599 4563a0 86598->86599 86600 4563c6 GetAsyncKeyState GetAsyncKeyState 86599->86600 86645 451aa9 75 API calls 86599->86645 86603 45645f 86600->86603 86605 4563ec 86600->86605 86602 4564a7 86602->86588 86602->86589 86603->86602 86648 451aa9 75 API calls 86603->86648 86604 456400 86647 451aa9 75 API calls 86604->86647 86605->86603 86605->86604 86646 451aa9 75 API calls 86605->86646 86608 456422 86608->86603 86610 45642b GetWindowLongW 86608->86610 86610->86604 86611->86591 86613 4417d0 86612->86613 86617 4417db 86612->86617 86614 4340b2 GetWindowLongW 86613->86614 86614->86617 86615 441935 86615->86592 86616 441824 86618 44191b 86616->86618 86619 4418c5 EnableWindow 86616->86619 86620 441905 LockWindowUpdate InvalidateRect 86616->86620 86621 441887 ShowWindow 86616->86621 86622 44189e 86616->86622 86623 4418ee LockWindowUpdate 86616->86623 86624 4418d9 EnableWindow 86616->86624 86625 44185a 86616->86625 86626 44183b 86616->86626 86617->86615 86617->86616 86627 44180c 86617->86627 86618->86592 86619->86592 86620->86618 86621->86592 86628 4418a7 ShowWindow 86622->86628 86629 4418bc 86622->86629 86623->86592 86624->86592 86625->86629 86631 44185f ShowWindow 86625->86631 86626->86629 86630 441840 ShowWindow 86626->86630 86662 441077 6 API calls 86627->86662 86628->86592 86629->86592 86634 4375b0 24 API calls 86630->86634 86635 441877 86631->86635 86636 44186c 86631->86636 86633 44181e 86633->86616 86637 44184e 86634->86637 86635->86592 86636->86635 86649 4375b0 GetForegroundWindow 86636->86649 86637->86592 86639->86571 86640->86574 86642 4340c0 GetWindowRect GetClientRect GetSystemMetrics GetSystemMetrics 86641->86642 86643 4340c8 GetWindowLongW 86641->86643 86642->86573 86642->86584 86643->86642 86644->86597 86645->86600 86646->86608 86647->86603 86648->86602 86650 4375c3 86649->86650 86651 4375ce 86649->86651 86650->86635 86652 4375d2 FindWindowW 86651->86652 86653 4375e0 IsIconic 86651->86653 86652->86653 86654 4375f4 SetForegroundWindow 86653->86654 86655 4375eb ShowWindow 86653->86655 86656 4376e7 86654->86656 86657 43760b 7 API calls 86654->86657 86655->86654 86656->86635 86658 4376c1 86657->86658 86659 43764f 9 API calls 86657->86659 86660 4376c9 AttachThreadInput AttachThreadInput AttachThreadInput 86658->86660 86659->86660 86661 4376b7 86659->86661 86660->86635 86661->86660 86662->86633 86663 40916c 86667 409170 86663->86667 86664 40be00 75 API calls 86664->86667 86665 42c082 86666 4092c0 VariantClear 86665->86666 86669 409204 86666->86669 86667->86664 86667->86665 86668 4091fb 86667->86668 86670 42c06f 86667->86670 86673 4092c0 VariantClear 86667->86673 86674 4091f0 86667->86674 86671 4092c0 VariantClear 86668->86671 86675 45e62e 116 API calls 3 library calls 86670->86675 86671->86669 86673->86667 86675->86665 86676 40c170 86677 40c17b 86676->86677 86684 40c1a5 _memcpy_s 86676->86684 86678 40c1d6 86677->86678 86679 40c19b 86677->86679 86677->86684 86681 41171a 75 API calls 86678->86681 86685 4034b0 86679->86685 86682 40c1df 86681->86682 86683 41171a 75 API calls 86682->86683 86682->86684 86683->86684 86686 4034b9 86685->86686 86687 4034bd 86685->86687 86686->86684 86688 41171a 75 API calls 86687->86688 86689 42a0ba 86687->86689 86690 4034fe _memcpy_s moneypunct 86688->86690 86690->86684 86691 403fb0 86692 404001 86691->86692 86693 403fbb 86691->86693 86694 40c740 75 API calls 86692->86694 86693->86692 86695 403fc8 86693->86695 86696 40400b 86694->86696 86697 42ac60 86695->86697 86698 403fd4 86695->86698 86700 4013e0 75 API calls 86697->86700 86705 404020 75 API calls moneypunct 86698->86705 86701 42ac67 86700->86701 86703 41171a 75 API calls 86701->86703 86702 403fd9 _memcpy_s 86704 42ac89 86703->86704 86705->86702 86706 4011b0 86707 4011bc 86706->86707 86708 40110d 86706->86708 86713 45f48e 88 API calls _memset 86707->86713 86709 401119 DefWindowProcW 86708->86709 86711 42e733 86711->86709 86712 42e73b 86711->86712 86712->86712 86713->86711 86714 466537 86715 453081 111 API calls 86714->86715 86716 466549 86715->86716 86724 44bf8d 86716->86724 86718 46654f 86719 466556 GetLastError 86718->86719 86723 466574 86718->86723 86720 404120 VariantClear 86719->86720 86721 46656b 86720->86721 86722 4092c0 VariantClear 86721->86722 86722->86723 86725 40ffb0 76 API calls 86724->86725 86726 44bfac 86725->86726 86736 436ac4 GetFileAttributesW 86726->86736 86728 44bfb6 _wcscat 86729 413db0 __wsplitpath 67 API calls 86728->86729 86730 44bff6 FindFirstFileW 86729->86730 86731 44c094 FindClose 86730->86731 86733 44c015 _wcscat _wcscpy 86730->86733 86731->86718 86732 44c06e FindNextFileW 86732->86733 86733->86731 86733->86732 86734 44c05b DeleteFileW 86733->86734 86734->86732 86735 44c085 FindClose 86734->86735 86735->86718 86737 436ad4 86736->86737 86737->86728 86738 47e674 86739 47e729 86738->86739 86742 47e1fa 86739->86742 86741 47e838 86743 4340b2 GetWindowLongW 86742->86743 86828 47e21a 86743->86828 86744 47e228 DefDlgProcW 86744->86741 86745 47e445 86747 47e5c6 86745->86747 86748 47e451 86745->86748 86746 47e2fe 86749 47e304 86746->86749 86750 47e42a 86746->86750 86753 47e5ce 86747->86753 86754 47e61a 86747->86754 86751 47e457 86748->86751 86752 47e5b3 86748->86752 86749->86744 86756 47e386 86749->86756 86757 47e3a6 86749->86757 86758 47e3e3 86749->86758 86759 47e321 86749->86759 86760 47e34d 86749->86760 86761 47e32d 86749->86761 86762 47e36b 86749->86762 86763 47e417 86749->86763 86764 47e3b7 86749->86764 86765 47e396 86749->86765 86766 47e3d2 86749->86766 86767 47e33d 86749->86767 86768 47e3fc 86749->86768 86875 469681 105 API calls 2 library calls 86750->86875 86751->86744 86784 47e485 86751->86784 86785 47e4a9 86751->86785 86786 47e497 86751->86786 86787 47e537 86751->86787 86788 47e476 86751->86788 86789 47e595 86751->86789 86790 47e555 86751->86790 86791 47e575 86751->86791 86792 47e4bb 86751->86792 86793 47e4d9 86751->86793 86794 47e4f9 86751->86794 86795 47e519 86751->86795 86888 44096a DefDlgProcW 86752->86888 86771 47e5d0 86753->86771 86772 47e609 86753->86772 86754->86744 86770 47e626 86754->86770 86868 4409df GetWindowLongW GetWindowRect GetWindowRect MoveWindow 86756->86868 86870 447a87 139 API calls 86757->86870 86850 44796b 86758->86850 86759->86741 86866 440b39 8 API calls 86760->86866 86864 47c08e 132 API calls _wcsncpy 86761->86864 86867 440adf GetWindowLongW DefDlgProcW 86762->86867 86874 44099c CreateProcessW CloseHandle DefDlgProcW 86763->86874 86871 43323e GetWindowLongW DefDlgProcW 86764->86871 86869 447b66 113 API calls 86765->86869 86872 447b15 GetWindowLongW PostMessageW PostMessageW DefDlgProcW 86766->86872 86865 46f749 18 API calls 86767->86865 86873 447870 6 API calls 86768->86873 86892 44782b LoadLibraryA GetProcAddress DefDlgProcW 86770->86892 86800 47e5f6 86771->86800 86801 47e5da 86771->86801 86891 46f2b0 91 API calls _wcscat 86772->86891 86773 47e43b 86773->86741 86877 45058d 102 API calls 86784->86877 86879 45058d 102 API calls 86785->86879 86878 45058d 102 API calls 86786->86878 86884 46f70d 111 API calls 86787->86884 86876 447b4e GetWindowLongW 86788->86876 86887 4331d9 ClientToScreen ImageList_DragMove DefDlgProcW 86789->86887 86885 461eb0 83 API calls 86790->86885 86886 461eb0 83 API calls 86791->86886 86880 454c69 80 API calls 86792->86880 86881 469995 93 API calls 86793->86881 86882 469995 93 API calls 86794->86882 86883 46f72b 111 API calls 86795->86883 86798 47e5bc 86798->86741 86890 440938 DefDlgProcW 86800->86890 86801->86744 86818 47e5e3 86801->86818 86807 47e335 86807->86741 86809 47e343 86809->86741 86811 47e361 86811->86741 86813 47e37c 86813->86741 86815 47e38c 86815->86741 86816 47e39c 86816->86741 86817 47e3ad 86817->86741 86889 454c1b 76 API calls 86818->86889 86819 47e3ca 86819->86741 86820 47e3d9 86820->86741 86822 47e3f4 86822->86741 86823 47e610 86823->86741 86824 47e40d 86824->86741 86825 47e420 86825->86741 86828->86744 86849 47e2e5 86828->86849 86863 47dfd1 174 API calls __wcsicoll 86828->86863 86831 47e4cf 86831->86741 86832 47e4ef 86832->86741 86833 47e50f 86833->86741 86834 47e52d 86834->86741 86835 47e54b 86835->86741 86836 47e56b 86836->86741 86837 47e58b 86837->86741 86838 47e5a9 86838->86741 86840 47e5ff 86840->86741 86842 47e48f 86842->86741 86843 47e4a1 86843->86741 86845 47e4b3 86845->86741 86846 47e5ec 86846->86741 86847 47e2c4 86847->86759 86848 4340b2 GetWindowLongW 86847->86848 86848->86849 86849->86745 86849->86746 86849->86759 86851 4340b2 GetWindowLongW 86850->86851 86852 447985 GetClientRect GetCursorPos ScreenToClient 86851->86852 86853 447a63 DefDlgProcW 86852->86853 86854 4479d2 86852->86854 86853->86822 86854->86853 86855 4479f5 WindowFromPoint 86854->86855 86856 447a49 86854->86856 86855->86856 86858 447a09 86855->86858 86894 433bac 30 API calls 86856->86894 86858->86856 86861 447a32 86858->86861 86893 433bac 30 API calls 86861->86893 86863->86847 86864->86807 86865->86809 86866->86811 86867->86813 86868->86815 86869->86816 86870->86817 86871->86819 86872->86820 86873->86824 86874->86825 86875->86773 86877->86842 86878->86843 86879->86845 86880->86831 86881->86832 86882->86833 86883->86834 86884->86835 86885->86836 86886->86837 86887->86838 86888->86798 86889->86846 86890->86840 86891->86823 86892->86759 86895 461e7f GetForegroundWindow 86896 4340b2 GetWindowLongW 86895->86896 86897 461e90 86896->86897 86898 461ead 86897->86898 86899 456354 80 API calls 86897->86899 86899->86898

    Control-flow Graph

    APIs
    • GetForegroundWindow.USER32(00000000,?,?,004448AF,?), ref: 004375B3
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004375D8
    • IsIconic.USER32(?), ref: 004375E1
    • ShowWindow.USER32(?,00000009,?,?,004448AF,?), ref: 004375EE
    • SetForegroundWindow.USER32(?), ref: 004375FD
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00437615
    • GetCurrentThreadId.KERNEL32 ref: 00437619
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00437624
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437632
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437638
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 0043763E
    • SetForegroundWindow.USER32(?), ref: 00437645
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437654
    • keybd_event.USER32(00000012,00000000), ref: 0043765D
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043766B
    • keybd_event.USER32(00000012,00000000), ref: 00437674
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437682
    • keybd_event.USER32(00000012,00000000), ref: 0043768B
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437699
    • keybd_event.USER32(00000012,00000000), ref: 004376A2
    • SetForegroundWindow.USER32(?), ref: 004376AD
    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376CD
    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D3
    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
    • String ID: Shell_TrayWnd
    • API String ID: 3778422247-2988720461
    • Opcode ID: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
    • Instruction ID: 6108fbe056c1a000d5481f33e03d330ccc862392245923d3170deea12ea07584
    • Opcode Fuzzy Hash: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
    • Instruction Fuzzy Hash: AC31A4712803157FE6245BA59D0EF7F3F9CEB48B51F10082EFA02EA1D1DAE458009B79
    APIs
    • _wcslen.LIBCMT ref: 00409A61
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
    • CharUpperBuffW.USER32(?,?), ref: 00409AF5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
    • String ID: 0vH$4RH
    • API String ID: 1143807570-2085553193
    • Opcode ID: 4b0f0b3f61dbcabd6cff1b2128a933effe0869b46afb2cc26fbc370943077572
    • Instruction ID: 3ab615a69cb9e6f40c53410016556bff414b7e0a3337ae804ba92b9b37f080c7
    • Opcode Fuzzy Hash: 4b0f0b3f61dbcabd6cff1b2128a933effe0869b46afb2cc26fbc370943077572
    • Instruction Fuzzy Hash: FA238170A043109FD724DF25D480A6BB7E1BF89304F54896EE84A9B391D739EC46CB9B

    Control-flow Graph

    APIs
    • GetCurrentDirectoryW.KERNEL32(00000104,?,00000001,?,00000000), ref: 0040D6E5
      • Part of subcall function 00401F80: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\AutoClicker-3.0.exe,00000104,?,?,?,?,00000000), ref: 00401FAD
      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 00402078
      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 0040208E
      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020A4
      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020BA
      • Part of subcall function 00401F80: _wcscpy.LIBCMT ref: 004020EF
    • IsDebuggerPresent.KERNEL32(?), ref: 0040D6F1
    • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\AutoClicker-3.0.exe,00000104,?,004A7CF8,004A7CFC), ref: 0040D763
      • Part of subcall function 00401440: GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00401483
    • SetCurrentDirectoryW.KERNEL32(?,00000001,C:\Users\user\Desktop\AutoClicker-3.0.exe,00000004), ref: 0040D7D6
    • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,004846D6,00000010), ref: 00431AAB
    • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\Desktop\AutoClicker-3.0.exe,00000004), ref: 00431B0E
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,C:\Users\user\Desktop\AutoClicker-3.0.exe,00000004), ref: 00431B3F
    • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 00431B8B
    • ShellExecuteW.SHELL32(00000000), ref: 00431B92
      • Part of subcall function 004101F0: GetSysColorBrush.USER32(0000000F), ref: 004101F9
      • Part of subcall function 004101F0: LoadCursorW.USER32(00000000,00007F00), ref: 00410209
      • Part of subcall function 004101F0: LoadIconW.USER32(?,00000063), ref: 0041021F
      • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A4), ref: 00410232
      • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A2), ref: 00410245
      • Part of subcall function 004101F0: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
      • Part of subcall function 004101F0: RegisterClassExW.USER32 ref: 004102C6
      • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
      • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
      • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 00410454
      • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 0041045E
      • Part of subcall function 0040E1E0: _memset.LIBCMT ref: 0040E202
      • Part of subcall function 0040E1E0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memset_wcscpy
    • String ID: @GH$@GH$C:\Users\user\Desktop\AutoClicker-3.0.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
    • API String ID: 2493088469-3650105508
    • Opcode ID: 75596ac1eb9fb8c27b10a3e9b89ecf98d01d6b80bfe706059cb2955862baadc9
    • Instruction ID: 2e872a54c38beeffbe1e66633b50b6eacae0f9fd3fe4cebaa62a8528039093a6
    • Opcode Fuzzy Hash: 75596ac1eb9fb8c27b10a3e9b89ecf98d01d6b80bfe706059cb2955862baadc9
    • Instruction Fuzzy Hash: 4A411731618341ABD320F7A09D49BAF3BA4AB95704F04493FF941672D1DBBC9949C72E

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1641 44bf8d-44bfbb call 40ffb0 call 436ac4 1646 44bfbd-44bfcc call 411663 1641->1646 1647 44bfcf-44c013 call 413db0 FindFirstFileW 1641->1647 1646->1647 1652 44c094-44c0a4 FindClose 1647->1652 1653 44c015-44c018 1647->1653 1653->1652 1654 44c01a-44c022 1653->1654 1655 44c024-44c06c call 411691 call 411663 * 2 DeleteFileW 1654->1655 1656 44c06e-44c07f FindNextFileW 1654->1656 1655->1656 1664 44c085-44c093 FindClose 1655->1664 1656->1653 1658 44c081-44c083 1656->1658 1658->1653
    APIs
      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\AutoClicker-3.0.exe,?,C:\Users\user\Desktop\AutoClicker-3.0.exe,004A8E80,C:\Users\user\Desktop\AutoClicker-3.0.exe,0040F3D2), ref: 0040FFCA
      • Part of subcall function 00436AC4: GetFileAttributesW.KERNELBASE(?,0044BD82,?,?,?), ref: 00436AC9
    • _wcscat.LIBCMT ref: 0044BFC7
    • __wsplitpath.LIBCMT ref: 0044BFF1
    • FindFirstFileW.KERNELBASE(?,?), ref: 0044C006
    • _wcscpy.LIBCMT ref: 0044C032
    • _wcscat.LIBCMT ref: 0044C044
    • _wcscat.LIBCMT ref: 0044C056
    • DeleteFileW.KERNELBASE(?), ref: 0044C063
    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 0044C077
    • FindClose.KERNEL32(00000000), ref: 0044C086
    • FindClose.KERNEL32(00000000), ref: 0044C095
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FileFind$_wcscat$Close$AttributesDeleteFirstFullNameNextPath__wsplitpath_wcscpy
    • String ID: \*.*
    • API String ID: 3771809977-1173974218
    • Opcode ID: 429c72fd8ce84cdae074230fe06e5095f65bdfd842ee2103364736c543792b33
    • Instruction ID: 9cf480aa196f294c1fa35a86eed1a807036e0773d071a08e0fc304530ec90260
    • Opcode Fuzzy Hash: 429c72fd8ce84cdae074230fe06e5095f65bdfd842ee2103364736c543792b33
    • Instruction Fuzzy Hash: D331D7724093049BC710DFA0D884ADFB7ECAB99314F084E1EF69982151EB39D24C87AA

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1721 40e470-40e500 call 40c060 GetVersionExW call 4021e0 call 40e600 call 40e620 1730 40e506-40e509 1721->1730 1731 42accc-42acd1 1721->1731 1734 40e540-40e555 call 40ee70 1730->1734 1735 40e50b-40e51c 1730->1735 1732 42acd3-42acdb 1731->1732 1733 42acdd-42ace0 1731->1733 1737 42ad12-42ad20 1732->1737 1738 42ace2-42aceb 1733->1738 1739 42aced-42acf0 1733->1739 1752 40e557-40e573 GetCurrentProcess call 40ee30 1734->1752 1753 40e579-40e5a8 1734->1753 1740 40e522-40e525 1735->1740 1741 42ac9b-42aca7 1735->1741 1751 42ad28-42ad2d GetSystemInfo 1737->1751 1738->1737 1739->1737 1746 42acf2-42ad06 1739->1746 1740->1734 1742 40e527-40e537 1740->1742 1744 42acb2-42acba 1741->1744 1745 42aca9-42acad 1741->1745 1749 42acbf-42acc7 1742->1749 1750 40e53d 1742->1750 1744->1734 1745->1734 1747 42ad08-42ad0c 1746->1747 1748 42ad0e 1746->1748 1747->1737 1748->1737 1749->1734 1750->1734 1755 42ad38-42ad3d GetSystemInfo 1751->1755 1752->1753 1763 40e575 1752->1763 1753->1755 1756 40e5ae-40e5c3 call 40eee0 1753->1756 1756->1751 1761 40e5c9-40e5db call 40eea0 GetNativeSystemInfo 1756->1761 1765 40e5e0-40e5ef 1761->1765 1766 40e5dd-40e5de FreeLibrary 1761->1766 1763->1753 1767 40e5f1-40e5f2 FreeLibrary 1765->1767 1768 40e5f4-40e5ff 1765->1768 1766->1765 1767->1768
    APIs
    • GetVersionExW.KERNEL32 ref: 0040E495
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    • GetCurrentProcess.KERNEL32(?,?), ref: 0040E560
    • GetNativeSystemInfo.KERNELBASE(?,?), ref: 0040E5D3
    • FreeLibrary.KERNEL32(?), ref: 0040E5DE
    • FreeLibrary.KERNEL32(?), ref: 0040E5F2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_wcslen
    • String ID: pMH$#v
    • API String ID: 2923339712-1800489730
    • Opcode ID: 4c6546f83278d93c296eece5aed2db143aaa01919c58d78ab84702413c249700
    • Instruction ID: 31d199e0849a18b4fe3a20375a839c17b1fda7a8e5a404adfed2e153d323e8b3
    • Opcode Fuzzy Hash: 4c6546f83278d93c296eece5aed2db143aaa01919c58d78ab84702413c249700
    • Instruction Fuzzy Hash: D4612E71508792AEC311CB69C44425ABFE07B6A308F580E6EE48483A42D379E568C7AB
    APIs
    • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EB55,0040D86E), ref: 0040EB7B
    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EB8D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: IsThemeActive$uxtheme.dll
    • API String ID: 2574300362-3542929980
    • Opcode ID: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
    • Instruction ID: e8120cabfd18d8fe06d2f96d8b82b2b5a4bcadd10797c678d2963416b1e4c3b8
    • Opcode Fuzzy Hash: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
    • Instruction Fuzzy Hash: 05D0C9B49407039AD7306F72C918B0A7BE4AB50342F204C3EF996A1694DBBCD0508B28
    APIs
    • GetFileAttributesW.KERNELBASE(00000001,00000000), ref: 00436AEF
    • FindFirstFileW.KERNELBASE(00000001,?), ref: 00436B00
    • FindClose.KERNEL32(00000000), ref: 00436B13
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FileFind$AttributesCloseFirst
    • String ID:
    • API String ID: 48322524-0
    • Opcode ID: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
    • Instruction ID: 417b6d6de692ea6945bae3bf725251b28653fd5bce93257cef0f58e2a105c1b1
    • Opcode Fuzzy Hash: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
    • Instruction Fuzzy Hash: 23E02236804418678600AB7CAC0C4EE779CDB0A335F100B96FE38C21D0D775A9408FEA
    APIs
    • DefDlgProcW.USER32(?,?,?,?,004A83D8,?), ref: 0047E22C
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Proc
    • String ID:
    • API String ID: 2346855178-0
    • Opcode ID: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
    • Instruction ID: e1c03c818efbd3cbf3664a0c3e659178dbc9a05004c0f073233894ce1d713c90
    • Opcode Fuzzy Hash: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
    • Instruction Fuzzy Hash: 4EB1E63330602429E114916BBC88EBFBB9CD7D677BB208B7FF142C1582DB5B6425A179

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 916 448759-448785 call 44213b 919 448787-44878f 916->919 920 448792-4487cd 916->920 921 4487d1-4487dc 920->921 922 4487cf 920->922 923 4487f1-4487f7 921->923 924 4487de-4487e4 call 441c1e 921->924 922->921 926 448818-448823 923->926 927 4487f9-448810 SetWindowPos 923->927 928 4487e9 924->928 929 448b7f-448b8b 926->929 930 448829-448830 926->930 927->926 928->923 935 448b91-448ba1 929->935 936 448c6b-448c75 929->936 930->919 931 448974-4489b6 GetWindowLongW 930->931 932 448b33-448b3b 930->932 933 448a2a-448a56 GetMenuItemInfoW 930->933 934 44892b-44892e 930->934 943 4489bf-4489dd SendMessageW 931->943 944 4489b8-4489bb 931->944 941 448b41-448b44 932->941 942 448c78-448c85 932->942 933->919 939 448a5c-448a5f 933->939 934->929 940 448934-448946 934->940 937 448bb5-448bb7 935->937 938 448ba3-448bb1 KiUserCallbackDispatcher 935->938 947 448bb9-448bc7 EnableWindow 937->947 948 448bcb-448bd0 937->948 938->937 939->919 949 448a65-448a67 939->949 950 448954-44896f call 441077 940->950 951 448948-44894e 940->951 952 448b46-448b5a SendMessageW 941->952 953 448b5c-448b75 SendMessageW 941->953 945 4489f0-4489f5 943->945 946 4489df-4489ee SendMessageW 943->946 944->943 954 448b77 945->954 955 4489fb-448a25 call 4421c1 call 441c1e SendMessageW 945->955 946->945 947->948 956 448bd5-448bde 948->956 957 448bd2 948->957 958 448a71-448a74 949->958 959 448a69 949->959 950->954 951->950 952->954 953->929 953->954 954->929 955->954 962 448be0 956->962 963 448be3-448be5 956->963 957->956 964 448a76 958->964 965 448a7b-448a80 958->965 959->958 962->963 968 448be7 963->968 969 448bed-448bf2 963->969 964->965 970 448a82 965->970 971 448a8a-448a8f 965->971 968->969 975 448bf4 969->975 976 448bfa-448c12 969->976 970->971 972 448a91-448a94 971->972 973 448a9b-448abb SetMenuItemInfoW 971->973 972->973 977 448a96 972->977 978 448ac2-448ad6 GetMenuItemInfoW 973->978 979 448abd-448ac0 973->979 975->976 981 448c14-448c23 976->981 982 448c2a-448c32 976->982 977->973 984 448af0-448afd DrawMenuBar 978->984 985 448ad8-448ae0 978->985 983 448ae6-448aea SetMenuDefaultItem 979->983 981->982 986 448c25-448c28 981->986 987 448c34-448c37 ShowWindow 982->987 988 448c39-448c3e 982->988 983->984 984->954 985->984 991 448ae2-448ae4 985->991 986->936 986->982 987->988 989 448c40-448c4a ShowWindow 988->989 990 448c5e-448c66 call 43401c 988->990 989->990 992 448c4c-448c53 989->992 990->936 991->983 992->990 994 448c55-448c58 EnableWindow 992->994 994->990
    APIs
    • SetWindowPos.USER32(004A83D8,00000000,00000000,00000000,00000000,00000000,00000013,004A83D8,?,?), ref: 0044880A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window
    • String ID: 0
    • API String ID: 2353593579-4108050209
    • Opcode ID: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
    • Instruction ID: 13976ff69904029c6bcd7d6129a783336058688c161485e0dcc644b2654616cc
    • Opcode Fuzzy Hash: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
    • Instruction Fuzzy Hash: 94B19DB02443419FF324CF14C889BABBBE4EB89744F14491EF991972D1DBB8E845CB5A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 995 410b90-410cf1 call 425210 call 41171a GetModuleFileNameW call 413db0 call 413dfc call 413e3c call 41171a call 411691 RegOpenKeyExW 1010 429bc3-429bec RegQueryValueExW 995->1010 1011 410cf7-410d03 995->1011 1012 429bf2-429c18 1010->1012 1013 429cd9-429cde RegCloseKey 1010->1013 1014 429c1f-429c31 1012->1014 1015 429c33-429c37 1014->1015 1016 429c50-429c5f call 4112d5 1014->1016 1015->1016 1018 429c39-429c48 call 411663 1015->1018 1021 429c61-429c74 call 4112d5 1016->1021 1022 429c88-429cd2 call 41171a call 41326a 1016->1022 1026 429c4b-429c4e 1018->1026 1021->1022 1029 429c76-429c85 call 411663 1021->1029 1022->1026 1034 429cd8 1022->1034 1026->1014 1029->1022 1034->1013
    APIs
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00410C44
    • __wsplitpath.LIBCMT ref: 00410C61
      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
    • _wcsncat.LIBCMT ref: 00410C78
    • __wmakepath.LIBCMT ref: 00410C94
      • Part of subcall function 00413E3C: __wmakepath_s.LIBCMT ref: 00413E52
      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
    • _wcscpy.LIBCMT ref: 00410CCC
    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00020019,?), ref: 00410CE9
    • RegQueryValueExW.ADVAPI32 ref: 00429BE4
    • _wcscat.LIBCMT ref: 00429C43
    • _wcslen.LIBCMT ref: 00429C55
    • _wcslen.LIBCMT ref: 00429C66
    • _wcscat.LIBCMT ref: 00429C80
    • _wcsncpy.LIBCMT ref: 00429CC0
    • RegCloseKey.ADVAPI32(?), ref: 00429CDE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcscat_wcslen$CloseException@8FileModuleNameOpenQueryThrowValue__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpystd::bad_alloc::bad_allocstd::bad_exception::bad_exception
    • String ID: Include$Software\AutoIt v3\AutoIt$\
    • API String ID: 1004883554-2276155026
    • Opcode ID: 9c84c0a9a9a9c0e0a1437b89d325e41f67c5677d19a9470ceb95af2957afecf8
    • Instruction ID: ef4714a7fd58501e566ba693257e1f196c1b97611c18bc9c35ab262cfa7686fb
    • Opcode Fuzzy Hash: 9c84c0a9a9a9c0e0a1437b89d325e41f67c5677d19a9470ceb95af2957afecf8
    • Instruction Fuzzy Hash: B961B3B1508340DFC300EF65EC8599BBBE8FB99704F44882EF544C3261EBB59948CB5A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1085 4700b0-4700d2 call 41171a 1088 4700d4-4700dc call 46e891 1085->1088 1089 4700de 1085->1089 1091 4700e0-4700f0 1088->1091 1089->1091 1093 4700f2-47010d call 434343 1091->1093 1094 47010f-470117 1091->1094 1096 470137-470153 1093->1096 1094->1096 1097 470119 1094->1097 1099 470155 1096->1099 1100 47015a-470166 1096->1100 1098 470120-47012c 1097->1098 1102 470133 1098->1102 1103 47012e-470131 1098->1103 1099->1100 1104 47016e-470174 1100->1104 1105 470168 1100->1105 1102->1096 1103->1098 1103->1102 1106 470176 1104->1106 1107 47017c-470181 1104->1107 1105->1104 1106->1107 1108 470183 1107->1108 1109 47018b-470194 1107->1109 1108->1109 1110 470240-47024c 1109->1110 1111 47019a-4701a0 1109->1111 1112 470252-470256 1110->1112 1113 47024e 1110->1113 1114 4701a2-4701b5 call 4333e4 1111->1114 1115 4701b8-4701cc call 4340b2 1111->1115 1117 47025c-47025e 1112->1117 1118 470258 1112->1118 1113->1112 1124 4701e0-470234 GetWindowRect GetClientRect GetSystemMetrics * 2 1115->1124 1125 4701ce-4701d9 1115->1125 1121 470290-470293 1117->1121 1122 470260-47028e SystemParametersInfoW GetSystemMetrics 1117->1122 1118->1117 1126 470295-4702cb SystemParametersInfoW GetSystemMetrics 1121->1126 1127 4702de-470348 SetRect AdjustWindowRectEx CreateWindowExW 1121->1127 1122->1121 1124->1110 1129 470236-47023e GetSystemMetrics 1124->1129 1125->1124 1126->1127 1130 4702cd-4702dc GetSystemMetrics 1126->1130 1127->1114 1128 47034e-4703b7 SetWindowLongW GetClientRect GetStockObject SendMessageW call 456354 1127->1128 1133 4703cf-4703f1 call 441533 1128->1133 1134 4703b9-4703ca SetTimer 1128->1134 1129->1110 1130->1127 1137 4703f3-4703f8 1133->1137 1138 47040a-470413 1133->1138 1134->1133 1139 470416-470427 call 4419a8 1137->1139 1140 4703fa-4703ff 1137->1140 1140->1139 1141 470401-470405 call 4417bc 1140->1141 1141->1138
    APIs
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
    • GetWindowRect.USER32(?,?), ref: 004701EA
    • GetClientRect.USER32(?,?), ref: 004701FA
    • GetSystemMetrics.USER32(00000007), ref: 00470202
    • GetSystemMetrics.USER32(00000008), ref: 00470216
    • GetSystemMetrics.USER32(00000004), ref: 00470238
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047026B
    • GetSystemMetrics.USER32(00000007), ref: 00470273
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004702A0
    • GetSystemMetrics.USER32(00000008), ref: 004702A8
    • GetSystemMetrics.USER32(00000004), ref: 004702CF
    • SetRect.USER32(?,00000000,00000000,?,?), ref: 004702F1
    • AdjustWindowRectEx.USER32(?,?,00000000,000000FF), ref: 00470304
    • CreateWindowExW.USER32(?,0048C2C4,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 0047033E
    • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00470356
    • GetClientRect.USER32(?,?), ref: 00470371
    • GetStockObject.GDI32(00000011), ref: 00470391
    • SendMessageW.USER32(?,00000030,00000000), ref: 0047039D
    • SetTimer.USER32(00000000,00000000,00000028,Function_00061E7F), ref: 004703C4
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
    • String ID:
    • API String ID: 867697134-0
    • Opcode ID: a73baacc64540440ec946788187af886c0b277d923618f2a8eb8cfaa6ac1f0ba
    • Instruction ID: 96ed3905d942d8c5c267f8207effb08aff50268186fc7250a269a1908d1679c9
    • Opcode Fuzzy Hash: a73baacc64540440ec946788187af886c0b277d923618f2a8eb8cfaa6ac1f0ba
    • Instruction Fuzzy Hash: 27B19F71205301AFD324DF68DD45B6BB7E4FB88710F108A2EFA9587290DBB5E844CB5A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1145 46d6eb-46d788 call 410810 * 2 call 40df50 * 2 call 4021e0 call 40c060 * 3 1162 46d79a-46d79e 1145->1162 1163 46d78a-46d796 call 413762 1145->1163 1165 46d7a0-46d7a6 call 46884b 1162->1165 1166 46d7ad-46d7b5 call 437bfd 1162->1166 1163->1162 1165->1166 1172 46d7b7-46d7bf call 437bfd 1166->1172 1173 46d80d-46d81b call 401be0 1166->1173 1172->1173 1178 46d7c1-46d80a GetForegroundWindow call 44cc94 call 434343 call 402620 * 3 1172->1178 1179 46d821-46d833 call 401be0 1173->1179 1180 46dc5b-46dc67 call 437bfd 1173->1180 1179->1180 1187 46d839-46d847 1179->1187 1189 46dc76-46dc7a 1180->1189 1190 46dc69-46dc71 call 40df50 1180->1190 1193 46d84b-46d866 call 460ed4 1187->1193 1191 46dc83-46dc8b 1189->1191 1192 46dc7c 1189->1192 1190->1189 1196 46dc95-46dc99 1191->1196 1197 46dc8d-46dc90 call 410a40 1191->1197 1192->1191 1193->1180 1205 46d86c-46d880 call 445975 1193->1205 1202 46dc9b-46dc9f 1196->1202 1203 46dca9-46dcb3 1196->1203 1197->1196 1202->1203 1206 46dca1-46dca4 call 410a40 1202->1206 1208 46dcc4 EnumWindows 1203->1208 1209 46dcb5-46dcc2 GetDesktopWindow EnumChildWindows 1203->1209 1217 46d886-46d89a call 445975 1205->1217 1218 46db41-46db55 call 445975 1205->1218 1206->1203 1213 46dcca-46dce6 call 445691 call 410810 1208->1213 1209->1213 1227 46dcf6-46dd1f call 402620 * 3 1213->1227 1228 46dce8-46dcf1 call 44cc94 1213->1228 1231 46d8a0-46d8b4 call 445975 1217->1231 1232 46db8a-46db9e call 445975 1217->1232 1229 46db57-46db5b 1218->1229 1230 46db1a-46db3e call 402620 * 3 1218->1230 1228->1227 1236 46db64-46db87 call 402620 * 3 1229->1236 1237 46db5d 1229->1237 1249 46dbc7-46dbe6 call 435c62 IsWindow 1231->1249 1250 46d8ba-46d8ce call 445975 1231->1250 1232->1230 1245 46dba4-46dbc1 GetForegroundWindow call 44cc94 1232->1245 1237->1236 1245->1249 1249->1236 1267 46dbec-46dc03 call 44cc94 1249->1267 1264 46d8d0-46d8d5 1250->1264 1265 46d92b-46d93f call 445975 1250->1265 1270 46d8db-46d8f2 call 401060 1264->1270 1271 46dc09-46dc2f call 402620 * 3 1264->1271 1278 46d941-46d955 call 40df50 1265->1278 1279 46d95a-46d96e call 445975 1265->1279 1267->1271 1284 46d8f3-46d8fc call 46865b 1270->1284 1278->1193 1292 46d970-46d986 call 401060 1279->1292 1293 46d98b-46d99f call 445975 1279->1293 1284->1193 1295 46d902-46d928 call 402620 * 3 1284->1295 1292->1284 1302 46d9c0-46d9d4 call 445975 1293->1302 1303 46d9a1-46d9bb call 413431 1293->1303 1310 46d9d6-46d9f0 call 413431 1302->1310 1311 46d9f5-46da09 call 445975 1302->1311 1303->1193 1310->1193 1318 46da2a-46da3e call 445975 1311->1318 1319 46da0b-46da25 call 413431 1311->1319 1324 46da40-46da5a call 413431 1318->1324 1325 46da5f-46da73 call 445975 1318->1325 1319->1193 1324->1193 1330 46da75-46da8c call 413431 1325->1330 1331 46da91-46daa5 call 445975 1325->1331 1330->1193 1336 46dac6-46dada call 445975 1331->1336 1337 46daa7-46dabb call 445975 1331->1337 1343 46db00-46db14 call 44cd47 1336->1343 1344 46dadc-46dae1 1336->1344 1337->1230 1342 46dabd-46dac1 1337->1342 1342->1193 1343->1193 1343->1230 1345 46dae7-46dafb call 40df50 1344->1345 1346 46dc32-46dc58 call 402620 * 3 1344->1346 1345->1193
    APIs
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    • GetForegroundWindow.USER32(?,?), ref: 0046D7C1
    • GetForegroundWindow.USER32 ref: 0046DBA4
    • IsWindow.USER32(?), ref: 0046DBDE
    • GetDesktopWindow.USER32 ref: 0046DCB5
    • EnumChildWindows.USER32(00000000), ref: 0046DCBC
    • EnumWindows.USER32(00460772,?), ref: 0046DCC4
      • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop
    • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
    • API String ID: 1322021666-1919597938
    • Opcode ID: cbc4988671bc876272ad8e7c4e90c78d84a2def2512d6566d5f4c11776eea4b9
    • Instruction ID: e1aaf888814e3eac3081d1083895f2ec5ff588ed609477e93394eec3ab890be9
    • Opcode Fuzzy Hash: cbc4988671bc876272ad8e7c4e90c78d84a2def2512d6566d5f4c11776eea4b9
    • Instruction Fuzzy Hash: 6EF1A471D143409BCB00EF61C881EAB73A4BF95308F44496FF9456B286E779E909CB6A
    APIs
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004095E6
      • Part of subcall function 00409A40: _wcslen.LIBCMT ref: 00409A61
      • Part of subcall function 00409A40: CharUpperBuffW.USER32(?,?), ref: 00409AF5
    • Sleep.KERNELBASE(0000000A), ref: 00409870
    • timeGetTime.WINMM ref: 00409880
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: BuffCharMessagePeekSleepTimeUpper_wcslentime
    • String ID:
    • API String ID: 443495328-0
    • Opcode ID: eb868e2ce43b053abd022d51f820cbd3c6172a1587fca9e5b736b6f37d8c98a2
    • Instruction ID: 03a7f49fb1e2d4a9a734ee4a54d3513b76137e648902fc120991470ee1d9a000
    • Opcode Fuzzy Hash: eb868e2ce43b053abd022d51f820cbd3c6172a1587fca9e5b736b6f37d8c98a2
    • Instruction Fuzzy Hash: 8122F171608342ABC724DF64C984BABB7A0BF89304F14492FE54997392D77CEC45CB9A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1569 4556f8-455715 call 44213b 1572 455717-45571c 1569->1572 1573 45571f-455747 1569->1573 1574 45599d-4559a5 1573->1574 1575 45574d-45574f 1573->1575 1575->1574 1576 455755-455757 1575->1576 1576->1574 1577 45575d-45575f 1576->1577 1577->1574 1578 455765-455767 1577->1578 1578->1574 1579 45576d-45576f 1578->1579 1579->1574 1580 455775-455777 1579->1580 1580->1574 1581 45577d-45577f 1580->1581 1581->1574 1582 455785-455787 1581->1582 1582->1574 1583 45578d-4557d0 1582->1583 1584 4557d6-4557f3 call 4421c1 1583->1584 1585 4558de-4558e0 1583->1585 1593 4557f5-4557f9 1584->1593 1594 455806-455851 CreateWindowExW 1584->1594 1587 4558e2-4558e3 DestroyWindow 1585->1587 1588 4558e9-455930 CreateWindowExW 1585->1588 1587->1588 1589 455936-455952 SendMessageW call 4021e0 1588->1589 1590 455853-45585c 1588->1590 1595 455957-45597e GetDesktopWindow GetWindowRect SendMessageW 1589->1595 1596 4557ff-455800 DestroyWindow 1593->1596 1597 4558aa-4558db SendMessageW call 4021e0 1593->1597 1594->1590 1598 45585f-4558a4 call 4021e0 SendMessageW 1594->1598 1599 455980-45598c SendMessageW 1595->1599 1600 45598e-45599a 1595->1600 1596->1594 1598->1597 1599->1600
    APIs
    • DestroyWindow.USER32(?,004A83D8,?), ref: 00455800
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 00455847
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$CreateDestroy
    • String ID: ,$tooltips_class32
    • API String ID: 1109047481-3856767331
    • Opcode ID: 7117374fe45777b16888165e435651760853477eb4c63a4562400de494fa4efb
    • Instruction ID: af4df8b80438f92fd5356fe82daba85812243c44dff517d7eb602cf52e2cfce3
    • Opcode Fuzzy Hash: 7117374fe45777b16888165e435651760853477eb4c63a4562400de494fa4efb
    • Instruction Fuzzy Hash: BF719075244704AFE320DB28CC85F7B77E4EB89700F50491EFA8197391E6B5E905CB59

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1605 46f90e-46f919 GetWindowLongW 1606 46f98c-46f991 1605->1606 1607 46f91b-46f933 LoadImageW 1605->1607 1608 46f993-46f998 1606->1608 1609 46fa0b-46fa25 ExtractIconExW 1606->1609 1610 46fff0-470008 call 4092c0 1607->1610 1611 46f939-46f94d SendMessageW 1607->1611 1608->1609 1612 46f99a-46f9b2 LoadImageW 1608->1612 1609->1610 1616 46fa2b-46fa39 1609->1616 1614 46f956-46f95b 1611->1614 1615 46f94f-46f950 DeleteObject 1611->1615 1617 46ffd2-46ffed call 4092c0 1612->1617 1618 46f9b8-46f9cc SendMessageW 1612->1618 1620 46f964-46f989 call 4092c0 1614->1620 1621 46f95d-46f95e DestroyIcon 1614->1621 1615->1614 1622 46fa46-46fa4e 1616->1622 1623 46fa3b-46fa44 1616->1623 1617->1610 1626 46f9d5-46f9da 1618->1626 1627 46f9ce-46f9cf DeleteObject 1618->1627 1621->1620 1624 46fa4f-46fa65 DestroyIcon SendMessageW 1622->1624 1623->1624 1629 46fa67-46fa68 DeleteObject 1624->1629 1630 46fa6e-46fa73 1624->1630 1632 46f9e3-46fa08 call 4092c0 1626->1632 1633 46f9dc-46f9dd DestroyIcon 1626->1633 1627->1626 1629->1630 1635 46fa75-46fa76 DestroyIcon 1630->1635 1636 46fa78-46fa9d call 4092c0 1630->1636 1633->1632 1635->1636
    APIs
    • GetWindowLongW.USER32(?,000000F0), ref: 0046F911
    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 0046F929
    • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 0046F942
    • DeleteObject.GDI32(?), ref: 0046F950
    • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,00000000,00000000,00000000,00002010,?,000000F0), ref: 0046F95E
    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9A8
    • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 0046F9C1
    • DeleteObject.GDI32(?), ref: 0046F9CF
    • DestroyIcon.USER32(?,?,000000F7,00000001,00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9DD
    • ExtractIconExW.SHELL32(?,?,?,000000FF,00000001), ref: 0046FA1D
    • DestroyIcon.USER32(?), ref: 0046FA4F
    • SendMessageW.USER32(?,000000F7,00000001,?), ref: 0046FA5A
    • DeleteObject.GDI32(?), ref: 0046FA68
    • DestroyIcon.USER32(?,?,000000F7,00000001,?), ref: 0046FA76
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Icon$Destroy$DeleteMessageObjectSend$ImageLoad$ExtractLongWindow
    • String ID:
    • API String ID: 3412594756-0
    • Opcode ID: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
    • Instruction ID: 2b127e2e725f503062080ad48664a75956f0b49bd2ac624c91da1236fc619d99
    • Opcode Fuzzy Hash: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
    • Instruction Fuzzy Hash: BD41B575344301ABE7209B65ED45B6B7398EB44711F00083EFA85A7381DBB9E809C76A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1665 44920c-449251 call 425210 call 44213b 1670 449257-449285 1665->1670 1671 44933c-449348 1665->1671 1672 449287 1670->1672 1673 4492d2-4492db 1670->1673 1674 449486-44948f 1672->1674 1675 4494f6-44951d call 435a35 SendMessageW 1672->1675 1676 4492b0-4492d0 1672->1676 1677 4492e3-4492e6 1672->1677 1678 44928e-4492ae 1672->1678 1679 4492fe-44930b 1672->1679 1680 4493e8-449431 call 413f97 SendMessageW 1672->1680 1681 4492fa-4492fc 1672->1681 1673->1677 1682 4492dd-4492e1 1673->1682 1683 449491-449495 1674->1683 1684 4494b8-4494f3 SetWindowTextW SendMessageW 1674->1684 1706 449886-449895 1675->1706 1707 449523-44952d 1675->1707 1676->1677 1686 449861-449863 1677->1686 1687 4492ec-4492f3 1677->1687 1678->1677 1681->1679 1688 44930e-449322 SendMessageW 1681->1688 1682->1671 1682->1677 1683->1684 1693 449497-4494b5 SendMessageW 1683->1693 1686->1679 1695 449869-449873 SetWindowTextW 1686->1695 1687->1674 1687->1675 1687->1679 1687->1680 1687->1681 1690 449324-449337 SendMessageW call 43401c 1688->1690 1691 44934b-449359 1688->1691 1690->1671 1697 449360-449373 CharNextW 1691->1697 1698 44935b-44935e 1691->1698 1695->1671 1700 449879-449881 call 43401c 1695->1700 1702 449374-449377 SendMessageW 1697->1702 1698->1697 1701 44937c-449395 call 433a98 1698->1701 1700->1706 1709 449397-4493a6 1701->1709 1710 4493a8-4493b1 1701->1710 1702->1701 1709->1702 1710->1706 1711 4493b7-4493c5 SendMessageW 1710->1711 1711->1706 1712 4493cb-4493e5 SendMessageW 1711->1712
    APIs
    • SendMessageW.USER32(?,00000000,000000FF,?), ref: 0044931D
    • SendMessageW.USER32(?,0045BBB0,00000000,00000000), ref: 0044932D
    • CharNextW.USER32(?,?,?,?,0045BBB0,00000000,00000000,?,?), ref: 00449361
    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449375
    • SendMessageW.USER32(?,00000402,?), ref: 0044941C
    • SendMessageW.USER32(004A83D8,000000C2,00000001,?), ref: 004494A0
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449515
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$CharNext
    • String ID:
    • API String ID: 1350042424-0
    • Opcode ID: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
    • Instruction ID: cf19a455924c4199ae2d31ef2e344bdd2865620a2145bd440d1f5c61272ee54d
    • Opcode Fuzzy Hash: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
    • Instruction Fuzzy Hash: 5D81B5312083019BE720DF15DC85FBBB7E4EBD9B20F00492EFA54962C0D7B99946D766

    Control-flow Graph

    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 004101F9
    • LoadCursorW.USER32(00000000,00007F00), ref: 00410209
    • LoadIconW.USER32(?,00000063), ref: 0041021F
    • LoadIconW.USER32(?,000000A4), ref: 00410232
    • LoadIconW.USER32(?,000000A2), ref: 00410245
    • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
    • RegisterClassExW.USER32 ref: 004102C6
      • Part of subcall function 004102F0: GetSysColorBrush.USER32 ref: 00410326
      • Part of subcall function 004102F0: RegisterClassExW.USER32 ref: 00410359
      • Part of subcall function 004102F0: RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
      • Part of subcall function 004102F0: InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
      • Part of subcall function 004102F0: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
      • Part of subcall function 004102F0: LoadIconW.USER32(00400000,000000A9), ref: 004103B1
      • Part of subcall function 004102F0: ImageList_ReplaceIcon.COMCTL32(00B520D0,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
    • String ID: #$0$PGH
    • API String ID: 423443420-3673556320
    • Opcode ID: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
    • Instruction ID: 6be78a7d21e01e6533eb66d2751721d4fd39e3055bf34e10baa21603515e7cea
    • Opcode Fuzzy Hash: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
    • Instruction Fuzzy Hash: 60216DB5A18300AFD310CF59EC84A4A7FE4FB99710F00497FF648972A0D7B599408B99

    Control-flow Graph

    APIs
    • GetSysColorBrush.USER32 ref: 00410326
    • RegisterClassExW.USER32 ref: 00410359
    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
    • InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
    • LoadIconW.USER32(00400000,000000A9), ref: 004103B1
    • ImageList_ReplaceIcon.COMCTL32(00B520D0,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
    • String ID: +$0$TaskbarCreated
    • API String ID: 2914291525-888179712
    • Opcode ID: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
    • Instruction ID: c8c51aded5b6d43d10953d3ded2c15c159303f3bf9a059b11759766ceadcbce4
    • Opcode Fuzzy Hash: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
    • Instruction Fuzzy Hash: 9F2129B4518301AFD340DF64D888B4EBFF4FB89704F008A2EF685962A0E7B58144CF5A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1769 448602-448630 call 4131f0 1772 448666-44867d call 44213b 1769->1772 1773 448632-44863a 1769->1773 1779 44867f-448687 1772->1779 1780 44868a-4486c0 1772->1780 1775 44863c-448658 CreateMenu KiUserCallbackDispatcher 1773->1775 1776 44865e-448661 1773->1776 1775->1776 1777 4486f5-4486ff CreatePopupMenu 1776->1777 1777->1779 1781 448705-448756 InsertMenuItemW KiUserCallbackDispatcher 1777->1781 1782 4486e7-4486f3 IsMenu 1780->1782 1783 4486c2-4486de GetMenuItemInfoW 1780->1783 1782->1777 1782->1779 1783->1779 1784 4486e0-4486e4 1783->1784 1784->1782
    APIs
    • _memset.LIBCMT ref: 00448625
    • CreateMenu.USER32 ref: 0044863C
    • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 0044864C
    • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 004486D6
    • IsMenu.USER32(?), ref: 004486EB
    • CreatePopupMenu.USER32 ref: 004486F5
    • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 00448739
    • KiUserCallbackDispatcher.NTDLL ref: 00448742
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Menu$CallbackCreateDispatcherItemUser$InfoInsertPopup_memset
    • String ID: 0
    • API String ID: 3573223033-4108050209
    • Opcode ID: 398b20284ae2dd8e24f85faaaec6a171caf958440e6461c306f566c295f4dbe9
    • Instruction ID: 98f94d81d6847d6484dd50bbdc77a0bd9f9f2d632c710d3394220f00cc789bef
    • Opcode Fuzzy Hash: 398b20284ae2dd8e24f85faaaec6a171caf958440e6461c306f566c295f4dbe9
    • Instruction Fuzzy Hash: 86417675604201AFD700CF68D894A9BBBE4FF89314F14891EFA488B350DBB5A845CFA6

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __fread_nolock$_fseek_wcscpy
    • String ID:
    • API String ID: 3888824918-0
    • Opcode ID: 70f9d2555cd4b937afee95e3842e048f6fb83f88a04dc36cc96d911dde711c00
    • Instruction ID: 4ef410ecd558539c323a9e7c28a389b7a4e1de4454aa14b959edd431145e4532
    • Opcode Fuzzy Hash: 70f9d2555cd4b937afee95e3842e048f6fb83f88a04dc36cc96d911dde711c00
    • Instruction Fuzzy Hash: 2E41DAB2544300BBD310EB55DC81FEB73A9AFC8718F54490EFA8497181F679E648C7AA
    APIs
    • _fseek.LIBCMT ref: 004525DA
      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
    • __fread_nolock.LIBCMT ref: 00452618
    • __fread_nolock.LIBCMT ref: 00452629
    • __fread_nolock.LIBCMT ref: 00452644
    • __fread_nolock.LIBCMT ref: 00452661
    • _fseek.LIBCMT ref: 0045267D
    • _malloc.LIBCMT ref: 00452689
    • _malloc.LIBCMT ref: 00452696
    • __fread_nolock.LIBCMT ref: 004526A7
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __fread_nolock$_fseek_malloc_wcscpy
    • String ID:
    • API String ID: 1911931848-0
    • Opcode ID: 560f376fbcaf8acced29e143c2e36741162d013c6d2c6d23142be596ea2e53d1
    • Instruction ID: 9bebfc8f8781244da66410795de4f71a837b543c74ff75a32d26dbe6cfd3b682
    • Opcode Fuzzy Hash: 560f376fbcaf8acced29e143c2e36741162d013c6d2c6d23142be596ea2e53d1
    • Instruction Fuzzy Hash: 63514CB1A08340AFD310DF5AD881A9BF7E9FFC8704F40492EF68887241D77AE5448B5A
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
    • Instruction ID: b1e2397247e50d0c7000acf5a2db8631a214b417b603bec0598d849dd48054e0
    • Opcode Fuzzy Hash: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
    • Instruction Fuzzy Hash: E54128332402806BE320A75DB8C4ABBFB98E7A2362F50443FF18196520D76678C5D339
    APIs
      • Part of subcall function 00436328: _wcsncpy.LIBCMT ref: 0043633C
    • _wcslen.LIBCMT ref: 004366DD
    • GetFileAttributesW.KERNELBASE(?), ref: 00436700
    • GetLastError.KERNEL32 ref: 0043670F
    • CreateDirectoryW.KERNELBASE(00000000,00000000), ref: 00436727
    • _wcsrchr.LIBCMT ref: 0043674C
      • Part of subcall function 004366BE: CreateDirectoryW.KERNEL32(?,00000000,?,00000000,00000000), ref: 0043678F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
    • String ID: \
    • API String ID: 321622961-2967466578
    • Opcode ID: 7909a0f7da8c6b907cb6a51859e723d2d3412933211c24888a61a0b8cd77956a
    • Instruction ID: 68cadaa88695c7c006562ade17844284f7fc34f8e7e15af3b97584e331f528d6
    • Opcode Fuzzy Hash: 7909a0f7da8c6b907cb6a51859e723d2d3412933211c24888a61a0b8cd77956a
    • Instruction Fuzzy Hash: 3C2148765003017ADB20A724EC47AFF33989F95764F90993EFD14D6281E779950882AE
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcscpy$DesktopFolderFromListMallocPath
    • String ID: C:\Users\user\Desktop\AutoClicker-3.0.exe
    • API String ID: 192938534-1537546201
    • Opcode ID: 5ece4c7ff29e91b032290827dfb68f29224480ab515cd257a4404770751faa23
    • Instruction ID: 2fe23ff91bf644c1e681f842d3c1e96d6f0f177144f23c1ad52f1bdc7517ad48
    • Opcode Fuzzy Hash: 5ece4c7ff29e91b032290827dfb68f29224480ab515cd257a4404770751faa23
    • Instruction Fuzzy Hash: 822179B5604211AFC210EB64DC84DABB3ECEFC8704F14891DF94987210E739ED46CBA6
    APIs
    • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
    • KillTimer.USER32(?,00000001), ref: 00401178
    • PostQuitMessage.USER32(00000000), ref: 0040118A
    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011CB
    • RegisterWindowMessageW.USER32(TaskbarCreated,?,00000001,000002EE,00000000), ref: 004011D6
    • CreatePopupMenu.USER32 ref: 004011EE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
    • String ID: TaskbarCreated
    • API String ID: 129472671-2362178303
    • Opcode ID: 4c70688f189b870509a26c7c5bf2f36572c81ec263cad35b2f1db9d226609c42
    • Instruction ID: 9ac6c3ecaa768f1ea1698d220d594d64e7d01d8954b4f99a9dd389ce918c891f
    • Opcode Fuzzy Hash: 4c70688f189b870509a26c7c5bf2f36572c81ec263cad35b2f1db9d226609c42
    • Instruction Fuzzy Hash: E901D832244108ABD750EFA4BD4DBAA7B68F7E9302F00457FFC01E6190E7B50860C7A8
    APIs
    • _memset.LIBCMT ref: 00401257
      • Part of subcall function 00401E70: _memset.LIBCMT ref: 00401EF2
      • Part of subcall function 00401E70: _wcsncpy.LIBCMT ref: 00401F31
      • Part of subcall function 00401E70: _wcscpy.LIBCMT ref: 00401F4D
      • Part of subcall function 00401E70: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401F5F
    • KillTimer.USER32(?,?), ref: 004012B0
    • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012BF
    • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AA80
    • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AACC
    • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AB0F
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: IconNotifyShell_$Timer_memset$Kill_wcscpy_wcsncpy
    • String ID:
    • API String ID: 1792922140-0
    • Opcode ID: 99aab9b00b72ad057fb1838a04829e5adb0dd8f624055c44eb3d4c782eade09e
    • Instruction ID: 067d5d833dd9776af7a5d412fc03fcb55fd665557ee4bb0c43bcbb136bd66aa2
    • Opcode Fuzzy Hash: 99aab9b00b72ad057fb1838a04829e5adb0dd8f624055c44eb3d4c782eade09e
    • Instruction Fuzzy Hash: 3E319670609642BFE319CB24D544B9BFBE8BF85304F04856EF488A3251C7789A19D7AB
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
    • String ID:
    • API String ID: 3886058894-0
    • Opcode ID: f2485d93bcfe167600386a220f3dfbe0502d7b8fb096abab391be01cb981333f
    • Instruction ID: 085ef53bf2cba992f8731f00f2d52beda6aca72a1b803249d76dffc069a60243
    • Opcode Fuzzy Hash: f2485d93bcfe167600386a220f3dfbe0502d7b8fb096abab391be01cb981333f
    • Instruction Fuzzy Hash: CA510830900604EFCB208FA9C8445DFBBB5EFC5324F24825BF82596290D7799ED2CB99
    APIs
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0044890A
    • SendMessageW.USER32(?,00000469,?,00000000), ref: 00448920
    • KiUserCallbackDispatcher.NTDLL(004A83D8,00000000), ref: 00448BAB
    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
    • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
    • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$EnableShow$CallbackDispatcherMessageMoveSendUser
    • String ID:
    • API String ID: 3527751885-0
    • Opcode ID: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
    • Instruction ID: 0809a8548e22334437b8974569d6adfa08582830463fbdb99c3481629354d751
    • Opcode Fuzzy Hash: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
    • Instruction Fuzzy Hash: 63419E746043419FF7248B24C884B6FB7A1FB99305F18886EF98197391DA78A845CB59
    APIs
    • _memset.LIBCMT ref: 004484C4
    • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 00448562
    • IsMenu.USER32(?), ref: 0044857B
    • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 004485D0
    • KiUserCallbackDispatcher.NTDLL ref: 004485E4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Menu$Item$CallbackDispatcherInfoInsertUser_memset
    • String ID: 0
    • API String ID: 1292064452-4108050209
    • Opcode ID: f566a4a6ec78e62e9a58ad5d88974b8e59e8384f3d8d5b40abd28c46ea68d548
    • Instruction ID: c1b4c65bd9dbf201e14e83578cc8030a3c247867dd5f1e451e409e2153a24926
    • Opcode Fuzzy Hash: f566a4a6ec78e62e9a58ad5d88974b8e59e8384f3d8d5b40abd28c46ea68d548
    • Instruction Fuzzy Hash: 9F417F75604341AFE710CF45C984B6BB7E4FB89304F14881EFA554B391DBB4E849CB5A
    APIs
    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448B16
    • GetFocus.USER32 ref: 00448B1C
    • KiUserCallbackDispatcher.NTDLL(004A83D8,00000000), ref: 00448BAB
    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
    • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
    • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$EnableShow$CallbackDispatcherFocusMessageSendUser
    • String ID:
    • API String ID: 254007784-0
    • Opcode ID: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
    • Instruction ID: 96ed947056310062a3fa6d2350adc65d304252fdbf70c479ab88671ed4e09c2c
    • Opcode Fuzzy Hash: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
    • Instruction Fuzzy Hash: FC31B4706443819BF7248E14C8C4BAFB7D0EB95745F04492EF981A6291DBA89845C719
    APIs
    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
    • ShowWindow.USER32(?,00000000), ref: 00410454
    • ShowWindow.USER32(?,00000000), ref: 0041045E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$CreateShow
    • String ID: AutoIt v3$edit
    • API String ID: 1584632944-3779509399
    • Opcode ID: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
    • Instruction ID: daa3d4afae2654ee996124117597f48fa5c574a0ac4b96d00400a8ba476d7f73
    • Opcode Fuzzy Hash: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
    • Instruction Fuzzy Hash: F3F0A975BE4310BAF6609754AC43F592B59A765F00F3445ABB700BF1D0D6E478408B9C
    APIs
    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044886C
    • KiUserCallbackDispatcher.NTDLL(004A83D8,00000000), ref: 00448BAB
    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
    • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
    • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$EnableShow$CallbackDispatcherMessageSendUser
    • String ID:
    • API String ID: 148772376-0
    • Opcode ID: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
    • Instruction ID: fbfed122d4da650e42f877d7e8bff2bfe9b33138fa51555fe8345b8bcc16d821
    • Opcode Fuzzy Hash: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
    • Instruction Fuzzy Hash: A731F3B07443819BF7248E14C8C4BAFB7D0AB95345F08482EF981A63D1DBAC9846872A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __fread_nolock_fseek_strcat
    • String ID:
    • API String ID: 3818483258-0
    • Opcode ID: 3a312acd4387509a524006497359dc3cfb623b7b4978b3f3d4501f18df932f25
    • Instruction ID: a326fe91d6bb541f17a8cee8b09d92be642ba4032c5aa5fe266a96c6f27d1a6c
    • Opcode Fuzzy Hash: 3a312acd4387509a524006497359dc3cfb623b7b4978b3f3d4501f18df932f25
    • Instruction Fuzzy Hash: 2B416C7160C340ABC331DA24C841AEB77A59B95308F68087EF5C597683E578E44A876B
    APIs
    • GetClientRect.USER32(?,?), ref: 00447997
    • GetCursorPos.USER32(?), ref: 004479A2
    • ScreenToClient.USER32(?,?), ref: 004479BE
    • WindowFromPoint.USER32(?,?), ref: 004479FF
    • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447A78
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Client$CursorFromPointProcRectScreenWindow
    • String ID:
    • API String ID: 1822080540-0
    • Opcode ID: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
    • Instruction ID: e9c1e18ea4fcc9a2ad4b32cd349e8b57ec7287094a91df3c43d19f1875151664
    • Opcode Fuzzy Hash: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
    • Instruction Fuzzy Hash: DE3188742082029BD710CF19D88596FB7A9EBC8714F144A1EF88097291D778EA57CBAA
    APIs
    • KiUserCallbackDispatcher.NTDLL(004A83D8,00000000), ref: 00448BAB
    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
    • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
    • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
      • Part of subcall function 004413F0: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
      • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441452
      • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441493
      • Part of subcall function 004413F0: SendMessageW.USER32(0442EC60,000000F1,00000000,00000000), ref: 004414C6
      • Part of subcall function 004413F0: SendMessageW.USER32(0442EC60,000000F1,00000001,00000000), ref: 004414F1
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$MessageSend$EnableLongShow$CallbackDispatcherUser
    • String ID:
    • API String ID: 1579311380-0
    • Opcode ID: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
    • Instruction ID: 53ead31d82dc60d0a1ec6489c26700cf05fac79e8a5bf65a12bf69c5108a1aee
    • Opcode Fuzzy Hash: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
    • Instruction Fuzzy Hash: 942105B07053809BF7148E28C8C47AFB7D0FB95345F08482EF981A6391DBAC9845C72E
    APIs
    • __lock.LIBCMT ref: 00413AA6
      • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
      • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
      • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00000000,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
    • ___sbh_find_block.LIBCMT ref: 00413AB1
    • ___sbh_free_block.LIBCMT ref: 00413AC0
    • RtlFreeHeap.NTDLL(00000000,00000000,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00000000,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
    • GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00000000,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
    • String ID:
    • API String ID: 2714421763-0
    • Opcode ID: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
    • Instruction ID: 54fb22c17cbd059cfb8714ef359fce415cc636064f476ff80f42ef981757bf49
    • Opcode Fuzzy Hash: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
    • Instruction Fuzzy Hash: 7401A731A08301BADF206F71AC09BDF3B64AF00759F10052FF544A6182DB7D9AC19B9C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _malloc
    • String ID: Default$|k
    • API String ID: 1579825452-2254895183
    • Opcode ID: 7f524ef2e123d26532238b7238cbb2c4ca26211354ccdafe1ea247801ae0a3b3
    • Instruction ID: 39a525bc613f0e7e9485e4ea944b13d532e73913c0a35fc25f8fa2b96209a7b9
    • Opcode Fuzzy Hash: 7f524ef2e123d26532238b7238cbb2c4ca26211354ccdafe1ea247801ae0a3b3
    • Instruction Fuzzy Hash: 51F19F706083018BD714DF25C484A6BB7E5AF85314F64886FF885AB392D738EC55CB9B
    APIs
    • DestroyWindow.USER32(00000000,004A83D8,00000000,?,?), ref: 00450C60
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: DestroyWindow
    • String ID: msctls_updown32
    • API String ID: 3375834691-2298589950
    • Opcode ID: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
    • Instruction ID: 6a1e1189e42626fde14bc74b9d87f1f450c181bb0fe7a510af516aef360d3f61
    • Opcode Fuzzy Hash: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
    • Instruction Fuzzy Hash: CE31A279300201AFD624DF54DC81F5B73A9EB9A714F20451EF640AB382C7B4AC4ACB6A
    APIs
      • Part of subcall function 0040F580: _wcslen.LIBCMT ref: 0040F58A
      • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0040F5A3
      • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,-00000010,00000001,?,?,?,?), ref: 0040F5CC
    • _strcat.LIBCMT ref: 0040F603
      • Part of subcall function 0040F6A0: _memset.LIBCMT ref: 0040F6A8
      • Part of subcall function 0040F6D0: _strlen.LIBCMT ref: 0040F6D8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ByteCharMultiWide$_memset_strcat_strlen_wcslen
    • String ID: HH
    • API String ID: 1194219731-2761332787
    • Opcode ID: 531e5e4b60cffeb03f7dc22b45a86586f5084d05311360ccc6dfc4655590b5a7
    • Instruction ID: 77132907542d59a05bac1aa3c478de699dd177fde038efc08b3990cce79c107f
    • Opcode Fuzzy Hash: 531e5e4b60cffeb03f7dc22b45a86586f5084d05311360ccc6dfc4655590b5a7
    • Instruction Fuzzy Hash: 452149B260825067C724EF7A9C8266EF7D8AF85308F148C3FF554D2282F638D555879A
    APIs
    • CreateWindowExW.USER32(?,?,?,00000000,?,?,?,?,?,?,00400000,00000000), ref: 0043367E
    • GetStockObject.GDI32(00000011), ref: 00433695
    • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043369F
    • ShowWindow.USER32(00000000,00000000), ref: 004336BA
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$CreateMessageObjectSendShowStock
    • String ID:
    • API String ID: 1358664141-0
    • Opcode ID: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
    • Instruction ID: 5bb77caae3378c1c36de35f78993aeb7f53e4fc0e9047450929301c31466c70f
    • Opcode Fuzzy Hash: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
    • Instruction Fuzzy Hash: 60114F72204A00BFD254DF55CC49F5BB3F9AFCCB01F20950DB254922A0D7B4E9418BA9
    APIs
    • _malloc.LIBCMT ref: 00411734
      • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
      • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
      • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00416FC7,00000000,00000001,00000000,?,00418391,00000018,0048CA38,0000000C,00418422), ref: 00413931
    • std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
      • Part of subcall function 004116B0: std::exception::exception.LIBCMT ref: 004116BC
    • std::bad_exception::bad_exception.LIBCMT ref: 0041176B
    • __CxxThrowException@8.LIBCMT ref: 00411779
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
    • String ID:
    • API String ID: 1411284514-0
    • Opcode ID: 2b08f9b799f51058a5e1d07876b0fb00982c88e540bb6b1726fd420a7fee663d
    • Instruction ID: c554e94cc15d94fff19a40754e7570613bf3612ee9c26c673f8185df9075a277
    • Opcode Fuzzy Hash: 2b08f9b799f51058a5e1d07876b0fb00982c88e540bb6b1726fd420a7fee663d
    • Instruction Fuzzy Hash: 6FF0E23550060A66CF08B723EC06ADE3B649F11798B10403BFA20552F2DF6DADC9865C
    APIs
    • RegOpenKeyExW.KERNELBASE(80000001,0040F0EE,00000000,00000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F132
    • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F14F
    • RegCloseKey.KERNELBASE(00000000,?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F159
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CloseOpenQueryValue
    • String ID:
    • API String ID: 3677997916-0
    • Opcode ID: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
    • Instruction ID: 6acd5c45b0bc896a902747136fbadff1bb775023c46fd22fba7b324c5144c726
    • Opcode Fuzzy Hash: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
    • Instruction Fuzzy Hash: 60F0BDB0204202ABD614DF54DD88E6BB7F9EF88704F10492DB585D7250D7B4A804CB26
    APIs
    • _malloc.LIBCMT ref: 00435278
      • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
      • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
      • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00416FC7,00000000,00000001,00000000,?,00418391,00000018,0048CA38,0000000C,00418422), ref: 00413931
    • _malloc.LIBCMT ref: 00435288
    • _malloc.LIBCMT ref: 00435298
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _malloc$AllocateHeap
    • String ID:
    • API String ID: 680241177-0
    • Opcode ID: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
    • Instruction ID: 30b75876ff52ae1c35022de4a6700901ba1db26c97f4d16f7fcf584af9a5a73f
    • Opcode Fuzzy Hash: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
    • Instruction Fuzzy Hash: E5F0A0B1500F0046E660AB3198457C7A2E09B14307F00186FB6855618ADA7C69C4CEAC
    APIs
    • _wcslen.LIBCMT ref: 00401B71
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Exception@8Throw_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
    • String ID: @EXITCODE
    • API String ID: 580348202-3436989551
    • Opcode ID: cf09f8cc563ea490457be074e3f36df2996e570d733701a8ccb845f104b99734
    • Instruction ID: 288ad252d7dad0c090ff8240dee62855692e698d70424b42c0a66861a7771545
    • Opcode Fuzzy Hash: cf09f8cc563ea490457be074e3f36df2996e570d733701a8ccb845f104b99734
    • Instruction Fuzzy Hash: 73F06DF2A002025BD7649B35DC0276776E4AB44704F18C83EE14AC7791F6BDE8829B15
    APIs
    • PostMessageW.USER32(044051D8,00000028,?,00000001), ref: 00441C8C
    • PostMessageW.USER32(?,000000B1,?,?), ref: 00441CAB
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessagePost
    • String ID:
    • API String ID: 410705778-0
    • Opcode ID: f1a10e336183c0ff2b6d957fcf18a3a835ea54dd3f96ed3d36d0cc8343e646a5
    • Instruction ID: ba536238118c8d010d3f6b0aa660f9f8498b4d39804cd88edc9aab5a1a4e475f
    • Opcode Fuzzy Hash: f1a10e336183c0ff2b6d957fcf18a3a835ea54dd3f96ed3d36d0cc8343e646a5
    • Instruction Fuzzy Hash: 4A115E316402019FD320CF69DCC0E67B7A9FB8A324F64861EE564873A1C771A895CB64
    APIs
    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DFD2,?,00000001,00403843,?), ref: 0040F00A
    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DFD2,?,00000001,00403843,?), ref: 004299D9
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: dd4e9784c729e2579dc6c7dcc4eae85dd5e33ad8779cc8778449c0a6aa825786
    • Instruction ID: e5d7371eb9ad186003774bde1dadc6d04f69248817ad2f12c572821bee3fde52
    • Opcode Fuzzy Hash: dd4e9784c729e2579dc6c7dcc4eae85dd5e33ad8779cc8778449c0a6aa825786
    • Instruction Fuzzy Hash: F401FB70384310BAF2301A28AD1BF5626506B44B24F244A39FBD9BE2E2D2F868859708
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __lock_file_memset
    • String ID:
    • API String ID: 26237723-0
    • Opcode ID: d27c2f8224b4ab81f31e209f00c936090378a494e412a841fbfad35c81dc8b2e
    • Instruction ID: c8a12bf2a45d0ac11074f8cac28b928f9e20b60047ac9024d749846706a082ab
    • Opcode Fuzzy Hash: d27c2f8224b4ab81f31e209f00c936090378a494e412a841fbfad35c81dc8b2e
    • Instruction Fuzzy Hash: 32012971C00609FBCF22AF65DC029DF3B31AF44714F04815BF82416261D7798AA2DF99
    APIs
      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
    • __lock_file.LIBCMT ref: 00414EE4
      • Part of subcall function 00415965: __lock.LIBCMT ref: 0041598A
    • __fclose_nolock.LIBCMT ref: 00414EEE
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __decode_pointer__fclose_nolock__getptd_noexit__lock__lock_file
    • String ID:
    • API String ID: 717694121-0
    • Opcode ID: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
    • Instruction ID: 225a509e04b880138f2478077c57af59103cae2c072c29012e7845c0956b1514
    • Opcode Fuzzy Hash: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
    • Instruction Fuzzy Hash: DEF06270D0470499C721BB6A9802ADE7AB0AFC1338F21864FE479A72D1C77C46C29F5D
    APIs
    • TranslateMessage.USER32(?), ref: 004098F6
    • DispatchMessageW.USER32(?), ref: 00409901
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Message$DispatchTranslate
    • String ID:
    • API String ID: 1706434739-0
    • Opcode ID: 8fad050e2429e92640c4d66c63a080c3d8b52bf286d60078a67dc5eaa0bc8fd5
    • Instruction ID: 49647130acdc3617ae5c3e08a3fd5206ae6b80a91b6ea45e7ea8fc99a74219a8
    • Opcode Fuzzy Hash: 8fad050e2429e92640c4d66c63a080c3d8b52bf286d60078a67dc5eaa0bc8fd5
    • Instruction Fuzzy Hash: B3F03071114300AFDA24D7E58D41B5BB3A8AF98740F408C2EBA51A61C1EBB8E404C76A
    APIs
    • TranslateMessage.USER32(?), ref: 004098F6
    • DispatchMessageW.USER32(?), ref: 00409901
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Message$DispatchTranslate
    • String ID:
    • API String ID: 1706434739-0
    • Opcode ID: ad3eaad6f9eb8a4c6a895da0c71685ac0de1523e6c1ed7ca4735466c55914713
    • Instruction ID: fcd1fcbac2743dfbe9e9f23951ccc9fdc6ec49d10456b19be6482b7702c7dba2
    • Opcode Fuzzy Hash: ad3eaad6f9eb8a4c6a895da0c71685ac0de1523e6c1ed7ca4735466c55914713
    • Instruction Fuzzy Hash: 03F054B1114300ABDA14D7E58D41B5B73A4AF94740F408C3EBA11E52C1EBFCD504C71A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: SleepTimetime
    • String ID:
    • API String ID: 346578373-0
    • Opcode ID: 6cbc87983288f369fe854831ce83547e730c3a40b45c9aa84d90c27d10a72474
    • Instruction ID: ff5a2ab7ad483658a1e7ee0f102d7e53cedbfc4179de8e6e3d04cf6f96f9dbeb
    • Opcode Fuzzy Hash: 6cbc87983288f369fe854831ce83547e730c3a40b45c9aa84d90c27d10a72474
    • Instruction Fuzzy Hash: 71F08C302402029FC354EB36C988B6AB7E5BF48714F00453EE82AD7290DB706C00CB49
    APIs
    • SetFilePointerEx.KERNELBASE(?,00000001,00000000,00000000,?,?,?,00002000,004299F5,00000000,00000000,00000002), ref: 0040E161
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FilePointer
    • String ID:
    • API String ID: 973152223-0
    • Opcode ID: f8d047d6c84c1d5351833b7e4dc779dcc76b9ab6f4d10bb6ce443b9109c67af0
    • Instruction ID: bf1ff616b31f8859df6a36759f609e08942fe16eb7891d7d66819dec20fab3ba
    • Opcode Fuzzy Hash: f8d047d6c84c1d5351833b7e4dc779dcc76b9ab6f4d10bb6ce443b9109c67af0
    • Instruction Fuzzy Hash: CD2189713047018FC334DE6ED88092BB7F6AB84700B148D3EE09697780D778EC198B6A
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e6f29a5b5d397e9c169840f4e72f2cc99dacdc7a4a851b511489a24b50254112
    • Instruction ID: 573dba848690e0cdfd4c9be45b5663ff9194aa529e9341154cf92adfcd841cf8
    • Opcode Fuzzy Hash: e6f29a5b5d397e9c169840f4e72f2cc99dacdc7a4a851b511489a24b50254112
    • Instruction Fuzzy Hash: 5E11C374200200ABC7249FAAD8D5F2A73A5AF45304B244C6FE845E7392D73CEC81EB5E
    APIs
    • IsWindow.USER32(00000000), ref: 0046DD51
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window
    • String ID:
    • API String ID: 2353593579-0
    • Opcode ID: d542f03a771d560791b2d60914641f419b52aec631d11b29288999ccc7a3f70e
    • Instruction ID: 3dbbf4ce6cbb31777181d39d36a0bafd53fba8119ad51c52c33e2496f0deb3bf
    • Opcode Fuzzy Hash: d542f03a771d560791b2d60914641f419b52aec631d11b29288999ccc7a3f70e
    • Instruction Fuzzy Hash: B401A5B27056122AE240FBB6DC84DEBE35CEFC1755F10442FB954A3101DB68A91987B5
    APIs
    • IsDialogMessageW.USER32(?,?), ref: 00429736
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: DialogMessage
    • String ID:
    • API String ID: 547518314-0
    • Opcode ID: 82ba507458c3cc1f94d3d28079edc5cdfa4e511764e1982768cc8777ed70dd99
    • Instruction ID: 22bd88da52f97160d00f1d8a94fefff49a3d3f967eff1dd42869de01bd9242f3
    • Opcode Fuzzy Hash: 82ba507458c3cc1f94d3d28079edc5cdfa4e511764e1982768cc8777ed70dd99
    • Instruction Fuzzy Hash: 83116D35720221DBD718DF69E840AA733A9BF85740F4440BAE8008B391D779EC81D768
    APIs
    • ReadFile.KERNELBASE(00000000,?,00010000,00000001,00000000,?,?,?,0040E069,?,00000000,00000000,00000000,?,?,00002000), ref: 00403D8F
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FileRead
    • String ID:
    • API String ID: 2738559852-0
    • Opcode ID: 852a1cb3f0b5f9975df2e5c300a516c91c147c270c9c7f7eb41267229f0cb118
    • Instruction ID: 2ba226730ef5eb06f306df9186f38f9ffb5679716130b96955790a83c1a8eaf9
    • Opcode Fuzzy Hash: 852a1cb3f0b5f9975df2e5c300a516c91c147c270c9c7f7eb41267229f0cb118
    • Instruction Fuzzy Hash: 0C11E875104B019FD330CF1AC944B17BBF8BF94701F108A2EE5AA96A90D778F9458B65
    APIs
      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\AutoClicker-3.0.exe,?,C:\Users\user\Desktop\AutoClicker-3.0.exe,004A8E80,C:\Users\user\Desktop\AutoClicker-3.0.exe,0040F3D2), ref: 0040FFCA
    • GetPrivateProfileStringW.KERNEL32(00000000,?,00000000,?,00000000,?), ref: 0045E3F4
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FullNamePathPrivateProfileString
    • String ID:
    • API String ID: 1991638491-0
    • Opcode ID: 5064cccf269aeec5bfcaf438ced0f52b4aa5f35a6a51ad06360e57e31aeaf74a
    • Instruction ID: 795123a9964a567baa6f2b995176c7232f085ac76b7870cbfafca5f053a3bfa2
    • Opcode Fuzzy Hash: 5064cccf269aeec5bfcaf438ced0f52b4aa5f35a6a51ad06360e57e31aeaf74a
    • Instruction Fuzzy Hash: B1016275500301AFC720EB61D885CABB3E8EF84715F00893EBC4497253C638ED0D87A5
    APIs
    • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ProcWindow
    • String ID:
    • API String ID: 181713994-0
    • Opcode ID: 797c0786aa0f3924bb3699c28751d37a5b16fe4bb2c2999019daaebda4768fa7
    • Instruction ID: a3c9b556abeffd3a3d236bd0da4acfa7dbf4fec9ae0cef4481f4ce4fc0f6f2ed
    • Opcode Fuzzy Hash: 797c0786aa0f3924bb3699c28751d37a5b16fe4bb2c2999019daaebda4768fa7
    • Instruction Fuzzy Hash: 47E0D837310004A7CB20DA18EC85CEF3769E7E9310B00815BFC05A7350D1399C1083E8
    APIs
    • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
      • Part of subcall function 0045F48E: _memset.LIBCMT ref: 0045F4AE
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ProcWindow_memset
    • String ID:
    • API String ID: 3823874381-0
    • Opcode ID: 65d7a47c1ee730458d49265d3a498346a3fc6e0928520fdff36007113c723e01
    • Instruction ID: 99c19739993644e6b3dd00d8412d170de6df0e6d4f715ca0dc7000a6c0ee3911
    • Opcode Fuzzy Hash: 65d7a47c1ee730458d49265d3a498346a3fc6e0928520fdff36007113c723e01
    • Instruction Fuzzy Hash: 48E01A7A700018BB9A249E84EC85CFB772DE7E9750B10C11BFD055B2919678AC0297AA
    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041AA46
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CreateHeap
    • String ID:
    • API String ID: 10892065-0
    • Opcode ID: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
    • Instruction ID: 99ddfbee892492b32903703907324a593b21f4d4a70cf9c354be63060b8faba1
    • Opcode Fuzzy Hash: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
    • Instruction Fuzzy Hash: 56D05E325543449EDF009F71AC087663FDCE788395F008836BC1CC6150E778C950CA08
    APIs
      • Part of subcall function 00444326: SetFilePointerEx.KERNEL32(00000000,00000001,00000000,00000000,00000001,?,?,0044434E,?,?,00429A83,?,00487174,00000003,0040DFEE,?), ref: 004442F3
    • WriteFile.KERNELBASE(?,?,00000001,?,00000000,?,?,00429A83,?,00487174,00000003,0040DFEE,?,?,00000001,00403843), ref: 00444362
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: File$PointerWrite
    • String ID:
    • API String ID: 539440098-0
    • Opcode ID: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
    • Instruction ID: 4a339a6eb5dfef6003722c1615037f540bc53d76d7f4c43935d02bdd90bbdfc9
    • Opcode Fuzzy Hash: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
    • Instruction Fuzzy Hash: 7CE09275104311AFD250DF54D944F9BB3F8AF88714F108D0EF59587241D7B4A9848BA6
    APIs
    • SetCurrentDirectoryW.KERNELBASE(00000000,?), ref: 0045C42E
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CurrentDirectory
    • String ID:
    • API String ID: 1611563598-0
    • Opcode ID: 7ed3f007977dbf0840c3198b4269b85f03ebf057065c423cfd84750bf55ab1bb
    • Instruction ID: 24a177d83da78915dd038621c57253a9c2277195ed5cf6e0cb1d508dd59d3fc2
    • Opcode Fuzzy Hash: 7ed3f007977dbf0840c3198b4269b85f03ebf057065c423cfd84750bf55ab1bb
    • Instruction Fuzzy Hash: ECE0E274610300ABCB10AF65D988B5BB7E8AF44309F10C86EB884E7252D778EC44CB58
    APIs
    • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,00000001,00000001), ref: 0040E1A7
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FilePointer
    • String ID:
    • API String ID: 973152223-0
    • Opcode ID: 7fb4a431d7c88b8df2b2ab5c876b5886417a5735912a69d89beb2a9be6380502
    • Instruction ID: e3d3b8edd02b88be3e3fab528302d1ae36246e92752b58c3ae5b866334c53333
    • Opcode Fuzzy Hash: 7fb4a431d7c88b8df2b2ab5c876b5886417a5735912a69d89beb2a9be6380502
    • Instruction Fuzzy Hash: 0ED09EB5214200AFD308DF18DD55E1BB3A5EBD8701F40CA2DFE85C7254D671E818CB66
    APIs
    • GetForegroundWindow.USER32 ref: 00461E7F
      • Part of subcall function 00456354: GetCursorPos.USER32(004A83D8), ref: 0045636A
      • Part of subcall function 00456354: ScreenToClient.USER32(004A83D8,?), ref: 0045638A
      • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563D0
      • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563DC
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AsyncState$ClientCursorForegroundScreenWindow
    • String ID:
    • API String ID: 438598555-0
    • Opcode ID: 54082aafdb57b586f8929883e8d709b373baa5110370441d1553411daa9ffa3a
    • Instruction ID: 4a152846bf4ba43a43aad19695ce4772c9049440bf633214ba3aeb9018b509ff
    • Opcode Fuzzy Hash: 54082aafdb57b586f8929883e8d709b373baa5110370441d1553411daa9ffa3a
    • Instruction Fuzzy Hash: F5D0A7742402009BC5149B58CC46E3A3324E79A714B640E4F7D20D72D2DAF96861872D
    APIs
    • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ProcWindow
    • String ID:
    • API String ID: 181713994-0
    • Opcode ID: ebe044c8d1b4f6e53d21533edc0916c7e61d8c1498fb8b3ba8c090a7cdee16fc
    • Instruction ID: 4c36cba44089d0e03573cc5e8dee84df23505be31ebc2729507753268ee0d302
    • Opcode Fuzzy Hash: ebe044c8d1b4f6e53d21533edc0916c7e61d8c1498fb8b3ba8c090a7cdee16fc
    • Instruction Fuzzy Hash: C3C08C72100008BB8700DE04EC44CFBB72CEBD8310700C20BBC0586201C230885097A1
    APIs
    • SetWindowTextW.USER32(?,00000000), ref: 0045A2EA
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: TextWindow
    • String ID:
    • API String ID: 530164218-0
    • Opcode ID: bf537bc566f1649e1c5513faed30c9671d3ed55477db65dbd5ca2eebb2b834ba
    • Instruction ID: a3a38933dd55b770b0e7b274a1d20917013c2d1109a89d21ab04268e44d9002d
    • Opcode Fuzzy Hash: bf537bc566f1649e1c5513faed30c9671d3ed55477db65dbd5ca2eebb2b834ba
    • Instruction Fuzzy Hash: 96D00279614200AFC344DB74DD98C2B77E9BFA8705715C86DB845C7255C635DC04DB54
    APIs
    • GetFileAttributesW.KERNELBASE(?,0044BD82,?,?,?), ref: 00436AC9
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID:
    • API String ID: 3188754299-0
    • Opcode ID: 3827fa499cbe6790da74950c01e8698407cb86e948326011d7c9144cf41c76ba
    • Instruction ID: 9dac39ab09fb3289a02c1092d62d1a923cd271104a6d6048bcac11b088e6d7d5
    • Opcode Fuzzy Hash: 3827fa499cbe6790da74950c01e8698407cb86e948326011d7c9144cf41c76ba
    • Instruction Fuzzy Hash: 86C08C78000600268D001A3C465C04A33E0AA477A0FD5EA81F065921E0C2788C07EA24
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __wfsopen
    • String ID:
    • API String ID: 197181222-0
    • Opcode ID: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
    • Instruction ID: 6225ca515e7db1e5d7746fb8cf1e0ad45b41b4d1817cc5a1d8a93eb941133566
    • Opcode Fuzzy Hash: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
    • Instruction Fuzzy Hash: EDC09B7644010C77CF122943FC02E453F1997C0764F044011FB1C1D561D577D5619589
    APIs
      • Part of subcall function 0044BF8D: _wcscat.LIBCMT ref: 0044BFC7
      • Part of subcall function 0044BF8D: __wsplitpath.LIBCMT ref: 0044BFF1
      • Part of subcall function 0044BF8D: FindFirstFileW.KERNELBASE(?,?), ref: 0044C006
      • Part of subcall function 0044BF8D: _wcscpy.LIBCMT ref: 0044C032
      • Part of subcall function 0044BF8D: _wcscat.LIBCMT ref: 0044C044
      • Part of subcall function 0044BF8D: _wcscat.LIBCMT ref: 0044C056
      • Part of subcall function 0044BF8D: DeleteFileW.KERNELBASE(?), ref: 0044C063
      • Part of subcall function 0044BF8D: FindNextFileW.KERNELBASE(00000000,00000010), ref: 0044C077
      • Part of subcall function 0044BF8D: FindClose.KERNEL32(00000000), ref: 0044C086
    • GetLastError.KERNEL32 ref: 00466556
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FileFind_wcscat$CloseDeleteErrorFirstLastNext__wsplitpath_wcscpy
    • String ID:
    • API String ID: 3480085570-0
    • Opcode ID: 62482746e5b39043409a3ba4a11f9667d9ae4b5bfd2dd12917798eb8923619e1
    • Instruction ID: 6d44c460f9e4b0529ad0a53a1ad2664b698cea24a8b75bada06735633f4f8814
    • Opcode Fuzzy Hash: 62482746e5b39043409a3ba4a11f9667d9ae4b5bfd2dd12917798eb8923619e1
    • Instruction Fuzzy Hash: 45F065B15002109BD710EF64ED45B47B7D4AF44308F15895EF888D7253CB78EC44CB99
    APIs
    • CloseHandle.KERNELBASE(00000000,?,0040DF8E), ref: 0040D91D
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
    • Instruction ID: 397672216df932ca6c22f29d52987cd2165f63c791f69eb8015935d900cfb6d9
    • Opcode Fuzzy Hash: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
    • Instruction Fuzzy Hash: 16E0DEB5900B019EC7318F6AE544416FBF8AEE46213248E2FD4E6D2A64D3B4A5898F54
    APIs
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C158
    • DefDlgProcW.USER32(?,0000004E,?,?,004A83D8,?,004A83D8,?), ref: 0047C173
    • GetKeyState.USER32(00000011), ref: 0047C1A4
    • GetKeyState.USER32(00000009), ref: 0047C1AD
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C1C0
    • GetKeyState.USER32(00000010), ref: 0047C1CA
    • GetWindowLongW.USER32(00000044,000000F0), ref: 0047C1DE
    • SendMessageW.USER32(00000044,0000110A,00000009,00000000), ref: 0047C20A
    • SendMessageW.USER32(00000044,0000113E,00000000,?), ref: 0047C22D
    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047C2D6
    • SendMessageW.USER32 ref: 0047C2FB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$State$LongProcWindow
    • String ID: @GUI_DRAGID$F
    • API String ID: 1562745308-4164748364
    • Opcode ID: 4caa6ee04ed861106395c07a7bf00754629ef83c69e4911a74f4d1e4baa8c438
    • Instruction ID: f40edf6d5039c675f00343e7880f865f139be9e64e9b8d530a61de5f06f6045f
    • Opcode Fuzzy Hash: 4caa6ee04ed861106395c07a7bf00754629ef83c69e4911a74f4d1e4baa8c438
    • Instruction Fuzzy Hash: C6429F702042019FD714CF54C884FAB77A5EB89B04F548A6EFA48AB291DBB4EC45CB5A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: PF$'|G$*"D$*vG$+%F$0wE$2G$5CG$7eF$<HF$<G$ApG$DvE$GSG$IqE$K@G$LbF$MdF$NgF$PIF$YtG$^[F$_?G$b"D$i}G$j)F$kQG$lE$rTG$vjE$}eE$*F$3G$_G$wG
    • API String ID: 0-3772701627
    • Opcode ID: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
    • Instruction ID: b1e67458769bbea4a86cd8903524db5b6e79558e2e7ab8c51025fc7bd56032a7
    • Opcode Fuzzy Hash: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
    • Instruction Fuzzy Hash: 118366F1905B409FC351DFAAF984605BAE1F3AA3157A2857FC5088B731D7B8194A8F4C
    APIs
    • _memset.LIBCMT ref: 0044621B
    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 00446277
    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0044628A
    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004462A4
    • GetProcessWindowStation.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462BD
    • SetProcessWindowStation.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462C8
    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004462E4
    • _wcslen.LIBCMT ref: 0044639E
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
    • _wcsncpy.LIBCMT ref: 004463C7
    • LoadUserProfileW.USERENV(?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 004463E7
    • CreateEnvironmentBlock.USERENV(?,?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 00446408
    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,?,00000000,?,?,00000000,?), ref: 00446446
    • UnloadUserProfile.USERENV(?,?,?,?,?,?,?), ref: 00446483
    • CloseWindowStation.USER32(00000000,?,?,?,?), ref: 00446497
    • CloseDesktop.USER32(00000000,?,?,?,?), ref: 0044649E
    • SetProcessWindowStation.USER32(?,?,?,?,?), ref: 004464A9
    • CloseHandle.KERNEL32(?,?,?,?,?), ref: 004464B4
    • DestroyEnvironmentBlock.USERENV(?,?,?,?,?,?), ref: 004464C8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_memset_wcslen_wcsncpy
    • String ID: $default$winsta0
    • API String ID: 2173856841-1027155976
    • Opcode ID: d8ea487f0f89faab6449b78d9ea2deda36349eb78ff917abc2f4d4a631f0aebf
    • Instruction ID: eafd5d154f9bcf2590b8f8eb1e0f3d39b01f77f2fd200ee1cb9c7344d9c52646
    • Opcode Fuzzy Hash: d8ea487f0f89faab6449b78d9ea2deda36349eb78ff917abc2f4d4a631f0aebf
    • Instruction Fuzzy Hash: DD819170208341AFE724DF65C848B6FBBE8AF89744F04491DF69097291DBB8D805CB6B
    APIs
      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\AutoClicker-3.0.exe,?,C:\Users\user\Desktop\AutoClicker-3.0.exe,004A8E80,C:\Users\user\Desktop\AutoClicker-3.0.exe,0040F3D2), ref: 0040FFCA
      • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A45
      • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A6C
      • Part of subcall function 00436A1D: __wcsicoll.LIBCMT ref: 00436A93
      • Part of subcall function 00436AC4: GetFileAttributesW.KERNELBASE(?,0044BD82,?,?,?), ref: 00436AC9
    • _wcscat.LIBCMT ref: 0044BD96
    • _wcscat.LIBCMT ref: 0044BDBF
    • __wsplitpath.LIBCMT ref: 0044BDEC
    • FindFirstFileW.KERNEL32(?,?), ref: 0044BE04
    • _wcscpy.LIBCMT ref: 0044BE73
    • _wcscat.LIBCMT ref: 0044BE85
    • _wcscat.LIBCMT ref: 0044BE97
    • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC3
    • DeleteFileW.KERNEL32(?), ref: 0044BED5
    • MoveFileW.KERNEL32(?,?), ref: 0044BEF5
    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0C
    • DeleteFileW.KERNEL32(?), ref: 0044BF17
    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2E
    • FindClose.KERNEL32(00000000), ref: 0044BF35
    • MoveFileW.KERNEL32(?,?), ref: 0044BF51
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF66
    • FindClose.KERNEL32(00000000), ref: 0044BF7E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
    • String ID: \*.*
    • API String ID: 2188072990-1173974218
    • Opcode ID: 17236194f9edcd562325c7edff49f5a7e5c5602ba918c05fd512f14d450464fd
    • Instruction ID: 14f7055b3521afb04026f42b490306401b0ba37f80ed0ea0ca267746d8cc4687
    • Opcode Fuzzy Hash: 17236194f9edcd562325c7edff49f5a7e5c5602ba918c05fd512f14d450464fd
    • Instruction Fuzzy Hash: CA5166B2008344AAD720DBA4DC44FDF73E8AB85314F448D1EF68982141EB79D64CCBAA
    APIs
    • __invoke_watson.LIBCMT ref: 004203A4
      • Part of subcall function 00417D93: _memset.LIBCMT ref: 00417DBB
      • Part of subcall function 00417D93: IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 00417E6F
      • Part of subcall function 00417D93: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000314), ref: 00417E79
      • Part of subcall function 00417D93: UnhandledExceptionFilter.KERNEL32(?,?,?,00000314), ref: 00417E86
      • Part of subcall function 00417D93: GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 00417EA1
      • Part of subcall function 00417D93: TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 00417EA8
    • __get_daylight.LIBCMT ref: 004203B0
    • __invoke_watson.LIBCMT ref: 004203BF
    • __get_daylight.LIBCMT ref: 004203CB
    • __invoke_watson.LIBCMT ref: 004203DA
    • ____lc_codepage_func.LIBCMT ref: 004203E2
    • _strlen.LIBCMT ref: 00420442
    • __malloc_crt.LIBCMT ref: 00420449
    • _strlen.LIBCMT ref: 0042045F
    • _strcpy_s.LIBCMT ref: 0042046D
    • __invoke_watson.LIBCMT ref: 00420482
    • GetTimeZoneInformation.KERNEL32(00496C28), ref: 004204AA
    • WideCharToMultiByte.KERNEL32(?,?,00496C2C,?,?,0000003F,?,?), ref: 00420528
    • WideCharToMultiByte.KERNEL32(?,?,00496C80,000000FF,?,0000003F,?,?,?,00496C2C,?,?,0000003F,?,?), ref: 0042055C
      • Part of subcall function 00413A88: __lock.LIBCMT ref: 00413AA6
      • Part of subcall function 00413A88: ___sbh_find_block.LIBCMT ref: 00413AB1
      • Part of subcall function 00413A88: ___sbh_free_block.LIBCMT ref: 00413AC0
      • Part of subcall function 00413A88: RtlFreeHeap.NTDLL(00000000,00000000,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00000000,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
      • Part of subcall function 00413A88: GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00000000,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
    • __invoke_watson.LIBCMT ref: 004205CC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __invoke_watson$ByteCharExceptionFilterMultiProcessUnhandledWide__get_daylight_strlen$CurrentDebuggerErrorFreeHeapInformationLastPresentTerminateTimeZone____lc_codepage_func___sbh_find_block___sbh_free_block__lock__malloc_crt_memset_strcpy_s
    • String ID: S\
    • API String ID: 4084823496-393906132
    • Opcode ID: b65f886e276c08b6e4963b4b205cd0f80d0f885a38fead6d8395163e32eee966
    • Instruction ID: b357f19af7064e56bcdb8625987f67de7edc2332d57e558cb2e7b84f91b73af7
    • Opcode Fuzzy Hash: b65f886e276c08b6e4963b4b205cd0f80d0f885a38fead6d8395163e32eee966
    • Instruction Fuzzy Hash: 6A91D371E00125AFDB20EF65EC819AE7BE9EF55300B95003BF540A7253DA3C89828F5C
    APIs
    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00434D75
    • __swprintf.LIBCMT ref: 00434D91
    • _wcslen.LIBCMT ref: 00434D9B
    • _wcslen.LIBCMT ref: 00434DB0
    • _wcslen.LIBCMT ref: 00434DC5
    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00434DD7
    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00434E0A
    • _memset.LIBCMT ref: 00434E27
    • _wcslen.LIBCMT ref: 00434E3C
    • _wcsncpy.LIBCMT ref: 00434E6F
    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00434EA9
    • CloseHandle.KERNEL32(00000000), ref: 00434EB4
    • RemoveDirectoryW.KERNEL32(?), ref: 00434EBB
    • CloseHandle.KERNEL32(00000000), ref: 00434ECE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcslen$CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
    • String ID: :$\$\??\%s
    • API String ID: 302090198-3457252023
    • Opcode ID: 2a5133c0eab3b4922159a151545836d770f37b46c916c545b877f60e117c6dff
    • Instruction ID: 730b2dca1b6b09bd6b76555d3316dee95f4818bcffb97f26f8f03165767cfd2f
    • Opcode Fuzzy Hash: 2a5133c0eab3b4922159a151545836d770f37b46c916c545b877f60e117c6dff
    • Instruction Fuzzy Hash: 30416676604340ABE330EB64DC49FEF73E8AFD8714F00891EF649921D1E7B4A645876A
    APIs
      • Part of subcall function 00444233: _wcslen.LIBCMT ref: 0044424E
    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0046449E
    • GetLastError.KERNEL32 ref: 004644B4
    • GetCurrentThread.KERNEL32 ref: 004644C8
    • OpenThreadToken.ADVAPI32(00000000), ref: 004644CF
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004644E0
    • OpenProcessToken.ADVAPI32(00000000), ref: 004644E7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
    • String ID: SeDebugPrivilege
    • API String ID: 1312810259-2896544425
    • Opcode ID: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
    • Instruction ID: c3f5e6af55eb0da9fa74db60d4f5a84adac3a89a74612fbe59a223ef38337450
    • Opcode Fuzzy Hash: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
    • Instruction Fuzzy Hash: 0E51A171200201AFD710DF65DD85F5BB7A8AB84704F10892EFB44DB2C1D7B8E844CBAA
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403871
    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403887
    • __wsplitpath.LIBCMT ref: 004038B2
      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
    • _wcscpy.LIBCMT ref: 004038C7
    • _wcscat.LIBCMT ref: 004038DC
    • SetCurrentDirectoryW.KERNEL32(?), ref: 004038EC
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
      • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,0040397D,?,?,00000010), ref: 00403F54
      • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,00000010), ref: 00403F8B
    • _wcscpy.LIBCMT ref: 004039C2
    • _wcslen.LIBCMT ref: 00403A53
    • _wcslen.LIBCMT ref: 00403AAA
    Strings
    • Error opening the file, xrefs: 0042B8AC
    • #include depth exceeded. Make sure there are no recursive includes, xrefs: 0042B87B
    • Unterminated string, xrefs: 0042B9BA
    • _, xrefs: 00403B48
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpy$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_wcscatstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
    • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
    • API String ID: 4115725249-188983378
    • Opcode ID: f0c0ae3c4af8218da084933964ac487fcd1ae6a10cc21228fb4d7df4d407b544
    • Instruction ID: dca64db042171ec5605b2d10b6a92a42a2076cc25022adee7b8115af8a15fc96
    • Opcode Fuzzy Hash: f0c0ae3c4af8218da084933964ac487fcd1ae6a10cc21228fb4d7df4d407b544
    • Instruction Fuzzy Hash: 16D1D5B15083019AD710EF65C841AEB77E8AF95308F04492FF5C563292DB78DA49C7AB
    APIs
    • FindFirstFileW.KERNEL32(?,?), ref: 00434C12
    • GetFileAttributesW.KERNEL32(?), ref: 00434C4F
    • SetFileAttributesW.KERNEL32(?,?), ref: 00434C65
    • FindNextFileW.KERNEL32(00000000,?), ref: 00434C77
    • FindClose.KERNEL32(00000000), ref: 00434C88
    • FindClose.KERNEL32(00000000), ref: 00434C9C
    • FindFirstFileW.KERNEL32(*.*,?), ref: 00434CB7
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00434CFE
    • SetCurrentDirectoryW.KERNEL32(0048A090), ref: 00434D22
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00434D2A
    • FindClose.KERNEL32(00000000), ref: 00434D35
    • FindClose.KERNEL32(00000000), ref: 00434D43
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
    • String ID: *.*
    • API String ID: 1409584000-438819550
    • Opcode ID: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
    • Instruction ID: 399dbb17912f16e5170155dcc5475d9346bc7ba5aa4a4c8a0ea4d4714b2c7a66
    • Opcode Fuzzy Hash: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
    • Instruction Fuzzy Hash: 4141D8726042086BD710EF64DC45AEFB3A8AAC9311F14592FFD54C3280EB79E915C7B9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Timetime$Sleep
    • String ID: BUTTON
    • API String ID: 4176159691-3405671355
    • Opcode ID: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
    • Instruction ID: 32c89cc89acb3c111fc3cc5f781edb0c57d51ec263d79eeef99f8852f1a29925
    • Opcode Fuzzy Hash: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
    • Instruction Fuzzy Hash: CB21B7723843016BE330DB74FD4DF5A7B94A7A5B51F244876F600E6290D7A5D442876C
    APIs
    • FindFirstFileW.KERNEL32(?,76228FB0,76228FB0,?,?,00000000), ref: 00442E40
    • FindNextFileW.KERNEL32(00000000,?,?,00000000), ref: 00442EA4
    • FindClose.KERNEL32(00000000,?,00000000), ref: 00442EB5
    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00442ED1
    • FindFirstFileW.KERNEL32(*.*,?), ref: 00442EF0
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00442F3B
    • SetCurrentDirectoryW.KERNEL32(0048A090,?,?,?,00000000), ref: 00442F6D
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00442F75
    • FindClose.KERNEL32(00000000), ref: 00442F80
      • Part of subcall function 00436D2D: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000,76233220,00000000,00000000,00442E95,?,?,?), ref: 00436D4F
    • FindClose.KERNEL32(00000000,?,?,?,00000000), ref: 00442F92
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
    • String ID: *.*
    • API String ID: 2640511053-438819550
    • Opcode ID: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
    • Instruction ID: 5fd3b3f399b1dfd6b0a62b5043663bf11a2259675d3c80dc16c90576bc2ddb84
    • Opcode Fuzzy Hash: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
    • Instruction Fuzzy Hash: 0F41E8326083046BD620FA64DD85BEFB3A89BC5311F54492FF95483280E7FEA50D8779
    APIs
      • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004392DE
      • Part of subcall function 004392BC: GetLastError.KERNEL32 ref: 004392E4
      • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0043930B
      • Part of subcall function 0043928B: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004392A5
    • GetSecurityDescriptorDacl.ADVAPI32(?,00000004,?,?,?,?), ref: 00445E4B
    • _memset.LIBCMT ref: 00445E61
    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00445E83
    • GetLengthSid.ADVAPI32(?), ref: 00445E92
    • GetAce.ADVAPI32(?,00000000,?,?,00000018), ref: 00445EDE
    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00445EFB
    • GetLengthSid.ADVAPI32(?,?,00000018), ref: 00445F11
    • GetLengthSid.ADVAPI32(?,00000008,?,?,00000000,?,00000000), ref: 00445F39
    • CopySid.ADVAPI32(00000000,?,00000000,?,00000000), ref: 00445F40
    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?,?,00000000,?,00000000), ref: 00445F6E
    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000000,?,00000000), ref: 00445F8B
    • SetUserObjectSecurity.USER32(?,?,?), ref: 00445FA0
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast_memset
    • String ID:
    • API String ID: 3490752873-0
    • Opcode ID: d90d208e026f019221a7fede9d8e70b789478b0619571f3bd68bfaa723845334
    • Instruction ID: 491154c1e478dcf6c9ac3cbca3c2c9e2645d4ee7bbdc2abf5fae4ada557f6fe4
    • Opcode Fuzzy Hash: d90d208e026f019221a7fede9d8e70b789478b0619571f3bd68bfaa723845334
    • Instruction Fuzzy Hash: 85519D71108301ABD610DF61CD84E6FB7E9AFC9B04F04491EFA869B242D778E909C76B
    APIs
    • OleInitialize.OLE32(00000000), ref: 0047AA03
    • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AA27
    • CoCreateInstance.OLE32(?,00000000,00000005,004829C0,?), ref: 0047AAAA
    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0047AB6B
    • _memset.LIBCMT ref: 0047AB7C
    • _wcslen.LIBCMT ref: 0047AC68
    • _memset.LIBCMT ref: 0047ACCD
    • CoCreateInstanceEx.OLE32 ref: 0047AD06
    • CoSetProxyBlanket.OLE32(004829D0,?,?,?,?,?,?,00000800), ref: 0047AD53
    Strings
    • NULL Pointer assignment, xrefs: 0047AD84
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CreateInitializeInstance_memset$BlanketFromProgProxySecurity_wcslen
    • String ID: NULL Pointer assignment
    • API String ID: 1588287285-2785691316
    • Opcode ID: 487cd5cb85bd3a58ff9f5ee20b35b873eec4f009956aa99fb30b2d9d862597ed
    • Instruction ID: 16786b45dbc5194aa398acfc0f0ff3b91b98a178c64a073a91da7f4e0cb75f58
    • Opcode Fuzzy Hash: 487cd5cb85bd3a58ff9f5ee20b35b873eec4f009956aa99fb30b2d9d862597ed
    • Instruction Fuzzy Hash: 54B10DB15083409FD320EF65C881B9FB7E8BBC8744F108E2EF58997291D7759948CB66
    APIs
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004364B9
    • OpenProcessToken.ADVAPI32(00000000), ref: 004364C0
    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004364D6
    • AdjustTokenPrivileges.ADVAPI32 ref: 004364FE
    • GetLastError.KERNEL32 ref: 00436504
    • ExitWindowsEx.USER32(?,00000000), ref: 00436527
    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000001), ref: 00436557
    • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 0043656A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
    • String ID: SeShutdownPrivilege
    • API String ID: 2938487562-3733053543
    • Opcode ID: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
    • Instruction ID: b625d7910520021a286729d09db348b3c4b0b131b75d5259d4bd29649b467962
    • Opcode Fuzzy Hash: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
    • Instruction Fuzzy Hash: E021D5B02803017FF7149B64DD4AF6B3398EB48B10F948829FE09852D2D6BDE844973D
    APIs
    • __swprintf.LIBCMT ref: 00436162
    • __swprintf.LIBCMT ref: 00436176
      • Part of subcall function 0041353A: __woutput_l.LIBCMT ref: 0041358F
    • __wcsicoll.LIBCMT ref: 00436185
    • FindResourceW.KERNEL32(?,?,0000000E), ref: 004361A6
    • LoadResource.KERNEL32(?,00000000), ref: 004361AE
    • LockResource.KERNEL32(00000000), ref: 004361B5
    • FindResourceW.KERNEL32(?,?,00000003), ref: 004361DA
    • LoadResource.KERNEL32(?,00000000), ref: 004361E4
    • SizeofResource.KERNEL32(?,00000000), ref: 004361F0
    • LockResource.KERNEL32(?), ref: 004361FD
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll__woutput_l
    • String ID:
    • API String ID: 2406429042-0
    • Opcode ID: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
    • Instruction ID: 79d88324f8a28cdfdddc37bd7103cac5134eefaeeaedb246b69d205017f9fa0d
    • Opcode Fuzzy Hash: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
    • Instruction Fuzzy Hash: 82313432104210BFD700EF64ED88EAF77A9FB89304F00882BFA4196150E778D940CB68
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D522
    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D593
    • GetLastError.KERNEL32 ref: 0045D59D
    • SetErrorMode.KERNEL32(?), ref: 0045D629
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Error$Mode$DiskFreeLastSpace
    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
    • API String ID: 4194297153-14809454
    • Opcode ID: 09c115e5427f4a047c6d57a237b565b9fe346373832b08411eb119e23da9ab19
    • Instruction ID: c88e17b2292a8fee63b3c2d5931921323f124f64d82654728647185a86005220
    • Opcode Fuzzy Hash: 09c115e5427f4a047c6d57a237b565b9fe346373832b08411eb119e23da9ab19
    • Instruction Fuzzy Hash: 5231AB75A083009FC314EF65D98090BB7E0AF89319F448D6FF94997362D778E9068B6A
    APIs
    • MkParseDisplayName.OLE32(?,00000000,?,?), ref: 0047AF0F
      • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(0425A7C0,?), ref: 00478270
      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(0425A7A0,?), ref: 00478287
    • OleInitialize.OLE32(00000000), ref: 0047AE06
      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
    • _wcslen.LIBCMT ref: 0047AE18
    • CreateBindCtx.OLE32(00000000,?), ref: 0047AEC2
    • CLSIDFromProgID.OLE32(00000000,?,?), ref: 0047AFCC
    • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0047AFF9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CopyVariant$_wcslen$ActiveBindCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcscpy
    • String ID: HH
    • API String ID: 1915432386-2761332787
    • Opcode ID: 5111e7be83367371adae77edb9a14708543d73a5edecb40ea52b156e73750e39
    • Instruction ID: 7e3b4e38c6064d991530b19baaff212313fd3e9d55f264e0ba959e8ba912c45c
    • Opcode Fuzzy Hash: 5111e7be83367371adae77edb9a14708543d73a5edecb40ea52b156e73750e39
    • Instruction Fuzzy Hash: 6C915C71604301ABD710EB65CC85F9BB3E8AFC8714F10892EF64597291EB78E909CB5A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: DEFINE$`$h$h
    • API String ID: 0-4194577831
    • Opcode ID: 924177e0c3576f85a96b78a37b3c3cedf46843da4e7c3acb3e3d7f55582469aa
    • Instruction ID: b1cbab3e2140d6a963e4b85c5b61650905c2e88cbb7a9c7ccaf19de07e543520
    • Opcode Fuzzy Hash: 924177e0c3576f85a96b78a37b3c3cedf46843da4e7c3acb3e3d7f55582469aa
    • Instruction Fuzzy Hash: 9802A1715083818FE725CF29C88076BBBE2BFD5304F28896EE89587342D779D849CB56
    APIs
    • socket.WSOCK32(00000002,00000001,00000006,?,00000000), ref: 004648B0
    • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,?,00000000), ref: 004648BE
    • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648DA
    • WSAGetLastError.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648E6
    • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000005,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 0046492D
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ErrorLast$bindclosesocketsocket
    • String ID:
    • API String ID: 2609815416-0
    • Opcode ID: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
    • Instruction ID: d240999dee57073d64b91b26c15bb406cb7727aead8f71c00845428af50f987f
    • Opcode Fuzzy Hash: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
    • Instruction Fuzzy Hash: C731CB712002009BD710FF2ADC81B6BB3E8EF85724F144A5FF594A72D2D779AC85876A
    APIs
    • CreateToolhelp32Snapshot.KERNEL32 ref: 00437043
    • Process32FirstW.KERNEL32(00000000,00000002), ref: 00437050
    • Process32NextW.KERNEL32(00000000,?), ref: 00437075
    • __wsplitpath.LIBCMT ref: 004370A5
      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
    • _wcscat.LIBCMT ref: 004370BA
    • __wcsicoll.LIBCMT ref: 004370C8
    • CloseHandle.KERNEL32(00000000,?), ref: 00437105
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
    • String ID:
    • API String ID: 2547909840-0
    • Opcode ID: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
    • Instruction ID: d866d71778569fbbd99b025f777f77cc3db9ba9c83dfb601fa45888e96c7797d
    • Opcode Fuzzy Hash: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
    • Instruction Fuzzy Hash: 9C21A7B20083819BD735DB55C881BEFB7E8BB99304F00491EF5C947241EB79A589CB6A
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • FindFirstFileW.KERNEL32(?,?,?,?,?,00000000), ref: 0045217E
    • Sleep.KERNEL32(0000000A,?,?,00000000), ref: 004521B2
    • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 004522AC
    • FindClose.KERNEL32(?,?,00000000), ref: 004522C3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Find$File$CloseFirstNextSleep_wcslen
    • String ID: *.*
    • API String ID: 2693929171-438819550
    • Opcode ID: 795814aabf3575a312431df6cfdeffa41220e00b4b3161055ad0992ab15e1088
    • Instruction ID: af48064257187e8510c52105a37c09e2473729b295899029bd742ede75b152c9
    • Opcode Fuzzy Hash: 795814aabf3575a312431df6cfdeffa41220e00b4b3161055ad0992ab15e1088
    • Instruction Fuzzy Hash: 61419D756083409FC314DF25CA84A9FB7E4BF86305F04491FF98993291D7B8E949CB5A
    APIs
    • OpenClipboard.USER32(?), ref: 0046C635
    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
    • GetClipboardData.USER32(0000000D), ref: 0046C64F
    • CloseClipboard.USER32 ref: 0046C65D
    • GlobalLock.KERNEL32(00000000), ref: 0046C688
    • CloseClipboard.USER32 ref: 0046C692
    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
    • GetClipboardData.USER32(00000001), ref: 0046C6DD
    • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
    • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
    • CloseClipboard.USER32 ref: 0046C866
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
    • String ID: HH
    • API String ID: 589737431-2761332787
    • Opcode ID: e09648b3d4969b277154ac9d31c759a6fc68c617971e46f1926b624d84037e43
    • Instruction ID: 5556deb4c8197336e1b92b5e2a85e957832ef7964462d916cb468ff193882e13
    • Opcode Fuzzy Hash: e09648b3d4969b277154ac9d31c759a6fc68c617971e46f1926b624d84037e43
    • Instruction Fuzzy Hash: 7301F5762042005FC300AFB9ED45B6A7BA4EF59704F04097FF980A72C1EBB1E915C7AA
    APIs
    • __wcsicoll.LIBCMT ref: 0043643C
    • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 00436452
    • __wcsicoll.LIBCMT ref: 00436466
    • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043647C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __wcsicollmouse_event
    • String ID: DOWN
    • API String ID: 1033544147-711622031
    • Opcode ID: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
    • Instruction ID: 8a73d33e481528181e274ae5662561dddcd8f7088196b39fde8242b6fe69d79f
    • Opcode Fuzzy Hash: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
    • Instruction Fuzzy Hash: 75E0927558872039FC4036253C02FFB174CAB66796F018116FE00D1291EA586D865BBD
    APIs
      • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
    • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 00474213
    • WSAGetLastError.WSOCK32(00000000), ref: 00474233
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ErrorLastinet_addrsocket
    • String ID:
    • API String ID: 4170576061-0
    • Opcode ID: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
    • Instruction ID: 44a7e99483396e6262e636993c5e510db402c36a24f0b6146f21617b09e75fab
    • Opcode Fuzzy Hash: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
    • Instruction Fuzzy Hash: B6412C7164030067E720BB3A8C83F5A72D89F40728F144D5EF954BB2C3D6BAAD45475D
    APIs
    • GetCursorPos.USER32(004A83D8), ref: 0045636A
    • ScreenToClient.USER32(004A83D8,?), ref: 0045638A
    • GetAsyncKeyState.USER32(?), ref: 004563D0
    • GetAsyncKeyState.USER32(?), ref: 004563DC
    • GetWindowLongW.USER32(?,000000F0), ref: 00456430
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AsyncState$ClientCursorLongScreenWindow
    • String ID:
    • API String ID: 3539004672-0
    • Opcode ID: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
    • Instruction ID: 0eacbf52c9ff4b21db6d2500407d28a57be55752a0539e191fb639d8ee6a043b
    • Opcode Fuzzy Hash: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
    • Instruction Fuzzy Hash: 8E416071108341ABD724DF55CD84EBBB7E9EF86725F540B0EB8A543281C734A848CB6A
    APIs
      • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
    • IsWindowVisible.USER32 ref: 00477314
    • IsWindowEnabled.USER32 ref: 00477324
    • GetForegroundWindow.USER32(?,?,?,00000001,?,?), ref: 00477331
    • IsIconic.USER32 ref: 0047733F
    • IsZoomed.USER32 ref: 0047734D
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$EnabledForegroundIconicVisibleZoomed
    • String ID:
    • API String ID: 292994002-0
    • Opcode ID: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
    • Instruction ID: c753cb395bd8887e5e04db90522a3107d7308fd2cfa588f53a4db7a4177bc043
    • Opcode Fuzzy Hash: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
    • Instruction Fuzzy Hash: 351172327041119BE3209B26DD05B9FB7A8AF91310F05882EFC49E7250D7B8EC42D7A9
    APIs
    • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000,76233220,00000000,00000000,00442E95,?,?,?), ref: 00436D4F
    • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000), ref: 00436D8C
    • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 00436D93
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: File$CloseCreateHandleTime
    • String ID:
    • API String ID: 3397143404-0
    • Opcode ID: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
    • Instruction ID: bce1a9391340f9688fe0750810cd2cb1b104417d8b3c1e96578cdf6de8724fbd
    • Opcode Fuzzy Hash: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
    • Instruction Fuzzy Hash: A4F0C83634132077E5301A69AC8DFCF276CABDAB32F20452EF741A61C083D51445977D
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _strncmp
    • String ID: ACCEPT$^$h
    • API String ID: 909875538-4263704089
    • Opcode ID: adbbb77bd847cefbadd23aa8e42bde8f813033e7c46a43322acc698efb747d92
    • Instruction ID: 72a2cba82410d8b1d90f72ff5cad5771b474d57714a55a9933f2c727144888ce
    • Opcode Fuzzy Hash: adbbb77bd847cefbadd23aa8e42bde8f813033e7c46a43322acc698efb747d92
    • Instruction Fuzzy Hash: AE22A0746083818FE725CF29C48076BBBE2BFC9304F24896EE8D587351D779984ACB56
    APIs
    • _set_new_mode.LIBCMT ref: 0040D88C
    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D8B9
    • FreeLibrary.KERNEL32(?), ref: 0040D8CE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FreeInfoLibraryParametersSystem_set_new_mode
    • String ID: #v
    • API String ID: 1188159508-554117064
    • Opcode ID: 06ca62d5f0ac41005a4bed089aefec56480100fd5cca74c1e28fe2d3c932602c
    • Instruction ID: 2b4412acdce639bfbf0f9e0c9ecf3f694f94d165ded01d265c3c64edb54a61d9
    • Opcode Fuzzy Hash: 06ca62d5f0ac41005a4bed089aefec56480100fd5cca74c1e28fe2d3c932602c
    • Instruction Fuzzy Hash: C2215EB19183009FC700EF56D88150ABBE4FB98354F44497EF849A72A2D735A945CB9A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: ERCP$VUUU$VUUU$VUUU
    • API String ID: 0-2165971703
    • Opcode ID: fe5f619ecbbb89e409f3ebcf557090f4afc22d0cdf4dbad8df8e547bb5c0b5b7
    • Instruction ID: 514654dd073cfe12bfc68f6c44a091d7a3824994b709b832431b3f3de6bbd106
    • Opcode Fuzzy Hash: fe5f619ecbbb89e409f3ebcf557090f4afc22d0cdf4dbad8df8e547bb5c0b5b7
    • Instruction Fuzzy Hash: 5562D3716087818BE734CF18C8807ABB7E1EBC6314F154A2FE49986390E779D949CB5B
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045C9BE
    • FindNextFileW.KERNEL32(00000000,?), ref: 0045CA1B
    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CA4A
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Find$File$CloseFirstNext
    • String ID:
    • API String ID: 3541575487-0
    • Opcode ID: 389ad529d810a64bb0ac3ba1ac38a0637fa5927c4fe4527bdd92752c01277f73
    • Instruction ID: 18858b47483a38653cd59612877c1399ad483e9f26b014a4aa46912757e3bc7b
    • Opcode Fuzzy Hash: 389ad529d810a64bb0ac3ba1ac38a0637fa5927c4fe4527bdd92752c01277f73
    • Instruction Fuzzy Hash: EC41CE756003009FC720EF79D880A9BB3E4FF89315F208A6EED698B391D775A844CB95
    APIs
    • __time64.LIBCMT ref: 004433A2
      • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
      • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Time$FileSystem__aulldiv__time64
    • String ID: rJ
    • API String ID: 2893107130-1865492326
    • Opcode ID: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
    • Instruction ID: ebc1a5536eae3429eadb0b33e849de59894c076497330b79c1ff8485d89898ec
    • Opcode Fuzzy Hash: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
    • Instruction Fuzzy Hash: B721A2336205108BF321CF36CC41652B7E7EBE0314F268A6AE4A5973C5CA797906CB98
    APIs
    • __time64.LIBCMT ref: 004433A2
      • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
      • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Time$FileSystem__aulldiv__time64
    • String ID: rJ
    • API String ID: 2893107130-1865492326
    • Opcode ID: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
    • Instruction ID: 4b4e0c3debee0a45c2bc781276f994e79ac96c452fb6cf924f1e6ade5adf298d
    • Opcode Fuzzy Hash: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
    • Instruction Fuzzy Hash: E82187336345108BF321CF36CC4165277E3EBE0314B258B6AD4A5973C5CA797906CB88
    APIs
    • InternetQueryDataAvailable.WININET(?,?,?,?,00000000,00000000), ref: 004428C2
    • InternetReadFile.WININET(?,00000000,?,?), ref: 004428F9
      • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Internet$AvailableDataErrorFileLastQueryRead
    • String ID:
    • API String ID: 901099227-0
    • Opcode ID: af31bdc221bed25f814e7c1e84c79890fa83b0f908b7501cae1aaba44c7c76eb
    • Instruction ID: 2c15810e60b1cb59304632cc8162977c32d0240baa2dcf3c2cd6ef22f942a6bb
    • Opcode Fuzzy Hash: af31bdc221bed25f814e7c1e84c79890fa83b0f908b7501cae1aaba44c7c76eb
    • Instruction Fuzzy Hash: 452174B12043016BF220EF56DD45FAFB3E8ABD4715F40492EF285A6180D7B8E949C76A
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DDA1
    • FindClose.KERNEL32(00000000), ref: 0045DDDD
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
    • Instruction ID: 3577cc1601137e614a3334ffa73c6d258275d41fe8d72aaca367a27ef3e2a016
    • Opcode Fuzzy Hash: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
    • Instruction Fuzzy Hash: DE11E5766002049FD710EF6ADC89A5AF7E5EF84325F10892EF958D7281CB75E8048B94
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: 0vH$HH
    • API String ID: 0-728391547
    • Opcode ID: 9b328813cdefc07fded1753a613c2b4aedc6fb073271cfcf2f1583501405de88
    • Instruction ID: 538a6706abcc28c04bdc151be30d2aa4e2083a8dfdfa6c30a7857f36827e6882
    • Opcode Fuzzy Hash: 9b328813cdefc07fded1753a613c2b4aedc6fb073271cfcf2f1583501405de88
    • Instruction Fuzzy Hash: 60E1BE725143109FC310EF25C881A9FB7E5AFC4708F108D2EF589AB281D779E946CB9A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _memset
    • String ID:
    • API String ID: 2102423945-0
    • Opcode ID: 5eb33986bc824c7159e08e175cb88283df2c37f33089532841c0641cd62430c0
    • Instruction ID: fac722ae1e10b3ad9494cda40f9fb3e9e62b3c26aea04ddfc6562ea9d2065ebb
    • Opcode Fuzzy Hash: 5eb33986bc824c7159e08e175cb88283df2c37f33089532841c0641cd62430c0
    • Instruction Fuzzy Hash: C512B4B7B983194FDB48DEE4DCC169573E1FB98304F09A43C9A15C7306F6E8AA094794
    APIs
    • BlockInput.USER32(00000001), ref: 0045A272
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: BlockInput
    • String ID:
    • API String ID: 3456056419-0
    • Opcode ID: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
    • Instruction ID: 5d782454ef4d0180448527013755d2523f66e5fc327f68786c1d80a86620ac83
    • Opcode Fuzzy Hash: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
    • Instruction Fuzzy Hash: D2E04F752043019BC700EF71C545A5BB7E4AF94314F108C6EF845A7351D775AC45CB66
    APIs
    • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 0043918E
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: LogonUser
    • String ID:
    • API String ID: 1244722697-0
    • Opcode ID: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
    • Instruction ID: 63114e5cfb2c4979e73f5d19eacf740c811f86df1a08bc2cb556a5e36cce81ff
    • Opcode Fuzzy Hash: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
    • Instruction Fuzzy Hash: 8DD0ECB52686066FD204CB24D846E2B77E9A7C4701F008A0CB196D2280C670D805CA32
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: NameUser
    • String ID:
    • API String ID: 2645101109-0
    • Opcode ID: 80e3308b08f13769d0a14826f2c078b783276eaab1d980a49b65873380f47b9a
    • Instruction ID: 8011c19b6c32d183c263453b2018abc548473ce9ed5616c99acac4896e71f792
    • Opcode Fuzzy Hash: 80e3308b08f13769d0a14826f2c078b783276eaab1d980a49b65873380f47b9a
    • Instruction Fuzzy Hash: F6E08C322083058FC310EF55F8405ABB390EB94311F004C3FE64AA2191DA79920EDFAB
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00021FEC), ref: 00422033
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
    • Instruction ID: 3275b40964251646410af8875a24301f93fa315c26af6adae0ca3d0f7a721f84
    • Opcode Fuzzy Hash: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
    • Instruction Fuzzy Hash: CD9002743511144A4A011BB16E5D90925D46A586067920875B411C4064DB9840019619
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
    • Instruction ID: b3f199f19983f506b623bfe7955a95149e6efe4e98ce3416cc40fa12ddcf4508
    • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
    • Instruction Fuzzy Hash: 46D19073C0A9B30A8735812D42582BFEE626FD578131EC3E29CD07F38AD26B5DA195D4
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
    • Instruction ID: c47bdb3f9c9e38c5d46ddb9e43dedaf70276048770aeb58bd274f21c588a824b
    • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
    • Instruction Fuzzy Hash: 1CD19073D1A9B30A8735852D42581AFEE626FD578031EC3E2CCD07F38AD16B5DA191D4
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
    • Instruction ID: ac15b8da1a4b082d71a0b082c8349c97121379a14580263daf363e6ab8f75410
    • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
    • Instruction Fuzzy Hash: 87C18173C0A9B30A8736812D42641AFEE626FD579031FC3E2CCD47F38A91AB5DA195D4
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
    • Instruction ID: aa957cafbedeae1199dea6a597ba911d219650f283d164fb65797e90308ef47b
    • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
    • Instruction Fuzzy Hash: 5FC18E73D0A9B30A8735812D42581AFEE626FD578031EC3E28CE46F38ED26F5DA195D4
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
    • Instruction ID: b8cfd58d412160527e66ace840abba843d94ac3f5b06779728c9fe736b8606cc
    • Opcode Fuzzy Hash: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
    • Instruction Fuzzy Hash: ECD012F621844146F33144D866C0BD100437344310FB58C276005CEBC1C0DDECD6C229
    APIs
    • DeleteObject.GDI32(?), ref: 004593D7
    • DeleteObject.GDI32(?), ref: 004593F1
    • DestroyWindow.USER32(?), ref: 00459407
    • GetDesktopWindow.USER32 ref: 0045942A
    • GetWindowRect.USER32(00000000), ref: 00459431
    • SetRect.USER32(50000001,00000000,00000000,000001F4,?), ref: 00459568
    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00459577
    • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,?,?,50000001,?,?,00000000,00000000), ref: 004595BB
    • GetClientRect.USER32(00000000,?), ref: 004595C8
    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 00459615
    • CreateFileW.KERNEL32(00000000,?,80000000,00000000,00000000,00000003,00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459635
    • GetFileSize.KERNEL32(00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459654
    • GlobalAlloc.KERNEL32(00000002,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 0045965F
    • GlobalLock.KERNEL32(00000000), ref: 00459668
    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459678
    • GlobalUnlock.KERNEL32(00000000), ref: 0045967F
    • CloseHandle.KERNEL32(00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459686
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,50000001,?,?,00000000,00000000,00000000), ref: 00459694
    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,000001F4), ref: 004596AD
    • GlobalFree.KERNEL32(00000000), ref: 004596C0
    • CopyImage.USER32(000000FF,00000000,00000000,00000000,00002000), ref: 004596EF
    • SendMessageW.USER32(00000000,00000172,00000000,000000FF), ref: 00459712
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,50000001,?,?,00000000,00000000,00000000), ref: 0045973D
    • ShowWindow.USER32(?,00000004,?,50000001,?,?,00000000,00000000,00000000), ref: 0045974B
    • CreateWindowExW.USER32(00000000,static,00000000,?,?,0000000B,0000000B,?,?,?,00000000,00000000), ref: 0045979C
    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004597AD
    • GetStockObject.GDI32(00000011), ref: 004597B7
    • SelectObject.GDI32(00000000,00000000), ref: 004597BF
    • GetTextFaceW.GDI32(00000000,00000040,00000190,?,50000001,?,?,00000000,00000000,00000000), ref: 004597CD
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004597D6
    • DeleteDC.GDI32(00000000), ref: 004597E1
    • _wcslen.LIBCMT ref: 00459800
    • _wcscpy.LIBCMT ref: 0045981F
    • CreateFontW.GDI32(?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 004598BB
    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004598D0
    • GetDC.USER32(?), ref: 004598DE
    • SelectObject.GDI32(00000000,?), ref: 004598EE
    • SelectObject.GDI32(00000000,?), ref: 00459919
    • ReleaseDC.USER32(?,00000000), ref: 00459925
    • MoveWindow.USER32(?,0000000B,?,?,?,00000001), ref: 00459943
    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 00459951
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
    • String ID: $AutoIt v3$DISPLAY$static
    • API String ID: 4040870279-2373415609
    • Opcode ID: 7e1fdcf96a6f28dbfc3d7d37a0d71ba4d1715dcad0ba926a9502b31959fe1ce4
    • Instruction ID: fce7466cc8f2b4b34a2e278d60cb4f704f90ff1017bfb666dbfc83d8aba9d67a
    • Opcode Fuzzy Hash: 7e1fdcf96a6f28dbfc3d7d37a0d71ba4d1715dcad0ba926a9502b31959fe1ce4
    • Instruction Fuzzy Hash: 3F028C70204301EFD714DF64DE89F2BB7A8AB84705F104A2DFA45AB2D2D7B4E805CB69
    APIs
    • GetSysColor.USER32(00000012), ref: 00441E64
    • SetTextColor.GDI32(?,?), ref: 00441E6C
    • GetSysColorBrush.USER32(0000000F), ref: 00441E83
    • GetSysColor.USER32(0000000F), ref: 00441E8F
    • SetBkColor.GDI32(?,?), ref: 00441EAA
    • SelectObject.GDI32(?,?), ref: 00441EBA
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00441EF0
    • GetSysColor.USER32(00000010), ref: 00441EF8
    • CreateSolidBrush.GDI32(00000000), ref: 00441EFF
    • FrameRect.USER32(?,?,00000000), ref: 00441F10
    • DeleteObject.GDI32(?), ref: 00441F1B
    • InflateRect.USER32(?,000000FE,000000FE), ref: 00441F75
    • FillRect.USER32(?,?,?), ref: 00441FB6
      • Part of subcall function 00433D5C: GetSysColor.USER32(0000000E), ref: 00433D81
      • Part of subcall function 00433D5C: SetTextColor.GDI32(?,00000000), ref: 00433D89
      • Part of subcall function 00433D5C: GetSysColorBrush.USER32(0000000F), ref: 00433DBF
      • Part of subcall function 00433D5C: GetSysColor.USER32(0000000F), ref: 00433DCB
      • Part of subcall function 00433D5C: GetSysColor.USER32(00000011), ref: 00433DEB
      • Part of subcall function 00433D5C: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
      • Part of subcall function 00433D5C: SelectObject.GDI32(?,00000000), ref: 00433E0D
      • Part of subcall function 00433D5C: SetBkColor.GDI32(?,?), ref: 00433E19
      • Part of subcall function 00433D5C: SelectObject.GDI32(?,?), ref: 00433E29
      • Part of subcall function 00433D5C: InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
      • Part of subcall function 00433D5C: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
      • Part of subcall function 00433D5C: GetWindowLongW.USER32 ref: 00433E8A
      • Part of subcall function 00433D5C: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
    • String ID:
    • API String ID: 69173610-0
    • Opcode ID: 19593ee34409e9ddd0eeb9012f0ee064bc7d6ee1214693f7227c46a791432ddd
    • Instruction ID: 0b0c06e318eae1aa70623bc76f746578ebcda4f465cb69034399d4c57c44293d
    • Opcode Fuzzy Hash: 19593ee34409e9ddd0eeb9012f0ee064bc7d6ee1214693f7227c46a791432ddd
    • Instruction Fuzzy Hash: BBB14D71508300AFD314DF64DD88A6FB7F8FB88720F504A2DF996922A0D774E845CB66
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
    • API String ID: 1038674560-3360698832
    • Opcode ID: 22e0be20f96ff30886eacb333e9a7762685b1cd48d74aa9fedb84598800c0ece
    • Instruction ID: b6083b7aed1673b33e689ff2aa7e8f17f47d7310e90ec65f4167159f85ee96f3
    • Opcode Fuzzy Hash: 22e0be20f96ff30886eacb333e9a7762685b1cd48d74aa9fedb84598800c0ece
    • Instruction Fuzzy Hash: 5A611471B4071076EA306A229C46FAB735CDF14345F50052FFC01A628BE7ADDA4A86EE
    APIs
    • GetSysColor.USER32(0000000E), ref: 00433D81
    • SetTextColor.GDI32(?,00000000), ref: 00433D89
    • GetSysColor.USER32(00000012), ref: 00433DA3
    • SetTextColor.GDI32(?,?), ref: 00433DAB
    • GetSysColorBrush.USER32(0000000F), ref: 00433DBF
    • GetSysColor.USER32(0000000F), ref: 00433DCB
    • CreateSolidBrush.GDI32(?), ref: 00433DD4
    • GetSysColor.USER32(00000011), ref: 00433DEB
    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
    • SelectObject.GDI32(?,00000000), ref: 00433E0D
    • SetBkColor.GDI32(?,?), ref: 00433E19
    • SelectObject.GDI32(?,?), ref: 00433E29
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
    • GetWindowLongW.USER32 ref: 00433E8A
    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
    • GetWindowTextW.USER32(00000000,00000000,00000105), ref: 00433EE1
    • InflateRect.USER32(?,000000FD,000000FD), ref: 00433F13
    • DrawFocusRect.USER32(?,?), ref: 00433F1F
    • GetSysColor.USER32(00000011), ref: 00433F2E
    • SetTextColor.GDI32(?,00000000), ref: 00433F36
    • DrawTextW.USER32(?,?,000000FF,?,?), ref: 00433F4E
    • SelectObject.GDI32(?,?), ref: 00433F63
    • DeleteObject.GDI32(?), ref: 00433F70
    • SelectObject.GDI32(?,?), ref: 00433F78
    • DeleteObject.GDI32(00000000), ref: 00433F7B
    • SetTextColor.GDI32(?,?), ref: 00433F83
    • SetBkColor.GDI32(?,?), ref: 00433F8F
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
    • String ID:
    • API String ID: 1582027408-0
    • Opcode ID: b2c91e7859f5e61cb204fae7d22b69f66fa16440cf679c3179dabdc67194f633
    • Instruction ID: aa454ab644ffbff4d2185aee23397a25bdbdaef3ad5a75b83a3ebbbeed3afe32
    • Opcode Fuzzy Hash: b2c91e7859f5e61cb204fae7d22b69f66fa16440cf679c3179dabdc67194f633
    • Instruction Fuzzy Hash: 53710570508340AFD304DF68DD88A6FBBF9FF89711F104A2DFA5592290D7B4E9418B6A
    APIs
    • OpenClipboard.USER32(?), ref: 0046C635
    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
    • GetClipboardData.USER32(0000000D), ref: 0046C64F
    • CloseClipboard.USER32 ref: 0046C65D
    • GlobalLock.KERNEL32(00000000), ref: 0046C688
    • CloseClipboard.USER32 ref: 0046C692
    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
    • GetClipboardData.USER32(00000001), ref: 0046C6DD
    • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
    • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
    • CloseClipboard.USER32 ref: 0046C866
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
    • String ID: HH
    • API String ID: 589737431-2761332787
    • Opcode ID: 63db885bd4685d11ba04ca2dc2cd5436c3481a0afd633c76eaef38f385c21831
    • Instruction ID: 24f9a4a7d39f76c57f2b33bac287345acac4ca31e4121bc437e702b91e2a4168
    • Opcode Fuzzy Hash: 63db885bd4685d11ba04ca2dc2cd5436c3481a0afd633c76eaef38f385c21831
    • Instruction Fuzzy Hash: F861E5722003019BD310EF65DD86B5E77A8EF54705F00483EFA41E72D1EBB5D9058BAA
    APIs
    • GetCursorPos.USER32(?), ref: 00456692
    • GetDesktopWindow.USER32 ref: 004566AA
    • GetWindowRect.USER32(00000000), ref: 004566B1
    • GetWindowLongW.USER32(?,000000F0), ref: 0045670D
    • GetWindowLongW.USER32(?,000000F0), ref: 00456720
    • DestroyWindow.USER32(?), ref: 00456731
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456779
    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00456797
    • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567C0
    • SendMessageW.USER32(?,00000421,?,?), ref: 004567D8
    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004567EE
    • IsWindowVisible.USER32(?), ref: 00456812
    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 0045682E
    • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 00456843
    • GetWindowRect.USER32(?,?), ref: 0045685C
    • MonitorFromPoint.USER32(?,?,00000002), ref: 00456880
    • GetMonitorInfoW.USER32 ref: 00456894
    • CopyRect.USER32(?,?), ref: 004568A8
    • SendMessageW.USER32(?,00000412,00000000), ref: 0045690A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$MessageSend$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
    • String ID: ($,$tooltips_class32
    • API String ID: 541082891-3320066284
    • Opcode ID: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
    • Instruction ID: 3987ef5f26dee50c6234681dd74380f3ee0746d74ffcadc96223edc745891050
    • Opcode Fuzzy Hash: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
    • Instruction Fuzzy Hash: 33B18EB0604341AFD714DF64C984B6BB7E5EF88704F408D2DF989A7292D778E848CB5A
    APIs
    • _wcslen.LIBCMT ref: 00454DCF
    • _wcslen.LIBCMT ref: 00454DE2
    • __wcsicoll.LIBCMT ref: 00454DEF
    • _wcslen.LIBCMT ref: 00454E04
    • __wcsicoll.LIBCMT ref: 00454E11
    • _wcslen.LIBCMT ref: 00454E24
    • __wcsicoll.LIBCMT ref: 00454E31
      • Part of subcall function 004115D0: __wcsicmp_l.LIBCMT ref: 00411657
    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00454E65
    • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,?,?,?,?,?,?,?,00000000), ref: 00454E79
    • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454EB7
    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00454EFB
    • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454F2C
    • FreeLibrary.KERNEL32(00000000), ref: 00454F37
    • ExtractIconExW.SHELL32(?,00000000,00000000,?,00000001), ref: 00454F94
    • DestroyIcon.USER32(?), ref: 00454FA2
    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00454FC0
    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00454FCC
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00454FF1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
    • String ID: .dll$.exe$.icl$#v
    • API String ID: 2511167534-1852478350
    • Opcode ID: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
    • Instruction ID: 777b7c61fe84a0ac0f88e3bb9536c5d4e291b97e4b5026f6b39318954af55ba4
    • Opcode Fuzzy Hash: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
    • Instruction Fuzzy Hash: D461D9711043016AE620DF659D85F7B73ECEF84B0AF00481EFE81D5182E7B9A989C77A
    APIs
    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00436B4E
    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000), ref: 00436B73
    • _wcslen.LIBCMT ref: 00436B79
    • _wcscpy.LIBCMT ref: 00436B9F
    • _wcscat.LIBCMT ref: 00436BC0
    • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00436BE7
    • _wcscat.LIBCMT ref: 00436C2A
    • _wcscat.LIBCMT ref: 00436C31
    • __wcsicoll.LIBCMT ref: 00436C4B
    • _wcsncpy.LIBCMT ref: 00436C62
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
    • API String ID: 1503153545-1459072770
    • Opcode ID: b807072921be43837c5f8a522ad558dd8c2fdb0261e20a250b057060507bcd93
    • Instruction ID: f4118b49cd66f9fee818cdfc0bae26735a4a754b0a3131160812af9443992caa
    • Opcode Fuzzy Hash: b807072921be43837c5f8a522ad558dd8c2fdb0261e20a250b057060507bcd93
    • Instruction Fuzzy Hash: B54115B264020137D200B7269C83EFF735CDE99715F54091FFE45A2253FA2EA69642BE
    APIs
      • Part of subcall function 004431E0: __time64.LIBCMT ref: 004431EA
    • _fseek.LIBCMT ref: 004527FC
    • __wsplitpath.LIBCMT ref: 0045285C
    • _wcscpy.LIBCMT ref: 00452871
    • _wcscat.LIBCMT ref: 00452886
    • __wsplitpath.LIBCMT ref: 004528B0
    • _wcscat.LIBCMT ref: 004528C8
    • _wcscat.LIBCMT ref: 004528DD
    • __fread_nolock.LIBCMT ref: 00452914
    • __fread_nolock.LIBCMT ref: 00452925
    • __fread_nolock.LIBCMT ref: 00452944
    • __fread_nolock.LIBCMT ref: 00452955
    • __fread_nolock.LIBCMT ref: 00452976
    • __fread_nolock.LIBCMT ref: 00452987
    • __fread_nolock.LIBCMT ref: 00452998
    • __fread_nolock.LIBCMT ref: 004529A9
      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
    • __fread_nolock.LIBCMT ref: 00452A39
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
    • String ID:
    • API String ID: 2054058615-0
    • Opcode ID: a756d5dc52df814b55dbbae7fb473f4d3a9ac756b6e5f5ef0450e1a4fbeec886
    • Instruction ID: 201a521b06b3709fb0a5eb03bbb196dd6daa16663b72699fbefef0c9ff0fdfcf
    • Opcode Fuzzy Hash: a756d5dc52df814b55dbbae7fb473f4d3a9ac756b6e5f5ef0450e1a4fbeec886
    • Instruction Fuzzy Hash: 4FC14EB2508340ABD320DF65C881EDBB7E8EFC9714F444D2FF68987241E6759544CBAA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 6f2b06a33fc2a75e9a8d451ebbee7099ec94d06d7003e7913124b150a1c2ca52
    • Instruction ID: a4e6889c8706d2a682ad3cc8acca51b009283e1ae9b51da70db0806919efebf9
    • Opcode Fuzzy Hash: 6f2b06a33fc2a75e9a8d451ebbee7099ec94d06d7003e7913124b150a1c2ca52
    • Instruction Fuzzy Hash: 95C104723403416BF3209B64DC46FBBB794EB95321F04453FFA45D62C1EBBA9409876A
    APIs
    • GetSysColor.USER32 ref: 0044A11D
    • GetClientRect.USER32(?,?), ref: 0044A18D
    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A1A6
    • GetWindowDC.USER32(?), ref: 0044A1B3
    • GetPixel.GDI32(00000000,?,?), ref: 0044A1C6
    • ReleaseDC.USER32(?,00000000), ref: 0044A1D6
    • GetSysColor.USER32(0000000F), ref: 0044A1EC
    • GetWindowLongW.USER32(?,000000F0), ref: 0044A207
    • GetSysColor.USER32(0000000F), ref: 0044A216
    • GetSysColor.USER32(00000005), ref: 0044A21E
    • GetWindowDC.USER32 ref: 0044A277
    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A28A
    • GetPixel.GDI32(00000000,?,00000000), ref: 0044A29F
    • GetPixel.GDI32(00000000,00000000,?), ref: 0044A2B4
    • GetPixel.GDI32(00000000,?,?), ref: 0044A2D0
    • ReleaseDC.USER32(?,00000000), ref: 0044A2D8
    • SetTextColor.GDI32(00000000,?), ref: 0044A2F6
    • SetBkMode.GDI32(00000000,00000001), ref: 0044A30A
    • GetStockObject.GDI32(00000005), ref: 0044A312
    • SetBkColor.GDI32(00000000,00000000), ref: 0044A328
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
    • String ID:
    • API String ID: 1744303182-0
    • Opcode ID: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
    • Instruction ID: f407f88e1fc9bdd08975b2e96734b256c85d8f08b0ead5e1f8dbf5832e348edb
    • Opcode Fuzzy Hash: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
    • Instruction Fuzzy Hash: AD6148315442016BE3209B388C88BBFB7A4FB49324F54079EF9A8973D0D7B99C51D76A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __wcsicoll$__wcsnicmp
    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
    • API String ID: 790654849-1810252412
    • Opcode ID: dc4bf10c5acfde0aa82a2b73d957bf05deb8d005684d043c04d75530e919c6ec
    • Instruction ID: 062d901ab728898637dbe4e522eb0dc02856c8c0bafd4dcc3878af77e4f2a789
    • Opcode Fuzzy Hash: dc4bf10c5acfde0aa82a2b73d957bf05deb8d005684d043c04d75530e919c6ec
    • Instruction Fuzzy Hash: A431B3B1644301A7CA00FA61CC83F5B73A85F54759F100A3FB951B61D6FA6CEA0C862F
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: InitVariant
    • String ID:
    • API String ID: 1927566239-0
    • Opcode ID: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
    • Instruction ID: b17386a2766a1a739d91313a8bf0106a5dd250ff49ec0cac6ee5761d63536315
    • Opcode Fuzzy Hash: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
    • Instruction Fuzzy Hash: 87A1F5766146019FC300EF65D88499FB7AAFF85315F408D3EFA49C3211D77AD4098BAA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: \
    • API String ID: 0-2967466578
    • Opcode ID: becf761c18ae497479a3d5c1c9b6859e57dd8286ccad06720f7d245abed9d0d3
    • Instruction ID: e6fbcda15cb9520e0e34bfac0f9750edaedb1b44b840e2dcfb1a2c219c195b9a
    • Opcode Fuzzy Hash: becf761c18ae497479a3d5c1c9b6859e57dd8286ccad06720f7d245abed9d0d3
    • Instruction Fuzzy Hash: 907186B2504300ABC720EB65C885FEBB3E8AF94714F148D1FF58997142E679E648C75A
    APIs
    • GetLocalTime.KERNEL32(?), ref: 0045DED4
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045DEE4
    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0045DEF0
    • _wcsncpy.LIBCMT ref: 0045DF0F
    • __wsplitpath.LIBCMT ref: 0045DF54
    • _wcscat.LIBCMT ref: 0045DF6C
    • _wcscat.LIBCMT ref: 0045DF7E
    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0045DF93
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFA7
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFE5
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFFB
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E00D
    • _wcscpy.LIBCMT ref: 0045E019
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0045E05F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CurrentDirectory$Time$File$Local_wcscat$System__wsplitpath_wcscpy_wcsncpy
    • String ID: *.*
    • API String ID: 3201719729-438819550
    • Opcode ID: 138f0a6ba4266c13c949904e73f279582c256440b9ecd5b366a120f820ad9124
    • Instruction ID: 9ef8ac46b2ec3f8a2b66e183c5d6435db2730cdd54c1860218fefef83dfd89d7
    • Opcode Fuzzy Hash: 138f0a6ba4266c13c949904e73f279582c256440b9ecd5b366a120f820ad9124
    • Instruction Fuzzy Hash: D061A7B25043049BC724EF65C881E9FB3E8AF94704F048E1EF98987241DB79E949CB96
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __wcsicoll$IconLoad
    • String ID: blank$info$question$stop$warning
    • API String ID: 2485277191-404129466
    • Opcode ID: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
    • Instruction ID: 3fdcc892c2a25cebf9aff257507665a297d4e16c4260cb8f6e9492a672fb13e0
    • Opcode Fuzzy Hash: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
    • Instruction Fuzzy Hash: CB2128B6B08301A7D610A725BC05FDF27489FA8365F004C2BF941E2283F3A8A45583BD
    APIs
    • CompareStringW.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428611
    • GetLastError.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428627
    • strncnt.LIBCMT ref: 00428646
    • strncnt.LIBCMT ref: 0042865A
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: strncnt$CompareErrorLastString
    • String ID:
    • API String ID: 1776594460-0
    • Opcode ID: f529e5e4f4e0d4330dedfb38631367518aabf5e5395540cf0b6beb59761b1ce6
    • Instruction ID: 056e5a993d73ec50dc3c8e072878bb631c9b69e1f80941a2a69bbd8adeb14d7f
    • Opcode Fuzzy Hash: f529e5e4f4e0d4330dedfb38631367518aabf5e5395540cf0b6beb59761b1ce6
    • Instruction Fuzzy Hash: 0DA1B131B01225AFDF219F61EC41AAF7BB6AF94340FA4402FF81196251DF3D8891CB58
    APIs
    • LoadIconW.USER32(?,00000063), ref: 004545DA
    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004545EC
    • SetWindowTextW.USER32(?,?), ref: 00454606
    • GetDlgItem.USER32(?,000003EA), ref: 0045461F
    • SetWindowTextW.USER32(00000000,?), ref: 00454626
    • GetDlgItem.USER32(?,000003E9), ref: 00454637
    • SetWindowTextW.USER32(00000000,?), ref: 0045463E
    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00454663
    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 0045467D
    • GetWindowRect.USER32(?,?), ref: 00454688
    • SetWindowTextW.USER32(?,?), ref: 004546FD
    • GetDesktopWindow.USER32 ref: 00454708
    • GetWindowRect.USER32(00000000), ref: 0045470F
    • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 00454760
    • GetClientRect.USER32(?,?), ref: 0045476F
    • PostMessageW.USER32(?,00000005,00000000,?), ref: 0045479E
    • SetTimer.USER32(?,0000040A,?,00000000), ref: 004547E9
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
    • String ID:
    • API String ID: 3869813825-0
    • Opcode ID: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
    • Instruction ID: 4e77de65cc6986e78e6be143d0a4b9e7f39e78804b6f4fc71fe9e35dfcfd5046
    • Opcode Fuzzy Hash: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
    • Instruction Fuzzy Hash: 8C616D71604701AFD320DF68CD88F2BB7E8AB88709F004E1DF98697691D7B8E849CB55
    APIs
    • LoadCursorW.USER32(00000000,00007F8A), ref: 00458D2D
    • LoadCursorW.USER32(00000000,00007F00), ref: 00458D3A
    • LoadCursorW.USER32(00000000,00007F03), ref: 00458D47
    • LoadCursorW.USER32(00000000,00007F8B), ref: 00458D54
    • LoadCursorW.USER32(00000000,00007F01), ref: 00458D61
    • LoadCursorW.USER32(00000000,00007F81), ref: 00458D6E
    • LoadCursorW.USER32(00000000,00007F88), ref: 00458D7B
    • LoadCursorW.USER32(00000000,00007F80), ref: 00458D88
    • LoadCursorW.USER32(00000000,00007F86), ref: 00458D95
    • LoadCursorW.USER32(00000000,00007F83), ref: 00458DA2
    • LoadCursorW.USER32(00000000,00007F85), ref: 00458DAF
    • LoadCursorW.USER32(00000000,00007F82), ref: 00458DBC
    • LoadCursorW.USER32(00000000,00007F84), ref: 00458DC9
    • LoadCursorW.USER32(00000000,00007F04), ref: 00458DD6
    • LoadCursorW.USER32(00000000,00007F02), ref: 00458DE3
    • LoadCursorW.USER32(00000000,00007F89), ref: 00458DF0
    • GetCursorInfo.USER32 ref: 00458E03
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Cursor$Load$Info
    • String ID:
    • API String ID: 2577412497-0
    • Opcode ID: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
    • Instruction ID: 36b4ee280ed0253346847529aeb00c95e660e1b7f2a6688567eec4957a26740b
    • Opcode Fuzzy Hash: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
    • Instruction Fuzzy Hash: D9311671E4C3156AE7509F758C5AB1BBEE0AF40B54F004D2FF2889F2D1DAB9E4448B86
    APIs
    • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 004696CC
    • GetFocus.USER32 ref: 004696E0
    • GetDlgCtrlID.USER32(00000000), ref: 004696EB
    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046973F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessagePost$CtrlFocus
    • String ID: 0
    • API String ID: 1534620443-4108050209
    • Opcode ID: 62584f0700354f9638dc84372f5bd7da2133143389ca1d81e46619cfd2228c9b
    • Instruction ID: 7d80af5808d25915b866e76daf530f36ef8b085de22dc1c7fc8dbb607ae8adb7
    • Opcode Fuzzy Hash: 62584f0700354f9638dc84372f5bd7da2133143389ca1d81e46619cfd2228c9b
    • Instruction Fuzzy Hash: 1591E1B1604301ABD710DF14D884BABB7A8FB89714F004A1EF99497391E7B4DC49CBAB
    APIs
    • _memset.LIBCMT ref: 00468107
    • GetMenuItemInfoW.USER32(?,00000007,00000000,?), ref: 00468190
    • GetMenuItemCount.USER32(?), ref: 00468227
    • DeleteMenu.USER32(?,00000005,00000000), ref: 004682B8
    • DeleteMenu.USER32(?,00000004,00000000), ref: 004682C1
    • DeleteMenu.USER32(?,00000006,00000000,?,00000004,00000000), ref: 004682CA
    • DeleteMenu.USER32(00000000,00000003,00000000,?,00000006,00000000,?,00000004,00000000), ref: 004682D3
    • GetMenuItemCount.USER32 ref: 004682DC
    • SetMenuItemInfoW.USER32 ref: 00468317
    • GetCursorPos.USER32(00000000), ref: 00468322
    • SetForegroundWindow.USER32(?), ref: 0046832D
    • TrackPopupMenuEx.USER32(?,00000000,00000000,00000006,?,00000000,?,?,00000006,00000000,?,00000004,00000000), ref: 00468345
    • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468352
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
    • String ID: 0
    • API String ID: 3993528054-4108050209
    • Opcode ID: 6d3a2f3eb8c47eedf1f08a8f50307072e29792adae5a186b56623d1b4fa5e004
    • Instruction ID: 4340dc150aa643cd5d6a06a27257ae06321217f8787b0a6ddf92a2fea5d0b5ae
    • Opcode Fuzzy Hash: 6d3a2f3eb8c47eedf1f08a8f50307072e29792adae5a186b56623d1b4fa5e004
    • Instruction Fuzzy Hash: 7171C070648301ABE3308B14CC49F5BB7E8BF86724F244B0EF5A5563D1DBB9A8458B1B
    APIs
    • DragQueryPoint.SHELL32(?,?), ref: 0046F2DA
      • Part of subcall function 00441CB4: ClientToScreen.USER32(044051D8,?), ref: 00441CDE
      • Part of subcall function 00441CB4: GetWindowRect.USER32(?,?), ref: 00441D5A
      • Part of subcall function 00441CB4: PtInRect.USER32(?,?,?), ref: 00441D6F
    • SendMessageW.USER32(?), ref: 0046F34C
    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0046F355
    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0046F37F
    • _wcscat.LIBCMT ref: 0046F3BC
    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0046F3D1
    • SendMessageW.USER32(?,000000B0,?,?), ref: 0046F3E3
    • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F3F1
    • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F40E
    • DragFinish.SHELL32(?), ref: 0046F414
    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0046F4FC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
    • API String ID: 4085615965-3440237614
    • Opcode ID: 21e723686adaaae76799126148fe52d6047df7c410e8070ac8fc7b2ba0157983
    • Instruction ID: d92027b63b9478c52a8b17f069484fb886a707b260a555cedefccfc898d4b85d
    • Opcode Fuzzy Hash: 21e723686adaaae76799126148fe52d6047df7c410e8070ac8fc7b2ba0157983
    • Instruction Fuzzy Hash: 596170716043009BD700EF54D885E5FB7A8FFC9714F104A2EF99097291D7B8A949CBAA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __wcsicoll
    • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
    • API String ID: 3832890014-4202584635
    • Opcode ID: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
    • Instruction ID: bf73cd225697d97a5a257e466bf5c8c79b4efa22739c650e03c6b1f9c6e9338c
    • Opcode Fuzzy Hash: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
    • Instruction Fuzzy Hash: 1D01616160562122FE11322A7C03BDF15898F5139AF14447BFC05F1282FF4DDA8692EE
    APIs
    • _memset.LIBCMT ref: 004669C4
    • _wcsncpy.LIBCMT ref: 00466A21
    • _wcsncpy.LIBCMT ref: 00466A4D
      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
    • _wcstok.LIBCMT ref: 00466A90
      • Part of subcall function 004142A3: __getptd.LIBCMT ref: 004142A9
    • _wcstok.LIBCMT ref: 00466B3F
    • _wcscpy.LIBCMT ref: 00466BC8
    • GetOpenFileNameW.COMDLG32(00000058), ref: 00466CFE
    • _wcslen.LIBCMT ref: 00466D1D
    • _memset.LIBCMT ref: 00466BEE
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    • _wcslen.LIBCMT ref: 00466D4B
    • GetSaveFileNameW.COMDLG32(00000058), ref: 00466D9E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcslen$FileName_memset_wcscpy_wcsncpy_wcstok$OpenSave__getptd
    • String ID: X$HH
    • API String ID: 3021350936-1944015008
    • Opcode ID: 8510c5a4e6f2f633b5c7c3d2e8616575f4ad048defd1bc8b91cbbd3d7e74e50c
    • Instruction ID: a4927f3182871fc14b8cfcfbdeecfc05aedc0290490a4e5168a192441a38e3fa
    • Opcode Fuzzy Hash: 8510c5a4e6f2f633b5c7c3d2e8616575f4ad048defd1bc8b91cbbd3d7e74e50c
    • Instruction Fuzzy Hash: 06C1B2716043408BC714EF65C981A9FB3E4BF84304F15892FF949AB292EB78E905CB5B
    APIs
    • _memset.LIBCMT ref: 0045F4AE
    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F519
    • SetMenuItemInfoW.USER32(00000008,00000004,00000000,?), ref: 0045F556
    • Sleep.KERNEL32(000001F4,?,?,00000000,?), ref: 0045F568
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: InfoItemMenu$Sleep_memset
    • String ID: 0
    • API String ID: 1504565804-4108050209
    • Opcode ID: a0187d59ff87fa41a03bb4d21dbb4f0370dcd754a2a60340bffe414ce63b3a66
    • Instruction ID: f442292141210e4664d210e26ccee3fd9952f46b07198f25d2fda28500c1543b
    • Opcode Fuzzy Hash: a0187d59ff87fa41a03bb4d21dbb4f0370dcd754a2a60340bffe414ce63b3a66
    • Instruction Fuzzy Hash: E271E3711043406BD3109F54DD48FABBBE8EBD5306F04086FFD8587252D6B9A94EC76A
    APIs
    • _wcsncpy.LIBCMT ref: 0045CCFA
    • __wsplitpath.LIBCMT ref: 0045CD3C
    • _wcscat.LIBCMT ref: 0045CD51
    • _wcscat.LIBCMT ref: 0045CD63
    • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,00000104,?), ref: 0045CD78
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000104,?), ref: 0045CD8C
      • Part of subcall function 00436AC4: GetFileAttributesW.KERNELBASE(?,0044BD82,?,?,?), ref: 00436AC9
    • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDD0
    • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDE6
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDF8
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045CE08
    • _wcscpy.LIBCMT ref: 0045CE14
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CE5A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
    • String ID: *.*
    • API String ID: 1153243558-438819550
    • Opcode ID: 8d4418e85b8a6406244653df922fd93611cdfbedd54d4075bce392ef71c36b09
    • Instruction ID: 4b7f18f3392d5c51d0b0bcfc25b88d1348604f1c1aa494fd035d881d108a9fe9
    • Opcode Fuzzy Hash: 8d4418e85b8a6406244653df922fd93611cdfbedd54d4075bce392ef71c36b09
    • Instruction Fuzzy Hash: 0561E5B61043419FD731EF54C885AEBB7E4EB84305F44882FED8983242D67D998E879E
    APIs
    • _memset.LIBCMT ref: 00455127
    • GetMenuItemInfoW.USER32 ref: 00455146
    • DeleteMenu.USER32(?,?,00000000), ref: 004551B2
    • DeleteMenu.USER32(?,?,00000000), ref: 004551C8
    • GetMenuItemCount.USER32(?), ref: 004551D9
    • SetMenu.USER32(?,00000000), ref: 004551E7
    • DestroyMenu.USER32(?,?,00000000), ref: 004551F4
    • DrawMenuBar.USER32 ref: 00455207
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow_memset
    • String ID: 0
    • API String ID: 1663942905-4108050209
    • Opcode ID: af7f8c80a5e4d124b441538db1d8f09d014a4296be6c866fe6a106d89ef87892
    • Instruction ID: b4bdd7d0bd4ee66815c45afb4cba49e6688c1fb7c5fb2b704b87d0eb3faa17d4
    • Opcode Fuzzy Hash: af7f8c80a5e4d124b441538db1d8f09d014a4296be6c866fe6a106d89ef87892
    • Instruction Fuzzy Hash: F4413B70600A01AFD715DF24D9A8B6B77A8BF44302F40891DFD49CB292DB78EC44CBA9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __get_daylight__invoke_watson$__gmtime64_s$__getptd_noexit
    • String ID:
    • API String ID: 1481289235-0
    • Opcode ID: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
    • Instruction ID: 11750150b5911b8a2d77b888e51b7102539fbc40f42687a9f62e69b5342e6946
    • Opcode Fuzzy Hash: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
    • Instruction Fuzzy Hash: 8461B372B00B15DBD724AB69DC81AEB73E99F84324F14452FF011D7682EB78DA808B58
    APIs
    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 0046FB61
    • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 0046FB7A
    • SendMessageW.USER32 ref: 0046FBAF
    • SendMessageW.USER32 ref: 0046FBE2
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001), ref: 0046FC1B
    • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0046FC3E
    • ImageList_Create.COMCTL32(00000020,00000020,00000021,?,00000001), ref: 0046FC51
    • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 0046FC73
    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FC97
    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FCA5
    • SendMessageW.USER32 ref: 0046FD00
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$IconImageList_$CreateExtractReplace
    • String ID:
    • API String ID: 2632138820-0
    • Opcode ID: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
    • Instruction ID: f8b2170a3f6480226351c2682443129a31dd3945ebd2779c8b18a40e734619f9
    • Opcode Fuzzy Hash: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
    • Instruction Fuzzy Hash: A461BF70208305AFD320DF14DC85F5BB7E4FB89B14F10492EFA85972D1E7B4A8498B66
    APIs
    • LoadCursorW.USER32(00000000,00007F89), ref: 00433BC7
    • LoadCursorW.USER32(00000000,00007F8A), ref: 00433BDE
    • LoadCursorW.USER32(00000000,00007F03), ref: 00433BF5
    • LoadCursorW.USER32(00000000,00007F8B), ref: 00433C0C
    • LoadCursorW.USER32(00000000,00007F01), ref: 00433C23
    • LoadCursorW.USER32(00000000,00007F88), ref: 00433C3A
    • LoadCursorW.USER32(00000000,00007F86), ref: 00433C51
    • LoadCursorW.USER32(00000000,00007F83), ref: 00433C68
    • LoadCursorW.USER32(00000000,00007F85), ref: 00433C7F
    • LoadCursorW.USER32(00000000,00007F82), ref: 00433C96
    • LoadCursorW.USER32(00000000,00007F84), ref: 00433CAD
    • LoadCursorW.USER32(00000000,00007F04), ref: 00433CC4
    • LoadCursorW.USER32(00000000,00007F02), ref: 00433CDB
    • LoadCursorW.USER32(00000000,00000000), ref: 00433CEF
    • LoadCursorW.USER32(00000000,00007F00), ref: 00433D06
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CursorLoad
    • String ID:
    • API String ID: 3238433803-0
    • Opcode ID: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
    • Instruction ID: acd63d7325575073817552101614e6badc0a76bef24473f745c9da0ba21645f6
    • Opcode Fuzzy Hash: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
    • Instruction Fuzzy Hash: 6D310E3058C302FFE7504F50EE0AB1C36A0BB48B47F008C7DF64AA62E0E6F055009B9A
    APIs
    • GetClassNameW.USER32(?,?,00000100), ref: 00460AF5
    • _wcslen.LIBCMT ref: 00460B00
    • __swprintf.LIBCMT ref: 00460B9E
    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00460C11
    • GetClassNameW.USER32(?,?,00000400), ref: 00460C8E
    • GetDlgCtrlID.USER32(?), ref: 00460CE6
    • GetWindowRect.USER32(?,?), ref: 00460D21
    • GetParent.USER32(?), ref: 00460D40
    • ScreenToClient.USER32(00000000), ref: 00460D47
    • GetClassNameW.USER32(?,?,00000100), ref: 00460DBE
    • GetWindowTextW.USER32(?,?,00000400), ref: 00460DFB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
    • String ID: %s%u
    • API String ID: 1899580136-679674701
    • Opcode ID: 0ff779261280a1d71afab97dfd93056d8abbd447807ed13e0868808c168531d5
    • Instruction ID: ed0b46c26cbb3f928a943cd91895a09858176ee0e89b0f6962e21683ef9d2041
    • Opcode Fuzzy Hash: 0ff779261280a1d71afab97dfd93056d8abbd447807ed13e0868808c168531d5
    • Instruction Fuzzy Hash: 3AA1CD722043019BDB14DF54C884BEB73A8FF84714F04892EFD889B245E778E946CBA6
    APIs
    • CoTaskMemFree.OLE32(?), ref: 0047D6D3
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    • StringFromCLSID.OLE32(?,?), ref: 0047D6B5
      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
    • StringFromIID.OLE32(?,?), ref: 0047D7F0
    • CoTaskMemFree.OLE32(?), ref: 0047D80A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FreeFromStringTask_wcslen$_wcscpy
    • String ID: 0vH$CLSID\$Interface\$ProgID$ToolBoxBitmap32$inprocserver32$localserver32$HH
    • API String ID: 2485709727-934586222
    • Opcode ID: 03995aef64252b90b47830dbf913c4564e5bef7073d381f9fbcf9ccf49670eb9
    • Instruction ID: 863a92aed17781cc5d2c46c31d9fb1bee6891e1aa6357fd1a436e63756cf1c3d
    • Opcode Fuzzy Hash: 03995aef64252b90b47830dbf913c4564e5bef7073d381f9fbcf9ccf49670eb9
    • Instruction Fuzzy Hash: 6B714BB5614201AFC304EF25C981D5BB3F8BF88704F108A2EF5599B351DB78E905CB6A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcscpy$Folder_memset$BrowseDesktopFromInitializeListMallocPathUninitialize
    • String ID: HH
    • API String ID: 3381189665-2761332787
    • Opcode ID: f56d20f5e9bcc0869150d07a39ca5b3b05c8c3ca1b4b44521316ef7453f83fd5
    • Instruction ID: 9856a5a3be2a6f4b6f15ab218c20ab076772672eb14c4daba281b2e598c2a196
    • Opcode Fuzzy Hash: f56d20f5e9bcc0869150d07a39ca5b3b05c8c3ca1b4b44521316ef7453f83fd5
    • Instruction Fuzzy Hash: E1619AB59043009FC320EF65C88499BB7E9BFC8704F048E1EF98987252D775E849CB6A
    APIs
    • GetDC.USER32(00000000), ref: 00434585
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00434590
    • CreateCompatibleDC.GDI32(00000000), ref: 0043459B
    • SelectObject.GDI32(00000000,?), ref: 004345A9
    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00434618
    • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00434665
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
    • String ID: (
    • API String ID: 3300687185-3887548279
    • Opcode ID: 43c474ea1f3cbc02bff59d45d8adde2e5616a8cdcdb3be6e0f2db7d71aaf462d
    • Instruction ID: a007e7ec8c3f390601fcb6226b5fc218b62818acb39bbc9fe8cd9ddeb27b86ed
    • Opcode Fuzzy Hash: 43c474ea1f3cbc02bff59d45d8adde2e5616a8cdcdb3be6e0f2db7d71aaf462d
    • Instruction Fuzzy Hash: E4514871508345AFD310CF69C884B6BBBE9EF8A310F14881DFA9687390D7B5E844CB66
    APIs
    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E463
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E480
    • __swprintf.LIBCMT ref: 0045E4D9
    • _printf.LIBCMT ref: 0045E595
    • _printf.LIBCMT ref: 0045E5B7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: LoadString_printf$__swprintf_wcslen
    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR $HH
    • API String ID: 3590180749-2894483878
    • Opcode ID: bdbc81a6f397f48541eb6b9d9cb118ea19acdf20d5b676a86077bf2114e3de40
    • Instruction ID: ea6607e378049cd2ed226c14e439a8f24e06fb14138fc01ed1da1d2b867fc66d
    • Opcode Fuzzy Hash: bdbc81a6f397f48541eb6b9d9cb118ea19acdf20d5b676a86077bf2114e3de40
    • Instruction Fuzzy Hash: 3251C171518345ABC324EF51CC41DAF77A8AB84744F00093FB94467292EB78EE498B6A
    APIs
      • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
      • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
    • GetDriveTypeW.KERNEL32 ref: 0045DA30
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DA76
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DAAB
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DADF
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: SendString$_wcslen$BuffCharDriveLowerType
    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
    • API String ID: 4013263488-4113822522
    • Opcode ID: fd9fc8206e1307b245725fda6a282fd52c9acdbe5fa1953a858f1a8c6bf21876
    • Instruction ID: 274ee433733a362713261a58857774369a2b1907b6125d9cd31254fc4f726d6f
    • Opcode Fuzzy Hash: fd9fc8206e1307b245725fda6a282fd52c9acdbe5fa1953a858f1a8c6bf21876
    • Instruction Fuzzy Hash: A7517D71604300ABD710EF55CC85F1EB3E4AF88704F14492EF985AB2E2D7B8E908CB5A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcslen$_wcsncpy$LocalTime__wcstoi64
    • String ID:
    • API String ID: 228034949-0
    • Opcode ID: 1bbe74cc6b430cd40855ef0fb96ca3219cb6c4760458e3245aadd62100630502
    • Instruction ID: c9113392db11e6d0b84b7dcaf0f9983ae7bcdcfbf3325debe08446cd55f13bc3
    • Opcode Fuzzy Hash: 1bbe74cc6b430cd40855ef0fb96ca3219cb6c4760458e3245aadd62100630502
    • Instruction Fuzzy Hash: 874194B181435066DA10FF6AC8479DFB3A8EF89314F84495FF945D3162E378E64883AA
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,0046FAD5), ref: 004334F4
    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043350F
    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043351A
    • GlobalLock.KERNEL32(00000000), ref: 00433523
    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433533
    • GlobalUnlock.KERNEL32(00000000), ref: 0043353A
    • CloseHandle.KERNEL32(00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433541
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043354F
    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,?), ref: 00433568
    • GlobalFree.KERNEL32(00000000), ref: 0043357B
    • GetObjectW.GDI32(?,00000018,?), ref: 004335A6
    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004335DB
    • DeleteObject.GDI32(?), ref: 00433603
    • SendMessageW.USER32(?,00000172,00000000,?), ref: 0043361B
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
    • String ID:
    • API String ID: 3969911579-0
    • Opcode ID: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
    • Instruction ID: 5aed18668fdc988692497ed4484016cc97142e8c7c748bcd34b77a3330007e11
    • Opcode Fuzzy Hash: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
    • Instruction Fuzzy Hash: 70410471204210AFD710DF64DC88F6BBBE8FB89711F10492DFA45972A0D7B5A941CBAA
    APIs
    • GetParent.USER32 ref: 00445A8D
    • GetClassNameW.USER32(00000000,?,00000100), ref: 00445AA0
    • __wcsicoll.LIBCMT ref: 00445AC4
    • __wcsicoll.LIBCMT ref: 00445AE0
    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445B3D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __wcsicoll$ClassMessageNameParentSend
    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
    • API String ID: 3125838495-3381328864
    • Opcode ID: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
    • Instruction ID: 9ea7b4bfd8e333fc3d4c3d1cc69785ca983c3453aa66f955cff8de8c622a02b1
    • Opcode Fuzzy Hash: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
    • Instruction Fuzzy Hash: F011E9B1B40301BBFF10B6659C46EAF739CDF94759F00081BFD44E6182F6ACA9458769
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CopyVariant$ErrorLast
    • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
    • API String ID: 2286883814-4206948668
    • Opcode ID: 14f2dc84b7c831f17f4450e9dac890b92e1ee860fca4f90808d6d67d1a29f54c
    • Instruction ID: 5c76bcf0434180a49ef26f8382d3619d889c8a8ee3f63882ad125ac36acecb62
    • Opcode Fuzzy Hash: 14f2dc84b7c831f17f4450e9dac890b92e1ee860fca4f90808d6d67d1a29f54c
    • Instruction Fuzzy Hash: 4EA1F0B1644300ABD620EB25CC81EABB3E9FBC4704F10891EF65987251D779E945CBAA
    APIs
      • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
      • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
    • GetDriveTypeW.KERNEL32(?,?,00000061), ref: 00475EEC
    • _wcscpy.LIBCMT ref: 00475F18
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: BuffCharDriveLowerType_wcscpy_wcslen
    • String ID: a$all$cdrom$fixed$network$ramdisk$removable$unknown$HH
    • API String ID: 3052893215-4176887700
    • Opcode ID: a487343c59825440cffdd6022f49dd836431a56fcda48515089244998ea4f28d
    • Instruction ID: 6cc86aaf3f57b9aec14a2210bc5d58b88d69c1962f85b7f875311c819b6133e0
    • Opcode Fuzzy Hash: a487343c59825440cffdd6022f49dd836431a56fcda48515089244998ea4f28d
    • Instruction Fuzzy Hash: 6051E5716047009BC710EF51D981B9BB3D4AB85705F108C2FF948AB382D7B9DE09879B
    APIs
    • StringFromIID.OLE32(?,?,00000003,?,?,00000000), ref: 004582E5
      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    • CoTaskMemFree.OLE32(?,00000000), ref: 00458335
    • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 00458351
    • RegQueryValueExW.ADVAPI32 ref: 00458381
    • CLSIDFromString.OLE32(00000000,?), ref: 004583AF
    • RegQueryValueExW.ADVAPI32 ref: 004583E8
    • LoadRegTypeLib.OLEAUT32(?,?), ref: 00458486
      • Part of subcall function 00413F97: __wtof_l.LIBCMT ref: 00413FA1
    • RegCloseKey.ADVAPI32(?), ref: 004584BA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FromQueryStringValue_wcslen$CloseFreeLoadOpenTaskType__wtof_l_wcscpy
    • String ID: Version$\TypeLib$interface\
    • API String ID: 656856066-939221531
    • Opcode ID: 7852234c5105a81b7c23e8532f1b62eaf04b9cd23b6536a13193c97c4d582f2b
    • Instruction ID: 79b7cd5abce1e27c05c99aa42fc57472f96028fce63c5dd006e808227a6af2ff
    • Opcode Fuzzy Hash: 7852234c5105a81b7c23e8532f1b62eaf04b9cd23b6536a13193c97c4d582f2b
    • Instruction Fuzzy Hash: DB513B715083059BD310EF55D944A6FB3E8FFC8B08F004A2DF985A7251EA78DD09CB9A
    APIs
    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E676
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E69A
    • __swprintf.LIBCMT ref: 0045E6EE
    • _printf.LIBCMT ref: 0045E7A9
    • _printf.LIBCMT ref: 0045E7D2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: LoadString_printf$__swprintf_wcslen
    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
    • API String ID: 3590180749-2354261254
    • Opcode ID: 10e48b686bc1fcf0ae36d010e9c9631c041a7cd6da18121578042419e2e4a910
    • Instruction ID: 03d42c299deb106851c26beaa035a1d67b90fa97d791fe748db8e656fe6cf6f8
    • Opcode Fuzzy Hash: 10e48b686bc1fcf0ae36d010e9c9631c041a7cd6da18121578042419e2e4a910
    • Instruction Fuzzy Hash: DA51D5715143019BD324FB51CC41EAF77A8AF94344F14093FF94527292DB78AE49CB6A
    APIs
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    • _memset.LIBCMT ref: 00458194
    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004581D6
    • RegConnectRegistryW.ADVAPI32(?,80000002,00000000), ref: 004581F4
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,00000000), ref: 00458219
    • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,?), ref: 00458248
    • CLSIDFromString.OLE32(00000000,?), ref: 00458279
    • RegCloseKey.ADVAPI32(00000000), ref: 0045828F
    • RegCloseKey.ADVAPI32(00000000), ref: 00458296
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset_wcslen
    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
    • API String ID: 2255324689-22481851
    • Opcode ID: 0d9c0df7270c869d7cac9b0932ccd045c0ffc63e625489a8662e397cd9251e0d
    • Instruction ID: 72af60983ba7b0dac16083a6d39a40a605b9268420798eaea06033c553dc61e3
    • Opcode Fuzzy Hash: 0d9c0df7270c869d7cac9b0932ccd045c0ffc63e625489a8662e397cd9251e0d
    • Instruction Fuzzy Hash: A0419C725083019BD320EF64C845B5FB7E8AF84704F044D2EF985B7291DBB8E949CB9A
    APIs
    • RegOpenKeyExW.ADVAPI32(80000000,interface,00000000,00020019,?), ref: 00458513
    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00458538
    • RegCloseKey.ADVAPI32(?), ref: 00458615
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,000001FE,interface\), ref: 0045858A
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000028), ref: 004585A8
    • __wcsicoll.LIBCMT ref: 004585D6
    • IIDFromString.OLE32(?,?,?,?), ref: 004585EB
    • RegCloseKey.ADVAPI32(?), ref: 004585F8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CloseOpen$EnumFromQueryStringValue__wcsicoll_wcslen
    • String ID: ($interface$interface\
    • API String ID: 2231185022-3327702407
    • Opcode ID: 350e120f6e18dddb3f8c6d46bfca87765a62661d057c16082d94f44a56e694f0
    • Instruction ID: 8bba9f68fd62273e28347649ee1beaf5ca721337d59508e4072ff8b61f6c8959
    • Opcode Fuzzy Hash: 350e120f6e18dddb3f8c6d46bfca87765a62661d057c16082d94f44a56e694f0
    • Instruction Fuzzy Hash: 58318371204305ABE710DF54DD85F6FB3E8FB84744F10492DF685A6191EAB8E908C76B
    APIs
    • WSAStartup.WSOCK32(00000101,?), ref: 004365A5
    • gethostname.WSOCK32(00000100,00000100,00000101,?), ref: 004365BC
    • gethostbyname.WSOCK32(00000101,00000100,00000100,00000101,?), ref: 004365C6
    • _wcscpy.LIBCMT ref: 004365F5
    • WSACleanup.WSOCK32 ref: 004365FD
    • inet_ntoa.WSOCK32(00000100,?), ref: 00436624
    • _strcat.LIBCMT ref: 0043662F
    • _wcscpy.LIBCMT ref: 00436644
    • WSACleanup.WSOCK32(?,?,?,?,?,?,00000100,?), ref: 00436652
    • _wcscpy.LIBCMT ref: 00436666
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcscpy$Cleanup$Startup_strcatgethostbynamegethostnameinet_ntoa
    • String ID: 0.0.0.0
    • API String ID: 2691793716-3771769585
    • Opcode ID: 81a51dda9f489601a27a8e5984809d836f13537a581e82ae0c3dfc8963991be9
    • Instruction ID: 29d249c793a1599df1911ffab6ed89036a29d54f41df1114d8fa63e2d2305339
    • Opcode Fuzzy Hash: 81a51dda9f489601a27a8e5984809d836f13537a581e82ae0c3dfc8963991be9
    • Instruction Fuzzy Hash: 5C21D4726003016BD620FB269C42FFF33A89FD4318F54492FF64456242EABDD58983AB
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048C968,0000000C,00416C4D,00000000,00000000,?,004114D4,?,00000000,00000001), ref: 00416B24
    • __crt_waiting_on_module_handle.LIBCMT ref: 00416B2F
      • Part of subcall function 0041177F: Sleep.KERNEL32(000003E8,00000000,?,00416A38,KERNEL32.DLL,?,00416AA4,?,004114D4,?,00000000,00000001), ref: 0041178B
      • Part of subcall function 0041177F: GetModuleHandleW.KERNEL32(00000000,?,00416A38,KERNEL32.DLL,?,00416AA4,?,004114D4,?,00000000,00000001), ref: 00411794
    • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00416B58
    • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00416B68
    • __lock.LIBCMT ref: 00416B8A
    • InterlockedIncrement.KERNEL32(?), ref: 00416B97
    • __lock.LIBCMT ref: 00416BAB
    • ___addlocaleref.LIBCMT ref: 00416BC9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
    • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
    • API String ID: 1028249917-2843748187
    • Opcode ID: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
    • Instruction ID: dfb830706c011728ae11a8c0f52cb2fa371409e71f4acd403326aacb15a29bdd
    • Opcode Fuzzy Hash: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
    • Instruction Fuzzy Hash: 4E119671944701AFD720EF76C905B9EBBE0AF00714F10495FE469A6391DB78A580CB1D
    APIs
    • GetKeyboardState.USER32(?,?,00000000), ref: 00453C0D
    • SetKeyboardState.USER32(?), ref: 00453C5A
    • GetAsyncKeyState.USER32(000000A0), ref: 00453C82
    • GetKeyState.USER32(000000A0), ref: 00453C99
    • GetAsyncKeyState.USER32(000000A1), ref: 00453CC9
    • GetKeyState.USER32(000000A1), ref: 00453CDA
    • GetAsyncKeyState.USER32(00000011), ref: 00453D07
    • GetKeyState.USER32(00000011), ref: 00453D15
    • GetAsyncKeyState.USER32(00000012), ref: 00453D3F
    • GetKeyState.USER32(00000012), ref: 00453D4D
    • GetAsyncKeyState.USER32(0000005B), ref: 00453D77
    • GetKeyState.USER32(0000005B), ref: 00453D85
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: State$Async$Keyboard
    • String ID:
    • API String ID: 541375521-0
    • Opcode ID: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
    • Instruction ID: 09d2c23b2f41f951af40c960ff4fa7a39ed3d74d48f5bb091813d5d41b5bf946
    • Opcode Fuzzy Hash: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
    • Instruction Fuzzy Hash: BD5108311497C42AF731EF6048217A7BBE45F52782F488D5EE9C107283E619AB0C976B
    APIs
    • GetDlgItem.USER32(?,00000001), ref: 00437DD7
    • GetWindowRect.USER32(00000000,?), ref: 00437DE9
    • MoveWindow.USER32(00000000,0000000A,?,?,?,00000000), ref: 00437E5C
    • GetDlgItem.USER32(?,00000002), ref: 00437E70
    • GetWindowRect.USER32(00000000,?), ref: 00437E82
    • MoveWindow.USER32(00000000,?,00000000,?,?,00000000), ref: 00437EDB
    • GetDlgItem.USER32(?,000003E9), ref: 00437EEA
    • GetWindowRect.USER32(00000000,?), ref: 00437EFC
    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00437F46
    • GetDlgItem.USER32(?,000003EA), ref: 00437F55
    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 00437F6E
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00437F78
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$ItemMoveRect$Invalidate
    • String ID:
    • API String ID: 3096461208-0
    • Opcode ID: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
    • Instruction ID: 6334a21bf5495bf578199e0a0c43900503e40640961724061e29feeedb49a886
    • Opcode Fuzzy Hash: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
    • Instruction Fuzzy Hash: 46511CB16083069FC318DF68DD85A2BB7E9ABC8300F144A2DF985D3391E6B4ED058B95
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
    • String ID:
    • API String ID: 136442275-0
    • Opcode ID: 6d9480e49288270feebf418813f714f0b9da2b6f6d0e5d6bea6da3981f44c382
    • Instruction ID: e47e2093bf76b35e8f1fec89578fc46911e8a4506192668d3a16ce6d5165f020
    • Opcode Fuzzy Hash: 6d9480e49288270feebf418813f714f0b9da2b6f6d0e5d6bea6da3981f44c382
    • Instruction Fuzzy Hash: 744124B2408345ABC235E754C885EEF73ECABD8314F44891EB68D42141EB796688C7A7
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B479
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ConnectRegistry_wcslen
    • String ID: HH
    • API String ID: 535477410-2761332787
    • Opcode ID: d31f8c66610355c23d2a511bc10269451823fc026b7b2a285ef58847e77f2878
    • Instruction ID: 7a368be733395892e28f24b11b3b05e85d853a2cd395d98498a1c99032eed9d9
    • Opcode Fuzzy Hash: d31f8c66610355c23d2a511bc10269451823fc026b7b2a285ef58847e77f2878
    • Instruction Fuzzy Hash: 63E171B1604200ABC714EF28C981F1BB7E4EF88704F148A1EF685DB381D779E945CB9A
    APIs
    • GetClassNameW.USER32(?,?,00000400), ref: 004604B5
    • GetWindowTextW.USER32(?,?,00000400), ref: 004604F1
    • _wcslen.LIBCMT ref: 00460502
    • CharUpperBuffW.USER32(?,00000000), ref: 00460510
    • GetClassNameW.USER32(?,?,00000400), ref: 00460589
    • GetWindowTextW.USER32(?,?,00000400), ref: 004605C2
    • GetClassNameW.USER32(?,?,00000400), ref: 00460606
    • GetClassNameW.USER32(?,?,00000400), ref: 0046063E
    • GetWindowRect.USER32(?,?), ref: 004606AD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen
    • String ID: ThumbnailClass
    • API String ID: 4123061591-1241985126
    • Opcode ID: e69171ecdb66c2ac8a22ada2a36eef6888958b698e598c7a9cc9f9e3d6af1520
    • Instruction ID: b645ef8d54a60b7d8a856e9fdf4d8999e4c56e3b903fe9b51be5921097eabf2a
    • Opcode Fuzzy Hash: e69171ecdb66c2ac8a22ada2a36eef6888958b698e598c7a9cc9f9e3d6af1520
    • Instruction Fuzzy Hash: 3F91B0715043019FDB14DF24C884BAB77A8EF84715F04896FFD85AA281E778E905CBAB
    APIs
      • Part of subcall function 00456354: GetCursorPos.USER32(004A83D8), ref: 0045636A
      • Part of subcall function 00456354: ScreenToClient.USER32(004A83D8,?), ref: 0045638A
      • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563D0
      • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563DC
    • DefDlgProcW.USER32(?,00000205,?,?,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F55F
    • ImageList_DragLeave.COMCTL32(00000000,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F57D
    • ImageList_EndDrag.COMCTL32 ref: 0046F583
    • ReleaseCapture.USER32 ref: 0046F589
    • SetWindowTextW.USER32(?,00000000), ref: 0046F620
    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0046F630
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
    • String ID: @GUI_DRAGFILE$@GUI_DROPID$HH
    • API String ID: 2483343779-2060113733
    • Opcode ID: ee7c3b17aec17e4c27bcbd9727a0060781f77dff83af6801a09f2031786b5110
    • Instruction ID: 4b94e37398fb4c0e8bf176de98e3888209b69965db7f8e5b86c8cb252d1f017b
    • Opcode Fuzzy Hash: ee7c3b17aec17e4c27bcbd9727a0060781f77dff83af6801a09f2031786b5110
    • Instruction Fuzzy Hash: EB5106716043119BD700DF18DC85FAF77A5EB89310F04492EF941973A2DB789D49CBAA
    APIs
    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 0046FD8A
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,004A83D8,?), ref: 0046FDF0
    • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 0046FE0E
    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,004A83D8,?), ref: 0046FE20
    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 0046FEA5
    • SendMessageW.USER32(?,0000113F,00000000,?), ref: 0046FEDF
    • GetClientRect.USER32(?,?), ref: 0046FEF2
    • RedrawWindow.USER32(?,?,00000000,00000000), ref: 0046FF02
    • DestroyIcon.USER32(?), ref: 0046FFCC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
    • String ID: 2
    • API String ID: 1331449709-450215437
    • Opcode ID: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
    • Instruction ID: e79942d1a0196d9b5e30c5c178d8ccafd59c9ae1e7fac48b8759c586c5a3b44e
    • Opcode Fuzzy Hash: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
    • Instruction Fuzzy Hash: EB51AC702043019FD320CF44D885BAABBE5FB88700F04487EE684872A2D7B5A849CB5A
    APIs
    • DestroyWindow.USER32(?,?,?,?,?,?,00000000,static,00000000,00000000,?,?,00000000,00000000,?,00000000), ref: 00450EE1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: DestroyWindow
    • String ID: static
    • API String ID: 3375834691-2160076837
    • Opcode ID: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
    • Instruction ID: 4605c95b1b006c90d65e271c0fdf07f62d21d56273c2870bf7f2e3decf5281c5
    • Opcode Fuzzy Hash: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
    • Instruction Fuzzy Hash: 4531B572200300BBD7109B64DC45F6BB3A8EBC9711F204A2EFA50D72C0D7B4E8048B69
    APIs
    • GetCurrentProcess.KERNEL32(00000008,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439409
    • OpenThreadToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 0043940C
    • GetCurrentProcess.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?), ref: 0043941D
    • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 00439420
    • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 0043945B
    • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00439474
    • _memcmp.LIBCMT ref: 004394A9
    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004394F8
    Strings
    • SeAssignPrimaryTokenPrivilege, xrefs: 00439455
    • SeIncreaseQuotaPrivilege, xrefs: 0043946A
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
    • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
    • API String ID: 1446985595-805462909
    • Opcode ID: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
    • Instruction ID: 628aaead06b6f58e004e5b45c2ed9710a22b4d2b921ab75b424857e8fd72c9d6
    • Opcode Fuzzy Hash: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
    • Instruction Fuzzy Hash: DB31A371508312ABC710DF21CD41AAFB7E8FB99704F04591EF98193240E7B8DD4ACBAA
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D848
    • GetDriveTypeW.KERNEL32(?,?), ref: 0045D8A3
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D94A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ErrorMode$DriveType
    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$HH
    • API String ID: 2907320926-41864084
    • Opcode ID: dedd84b25bf16ec97b8f7abf03141158f3469f8d6523b3826b7d448701e3e89b
    • Instruction ID: ff40a6618de8bc10fd9d8ab7c4bf8203ca17e7db32dce2f39fa84d08a6c534b9
    • Opcode Fuzzy Hash: dedd84b25bf16ec97b8f7abf03141158f3469f8d6523b3826b7d448701e3e89b
    • Instruction Fuzzy Hash: A1318B75A083008FC310EF65E48481EB7E1AFC8315F648D2BF945A7362C779D9068BAB
    APIs
    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 004672E6
    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046735D
    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467375
    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004673ED
    • SafeArrayGetVartype.OLEAUT32(CE8B7824,?), ref: 00467418
    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467445
    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046746A
    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 00467559
    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 0046748A
      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467571
    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004675E4
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ArraySafe$Data$AccessUnaccess$Exception@8ThrowVartype_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
    • String ID:
    • API String ID: 1932665248-0
    • Opcode ID: d6f42339ab3fa264365351f6c7f9bc6fbbd6feac36c871de3410b7a81864ab05
    • Instruction ID: 42a0e90c8bf2b482c85e144861ec280134e9fb1dbd9e00a0d693b148f8e5f150
    • Opcode Fuzzy Hash: d6f42339ab3fa264365351f6c7f9bc6fbbd6feac36c871de3410b7a81864ab05
    • Instruction Fuzzy Hash: E8B1BF752082009FD304DF29C884B6B77E5FF98318F14496EE98587362E779E885CB6B
    APIs
    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00448182
    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00448185
    • GetWindowLongW.USER32(?,000000F0), ref: 004481A7
    • _memset.LIBCMT ref: 004481BA
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481CC
    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0044824E
    • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482A4
    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482BE
    • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482E3
    • SendMessageW.USER32(?,0000101E,00000001,00000000), ref: 004482FC
    • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448317
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$LongWindow_memset
    • String ID:
    • API String ID: 830647256-0
    • Opcode ID: 1f974a42bb272ebd497ae17cfa8d31423c8f4085d5e66ed31892ece12506e0d7
    • Instruction ID: 69fd08a602074ed3d664547bad3ac5a94a9e6c02d61aa1d07dc3907ec7ad0976
    • Opcode Fuzzy Hash: 1f974a42bb272ebd497ae17cfa8d31423c8f4085d5e66ed31892ece12506e0d7
    • Instruction Fuzzy Hash: 41616F70208341AFE310DF54C881FABB7A4FF89704F14465EFA909B2D1DBB5A945CB56
    APIs
      • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
    • DestroyAcceleratorTable.USER32(?), ref: 0046EA9F
    • ImageList_Destroy.COMCTL32(?), ref: 0046EB04
    • ImageList_Destroy.COMCTL32(?), ref: 0046EB18
    • ImageList_Destroy.COMCTL32(?), ref: 0046EB24
    • DeleteObject.GDI32(?), ref: 0046EB4F
    • DestroyIcon.USER32(?), ref: 0046EB67
    • DeleteObject.GDI32(?), ref: 0046EB7F
    • DestroyWindow.USER32(?), ref: 0046EB97
    • DestroyIcon.USER32(?), ref: 0046EBBF
    • DestroyIcon.USER32(?), ref: 0046EBCD
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateRectTableWindow
    • String ID:
    • API String ID: 802431696-0
    • Opcode ID: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
    • Instruction ID: 42d633cefbe7d7192e7a113645d0a532909e6831d49db23f2259be933aabe8c6
    • Opcode Fuzzy Hash: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
    • Instruction Fuzzy Hash: 17513178600202DFDB14DF26D894E2A77E9FB4AB14B54446EE502CB361EB38EC41CB5E
    APIs
    • GetKeyboardState.USER32(?,?,?), ref: 00444D8A
    • GetAsyncKeyState.USER32(000000A0), ref: 00444E0F
    • GetKeyState.USER32(000000A0), ref: 00444E26
    • GetAsyncKeyState.USER32(000000A1), ref: 00444E40
    • GetKeyState.USER32(000000A1), ref: 00444E51
    • GetAsyncKeyState.USER32(00000011), ref: 00444E69
    • GetKeyState.USER32(00000011), ref: 00444E77
    • GetAsyncKeyState.USER32(00000012), ref: 00444E8F
    • GetKeyState.USER32(00000012), ref: 00444E9D
    • GetAsyncKeyState.USER32(0000005B), ref: 00444EB5
    • GetKeyState.USER32(0000005B), ref: 00444EC3
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: State$Async$Keyboard
    • String ID:
    • API String ID: 541375521-0
    • Opcode ID: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
    • Instruction ID: c605e69a62dfc64c618b97cb3a1930d242a0674024be490a091b983f03ece729
    • Opcode Fuzzy Hash: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
    • Instruction Fuzzy Hash: 6A41C3646087C52DFB31966484017E7FFD16FA2708F58844FD1C5067C2DBAEA9C8C7AA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: HH
    • API String ID: 0-2761332787
    • Opcode ID: 670d9dad4042a4df83a3cdc279bcaf48c88f5c22b2cf2c538bfc90d8bd087f9d
    • Instruction ID: 848a924b3cef8bd3153860a444c938f10782cf4bd198576b39dfa3900f93d9c5
    • Opcode Fuzzy Hash: 670d9dad4042a4df83a3cdc279bcaf48c88f5c22b2cf2c538bfc90d8bd087f9d
    • Instruction Fuzzy Hash: CDA1A2726043009BD310EF65DC82B6BB3E9ABD4718F008E2EF558E7281D779E9448B5A
    APIs
    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004508CB
    • SendMessageW.USER32(?,00001036,00000000,?), ref: 004508DB
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,00001036,00000000,?,000000FF,?,SysListView32,004848E8,00000000), ref: 004508FC
    • _wcslen.LIBCMT ref: 00450944
    • _wcscat.LIBCMT ref: 00450955
    • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045096C
    • SendMessageW.USER32(?,00001061,?,?), ref: 0045099B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$Window_wcscat_wcslen
    • String ID: -----$SysListView32
    • API String ID: 4008455318-3975388722
    • Opcode ID: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
    • Instruction ID: 786a3889ee88f98d9b0e9b4b0e1dacf7018a6923f31dd28eeaa3c07ad082d1a6
    • Opcode Fuzzy Hash: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
    • Instruction Fuzzy Hash: 17519470504340ABE330DB65C885FABB3E4AF84714F104E1EFA94972D3D6B99989CB65
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469277
    • GetDlgCtrlID.USER32(00000000), ref: 00469289
    • GetParent.USER32 ref: 004692A4
    • SendMessageW.USER32(00000000,?,00000111), ref: 004692A7
    • GetDlgCtrlID.USER32(00000000), ref: 004692AE
    • GetParent.USER32 ref: 004692C7
    • SendMessageW.USER32(00000000,?,00000111,?), ref: 004692CA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent$_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 2040099840-1403004172
    • Opcode ID: c4cfe3aa6347263f5e7f478cfbbd79706a78b3b69e9ca7ea7c2a1f62ea4a4c3e
    • Instruction ID: ef07326ddff4210f4741e87947fad3c2ec39ee11b6619cfdf8cc81125e1c6f8c
    • Opcode Fuzzy Hash: c4cfe3aa6347263f5e7f478cfbbd79706a78b3b69e9ca7ea7c2a1f62ea4a4c3e
    • Instruction Fuzzy Hash: BC21D6716002147BD600AB65CC45DBFB39CEB85324F044A1FF954A73D1DAB8EC0947B9
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469471
    • GetDlgCtrlID.USER32(00000000), ref: 00469483
    • GetParent.USER32 ref: 0046949E
    • SendMessageW.USER32(00000000,?,00000111), ref: 004694A1
    • GetDlgCtrlID.USER32(00000000), ref: 004694A8
    • GetParent.USER32 ref: 004694C1
    • SendMessageW.USER32(00000000,?,00000111,?), ref: 004694C4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent$_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 2040099840-1403004172
    • Opcode ID: f6d2d289d9c6b042648c13f3860ca422660ddf71d50f280739d9b957209a3e54
    • Instruction ID: 434b10a17d45167e777e8ea6e726dd6ee4e01267e4a119798c8aa60e835c5cdc
    • Opcode Fuzzy Hash: f6d2d289d9c6b042648c13f3860ca422660ddf71d50f280739d9b957209a3e54
    • Instruction Fuzzy Hash: CA21D7756002147BD600BB29CC45EBFB39CEB85314F04492FF984A7291EABCEC0A4779
    APIs
      • Part of subcall function 004419ED: DeleteObject.GDI32(?), ref: 00441A53
    • SendMessageW.USER32(769523D0,00001001,00000000,00000000), ref: 00448E73
    • SendMessageW.USER32(769523D0,00001026,00000000,00000000), ref: 00448E7E
      • Part of subcall function 00441A7A: CreateSolidBrush.GDI32 ref: 00441ACB
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$BrushCreateDeleteObjectSolid
    • String ID:
    • API String ID: 3771399671-0
    • Opcode ID: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
    • Instruction ID: ebbecaf0548398ae771b9aa28ebf0b72f134f9ffbbfb28b2279bd799396bd9e3
    • Opcode Fuzzy Hash: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
    • Instruction Fuzzy Hash: F4510930208300AFE2209F25DD85F6F77EAEB85B14F14091EF994E72D0CBB9E9458769
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: InitVariant$_malloc_wcscpy_wcslen
    • String ID:
    • API String ID: 3413494760-0
    • Opcode ID: 91be66427af8110ac7550738d959cd5ca7d42d83959e3146180f9e1927f67af1
    • Instruction ID: 77b59fa0745152fd1b6386ccdd9ca850b9b7f4abb66e551d88b584249de3d357
    • Opcode Fuzzy Hash: 91be66427af8110ac7550738d959cd5ca7d42d83959e3146180f9e1927f67af1
    • Instruction Fuzzy Hash: F83150B2600746AFC714DF7AC880996FBA8FF88310B44892EE64983641D735F554CBA5
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 004377D7
    • GetForegroundWindow.USER32(00000000,?,?,?,?,0045FDE0,?,?,00000001), ref: 004377EB
    • GetWindowThreadProcessId.USER32(00000000), ref: 004377F8
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 00437809
    • GetWindowThreadProcessId.USER32(?,00000001), ref: 00437819
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043782E
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043783D
    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 0043788D
    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378A1
    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378AC
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
    • String ID:
    • API String ID: 2156557900-0
    • Opcode ID: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
    • Instruction ID: cf5237ead9178137421241ba4763476990ac919c12b5de4495d1c20f4e3090f4
    • Opcode Fuzzy Hash: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
    • Instruction Fuzzy Hash: B0316FB1504341AFD768EF28DC88A7BB7A9EF9D310F14182EF44197250D7B89C44CB69
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __wcsicoll
    • String ID: 0%d$DOWN$OFF
    • API String ID: 3832890014-468733193
    • Opcode ID: 25bfc9ffe56a9f461fb290e39ecd018cd56add90ff5485f11d716e4021a18fc7
    • Instruction ID: 59f6fc8a39a1ed32042cb7d66bde0eae2646b23187a89e8194ac449c738fc85c
    • Opcode Fuzzy Hash: 25bfc9ffe56a9f461fb290e39ecd018cd56add90ff5485f11d716e4021a18fc7
    • Instruction Fuzzy Hash: D8F1F8614083856DEB21EB21C845BAF7BE85F85309F48092FF98216193D7BCD68DC76B
    APIs
    • VariantInit.OLEAUT32(00000000), ref: 0045E959
    • VariantCopy.OLEAUT32(00000000), ref: 0045E963
    • VariantClear.OLEAUT32 ref: 0045E970
    • VariantTimeToSystemTime.OLEAUT32 ref: 0045EAEB
    • __swprintf.LIBCMT ref: 0045EB1F
    • VarR8FromDec.OLEAUT32(?,?), ref: 0045EB61
    • VariantInit.OLEAUT32(00000000), ref: 0045EBE7
    Strings
    • %4d%02d%02d%02d%02d%02d, xrefs: 0045EB19
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Variant$InitTime$ClearCopyFromSystem__swprintf
    • String ID: %4d%02d%02d%02d%02d%02d
    • API String ID: 43541914-1568723262
    • Opcode ID: d00f3575eaae6f1fbd5a3cd41333b6c53ef84b4ccf113023cdfc9250f0e1dfeb
    • Instruction ID: db8708ae94f177a13b26e6bf0e0b18ed2eb17208bc27bd00c320e315e6f9d40a
    • Opcode Fuzzy Hash: d00f3575eaae6f1fbd5a3cd41333b6c53ef84b4ccf113023cdfc9250f0e1dfeb
    • Instruction Fuzzy Hash: ABC1F4BB1006019BC704AF06D480666F7A1FFD4322F14896FED984B341DB3AE95ED7A6
    APIs
    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FE66
    • Sleep.KERNEL32(0000000A), ref: 0042FE6E
    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FF5D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: DecrementInterlocked$Sleep
    • String ID: 0vH$0vH$4RH0vH$@COM_EVENTOBJ
    • API String ID: 2250217261-3412429629
    • Opcode ID: 44716e8b58411a22bf5e9706358fea0360974b21f94f58827399e6f3610dcba4
    • Instruction ID: fdebc272b4285a4f5a9ffd6436d65f3fd211228fadad30942f45df8fc1e0b6b5
    • Opcode Fuzzy Hash: 44716e8b58411a22bf5e9706358fea0360974b21f94f58827399e6f3610dcba4
    • Instruction Fuzzy Hash: 3EB1C0715083009FC714EF54C990A5FB3E4AF98304F508A2FF495972A2DB78ED4ACB9A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
    • API String ID: 0-1603158881
    • Opcode ID: 52d41c1a7261a7f8aa203eeb1d8ec3cab37edaea125225c5a8fb55a2446b714f
    • Instruction ID: 111766317b00017d2554efaeef8eefee6e91289a7738281aca74db9506f27563
    • Opcode Fuzzy Hash: 52d41c1a7261a7f8aa203eeb1d8ec3cab37edaea125225c5a8fb55a2446b714f
    • Instruction Fuzzy Hash: E7A1E3B14043459BCB20EF50CC81BDE37A4AF94348F44891FF9896B182EF79A64DC76A
    APIs
    • _memset.LIBCMT ref: 00479D1F
    • VariantInit.OLEAUT32(?), ref: 00479F06
    • VariantClear.OLEAUT32(?), ref: 00479F11
    • VariantInit.OLEAUT32(?), ref: 00479DF7
      • Part of subcall function 00467626: VariantInit.OLEAUT32(00000000), ref: 00467666
      • Part of subcall function 00467626: VariantCopy.OLEAUT32(00000000,00479BD3), ref: 00467670
      • Part of subcall function 00467626: VariantClear.OLEAUT32 ref: 0046767D
    • VariantClear.OLEAUT32(?), ref: 00479F9C
      • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(0425A7C0,?), ref: 00478270
      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(0425A7A0,?), ref: 00478287
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Variant$Copy$ClearInit$ErrorLast_memset
    • String ID: F$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
    • API String ID: 665237470-60002521
    • Opcode ID: 672b070f745711d29ad1395946218a656e5e9b717211adf8defdfd51c1fe5aa9
    • Instruction ID: 799f1794578ead7d01377608c22e1fb401aa4fc5ffca8a64c02b8280356d09a3
    • Opcode Fuzzy Hash: 672b070f745711d29ad1395946218a656e5e9b717211adf8defdfd51c1fe5aa9
    • Instruction Fuzzy Hash: 6091B272204341AFD720DF64D880EABB7E9EFC4314F50891EF28987291D7B9AD45C766
    APIs
    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401C4A
    • DestroyWindow.USER32(?), ref: 0042A751
    • UnregisterHotKey.USER32(?), ref: 0042A778
    • FreeLibrary.KERNEL32(?), ref: 0042A822
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0042A854
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
    • String ID: close all$#v
    • API String ID: 4174999648-3101823635
    • Opcode ID: 7f182f062eea9334f9c3dc38b7f8098b89df77d34f07efa5249f5c35eb1f643b
    • Instruction ID: 49ed5af2073df376bf671688ee1a81e421de76eb8675a0622219565a82f34620
    • Opcode Fuzzy Hash: 7f182f062eea9334f9c3dc38b7f8098b89df77d34f07efa5249f5c35eb1f643b
    • Instruction Fuzzy Hash: 79A17E75A002248FDB20EF55CC85B9AB3B8BF44304F5044EEE90967292C779AE85CF9D
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046A84D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ConnectRegistry_wcslen
    • String ID: HH
    • API String ID: 535477410-2761332787
    • Opcode ID: 3d2267bef85c0a3262a999e8db8e299d7bc7e68382ab05334579f55c94cd24bc
    • Instruction ID: 68d8ff7817732ac0dd8275009c421e29eb5870de2046e22f9b94a35ba54c9d9f
    • Opcode Fuzzy Hash: 3d2267bef85c0a3262a999e8db8e299d7bc7e68382ab05334579f55c94cd24bc
    • Instruction Fuzzy Hash: FE617FB56083009FD304EF65C981F6BB7E4AF88704F14891EF681A7291D678ED09CB97
    APIs
    • _memset.LIBCMT ref: 0045F317
    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F367
    • IsMenu.USER32(?), ref: 0045F380
    • CreatePopupMenu.USER32 ref: 0045F3C5
    • GetMenuItemCount.USER32(?), ref: 0045F42F
    • InsertMenuItemW.USER32(?,?,00000001,?), ref: 0045F45B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
    • String ID: 0$2
    • API String ID: 3311875123-3793063076
    • Opcode ID: d956014b862e72d73e15a0224eb2b58c38d8543e4629a4de4d4f92f78b3476b0
    • Instruction ID: 6c7ab59355789d00cbd42ef361c1bd9312a1bc9220e92816940967e3bd29aecc
    • Opcode Fuzzy Hash: d956014b862e72d73e15a0224eb2b58c38d8543e4629a4de4d4f92f78b3476b0
    • Instruction Fuzzy Hash: E451CF702043409FD710CF69D888B6BBBE4AFA5319F104A3EFD9586292D378994DCB67
    APIs
    • GetModuleHandleW.KERNEL32(00000000,004A8E80,00000100,00000100,?,C:\Users\user\Desktop\AutoClicker-3.0.exe), ref: 0043719E
    • LoadStringW.USER32(00000000), ref: 004371A7
    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004371BD
    • LoadStringW.USER32(00000000), ref: 004371C0
    • _printf.LIBCMT ref: 004371EC
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00437208
    Strings
    • %s (%d) : ==> %s: %s %s, xrefs: 004371E7
    • C:\Users\user\Desktop\AutoClicker-3.0.exe, xrefs: 00437189
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: HandleLoadModuleString$Message_printf
    • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\AutoClicker-3.0.exe
    • API String ID: 220974073-2791165512
    • Opcode ID: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
    • Instruction ID: cc9e6972dbc5209964c20f0f7d1f7455a13934f6c555fd98bc0bf92a0502fb90
    • Opcode Fuzzy Hash: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
    • Instruction Fuzzy Hash: F7014FB2A543447AE620EB549D06FFB365CABC4B01F444C1EB794A60C0AAF865548BBA
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3b556561e87b9e51fde25479456ffb330dfdb8a2834b775597ea4888df876024
    • Instruction ID: 20732dcab93056f759d0b04a6df1a57780e33876730225f1fefd21ccf2a16f59
    • Opcode Fuzzy Hash: 3b556561e87b9e51fde25479456ffb330dfdb8a2834b775597ea4888df876024
    • Instruction Fuzzy Hash: 36519070200301ABD320DF29CC85F5BB7E8EB48715F540A1EF995E7292D7B4E949CB29
    APIs
      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\AutoClicker-3.0.exe,?,C:\Users\user\Desktop\AutoClicker-3.0.exe,004A8E80,C:\Users\user\Desktop\AutoClicker-3.0.exe,0040F3D2), ref: 0040FFCA
      • Part of subcall function 00436AC4: GetFileAttributesW.KERNELBASE(?,0044BD82,?,?,?), ref: 00436AC9
    • lstrcmpiW.KERNEL32(?,?), ref: 0045355E
    • MoveFileW.KERNEL32(?,?), ref: 0045358E
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: File$AttributesFullMoveNamePathlstrcmpi
    • String ID:
    • API String ID: 978794511-0
    • Opcode ID: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
    • Instruction ID: dcad70f49e32ae1adaf0c812d378eb0bba467e0a617048934f4a65f03e3a0b24
    • Opcode Fuzzy Hash: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
    • Instruction Fuzzy Hash: 665162B25043406AC724EF61D885ADFB3E8AFC8305F44992EB94992151E73DD34DC767
    APIs
      • Part of subcall function 0044593E: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 0044595D
      • Part of subcall function 0044593E: GetCurrentThreadId.KERNEL32 ref: 00445964
      • Part of subcall function 0044593E: AttachThreadInput.USER32(00000000,?,00000001,00478FA7), ref: 0044596B
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D15
    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00445D35
    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445D3F
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D45
    • PostMessageW.USER32(00000000,00000100,00000027,00000000), ref: 00445D66
    • Sleep.KERNEL32(00000000), ref: 00445D70
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D76
    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00445D8B
    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445D8F
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
    • String ID:
    • API String ID: 2014098862-0
    • Opcode ID: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
    • Instruction ID: b085f3065cf9cd100f04f322da00d4b037e108fc79bf5967fdabce1cd6d2e74b
    • Opcode Fuzzy Hash: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
    • Instruction Fuzzy Hash: 7B116971790704B7F620AB958C8AF5A7399EF88B11F20080DF790AB1C1C9F5E4418B7C
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AddressProc_malloc$_strcat_strlen
    • String ID: AU3_FreeVar
    • API String ID: 2184576858-771828931
    • Opcode ID: a7d9c0a845a89e79f43da7fe58c75aa663a63e99ab6dfb48fb034afb76543887
    • Instruction ID: c940ad03d776ce5ee908f8b881b33357b51647545ffc53e819ca791e1fdac2da
    • Opcode Fuzzy Hash: a7d9c0a845a89e79f43da7fe58c75aa663a63e99ab6dfb48fb034afb76543887
    • Instruction Fuzzy Hash: EDA18DB5604205DFC300DF59C480A2AB7E5FFC8319F1489AEE9554B362D739ED89CB8A
    APIs
    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AA5A
    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AA8D
    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0044AAF9
    • InternetSetOptionW.WININET(00000000,0000001F,?,00000004), ref: 0044AB11
    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB20
    • HttpQueryInfoW.WININET(00000000,00000005,?,00000000,00000000), ref: 0044AB61
      • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
    • String ID:
    • API String ID: 1291720006-3916222277
    • Opcode ID: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
    • Instruction ID: 782b6278bf246bef60821ca34847c3ce69a0d92f774604c9678bedd135ce19ea
    • Opcode Fuzzy Hash: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
    • Instruction Fuzzy Hash: 9C51E6B12803016BF320EB65CD85FBBB7A8FB89704F00091EF74196181D7B9A548C76A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ErrorLastselect
    • String ID: HH
    • API String ID: 215497628-2761332787
    • Opcode ID: ef5dd3eb282c9c59a115c4ad17643cbfd5d1fa36e4b8f068544a97b5afd8a089
    • Instruction ID: a252b81ccbce03d1e7b1b0efababa2c0a0929072778302a7b1202b90a7697d70
    • Opcode Fuzzy Hash: ef5dd3eb282c9c59a115c4ad17643cbfd5d1fa36e4b8f068544a97b5afd8a089
    • Instruction Fuzzy Hash: BF51E4726043005BD320EB65DC42F9BB399EB94324F044A2EF558E7281EB79E944C7AA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __snwprintf__wcsicoll_wcscpy
    • String ID: , $$0vH$AUTOITCALLVARIABLE%d$CALLARGARRAY
    • API String ID: 1729044348-3708979750
    • Opcode ID: 6b829c0a1480426d75853ffd70e356581df5482476f18d518230032aff6643ac
    • Instruction ID: ee167683669ee8acd09c1b5f7e36e5ff8060cf38fed78844f66c8cafce8ff42b
    • Opcode Fuzzy Hash: 6b829c0a1480426d75853ffd70e356581df5482476f18d518230032aff6643ac
    • Instruction Fuzzy Hash: F451A471514300ABD610EF25C881ADFB3A4EFC4348F048D2FF54967191D779E94A8BAA
    APIs
      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\AutoClicker-3.0.exe,?,C:\Users\user\Desktop\AutoClicker-3.0.exe,004A8E80,C:\Users\user\Desktop\AutoClicker-3.0.exe,0040F3D2), ref: 0040FFCA
    • lstrcmpiW.KERNEL32(?,?), ref: 0044BC04
    • MoveFileW.KERNEL32(?,?), ref: 0044BC38
    • _wcscat.LIBCMT ref: 0044BCAA
    • _wcslen.LIBCMT ref: 0044BCB7
    • _wcslen.LIBCMT ref: 0044BCCB
    • SHFileOperationW.SHELL32 ref: 0044BD16
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
    • String ID: \*.*
    • API String ID: 2326526234-1173974218
    • Opcode ID: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
    • Instruction ID: 9e4979448571685848097db6772507fbfe8bfb8d1337cd0032b1ea927bdad9db
    • Opcode Fuzzy Hash: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
    • Instruction Fuzzy Hash: 4B3183B14083019AD724EF21C5D5ADFB3E4EFC8304F444D6EB98993251EB39E608D7AA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
    • API String ID: 1038674560-2734436370
    • Opcode ID: f82e8a01027983d2736bf74c6d13b90995fc1aed138edd385c7f449b5a6aa457
    • Instruction ID: f72ce1d64a5a3b865947b719243e4701f1ba8c8209579f194a7ae3ad15c73224
    • Opcode Fuzzy Hash: f82e8a01027983d2736bf74c6d13b90995fc1aed138edd385c7f449b5a6aa457
    • Instruction Fuzzy Hash: 1B21F87261161067E730B659DCC2BDB63985F65305F04406BF800AA247D6ADA98A83AA
    APIs
    • DeleteObject.GDI32(?), ref: 0044157D
    • GetDC.USER32(00000000), ref: 00441585
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00441590
    • ReleaseDC.USER32(00000000,00000000), ref: 0044159B
    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,000000FF,000000FF,000000FF,00000001,00000004,00000000,?,00000000,00000000), ref: 004415E9
    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00441601
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00441639
    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00441659
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
    • String ID:
    • API String ID: 3864802216-0
    • Opcode ID: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
    • Instruction ID: 4e191e68d33858d232da06d8f8bca50b2e2c885119a5133d865ec5329e905ca2
    • Opcode Fuzzy Hash: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
    • Instruction Fuzzy Hash: 1531C172240344BBE7208B14CD49FAB77EDEB88B15F08450DFB44AA2D1DAB4ED808B64
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 004140E1
      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(?,00416C10,?,004114D4,?,00000000,00000001), ref: 00416A8D
      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,004114D4,?,00000000,00000001), ref: 00416AAE
    • ___fls_getvalue@4.LIBCMT ref: 004140EC
      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
    • ___fls_setvalue@8.LIBCMT ref: 004140FF
      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
    • ExitThread.KERNEL32 ref: 0041410F
    • GetCurrentThreadId.KERNEL32 ref: 00414115
    • __freefls@4.LIBCMT ref: 00414135
    • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
    • String ID:
    • API String ID: 1925773019-0
    • Opcode ID: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
    • Instruction ID: d0499dd1a11a7aa3f5f6b81cdb2be0183561266298d4129ec5ef95b8f2f1ff50
    • Opcode Fuzzy Hash: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
    • Instruction Fuzzy Hash: 12018430000200ABC704BFB2DD0D9DE7BA9AF95345722886EF90497212DA3CC9C28B5C
    APIs
    • VariantClear.OLEAUT32(00000038), ref: 004357C3
    • VariantClear.OLEAUT32(00000058), ref: 004357C9
    • VariantClear.OLEAUT32(00000068), ref: 004357CF
    • VariantClear.OLEAUT32(00000078), ref: 004357D5
    • VariantClear.OLEAUT32(00000088), ref: 004357DE
    • VariantClear.OLEAUT32(00000048), ref: 004357E4
    • VariantClear.OLEAUT32(00000098), ref: 004357ED
    • VariantClear.OLEAUT32(000000A8), ref: 004357F6
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ClearVariant
    • String ID:
    • API String ID: 1473721057-0
    • Opcode ID: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
    • Instruction ID: 4669651a97e20320d925a323ac357da1b1419afffb7c9eb93274aad60c959a81
    • Opcode Fuzzy Hash: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
    • Instruction Fuzzy Hash: BDF03CB6400B446AC235EB79DC40BD7B7E86F89200F018E1DE58783514DA78F588CB64
    APIs
    • WSAStartup.WSOCK32(00000101,?,?), ref: 00464ADE
      • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
    • inet_addr.WSOCK32(?,00000000,?,?,00000101,?,?), ref: 00464B1F
    • gethostbyname.WSOCK32(?,?,00000000,?,?,00000101,?,?), ref: 00464B29
    • _memset.LIBCMT ref: 00464B92
    • GlobalAlloc.KERNEL32(00000040,00000040), ref: 00464B9E
    • GlobalFree.KERNEL32(00000000), ref: 00464CDE
    • WSACleanup.WSOCK32 ref: 00464CE4
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memsetgethostbynameinet_addr
    • String ID:
    • API String ID: 3424476444-0
    • Opcode ID: 39f98ba5d48deffad5e5b1f1b9bfc6eed3f046cb508338f23b217506224ddc0b
    • Instruction ID: 8d90feaebe95447676150adcea4a136074f650e12d33839f26a9dde16614cdb7
    • Opcode Fuzzy Hash: 39f98ba5d48deffad5e5b1f1b9bfc6eed3f046cb508338f23b217506224ddc0b
    • Instruction Fuzzy Hash: A3A17EB1504300AFD710EF65C982F9BB7E8AFC8714F54491EF64497381E778E9058B9A
    APIs
    • GetSystemMetrics.USER32(0000000F), ref: 00440B7B
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MetricsSystem
    • String ID:
    • API String ID: 4116985748-0
    • Opcode ID: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
    • Instruction ID: 1e23dbab6d9439f1299be2c39bdf7de0481ead398f869a6d5eaf0ea33fa99bdf
    • Opcode Fuzzy Hash: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
    • Instruction Fuzzy Hash: 8EA19C70608701DBE314CF68C984B6BBBE1FB88704F14491EFA8593251E778F965CB5A
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AC62
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ConnectRegistry_wcslen
    • String ID:
    • API String ID: 535477410-0
    • Opcode ID: 42451a53c77474e995d112ec97b7456022921b3a3b4469da5960d5bf31ac6bad
    • Instruction ID: 71109d01e6e71572d3d886d5d9f1e4ab699fb1be984f768d753da2f0a00da466
    • Opcode Fuzzy Hash: 42451a53c77474e995d112ec97b7456022921b3a3b4469da5960d5bf31ac6bad
    • Instruction Fuzzy Hash: BBA18EB1204300AFC710EF65C885B1BB7E4BF85704F14896EF685AB292D779E905CB9B
    APIs
      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
    • _memset.LIBCMT ref: 004538C4
    • GetMenuItemInfoW.USER32(?,?), ref: 004538EF
    • _wcslen.LIBCMT ref: 00453960
    • SetMenuItemInfoW.USER32(00000011,?,00000000,?), ref: 004539C4
    • SetMenuDefaultItem.USER32(?,000000FF,00000000,?,?), ref: 004539E0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ItemMenu$Info_wcslen$Default_memset_wcscpy
    • String ID: 0
    • API String ID: 3530711334-4108050209
    • Opcode ID: 901ea1785b3c77401400e6fc6071960f15ec71a520c70d6888e471f5913d090b
    • Instruction ID: 97d09e0af2b4d046480d7fb626e7fa0667c22e7462995616ff61acde959b3bac
    • Opcode Fuzzy Hash: 901ea1785b3c77401400e6fc6071960f15ec71a520c70d6888e471f5913d090b
    • Instruction Fuzzy Hash: 747118F15083015AD714DF65C881B6BB7E4EB98396F04491FFD8082292D7BCDA4CC7AA
    APIs
    • GetCurrentProcessId.KERNEL32(?), ref: 00473A00
    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00473A0E
    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00473A34
    • CloseHandle.KERNEL32(00000000,00000000,?,00000028), ref: 00473C01
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Process$CloseCountersCurrentHandleOpen
    • String ID: HH
    • API String ID: 3488606520-2761332787
    • Opcode ID: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
    • Instruction ID: 2161edc7e7eefe464b48455ffcea7dd3157e2cbe85e131cccd8837112284b0a3
    • Opcode Fuzzy Hash: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
    • Instruction Fuzzy Hash: 3581BF71A043019FD320EF69C882B5BF7E4AF84744F108C2EF598AB392D675E945CB96
    APIs
      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
    • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
    • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
    • LineTo.GDI32(?,?), ref: 004474BF
    • CloseFigure.GDI32(?), ref: 004474C6
    • SetPixel.GDI32(?,?,?,?), ref: 004474D6
    • Rectangle.GDI32(?,?), ref: 004474F3
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
    • String ID:
    • API String ID: 4082120231-0
    • Opcode ID: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
    • Instruction ID: e2e17d079c8faeb919f1a119f9aa9df975eabc7d00289576b12f70c1741c819b
    • Opcode Fuzzy Hash: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
    • Instruction Fuzzy Hash: BC713AB11083419FD300DF15C884E6BBBE9EFC9708F148A1EF99497351D778A906CBAA
    APIs
      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
    • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
    • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
    • LineTo.GDI32(?,?), ref: 004474BF
    • CloseFigure.GDI32(?), ref: 004474C6
    • SetPixel.GDI32(?,?,?,?), ref: 004474D6
    • Rectangle.GDI32(?,?), ref: 004474F3
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
    • String ID:
    • API String ID: 4082120231-0
    • Opcode ID: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
    • Instruction ID: 71053adf7dd607ae91079c2ca5de7ffea4483cc305881a9741cc2e8bc8d6f2cf
    • Opcode Fuzzy Hash: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
    • Instruction Fuzzy Hash: 55613BB51083419FD300DF55CC84E6BBBE9EBC9308F148A1EF99597351D738A906CB6A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AngleCloseEllipseFigureLineMovePixelRectangle
    • String ID:
    • API String ID: 288456094-0
    • Opcode ID: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
    • Instruction ID: d3db7697bfba14f4a3ad6627a8a5faa1010559558ae5e3f89cc6b0bd66950af4
    • Opcode Fuzzy Hash: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
    • Instruction Fuzzy Hash: 90514BB51082419FD300DF15CC84E6BBBE9EFC9308F14891EF99497351D734A906CB6A
    APIs
    • GetParent.USER32(?), ref: 004449B0
    • GetKeyboardState.USER32(?), ref: 004449C3
    • SetKeyboardState.USER32(?), ref: 00444A0F
    • PostMessageW.USER32(?,00000101,00000010,?), ref: 00444A3F
    • PostMessageW.USER32(?,00000101,00000011,?), ref: 00444A60
    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444AAC
    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444AD1
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$Parent
    • String ID:
    • API String ID: 87235514-0
    • Opcode ID: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
    • Instruction ID: 19c159416ad4887e81d4090d30fbb5c505c675cee05c330e2fd8e115592bd25d
    • Opcode Fuzzy Hash: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
    • Instruction Fuzzy Hash: B651C5A05487D139F7369234884ABA7BFD55F8A304F08CA4EF1E5156C3D2ECE984C769
    APIs
    • GetParent.USER32(?), ref: 00444BA9
    • GetKeyboardState.USER32(?), ref: 00444BBC
    • SetKeyboardState.USER32(?), ref: 00444C08
    • PostMessageW.USER32(?,00000100,00000010,?), ref: 00444C35
    • PostMessageW.USER32(?,00000100,00000011,?), ref: 00444C53
    • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444C9C
    • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444CBE
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$Parent
    • String ID:
    • API String ID: 87235514-0
    • Opcode ID: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
    • Instruction ID: 4493abccadab05ae7d00f733e1fa63583af0c494729619d74f1516a50adc8d80
    • Opcode Fuzzy Hash: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
    • Instruction Fuzzy Hash: A951E4F05097D139F7369364884ABA7BFE46F8A304F088A4EF1D5065C2D2ACE984C769
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
    • Instruction ID: b3b3da583a0ae8cfa3180eda0e634cae40a493ebdfd517dbec9d2fd4fbd82cb1
    • Opcode Fuzzy Hash: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
    • Instruction Fuzzy Hash: 1E513A315082909FE321CF14DC89FABBB64FB46320F18456FF895AB2D1D7649C06D7AA
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AA77
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ConnectRegistry_wcslen
    • String ID: HH
    • API String ID: 535477410-2761332787
    • Opcode ID: a63ec9c83cc9168df7042b3b4fff60977e3a3802a1594c770730f3a376df3e6f
    • Instruction ID: 7b41397762752e7dec08e47bcdb2cb2f58790b6f4670524580eb9da3090621e6
    • Opcode Fuzzy Hash: a63ec9c83cc9168df7042b3b4fff60977e3a3802a1594c770730f3a376df3e6f
    • Instruction Fuzzy Hash: A2516D71208301AFD304EF65C981F5BB7A9BFC4704F40892EF685A7291D678E905CB6B
    APIs
    • _memset.LIBCMT ref: 00457C34
    • _memset.LIBCMT ref: 00457CE8
    • ShellExecuteExW.SHELL32(?), ref: 00457D34
      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
    • CloseHandle.KERNEL32(?), ref: 00457DDD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _memset$CloseExecuteHandleShell_wcscpy_wcslen
    • String ID: <$@
    • API String ID: 1325244542-1426351568
    • Opcode ID: 560423ebeea4e3f350de3ed1877123b5ac122d7fc26b75ebb154a908a9472d64
    • Instruction ID: 09e461bdfc47c8bdd671eddb31188d347eda7c51057725e13e77015b5001baed
    • Opcode Fuzzy Hash: 560423ebeea4e3f350de3ed1877123b5ac122d7fc26b75ebb154a908a9472d64
    • Instruction Fuzzy Hash: EA510FB55083009FC710EF61D985A5BB7E4AF84709F00492EFD44AB392DB39ED48CB9A
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(?,?,?,?,?,?,?,?,?,00000002,00000000,00000014), ref: 0047379B
    • Process32FirstW.KERNEL32(00000000,?), ref: 004737A8
    • __wsplitpath.LIBCMT ref: 004737E1
      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
    • _wcscat.LIBCMT ref: 004737F6
    • __wcsicoll.LIBCMT ref: 00473818
    • Process32NextW.KERNEL32(00000000,?), ref: 00473844
    • CloseHandle.KERNEL32(00000000,00000000,?,?), ref: 00473852
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
    • String ID:
    • API String ID: 2547909840-0
    • Opcode ID: f78ed6dabbdec19c826504e8f481f610034b4281c5ca637fd19c05683318d9f0
    • Instruction ID: 8efa427203ffd7a45d167e3a64f6abf3f3640219bb0751621114887cb14f0fc1
    • Opcode Fuzzy Hash: f78ed6dabbdec19c826504e8f481f610034b4281c5ca637fd19c05683318d9f0
    • Instruction Fuzzy Hash: 4751BB71544304A7D720EF61CC86FDBB3E8AF84748F00492EF58957182E775E645C7AA
    APIs
    • SendMessageW.USER32(?,00001308,?,00000000), ref: 004552B7
    • ImageList_Remove.COMCTL32(?,?,?,?), ref: 004552EB
    • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004553D3
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
    • String ID:
    • API String ID: 2354583917-0
    • Opcode ID: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
    • Instruction ID: 19c5dc8500d05a42ca126c51664c70dafe1d1a8ca3b523478e8997b137d6e309
    • Opcode Fuzzy Hash: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
    • Instruction Fuzzy Hash: 77519D30204A419FC714DF24C4A4B7A77E5FB49301F4486AEFD9ACB392DB78A849CB54
    APIs
    • LoadLibraryW.KERNEL32(00000000), ref: 00463DD1
    • GetProcAddress.KERNEL32(?,?), ref: 00463E68
    • GetProcAddress.KERNEL32(?,00000000), ref: 00463E84
    • GetProcAddress.KERNEL32(?,?), ref: 00463ECE
    • FreeLibrary.KERNEL32(?,?,?,00000000,?), ref: 00463EF0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AddressProc$Library$FreeLoad
    • String ID: #v
    • API String ID: 2449869053-554117064
    • Opcode ID: 6560e9a9548e0f7d53ce025ee2f64236660ce85aa97c100a43ec9bf528c934e2
    • Instruction ID: 5a5949aabc30296464acd143044f95cbdcafad8a77d2d24e7d672d776762960f
    • Opcode Fuzzy Hash: 6560e9a9548e0f7d53ce025ee2f64236660ce85aa97c100a43ec9bf528c934e2
    • Instruction Fuzzy Hash: 9051C1752043409FC300EF25C881A5BB7A4FF89305F00456EF945A73A2DB79EE45CBAA
    APIs
      • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
    • GetMenu.USER32 ref: 004776AA
    • GetMenuItemCount.USER32(00000000), ref: 004776CC
    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004776FB
    • _wcslen.LIBCMT ref: 0047771A
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Menu$CountItemStringWindow_wcslen
    • String ID:
    • API String ID: 1823500076-0
    • Opcode ID: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
    • Instruction ID: 4b9e656becebfc5f52f27a1d7ad2c07a58398098864d75d3a5ce1c02cc274359
    • Opcode Fuzzy Hash: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
    • Instruction Fuzzy Hash: 174117715083019FD320EF25CC45BABB3E8BF88314F10492EF55997252D7B8E9458BA9
    APIs
    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
    • GetWindowLongW.USER32(?,000000F0), ref: 00441452
    • GetWindowLongW.USER32(?,000000F0), ref: 00441493
    • SendMessageW.USER32(0442EC60,000000F1,00000000,00000000), ref: 004414C6
    • SendMessageW.USER32(0442EC60,000000F1,00000001,00000000), ref: 004414F1
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$LongWindow
    • String ID:
    • API String ID: 312131281-0
    • Opcode ID: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
    • Instruction ID: f6a862a32ccfd92e4f153a1965fa7dc80102ffdb8abe4b8a046001f82176c48d
    • Opcode Fuzzy Hash: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
    • Instruction Fuzzy Hash: 2F416A347442019FE720CF58DCC4F6A77A5FB8A754F24416AE5519B3B1CB75AC82CB48
    APIs
    • InterlockedIncrement.KERNEL32 ref: 0047247C
    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472491
    • Sleep.KERNEL32(0000000A), ref: 00472499
    • InterlockedIncrement.KERNEL32(004A7CAC), ref: 004724A4
    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472599
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Interlocked$DecrementIncrement$Sleep
    • String ID: 0vH
    • API String ID: 327565842-3662162768
    • Opcode ID: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
    • Instruction ID: 7246262c18bb701d5349304b0e2d21290bf7c9637501dd5a114e6955e8e78370
    • Opcode Fuzzy Hash: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
    • Instruction Fuzzy Hash: 9631D2329082259BD710DF28DD41A8A77A5EB95324F05483EFD08FB251DB78EC498BED
    APIs
    • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042A9B0
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    • _memset.LIBCMT ref: 00401EF2
    • _wcsncpy.LIBCMT ref: 00401F31
    • _wcscpy.LIBCMT ref: 00401F4D
    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401F5F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: IconLoadNotifyShell_String_memset_wcscpy_wcslen_wcsncpy
    • String ID: Line:
    • API String ID: 1620655955-1585850449
    • Opcode ID: 2863b0622d7c727e9b4eb7be469658bed815448e9e41699da7f245ae1fd5f261
    • Instruction ID: cf28deb443ef615b1806bb9b25f2b858971b96f44b4edcf5fc59c771c180b501
    • Opcode Fuzzy Hash: 2863b0622d7c727e9b4eb7be469658bed815448e9e41699da7f245ae1fd5f261
    • Instruction Fuzzy Hash: 2031B0B1518301ABD320EB21DC41BDF77E8AB94314F04493FF989531A1EB78AA49C79B
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D32F
    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3B3
    • __swprintf.LIBCMT ref: 0045D3CC
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D416
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume__swprintf
    • String ID: %lu$HH
    • API String ID: 3164766367-3924996404
    • Opcode ID: 81476e894022667eb36c3ac8bd13111834b5c2d7b2c3d24812109a56e119a544
    • Instruction ID: dc8c686fdefa3e90a4813ad6837cde526186befd243c44a8c1b7e9854728ca0f
    • Opcode Fuzzy Hash: 81476e894022667eb36c3ac8bd13111834b5c2d7b2c3d24812109a56e119a544
    • Instruction Fuzzy Hash: 13314A716083019BC310EF55D981A5BB7E4FF88704F40892EFA459B292D774EA09CB9A
    APIs
    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450E24
    • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450E35
    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450E43
    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450E54
    • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450E62
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: Msctls_Progress32
    • API String ID: 3850602802-3636473452
    • Opcode ID: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
    • Instruction ID: b51c377fab27852337593a8f268aff884918310fa347e0537580fa9f3b853d23
    • Opcode Fuzzy Hash: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
    • Instruction Fuzzy Hash: 2C2121712543007AE7209A65DC42F5BB3E9AFD8B24F214A0EF754B72D1C6B4F8418B58
    APIs
    • ImageList_Destroy.COMCTL32(?), ref: 00455451
    • ImageList_Destroy.COMCTL32(?), ref: 0045545F
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
    • String ID:
    • API String ID: 3985565216-0
    • Opcode ID: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
    • Instruction ID: 02eb1b45cc7e926b76574f27881fb1e8d9d372094f4d7b34cf8607babd6cb63d
    • Opcode Fuzzy Hash: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
    • Instruction Fuzzy Hash: EA213270200A019FCB20DF65CAD4B2A77A9BF45312F50855EED45CB352DB39EC45CB69
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 00415737
    • __calloc_crt.LIBCMT ref: 00415743
    • __getptd.LIBCMT ref: 00415750
    • CreateThread.KERNEL32(00000000,?,0041568B,00000000,00000004,00000000), ref: 00415776
    • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00415786
    • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00415791
    • __dosmaperr.LIBCMT ref: 004157A9
      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
    • String ID:
    • API String ID: 1269668773-0
    • Opcode ID: 5ca6debf3f98313c7417d61dcb4085a5aa2857e81eadecf1103777f39421d166
    • Instruction ID: 083f1b3d72dc2b4e3073d7627409da2efaae6cca9fbdfa2eb2c15b7cb2a145f7
    • Opcode Fuzzy Hash: 5ca6debf3f98313c7417d61dcb4085a5aa2857e81eadecf1103777f39421d166
    • Instruction Fuzzy Hash: 4511E672501604EFC720AF76DC868DF7BA4EF80334F21412FF525922D1DB788981966D
    APIs
      • Part of subcall function 00438FE4: GetProcessHeap.KERNEL32(00000008,0000000C,0043910A,00000000,00000000,00000000,0044646E,?,?,?), ref: 00438FE8
      • Part of subcall function 00438FE4: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FEF
    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,0044646E,?,?,?), ref: 00439119
    • GetCurrentProcess.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439123
    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043912C
    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00439138
    • GetCurrentProcess.KERNEL32(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439142
    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00439145
    • CreateThread.KERNEL32(00000000,00000000,004390C2,00000000,00000000,00000000), ref: 0043915E
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
    • String ID:
    • API String ID: 1957940570-0
    • Opcode ID: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
    • Instruction ID: b388a4287fabc35bf2088fa38ebc9459a42e34e8a642192e1b63b89709cb9be3
    • Opcode Fuzzy Hash: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
    • Instruction Fuzzy Hash: 3BF0CD753413007BD220EB65DC86F5BB7A8EBC9B10F118919F6049B1D1C6B4A800CB65
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 00415690
      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(?,00416C10,?,004114D4,?,00000000,00000001), ref: 00416A8D
      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,004114D4,?,00000000,00000001), ref: 00416AAE
    • ___fls_getvalue@4.LIBCMT ref: 0041569B
      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
    • ___fls_setvalue@8.LIBCMT ref: 004156AD
      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
    • ExitThread.KERNEL32 ref: 004156BD
    • __freefls@4.LIBCMT ref: 004156D9
    • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
    • String ID:
    • API String ID: 4166825349-0
    • Opcode ID: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
    • Instruction ID: 1015f584654e325efa3cacb901eba7c9ae2b5aefa54885f90b4e6d99173acdac
    • Opcode Fuzzy Hash: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
    • Instruction Fuzzy Hash: 14F049745007009BD704BF72DD159DE7B69AF85345761C85FB80897222DA3DC9C1CB9C
    APIs
    • LoadLibraryA.KERNEL32(advapi32.dll,p#D,0043415E,p#D,?,00442370,?), ref: 00434134
    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00434146
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: RegDeleteKeyExW$advapi32.dll$p#D$p#D
    • API String ID: 2574300362-3261711971
    • Opcode ID: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
    • Instruction ID: cb82693085896f9455b4638215a98dd7e3cb824177552166877179ce6000b7c2
    • Opcode Fuzzy Hash: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
    • Instruction Fuzzy Hash: D8D05EB0400B039FCB105F24D8086AB76F4EB68700F208C2EF989A3750C7B8E8C0CB68
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
    • Instruction ID: be39947db1ffbcb7075193c31d102fc15fe4f6af8d23ce90efbce3d2b6a77a88
    • Opcode Fuzzy Hash: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
    • Instruction Fuzzy Hash: 4BF16D71108740AFD210DB59C880EABB7F9EFCA744F10891EF69983261D735AC45CBAA
    APIs
    • GetClientRect.USER32(?,?), ref: 00433724
    • GetWindowRect.USER32(00000000,?), ref: 00433757
    • GetClientRect.USER32(0000001D,?), ref: 004337AC
    • GetSystemMetrics.USER32(0000000F), ref: 00433800
    • GetWindowRect.USER32(?,?), ref: 00433814
    • ScreenToClient.USER32(?,?), ref: 00433842
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Rect$Client$Window$MetricsScreenSystem
    • String ID:
    • API String ID: 3220332590-0
    • Opcode ID: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
    • Instruction ID: 40e56d112be44df416332e5c874318f33691c6b0c201ea6c9f9086adb5117cf0
    • Opcode Fuzzy Hash: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
    • Instruction Fuzzy Hash: E9A126B42147028AC324CF68C5847ABBBF1FF98715F04991EE9D983360E775E908CB5A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _malloc_wcslen$_strcat_wcscpy
    • String ID:
    • API String ID: 1612042205-0
    • Opcode ID: 1d7505fdd44c962aa6356d7c58a15bb43476921a0b1e9b83c5c728d1d813009b
    • Instruction ID: 39b6431fb86a1cae222df6ecce28f21653e085caad8de22f1e35678e4483a9b6
    • Opcode Fuzzy Hash: 1d7505fdd44c962aa6356d7c58a15bb43476921a0b1e9b83c5c728d1d813009b
    • Instruction Fuzzy Hash: CD613B70504202EFCB10EF29D58096AB3E5FF48305B50496EF8859B306D738EE59DB9A
    APIs
    • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C588
    • SetKeyboardState.USER32(00000080), ref: 0044C59B
    • PostMessageW.USER32(?,00000104,?,?), ref: 0044C5EC
    • PostMessageW.USER32(?,00000100,?,?), ref: 0044C610
    • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C637
    • SendInput.USER32 ref: 0044C6E2
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$InputSend
    • String ID:
    • API String ID: 2221674350-0
    • Opcode ID: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
    • Instruction ID: 3a634557d1668dba9f4fbb3ffee1259adddcddb7f3fce46f2ce6721246940f3b
    • Opcode Fuzzy Hash: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
    • Instruction Fuzzy Hash: A24148725053486AF760EF209C80BFFBB98EF95324F04151FFDC412281D66E984987BA
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcscpy$_wcscat
    • String ID:
    • API String ID: 2037614760-0
    • Opcode ID: b5d96aa6376c13c18785be7a2f98d342a34ecccc7d1a8c87cc795457c8b72e53
    • Instruction ID: 871aa96d6b0d5f43eceffdadd72b032f7becd6ba50fbda5e2bca5dd503650597
    • Opcode Fuzzy Hash: b5d96aa6376c13c18785be7a2f98d342a34ecccc7d1a8c87cc795457c8b72e53
    • Instruction Fuzzy Hash: 7D41BD31901A256BDE317F55D880BBB7358DFA1314F84006FF98247313EA6E5892C6BE
    APIs
    • BeginPaint.USER32(044051D8,?,004A83D8,?), ref: 00447B9D
    • GetWindowRect.USER32(?,?), ref: 00447C1B
    • ScreenToClient.USER32(?,?), ref: 00447C39
    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
    • EndPaint.USER32(?,?), ref: 00447CD1
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
    • String ID:
    • API String ID: 4189319755-0
    • Opcode ID: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
    • Instruction ID: de699fe3e67e71f806f86ee7feca1bcffcb0489daa19151882f3061068cc4b26
    • Opcode Fuzzy Hash: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
    • Instruction Fuzzy Hash: D14182705043019FE320DF15C8C8F7B7BA8EB89724F04466EF9548B391DB74A846CB69
    APIs
    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B490
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4C2
    • EnterCriticalSection.KERNEL32(00000000), ref: 0044B4E3
    • LeaveCriticalSection.KERNEL32(00000000), ref: 0044B5A0
    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B5BB
      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5D1
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
    • String ID:
    • API String ID: 1726766782-0
    • Opcode ID: fe1a68558cce41cdee3aac09e120876cce5d53942181ea37469c02a6a9442391
    • Instruction ID: bf52b5dc2e344941501510e432fc863898df75637e45487ca8cd05157db66b41
    • Opcode Fuzzy Hash: fe1a68558cce41cdee3aac09e120876cce5d53942181ea37469c02a6a9442391
    • Instruction Fuzzy Hash: 09415C75104701AFD320EF26D845EABB3F8EF88708F008E2DF59A92650D774E945CB6A
    APIs
    • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 004410F9
    • EnableWindow.USER32(?,00000000), ref: 0044111A
    • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 00441183
    • ShowWindow.USER32(?,00000004,?,?,?,00448962,004A83D8,?,?), ref: 00441192
    • EnableWindow.USER32(?,00000001), ref: 004411B3
    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 004411D5
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$Show$Enable$MessageSend
    • String ID:
    • API String ID: 642888154-0
    • Opcode ID: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
    • Instruction ID: 824eeaafe1f931a994963cd163acc5b0ce47b26168a6fd4ee38d593e4569daee
    • Opcode Fuzzy Hash: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
    • Instruction Fuzzy Hash: 14417770604245DFE725CF14C984FA6B7E5BF89300F1886AEE6859B3B2CB74A881CB55
    APIs
    • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 004490E3
    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004490F8
    • SendMessageW.USER32(00000000,0000111E,00000000,?), ref: 0044910D
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00449124
    • GetWindowLongW.USER32(00000000,000000F0), ref: 0044912F
    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0044913C
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$LongWindow$InvalidateRect
    • String ID:
    • API String ID: 1976402638-0
    • Opcode ID: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
    • Instruction ID: 8b80d2acd15126bdfc8b54909556444574c0e56a9806921f1e0b477f33817628
    • Opcode Fuzzy Hash: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
    • Instruction Fuzzy Hash: F231B476244202AFF224DF04DC89FBBB7A9F785321F14492EF291973D0CA75AC469729
    APIs
    • GetForegroundWindow.USER32 ref: 00442597
      • Part of subcall function 004344B7: GetWindowRect.USER32(?,?), ref: 004344D3
    • GetDesktopWindow.USER32 ref: 004425BF
    • GetWindowRect.USER32(00000000), ref: 004425C6
    • mouse_event.USER32(00008001,?,?,?,?), ref: 004425F5
      • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
    • GetCursorPos.USER32(?), ref: 00442624
    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00442690
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
    • String ID:
    • API String ID: 4137160315-0
    • Opcode ID: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
    • Instruction ID: 1581b522c3ee05a339ffa1fd07f9e8cd23967deed6539873686ea33d82c69dd2
    • Opcode Fuzzy Hash: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
    • Instruction Fuzzy Hash: 7C31C1B2104306ABD310DF54CD85E6BB7E9FB98304F004A2EF94597281E675E9058BA6
    APIs
    • _memset.LIBCMT ref: 0044961A
    • SendMessageW.USER32 ref: 0044964A
      • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
    • SendMessageW.USER32(?,00001074,?,00000001), ref: 004496AC
    • _wcslen.LIBCMT ref: 004496BA
    • _wcslen.LIBCMT ref: 004496C7
    • SendMessageW.USER32(?,00001074,?,?), ref: 004496FD
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$_wcslen$_memset_wcspbrk
    • String ID:
    • API String ID: 1624073603-0
    • Opcode ID: 38f2e9bd9e3f8a3b09c784c794278912058c3ce8618c0eac3a04d5ca97ab3fe8
    • Instruction ID: 7e49a266cf7116299f7bc8659d1ce07b00adedb8b3f1b428e1954e4b11147a1e
    • Opcode Fuzzy Hash: 38f2e9bd9e3f8a3b09c784c794278912058c3ce8618c0eac3a04d5ca97ab3fe8
    • Instruction Fuzzy Hash: B631CA71508300AAE720DF15DC81BEBB7D4EBD4720F504A1FFA54862D0EBBAD945C7A6
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
    • Instruction ID: 0263b137e1f68684b0dae4bb7f633391a2f723f0f4072b7ce39308acd6c8c458
    • Opcode Fuzzy Hash: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
    • Instruction Fuzzy Hash: 31219272245110ABE7108B68DCC4B6F7798EB96374F240A3AF512C61E1EA7998C1C769
    APIs
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004555AD
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: DestroyWindow$DeleteObject$IconMove
    • String ID:
    • API String ID: 1640429340-0
    • Opcode ID: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
    • Instruction ID: 2ee25f48dcb0ad8048bc4d9c922f6cac320a9d705fdb810e808868a6102f62dc
    • Opcode Fuzzy Hash: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
    • Instruction Fuzzy Hash: 05312770200A419FD724DF24C998B3A73F9FB44312F4485AAE945CB266E778EC49CB69
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __fileno__setmode$DebugOutputString_fprintf
    • String ID:
    • API String ID: 3354276064-0
    • Opcode ID: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
    • Instruction ID: 1e9a75ed7ce68f0ee686932f25d41d1f14ae1a91d469003489e3a0780bce169f
    • Opcode Fuzzy Hash: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
    • Instruction Fuzzy Hash: 6D11F3B2D0830136D500BA366C02AAF7A5C4A91B5CF44056EFD4563293EA2DAA4943FF
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Destroy$DeleteMenuObject$IconWindow
    • String ID:
    • API String ID: 752480666-0
    • Opcode ID: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
    • Instruction ID: bf467a0aa8f060071afd9cdae546a2eb92d9c059e8a57ac1e588bb5f3fc3a395
    • Opcode Fuzzy Hash: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
    • Instruction Fuzzy Hash: 26215E30200A019FC724DF24D5E8B7AB7A9FB44312F50855EED498B392CB39EC89CB59
    APIs
    • DestroyWindow.USER32(00000000), ref: 0045527A
    • ImageList_Destroy.COMCTL32(?), ref: 0045528C
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$IconImageList_
    • String ID:
    • API String ID: 3275902921-0
    • Opcode ID: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
    • Instruction ID: c357af2a313eda44c34a26cb015c973203dd8f66e4d80e74dc1abfaeb9ce60f9
    • Opcode Fuzzy Hash: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
    • Instruction Fuzzy Hash: 2D217E70604A019BC714DF79D99466AB7A5BF44311F40856EF919CB342DB38E849CF68
    APIs
    • GetCurrentProcess.KERNEL32(0000000A,?,?,?,?,?,00446540,?,?,?,?,?,?,?,?,?), ref: 0043935D
    • OpenProcessToken.ADVAPI32(00000000,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439364
    • CreateEnvironmentBlock.USERENV(?,?,00000001,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439376
    • CloseHandle.KERNEL32(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439383
    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 004393C0
    • DestroyEnvironmentBlock.USERENV(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 004393D4
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
    • String ID:
    • API String ID: 1413079979-0
    • Opcode ID: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
    • Instruction ID: 8c652321442b38080740e7d333ba663a52d3460857ef2618669649d87ea194c0
    • Opcode Fuzzy Hash: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
    • Instruction Fuzzy Hash: 7B2150B2208300ABD314CB65D854EABB7EDEBCD754F084E1DF989A3250C7B4E901CB25
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 0041418F
    • __calloc_crt.LIBCMT ref: 0041419B
    • __getptd.LIBCMT ref: 004141A8
    • CreateThread.KERNEL32(?,?,004140DB,00000000,?,?), ref: 004141DF
    • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 004141E9
    • __dosmaperr.LIBCMT ref: 00414201
      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
    • String ID:
    • API String ID: 1803633139-0
    • Opcode ID: 0c093d742cb92319136ecc4d3b338e7ce05dcd366eb3ed3bbafc16c6f9e2b00b
    • Instruction ID: ec3febacf030228bba34671a5a373aa86179f0c9a00f1e1343e4adce14cbcb36
    • Opcode Fuzzy Hash: 0c093d742cb92319136ecc4d3b338e7ce05dcd366eb3ed3bbafc16c6f9e2b00b
    • Instruction Fuzzy Hash: 1311DD72504209BFCB10AFA5DC828DF7BA8EF44368B20446EF50193151EB39C9C18A68
    APIs
    • ImageList_Destroy.COMCTL32(?), ref: 004555E8
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$IconImageList_
    • String ID:
    • API String ID: 3275902921-0
    • Opcode ID: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
    • Instruction ID: 9e206caaed87a4944845468030bda76e3f946505fe2e652cce1cc100bc4c7c20
    • Opcode Fuzzy Hash: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
    • Instruction Fuzzy Hash: BE2141702006409FCB25DF25C994A2B77A9FF44312F80856EED49CB352DB39EC4ACB59
    APIs
    • SendMessageW.USER32 ref: 004554DF
    • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004554FA
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: DeleteDestroyMessageObjectSend$IconWindow
    • String ID:
    • API String ID: 3691411573-0
    • Opcode ID: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
    • Instruction ID: ead105b7aa3a144aa2df3f4c31681f961a0d6b706109639263d1a652a664e8ec
    • Opcode Fuzzy Hash: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
    • Instruction Fuzzy Hash: A5118F713046419BDB10DF68DD88A2A77A8FB58322F404A2AFE14DB2D1D775DC498B68
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcslen$_wcstok$ExtentPoint32Text
    • String ID:
    • API String ID: 1814673581-0
    • Opcode ID: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
    • Instruction ID: 25d714350c6a951fb861184d208c8546153e966ae5ec0a2422e5c8358eb53325
    • Opcode Fuzzy Hash: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
    • Instruction Fuzzy Hash: F60125B19053126BC6209F95DC42B5BB7E8EF45760F11842AFD04E3340D7F8E84483EA
    APIs
    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362A7
    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362B2
    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362BA
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362C5
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: PerformanceQuery$CounterSleep$Frequency
    • String ID:
    • API String ID: 2833360925-0
    • Opcode ID: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
    • Instruction ID: c21ea81f2c38402705b15ef58ab4919efdb6e4f3ef0ac894e378511a69de5cf2
    • Opcode Fuzzy Hash: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
    • Instruction Fuzzy Hash: C411D031909306ABC700EF19DA8499FB7E4FFCCB11F828D2DF98592210D734C9498B96
    APIs
      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
    • MoveToEx.GDI32(?,?,?,00000000), ref: 0044721F
    • LineTo.GDI32(?,?,?), ref: 00447227
    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447235
    • LineTo.GDI32(?,?,?), ref: 0044723D
    • EndPath.GDI32(?), ref: 0044724E
    • StrokePath.GDI32(?), ref: 0044725C
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
    • String ID:
    • API String ID: 372113273-0
    • Opcode ID: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
    • Instruction ID: cf4011081099dc8586e946db52605055ec0608de7db987eb6b7af15cf0be2a5d
    • Opcode Fuzzy Hash: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
    • Instruction Fuzzy Hash: B7018F36105264BBE2119750EC4AF9FBBACEF8A710F14451DF70156191C7F42A0587BD
    APIs
    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0041098F
    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410997
    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004109A2
    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004109AD
    • MapVirtualKeyW.USER32(00000011,00000000), ref: 004109B5
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004109BD
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Virtual
    • String ID:
    • API String ID: 4278518827-0
    • Opcode ID: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
    • Instruction ID: 14dd698fb88c41d3cb2937c08abaa7ad6cdafd80764dd657d9f2199fb51feb0a
    • Opcode Fuzzy Hash: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
    • Instruction Fuzzy Hash: 52112A6118ABC4ADD3329F694854A87FFE45FB6304F484A8ED1D607A43C195A60CCBBA
    APIs
    • GetDC.USER32(00000000), ref: 0044CBEF
    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC00
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC09
    • ReleaseDC.USER32(00000000,00000000), ref: 0044CC10
    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CC29
    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0044CC37
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CapsDevice$Release
    • String ID:
    • API String ID: 1035833867-0
    • Opcode ID: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
    • Instruction ID: 50bf861fd692b93b916a63282857a41227f0dfa19545bc4f0a59f576ae553c11
    • Opcode Fuzzy Hash: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
    • Instruction Fuzzy Hash: 560184B1641314BFF6009BA1DC4AF1BBB9CEF55755F01842EFF44A7241D6B098008BA9
    APIs
    • InterlockedExchange.KERNEL32(0042A369,057401F8), ref: 0044B66E
    • EnterCriticalSection.KERNEL32(0042A321), ref: 0044B67B
    • TerminateThread.KERNEL32(?,000001F6), ref: 0044B689
    • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B697
      • Part of subcall function 004356CD: CloseHandle.KERNEL32(00000000,0042A365,0044B6A3,0042A365,?,000003E8,?,000001F6), ref: 004356D9
    • InterlockedExchange.KERNEL32(0042A369,000001F6), ref: 0044B6AC
    • LeaveCriticalSection.KERNEL32(0042A321), ref: 0044B6AF
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
    • String ID:
    • API String ID: 3495660284-0
    • Opcode ID: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
    • Instruction ID: 3e278a896620ffa5fdfd5bcc44ba61fc9bc9ab212b345b13b81bb6ec37c91fca
    • Opcode Fuzzy Hash: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
    • Instruction Fuzzy Hash: E3F0F672141206BBD210AB24EE89DBFB37CFF44315F41096AF60142550CB75F811CBBA
    APIs
    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00437127
    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00437140
    • GetWindowThreadProcessId.USER32(?,?), ref: 00437150
    • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00437162
    • TerminateProcess.KERNEL32(00000000,00000000), ref: 0043716D
    • CloseHandle.KERNEL32(00000000), ref: 00437174
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
    • String ID:
    • API String ID: 839392675-0
    • Opcode ID: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
    • Instruction ID: 38550948ec006cf47bed7574f40cc63f5aae242ba43c895826076912260f23cd
    • Opcode Fuzzy Hash: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
    • Instruction Fuzzy Hash: 37F054352813117BE6215B109E4EFEF37A8AF49F02F104828FB41B51D0E7E469458BAE
    APIs
    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000008,004A8E80,BC000000,00431B28,C:\Users\user\Desktop\AutoClicker-3.0.exe,00000004), ref: 00436055
    • LockServiceDatabase.ADVAPI32(00000000), ref: 00436062
    • UnlockServiceDatabase.ADVAPI32(00000000), ref: 0043606D
    • CloseServiceHandle.ADVAPI32(00000000), ref: 00436076
    • GetLastError.KERNEL32 ref: 00436081
    • CloseServiceHandle.ADVAPI32(00000000), ref: 00436091
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Service$CloseDatabaseHandle$ErrorLastLockManagerOpenUnlock
    • String ID:
    • API String ID: 1690418490-0
    • Opcode ID: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
    • Instruction ID: 156e5f382d75df54ba3c5c30185d6bb62b1a9e6e0194ec4ef6b9e4a62dbea0b3
    • Opcode Fuzzy Hash: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
    • Instruction Fuzzy Hash: 9BE0E5319821216BC6231B30AE4DBCF3B99DB1F311F041827F701D2250CB998404DBA8
    APIs
      • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
    • CoInitialize.OLE32(00000000), ref: 00475B71
    • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 00475B8A
    • CoUninitialize.OLE32 ref: 00475D71
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CreateInitializeInstanceUninitialize_wcslen
    • String ID: .lnk$HH
    • API String ID: 886957087-3121654589
    • Opcode ID: cbdcb7c6a4246560604725b409e9d68526ef36aede7bc5c013af9d6be1461df9
    • Instruction ID: b6d9803851b6054faf16c07e8989240a53b2e47f806e3cdaffbf0cd9004b63c5
    • Opcode Fuzzy Hash: cbdcb7c6a4246560604725b409e9d68526ef36aede7bc5c013af9d6be1461df9
    • Instruction Fuzzy Hash: D1819E75604300AFD310EF65CC82F5AB3A9EF88704F50892DF658AF2D2D6B5E905CB99
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Menu$Delete$InfoItem_memset
    • String ID: 0
    • API String ID: 1173514356-4108050209
    • Opcode ID: 0389ae051b09bd7a4182935a25706d7d03e8dcba455cd5f79873236a29400f5c
    • Instruction ID: b3a4179b3c174fb1a3aa0d908437eb3f68f1f523a6631853a4ee88e897a1c7ed
    • Opcode Fuzzy Hash: 0389ae051b09bd7a4182935a25706d7d03e8dcba455cd5f79873236a29400f5c
    • Instruction Fuzzy Hash: 31418CB55043019BD710CF19C884B5BBBE5AFC5324F148A6EFCA49B282C375E809CBA6
    APIs
    • LoadLibraryA.KERNEL32(?), ref: 00437CB2
    • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00437D26
    • FreeLibrary.KERNEL32(?,?,AU3_GetPluginDetails), ref: 00437D3D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Library$AddressFreeLoadProc
    • String ID: AU3_GetPluginDetails$#v
    • API String ID: 145871493-3662034293
    • Opcode ID: 7d188c0f41cb5a6a9fa6c90f8b3ed77d1338546741db11454016202a0afb00a3
    • Instruction ID: 909018a8305b4cb0ce841e730e5bf8c258fddf5044228ae68d4d210ccee2088c
    • Opcode Fuzzy Hash: 7d188c0f41cb5a6a9fa6c90f8b3ed77d1338546741db11454016202a0afb00a3
    • Instruction Fuzzy Hash: 054147B96042019FC314DF68D8C4D5AF3E5FF8D304B20866EE9568B751DB35E802CB96
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469368
    • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00469379
    • SendMessageW.USER32(?,?,00000000,00000000), ref: 004693AB
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 763830540-1403004172
    • Opcode ID: d3985f96a52b892ef4da355b3a21fb9dfa355d459c64959265ec4f468b2ea63b
    • Instruction ID: 8c71ebf423f389569590ff88e643f185c263fd61562863516bde62979c95be4e
    • Opcode Fuzzy Hash: d3985f96a52b892ef4da355b3a21fb9dfa355d459c64959265ec4f468b2ea63b
    • Instruction Fuzzy Hash: E0210C7160020067C210BB3A9C46FAF77989B85364F09052FF959AB3D1EA7CE94A436E
    APIs
    • GetStdHandle.KERNEL32(?), ref: 004439B4
      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,76232EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
      • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CurrentHandleProcess$Duplicate
    • String ID: nul
    • API String ID: 2124370227-2873401336
    • Opcode ID: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
    • Instruction ID: e5202fea31d744cc2812a948a395a4146b23d8233fafbd02014e3d546f800e0b
    • Opcode Fuzzy Hash: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
    • Instruction Fuzzy Hash: 8921A070104301ABE320DF28D886B9B77E4AF94B24F504E1EF9D4972D1E3B5DA54CBA6
    APIs
    • GetStdHandle.KERNEL32(000000F6), ref: 004438B7
      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,76232EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
      • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CurrentHandleProcess$Duplicate
    • String ID: nul
    • API String ID: 2124370227-2873401336
    • Opcode ID: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
    • Instruction ID: 183321404fa0000a7fb955016a75d3ae5bd0bbc3c7f5d4043dd6f74a8503dfc6
    • Opcode Fuzzy Hash: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
    • Instruction Fuzzy Hash: 4E2182701002019BE210DF28DC45F9BB7E4AF54B34F204A1EF9E4962D0E7759654CB56
    APIs
    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00441333
    • LoadLibraryW.KERNEL32(?,?,?,?,0047B4D0,?,?,?,?,?,?,?,?,?,00000000), ref: 0044133A
    • SendMessageW.USER32(?,00000467,00000000,?), ref: 00441352
    • DestroyWindow.USER32(00000000,?,00000467,00000000,?,?,?,?,0047B4D0,?,?,?,?,?,?), ref: 0044135B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$DestroyLibraryLoadWindow
    • String ID: SysAnimate32
    • API String ID: 3529120543-1011021900
    • Opcode ID: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
    • Instruction ID: 28effd0bdeb99d0e0a50349a2d6ccdc4655b9339127a2247ff1827a793b197f6
    • Opcode Fuzzy Hash: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
    • Instruction Fuzzy Hash: D0216271204301ABF7209AA5DC84F6B73ECEBD9724F104A1EF651D72E0D6B4DC818729
    APIs
    • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000001), ref: 0044304E
    • TranslateMessage.USER32(?), ref: 0044308B
    • DispatchMessageW.USER32(?), ref: 00443096
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004430AD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Message$Peek$DispatchTranslate
    • String ID: *.*
    • API String ID: 1795658109-438819550
    • Opcode ID: b19940840b651d13cfc04ca41c5114d53f5c804e5001d4718e9bc3487643e911
    • Instruction ID: 84c9885b6e4fc552d1ee54f35d8b145f1ad41c27ed561efbb95b3f0e56ffebd7
    • Opcode Fuzzy Hash: b19940840b651d13cfc04ca41c5114d53f5c804e5001d4718e9bc3487643e911
    • Instruction Fuzzy Hash: FE2138715183419EF720DF289C80FA377949B60B05F048ABFF66492191E6B9D608C76E
    APIs
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
      • Part of subcall function 004389A1: SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
      • Part of subcall function 004389A1: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
      • Part of subcall function 004389A1: GetCurrentThreadId.KERNEL32 ref: 004389DA
      • Part of subcall function 004389A1: AttachThreadInput.USER32(00000000), ref: 004389E1
    • GetFocus.USER32 ref: 004609EF
      • Part of subcall function 004389EB: GetParent.USER32(?), ref: 004389F7
      • Part of subcall function 004389EB: GetParent.USER32(?), ref: 00438A04
    • GetClassNameW.USER32(?,?,00000100), ref: 00460A37
    • EnumChildWindows.USER32(?,00445A31,?), ref: 00460A60
    • __swprintf.LIBCMT ref: 00460A7A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_wcslen
    • String ID: %s%d
    • API String ID: 991886796-1110647743
    • Opcode ID: e0584e4c7655dfb437a781e80413a43f0e0ba7060e64afa03ba383c8918c4af6
    • Instruction ID: 20a4aa43144560c0524e92d1094e5dcb4402c89d1d481f65a72662ac57dae138
    • Opcode Fuzzy Hash: e0584e4c7655dfb437a781e80413a43f0e0ba7060e64afa03ba383c8918c4af6
    • Instruction Fuzzy Hash: 7521A4712403046BD610FB65DC8AFEFB7ACAF98704F00481FF559A7181EAB8A509877A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _memset$_sprintf
    • String ID: %02X
    • API String ID: 891462717-436463671
    • Opcode ID: 1d9a52d330d3330097730759c4fafcb20d1f411a5d2c737f19e6fb2c7dae5da1
    • Instruction ID: c3235ccac5cd273424cb9b73a8b9e0f10e05fa8943de770f4571b5c3e9b76774
    • Opcode Fuzzy Hash: 1d9a52d330d3330097730759c4fafcb20d1f411a5d2c737f19e6fb2c7dae5da1
    • Instruction Fuzzy Hash: 5B11E97225021167D314FA698C93BEE724CAB45704F50453FF541A75C1EF6CB558839E
    APIs
    • _memset.LIBCMT ref: 0042CD00
    • GetOpenFileNameW.COMDLG32 ref: 0042CD51
      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\AutoClicker-3.0.exe,?,C:\Users\user\Desktop\AutoClicker-3.0.exe,004A8E80,C:\Users\user\Desktop\AutoClicker-3.0.exe,0040F3D2), ref: 0040FFCA
      • Part of subcall function 00410130: SHGetMalloc.SHELL32(00000000), ref: 0041013A
      • Part of subcall function 00410130: SHGetDesktopFolder.SHELL32(?,004A8E80), ref: 00410150
      • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 00410160
      • Part of subcall function 00410130: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410197
      • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 004101AC
      • Part of subcall function 00410020: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 00410037
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: NamePath$Full_wcscpy$DesktopFileFolderFromListMallocOpen_memset
    • String ID: $OH$@OH$X
    • API String ID: 3491138722-1394974532
    • Opcode ID: 7062e3e3c76385fe5eccc206a12053cde1d52f0c1f3111404c53ffbe6451d0d0
    • Instruction ID: e3e81f3fa603e1d093c5df9e9287f390c0398a0e5563e0e16fb911f44c5f658a
    • Opcode Fuzzy Hash: 7062e3e3c76385fe5eccc206a12053cde1d52f0c1f3111404c53ffbe6451d0d0
    • Instruction Fuzzy Hash: 2111C2B02043405BC311EF19984175FBBE9AFD5308F14882EF68497292D7FD854DCB9A
    APIs
    • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C3DA
    • SetKeyboardState.USER32(00000080), ref: 0044C3ED
    • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C441
    • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C465
    • SendInput.USER32 ref: 0044C509
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: KeyboardMessagePostState$InputSend
    • String ID:
    • API String ID: 3031425849-0
    • Opcode ID: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
    • Instruction ID: f46f63d78903415e516a46676784f6fcea1caa301ceb581e17347d916cd8316d
    • Opcode Fuzzy Hash: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
    • Instruction Fuzzy Hash: DB413B715462446FF760AB24D944BBFBB94AF99324F04061FF9D4122C2D37D9908C77A
    APIs
    • RegEnumKeyExW.ADVAPI32 ref: 004422F0
    • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,?,?), ref: 0044232B
    • RegCloseKey.ADVAPI32(00000000), ref: 0044234E
    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00442390
    • RegEnumKeyExW.ADVAPI32(?,00000000), ref: 004423C0
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Enum$CloseDeleteOpen
    • String ID:
    • API String ID: 2095303065-0
    • Opcode ID: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
    • Instruction ID: 24d8057b763805d248a02a33893b377b1579bd56aab3fff97e90bb3d062a49ad
    • Opcode Fuzzy Hash: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
    • Instruction Fuzzy Hash: 0C3150721043056EE210DF94DD84FBF73ECEBC9314F44492EBA9596141D7B8E9098B6A
    APIs
    • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C2F4
    • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C31B
    • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C363
    • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C385
    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C392
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: PrivateProfile$SectionWrite$String
    • String ID:
    • API String ID: 2832842796-0
    • Opcode ID: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
    • Instruction ID: eb365ed5c03c4bb3a44f9ddbc5128f2f56e5f8affd5b6ace934fe40af23b551f
    • Opcode Fuzzy Hash: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
    • Instruction Fuzzy Hash: 00318675240305ABD610DFA1DC85F9BB3A8AF84705F00891DF94497292D7B9E889CB94
    APIs
    • GetWindowRect.USER32(?,?), ref: 00447C1B
    • ScreenToClient.USER32(?,?), ref: 00447C39
    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
    • EndPaint.USER32(?,?), ref: 00447CD1
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ClientPaintRectRectangleScreenViewportWindow
    • String ID:
    • API String ID: 659298297-0
    • Opcode ID: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
    • Instruction ID: 653bb342b0117225c29b14224c0e663a7b864e912777eddc33bb147bcfad3e12
    • Opcode Fuzzy Hash: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
    • Instruction Fuzzy Hash: 8A3150706043019FE320CF15D9C8F7B7BE8EB89724F044A6EF994873A1D774A8468B69
    APIs
    • GetCursorPos.USER32(?), ref: 004478A7
    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478C3
    • DefDlgProcW.USER32(?,0000007B,?,?,004A83D8,?,004A83D8,?), ref: 004478E7
    • GetCursorPos.USER32(?), ref: 00447935
    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 0044795B
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CursorMenuPopupTrack$Proc
    • String ID:
    • API String ID: 1300944170-0
    • Opcode ID: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
    • Instruction ID: 600148c7f6f0e64f7aba5c2d0a58757112576a5c49d56a392ea253be37485a5b
    • Opcode Fuzzy Hash: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
    • Instruction Fuzzy Hash: 2B31E475244204ABE214DB48DC48FABB7A5FBC9711F14491EF64483390D7B96C4BC779
    APIs
    • _memset.LIBCMT ref: 0044955A
      • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
    • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 004495B3
    • _wcslen.LIBCMT ref: 004495C1
    • _wcslen.LIBCMT ref: 004495CE
    • SendMessageW.USER32(?,00001060,00000000,?), ref: 004495FF
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend_wcslen$_memset_wcspbrk
    • String ID:
    • API String ID: 1843234404-0
    • Opcode ID: 5f7323ff963a176f6b5a9ce71003f1dfa38455e4a969b2d63375769b26704554
    • Instruction ID: 2eba0e6ca7bf2f01d6f4dc0284c8cedbdf4c7ea0b5caad0642d64795040b3bc6
    • Opcode Fuzzy Hash: 5f7323ff963a176f6b5a9ce71003f1dfa38455e4a969b2d63375769b26704554
    • Instruction Fuzzy Hash: 1821F87260430556E630EB15AC81BFBB3D8EBD0761F10483FEE4081280E67E9959D3AA
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
    • Instruction ID: 4734ce3ce40af5b77ad59fd8baedf6a3e56741e39cc50bb30d89ac3ca2d3bd52
    • Opcode Fuzzy Hash: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
    • Instruction Fuzzy Hash: 1321E0712006409BCB10EF29D994D6B73A8EF45321B40466EFE5597382DB34EC08CBA9
    APIs
    • IsWindowVisible.USER32(?), ref: 00445721
    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0044573C
    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00445773
    • _wcslen.LIBCMT ref: 004457A3
    • CharUpperBuffW.USER32(00000000,00000000), ref: 004457AD
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
    • String ID:
    • API String ID: 3087257052-0
    • Opcode ID: 4724513c408bbea161d15f0d2254f791de2be8b4c22b1fbcd3dacb0cb1d6555e
    • Instruction ID: 00e09c3d40749c53521e9302b0eb92bb7bfe2d7d521d01ead8474e6f611d5aec
    • Opcode Fuzzy Hash: 4724513c408bbea161d15f0d2254f791de2be8b4c22b1fbcd3dacb0cb1d6555e
    • Instruction Fuzzy Hash: FA11E972601741BBF7105B35DC46F5B77CDAF65320F04443AF40AE6281FB69E84583AA
    APIs
    • IsWindow.USER32(00000000), ref: 00459DEF
    • GetForegroundWindow.USER32 ref: 00459E07
    • GetDC.USER32(00000000), ref: 00459E44
    • GetPixel.GDI32(00000000,?,00000000), ref: 00459E4F
    • ReleaseDC.USER32(00000000,00000000), ref: 00459E8B
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$ForegroundPixelRelease
    • String ID:
    • API String ID: 4156661090-0
    • Opcode ID: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
    • Instruction ID: f25aa70a507d7fb142791e963b89e5313ab4350e7ab13503248c443e15a863bf
    • Opcode Fuzzy Hash: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
    • Instruction Fuzzy Hash: 76219D76600202ABD700EFA5CD49A5AB7E9FF84315F19483DF90597642DB78FC04CBA9
    APIs
      • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 00464985
    • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,00000000), ref: 00464993
    • connect.WSOCK32(00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649CD
    • WSAGetLastError.WSOCK32(00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649F4
    • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 00464A07
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ErrorLast$closesocketconnectinet_addrsocket
    • String ID:
    • API String ID: 245547762-0
    • Opcode ID: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
    • Instruction ID: b27d5ee258410aac5bd3077dd9c53ce90635b59006b610d0ec7ee295a05cd03d
    • Opcode Fuzzy Hash: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
    • Instruction Fuzzy Hash: 3211DA712002109BD310FB2AC842F9BB3D8AF85728F04895FF594A72D2D7B9A885875A
    APIs
    • DeleteObject.GDI32(00000000), ref: 00447151
    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
    • SelectObject.GDI32(?,00000000), ref: 004471A2
    • BeginPath.GDI32(?), ref: 004471B7
    • SelectObject.GDI32(?,00000000), ref: 004471DC
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Object$Select$BeginCreateDeletePath
    • String ID:
    • API String ID: 2338827641-0
    • Opcode ID: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
    • Instruction ID: ab30216038401830d00444c504d41f25dcbf82a6e2307e0a418987ed8484b610
    • Opcode Fuzzy Hash: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
    • Instruction Fuzzy Hash: 7E2171B18083019FD320CF29AD44A1B7FACF74A724F14052FF654933A1EB789849CB69
    APIs
    • Sleep.KERNEL32(00000000,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043771E
    • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043773C
    • Sleep.KERNEL32(00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043775C
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,004448B6,0000000F,?), ref: 00437767
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CounterPerformanceQuerySleep
    • String ID:
    • API String ID: 2875609808-0
    • Opcode ID: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
    • Instruction ID: fd8a8a83491f03de43ea78fbc63302b75a2fa5438857304713168bbc83ca9150
    • Opcode Fuzzy Hash: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
    • Instruction Fuzzy Hash: EA11A3B64093119BC210EF1ADA88A8FB7F4FFD8765F004D2EF9C462250DB34D5598B9A
    APIs
    • SendMessageW.USER32 ref: 0046FD00
    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 0046FD2E
    • SendMessageW.USER32(?,00001015,?,?), ref: 0046FD4B
    • DestroyIcon.USER32(?), ref: 0046FD58
    • DestroyIcon.USER32(?), ref: 0046FD5F
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$DestroyIcon
    • String ID:
    • API String ID: 3419509030-0
    • Opcode ID: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
    • Instruction ID: ba7c1cc62690e465ab1dcb48fa3e0f79152c3dc78d34179caeeeb49ed344ab69
    • Opcode Fuzzy Hash: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
    • Instruction Fuzzy Hash: 5F1182B15043449BE730DF14DC46BABB7E8FBC5714F00492EE6C857291D6B8A84A8B67
    APIs
    • __getptd.LIBCMT ref: 004175AE
      • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
      • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
    • __amsg_exit.LIBCMT ref: 004175CE
    • __lock.LIBCMT ref: 004175DE
    • InterlockedDecrement.KERNEL32(?), ref: 004175FB
    • InterlockedIncrement.KERNEL32(03012D98), ref: 00417626
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
    • String ID:
    • API String ID: 4271482742-0
    • Opcode ID: 2cd43cd66d4aa4db619ce4927731f647cc3dc831a8401a791259e36d2f4e5a3b
    • Instruction ID: de548182bd5f57d4f8c9f8a4c79293bfa6802d75d0085d2526eaa3c6a777046b
    • Opcode Fuzzy Hash: 2cd43cd66d4aa4db619ce4927731f647cc3dc831a8401a791259e36d2f4e5a3b
    • Instruction Fuzzy Hash: 9401AD31944A11AFC710ABA998497CE7BB0BB11724F0540ABE80063791CB3CA9C1CFEE
    APIs
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$Icon
    • String ID:
    • API String ID: 4023252218-0
    • Opcode ID: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
    • Instruction ID: d1816f9fa450f538fb043821254e2bd2cfb9ade9207d957631f6d0e9d50691b6
    • Opcode Fuzzy Hash: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
    • Instruction Fuzzy Hash: 05015E70300605ABCB20DF65D9D4B2B77A8BF14712B50452AFD04D7346EB38EC48CB69
    APIs
    • GetDlgItem.USER32(?,000003E9), ref: 00460342
    • GetWindowTextW.USER32(00000000,00000100,00000100), ref: 00460357
    • MessageBeep.USER32(00000000), ref: 0046036D
    • KillTimer.USER32(?,0000040A), ref: 00460392
    • EndDialog.USER32(?,00000001), ref: 004603AB
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: BeepDialogItemKillMessageTextTimerWindow
    • String ID:
    • API String ID: 3741023627-0
    • Opcode ID: 501acfb5eb3b6f3cfaa385888d3e55fb48a2c79b57e0378651af09ce6610da73
    • Instruction ID: 48c257e0c270193328064fa19c5b46d6a870d8092b70dfec968bdaebd9a60f08
    • Opcode Fuzzy Hash: 501acfb5eb3b6f3cfaa385888d3e55fb48a2c79b57e0378651af09ce6610da73
    • Instruction Fuzzy Hash: BE018831500300A7E7209B54DE5DBDB77A8BF44B05F00492EB681A25D0E7F8A584CB55
    APIs
    • SendMessageW.USER32(?,00001101,00000000,?), ref: 00455514
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: DeleteDestroyObject$IconMessageSendWindow
    • String ID:
    • API String ID: 1489400265-0
    • Opcode ID: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
    • Instruction ID: 68d82c845863845e83b9d92669df32d5d1b96a6c2c0272d07869f65424c05900
    • Opcode Fuzzy Hash: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
    • Instruction Fuzzy Hash: D9014F703006419BDB10EF65DED8A2A73A9FB44712B40455AFE05DB286DB78EC49CB68
    APIs
      • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
    • String ID:
    • API String ID: 1042038666-0
    • Opcode ID: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
    • Instruction ID: 707d1f3050e1f0ff98422ce5efa9f9a4d3559fdafbc0a23101ed238e91bf2869
    • Opcode Fuzzy Hash: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
    • Instruction Fuzzy Hash: B2014B702006419BCB10AF65D9C8A2A33ACAF19322780456AFD05D7242DB28EC498B79
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Path$ObjectStroke$DeleteFillSelect
    • String ID:
    • API String ID: 2625713937-0
    • Opcode ID: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
    • Instruction ID: 1b0d13c7bbaa275692c81ef4a4760df4fcf6218f807946f7e03cce85d1463269
    • Opcode Fuzzy Hash: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
    • Instruction Fuzzy Hash: F7F0A4751052019BD7508F18EC0C70E7FA8FB4F325F04462EEA19932E0DB781546CBAD
    APIs
      • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
    • ___set_flsgetvalue.LIBCMT ref: 004140E1
      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(?,00416C10,?,004114D4,?,00000000,00000001), ref: 00416A8D
      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,004114D4,?,00000000,00000001), ref: 00416AAE
    • ___fls_getvalue@4.LIBCMT ref: 004140EC
      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
    • ___fls_setvalue@8.LIBCMT ref: 004140FF
      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
    • ExitThread.KERNEL32 ref: 0041410F
    • GetCurrentThreadId.KERNEL32 ref: 00414115
    • __freefls@4.LIBCMT ref: 00414135
    • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
    • String ID:
    • API String ID: 132634196-0
    • Opcode ID: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
    • Instruction ID: c6f54ac6c47f72d6c6be617d0ab0d95393642b3a08ca47198428750b18cc63fb
    • Opcode Fuzzy Hash: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
    • Instruction Fuzzy Hash: EFE0B6318012096B8F0177F28E2A8DF3A2DAD56799B12842EBF10A3112DA6DD9D147AD
    APIs
    • __IsNonwritableInCurrentImage.LIBCMT ref: 00415610
      • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
    • __getptd_noexit.LIBCMT ref: 00415620
    • CloseHandle.KERNEL32(?,?,0041566B), ref: 00415634
    • __freeptd.LIBCMT ref: 0041563B
    • ExitThread.KERNEL32 ref: 00415643
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CloseCurrentExitFindHandleImageNonwritableSectionThread__freeptd__getptd_noexit
    • String ID:
    • API String ID: 3798957060-0
    • Opcode ID: b967dbfa637345d23b87cfc8d9af1ab50b09dd7bc3861eb0cbc05d30960e46f5
    • Instruction ID: 5ad9b57b40d8b41da6f03c32f2a15b2799e0bbfe2e5ad1689210a27a588f1b2a
    • Opcode Fuzzy Hash: b967dbfa637345d23b87cfc8d9af1ab50b09dd7bc3861eb0cbc05d30960e46f5
    • Instruction Fuzzy Hash: 29E01A31501A1197C2212BB9AC097DE3255AF01F36F944A6EF81A952A0DB6CD98147AD
    APIs
      • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
    • ___set_flsgetvalue.LIBCMT ref: 00415690
      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(?,00416C10,?,004114D4,?,00000000,00000001), ref: 00416A8D
      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,004114D4,?,00000000,00000001), ref: 00416AAE
    • ___fls_getvalue@4.LIBCMT ref: 0041569B
      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
    • ___fls_setvalue@8.LIBCMT ref: 004156AD
      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
    • ExitThread.KERNEL32 ref: 004156BD
    • __freefls@4.LIBCMT ref: 004156D9
    • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
    • String ID:
    • API String ID: 1537469427-0
    • Opcode ID: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
    • Instruction ID: 6f4b581ce684dac4bce1a6396b1ab204a3b2196504341234b7a244e47b3a25b0
    • Opcode Fuzzy Hash: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
    • Instruction Fuzzy Hash: 83E0E6308003096BCF0037F29E1A9DF392DAD41389B52841E7E14B2122DE6DD9D1466D
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _memcmp
    • String ID: '$[$h
    • API String ID: 2931989736-1224472061
    • Opcode ID: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
    • Instruction ID: c2eec353cbd26a418970a1643da97c958d9efd09d44d369c5aec2a2e92b02032
    • Opcode Fuzzy Hash: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
    • Instruction Fuzzy Hash: EBE1B3756083858FE725CF28C8807ABBBE1FFC9304F18896EE89587341D7799849CB56
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _strncmp
    • String ID: >$R$U
    • API String ID: 909875538-1924298640
    • Opcode ID: f9ebc198af2ab7ab0819517e001d9756788144751dce64bc403378e3fae079f3
    • Instruction ID: f6794502b7c89560a677b30a08de70cb8bc1b17d125f16f135907c58c8460d8d
    • Opcode Fuzzy Hash: f9ebc198af2ab7ab0819517e001d9756788144751dce64bc403378e3fae079f3
    • Instruction Fuzzy Hash: 46E19C745083818FEB25CF29C49076BBBE1EFD9304F28496EE89587381D378E849CB56
    APIs
      • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
    • CoInitialize.OLE32(00000000), ref: 0046CE18
    • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
    • CoUninitialize.OLE32 ref: 0046CE50
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CreateInitializeInstanceUninitialize_wcslen
    • String ID: .lnk
    • API String ID: 886957087-24824748
    • Opcode ID: e83563001dd7bcedea39289553fd9f142b66627775d313b87f420d830c244a68
    • Instruction ID: e6866be78573c1c884b97e0ea587eba5faae97601209690317d4c61f460e6c3a
    • Opcode Fuzzy Hash: e83563001dd7bcedea39289553fd9f142b66627775d313b87f420d830c244a68
    • Instruction Fuzzy Hash: AAA1ABB5A042019FC704EF64C980E6BB7E9EF88714F14895EF8849B392D735EC45CBA6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: #v
    • API String ID: 0-554117064
    • Opcode ID: 5a1fe417cc88f07602119dccfdc88dfc98e06262a5cefc90641c84d973a1b933
    • Instruction ID: a1f682be926937ece900e9fcc50ccc13891f43ead78ba7c6857800eee9f0599c
    • Opcode Fuzzy Hash: 5a1fe417cc88f07602119dccfdc88dfc98e06262a5cefc90641c84d973a1b933
    • Instruction Fuzzy Hash: EC81D2756043009FC310EF65C985B6AB7E4EF84315F008D2EF988AB392D779E909CB96
    Strings
    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00469C37
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcslen
    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
    • API String ID: 176396367-557222456
    • Opcode ID: 05e1b018147aed282f79f116f183daeb9dc862b539b2a65b9b9a41577d57b657
    • Instruction ID: ee4acdf3c96327ae22a3df5f5b4f890b4de0c7d3b79387d634d87417fcde4e10
    • Opcode Fuzzy Hash: 05e1b018147aed282f79f116f183daeb9dc862b539b2a65b9b9a41577d57b657
    • Instruction Fuzzy Hash: 938181711183009FC310EF65C88186BB7E8AF85714F408A2FF4959B2A2E778ED45CB9B
    APIs
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
    • VariantInit.OLEAUT32(00000000), ref: 0042D2E0
    • VariantCopy.OLEAUT32(?,?), ref: 0042D2EE
    • VariantClear.OLEAUT32(00000000), ref: 0042D2FF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Variant$ClearCopyInit_malloc
    • String ID: 4RH
    • API String ID: 2981388473-749298218
    • Opcode ID: 19798d7b68a272b0224218cfb1fccc5f7a84b30c0ccdfcda4340f78cbb0b9868
    • Instruction ID: 2430bd0654d197d786bc988f6f01769df72c779a088326c60667d263ff95ce9f
    • Opcode Fuzzy Hash: 19798d7b68a272b0224218cfb1fccc5f7a84b30c0ccdfcda4340f78cbb0b9868
    • Instruction Fuzzy Hash: CC913874A083519FC720CF29D480A1AB7E1FF89304F64892EE999DB351D774EC85CB96
    APIs
      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
    • __wcsnicmp.LIBCMT ref: 0046681A
    • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 004668B9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Connection__wcsnicmp_wcscpy_wcslen
    • String ID: LPT$HH
    • API String ID: 3035604524-2728063697
    • Opcode ID: 2b491d2c51208fa902effd0e5a828b46bf5d237b13e9c22ba9da351a55288af3
    • Instruction ID: 32c7950bcbaa764ae6d62266904c1b9f72d26d84b6ae022b5f72856ccecd4d84
    • Opcode Fuzzy Hash: 2b491d2c51208fa902effd0e5a828b46bf5d237b13e9c22ba9da351a55288af3
    • Instruction Fuzzy Hash: 2151D5B16043009FC720EF65C881B1BB7E5AF85704F11491EFA859B382E779ED49C79A
    APIs
      • Part of subcall function 004374AF: WriteProcessMemory.KERNEL32(?,?,00000000,00000000,00000000,?,00461142,?), ref: 004374E2
    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00438AB8
      • Part of subcall function 00437472: ReadProcessMemory.KERNEL32(?,00000000,00000000,?,00000000,00000000,00460C33,?,00000000,?,00000202), ref: 004374A5
    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00438B2F
    • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 00438BAF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$MemoryProcess$ReadWrite
    • String ID: @
    • API String ID: 4055202900-2766056989
    • Opcode ID: aff0382c476b5cf7d6aca6f0f11cfbc36414f9c6df0ff7349ef437f2faeb44c6
    • Instruction ID: 682097a2b5231093ce935cfc9f6f49684b756042c0be5430c67da702d62f7190
    • Opcode Fuzzy Hash: aff0382c476b5cf7d6aca6f0f11cfbc36414f9c6df0ff7349ef437f2faeb44c6
    • Instruction Fuzzy Hash: E6518FB2208304ABD310DB64CC81FEFB7A9EFC9714F04591EFA8597181D678F9498B66
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CrackInternet_memset_wcslen
    • String ID: |
    • API String ID: 915713708-2343686810
    • Opcode ID: 07c2940d3d4071da212895ad31b37a6daee595a4810490f232ca297cbb756b96
    • Instruction ID: 59fb16093b155e5aebf0565036b17e76eaaa1a90c891d08183ce313382d628e9
    • Opcode Fuzzy Hash: 07c2940d3d4071da212895ad31b37a6daee595a4810490f232ca297cbb756b96
    • Instruction Fuzzy Hash: AE417EB2754301ABD204EF69DC81B9BF7E8FB88714F00052EF64593290DB75E909CBA6
    APIs
    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A7FE
    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A851
    • HttpQueryInfoW.WININET ref: 0044A892
      • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
    • String ID:
    • API String ID: 3705125965-3916222277
    • Opcode ID: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
    • Instruction ID: e2ea4e726a01332d61d4ddbc0b4be6fd5f15ca60b5c099a75bcf819f780d651a
    • Opcode Fuzzy Hash: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
    • Instruction Fuzzy Hash: F431C6B56813416BE320EB16DC42F9FB7E8EFD9714F00091FF65057281D7A8A50D876A
    APIs
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00450A84
    • GetWindowLongW.USER32(?,000000F0), ref: 00450AA2
    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00450AB3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$Long
    • String ID: SysTreeView32
    • API String ID: 847901565-1698111956
    • Opcode ID: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
    • Instruction ID: 1ec52148e0427fd314aa46f8515fbaae5756f8dde681787cc4d1a4a364837cef
    • Opcode Fuzzy Hash: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
    • Instruction Fuzzy Hash: 9831E670244301AFE710DB64CC84B6BB3E8EF98325F104A1EF9A5932D1D7B8AD85CB25
    APIs
    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0045122A
    • SendMessageW.USER32(00000000,00000186,00000000,00000000), ref: 00451238
    • MoveWindow.USER32(?,?,00000000,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 0045125D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$MoveWindow
    • String ID: Listbox
    • API String ID: 3315199576-2633736733
    • Opcode ID: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
    • Instruction ID: bfe1e9b3800f224edd0053b2d0d87a77da448e7bf5b17050dc61905274d7532a
    • Opcode Fuzzy Hash: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
    • Instruction Fuzzy Hash: E421D3712043047BE6209A65DC81F6BB3E8EBCD735F104B1EFA60A72D1C675EC458729
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D243
    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D2C7
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D30C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume
    • String ID: HH
    • API String ID: 2507767853-2761332787
    • Opcode ID: 4a6b6fdd2b9f343c30d6a87df2371e8b20b84211b94e90a05c2356d7f8d83b37
    • Instruction ID: 3a13385eea30623c1676d674891632f467f7702306eb835dffc6848555556e8f
    • Opcode Fuzzy Hash: 4a6b6fdd2b9f343c30d6a87df2371e8b20b84211b94e90a05c2356d7f8d83b37
    • Instruction Fuzzy Hash: CB2148756083019FC310EF55D944A6AB7E4FF88704F40882EFA459B2A2D774E909CB5A
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D44A
    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CE
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D502
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume
    • String ID: HH
    • API String ID: 2507767853-2761332787
    • Opcode ID: 9c023fbce1981ba0af7c7a5460cac4153c8a79137d02893499ca688b8d4424f4
    • Instruction ID: 4d58de7222ae090191e92ac7ca7f860a166ce242790daddbe854cb28de2b959d
    • Opcode Fuzzy Hash: 9c023fbce1981ba0af7c7a5460cac4153c8a79137d02893499ca688b8d4424f4
    • Instruction Fuzzy Hash: AA2148756083019FC314EF55D984E5AB7E8FFC8704F40882EF649972A2D778E909CB9A
    APIs
    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450D74
    • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450D8A
    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450D98
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: msctls_trackbar32
    • API String ID: 3850602802-1010561917
    • Opcode ID: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
    • Instruction ID: c83169f0c5ec68c29a3e9aa847b4a28030a04f73c00385235601d1c9d4ce90e2
    • Opcode Fuzzy Hash: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
    • Instruction Fuzzy Hash: 4F1193717403117BE610CAA8DC81F5B73E8AB98B25F204A1AFA50A72C1D2B4FC458B68
    APIs
      • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
    • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046BD78
    • WSAGetLastError.WSOCK32(00000000,?,?,00000000,?,?), ref: 0046BD83
    • inet_ntoa.WSOCK32(00000000,?), ref: 0046BDCD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ByteCharErrorLastMultiWidegethostbynameinet_ntoa
    • String ID: HH
    • API String ID: 1515696956-2761332787
    • Opcode ID: 2b696c3958acac0cfebfc1979ee3383ded694f815108e0fb961243c0bb40863f
    • Instruction ID: 2fad99cf3c45da3a785a9a513efbde0c8943f1fdc9598a344110207fd9df59bd
    • Opcode Fuzzy Hash: 2b696c3958acac0cfebfc1979ee3383ded694f815108e0fb961243c0bb40863f
    • Instruction Fuzzy Hash: E21142765043006BC744FB66D885D9FB3A8AFC4318F448C2EF945A7242DA39E949876A
    APIs
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
    • GetMenuItemInfoW.USER32 ref: 004497EA
    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00449817
    • DrawMenuBar.USER32 ref: 00449828
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Menu$InfoItem$Draw_malloc
    • String ID: 0
    • API String ID: 772068139-4108050209
    • Opcode ID: e29b272cec8c3574c96d9346a1b982eff9512bed706191e6eff69957cd5056d8
    • Instruction ID: 895394c4ac3d8cdb9511dba433443d5742fa96e32f07ab63668b9f5a94eb31d1
    • Opcode Fuzzy Hash: e29b272cec8c3574c96d9346a1b982eff9512bed706191e6eff69957cd5056d8
    • Instruction Fuzzy Hash: 941182B16042009BF730EB55EC96FABB7A8FB91714F00452EE648CA281DB7A9445CB76
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AllocTask_wcslen
    • String ID: hkG
    • API String ID: 2651040394-3610518997
    • Opcode ID: 5f07d2af828b567661e14268adc7c222ee2706f89559f7cfcc8218844ad0a738
    • Instruction ID: 372044899b15e8c53ead78f1c779643819f92c4817f04f111663958edd7e2adf
    • Opcode Fuzzy Hash: 5f07d2af828b567661e14268adc7c222ee2706f89559f7cfcc8218844ad0a738
    • Instruction Fuzzy Hash: DCE065736442225B97506A79AC045CBA7D8AFB0370B15482BF880E7310E278E89643E5
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0043417A
    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0043418C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetSystemWow64DirectoryW$kernel32.dll
    • API String ID: 2574300362-1816364905
    • Opcode ID: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
    • Instruction ID: 1a9860a365f0c849ce8c10f1c40c5c80f9dda93506fd3415c38c98a37cde1a5a
    • Opcode Fuzzy Hash: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
    • Instruction Fuzzy Hash: F9D05EB1440B039FCB109FA0D80C64BB6E4AB64301F148C2EF885B2654D7B8E8C0CBA8
    APIs
    • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434466,?,?,00464B68,?,?,?,?,?,00000000,?,?,00000101,?), ref: 004343DE
    • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004343F0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: ICMP.DLL$IcmpSendEcho
    • API String ID: 2574300362-58917771
    • Opcode ID: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
    • Instruction ID: bde82dd314f67bb94adb8237e566b22d9cd50c1f3059090bebd97951f1ce1dc3
    • Opcode Fuzzy Hash: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
    • Instruction Fuzzy Hash: C9D017B45043039BD7105B21D80874A76E4AF58310F118C2FF881E2250CBBCE8808B79
    APIs
    • LoadLibraryA.KERNEL32(ICMP.DLL,?,0043447D,?,?,00464B56,?,?,?,?,00000000,?,?,00000101,?,?), ref: 0043440D
    • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 0043441F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: ICMP.DLL$IcmpCloseHandle
    • API String ID: 2574300362-3530519716
    • Opcode ID: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
    • Instruction ID: 815a2f2ef77883dfca24b23846b24e776c3b140ddfaf16f0983d17b56328066b
    • Opcode Fuzzy Hash: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
    • Instruction Fuzzy Hash: 9FD017B04443129AD7106B64D80874A76E4AB68302F129C3FF881A2660C7BCA8808B39
    APIs
    • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434494,?,?,00464A94,?), ref: 0043443C
    • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0043444E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: ICMP.DLL$IcmpCreateFile
    • API String ID: 2574300362-275556492
    • Opcode ID: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
    • Instruction ID: c247b13c068300da1972229949477068df6ba5342f41feac8fae2a533bc96115
    • Opcode Fuzzy Hash: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
    • Instruction Fuzzy Hash: 97D017B04043029ADB105B60D90875A77E4AB68300F118C7FF9A1A2250C7BCA8808B29
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,0040E551,?), ref: 0040EE7B
    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040EE8D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: IsWow64Process$kernel32.dll
    • API String ID: 2574300362-3024904723
    • Opcode ID: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
    • Instruction ID: 75875fa2f3f8b89ed4c8cde0d061cde3839b728dd3838c322d7dfd2ddbff31fa
    • Opcode Fuzzy Hash: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
    • Instruction Fuzzy Hash: 51D0C9B0940707DAC7301F72C91871B7AE4AB40342F204C3EB995A1290DBBCC0408B28
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ClearVariant
    • String ID:
    • API String ID: 1473721057-0
    • Opcode ID: b786052d017446ac87aa363545512332e0d3e258b34c33c51a4f3f919f54331e
    • Instruction ID: 4e1e522645e86f73b8885f2d86dba7d443b77ce6b8f7ad4508257b27d10f8221
    • Opcode Fuzzy Hash: b786052d017446ac87aa363545512332e0d3e258b34c33c51a4f3f919f54331e
    • Instruction Fuzzy Hash: 3DD18D746003018FD724DF25D484A26B7E1EF49704F64887EE9899B3A1D739EC92CB9A
    APIs
    • __flush.LIBCMT ref: 00414630
    • __fileno.LIBCMT ref: 00414650
    • __locking.LIBCMT ref: 00414657
    • __flsbuf.LIBCMT ref: 00414682
      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
    • String ID:
    • API String ID: 3240763771-0
    • Opcode ID: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
    • Instruction ID: ec1a4dff6c5341ad57a53ba98b0f539b864df2cc4a0ba96fecd891c5d8a4160d
    • Opcode Fuzzy Hash: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
    • Instruction Fuzzy Hash: 4841A571A00605ABDB249FA5C9445DFB7B6EFC1328F28852FE41997280D77CDEC18B48
    APIs
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
    • VariantCopy.OLEAUT32(?,?), ref: 00478259
    • VariantCopy.OLEAUT32(0425A7C0,?), ref: 00478270
    • VariantCopy.OLEAUT32(0425A7A0,?), ref: 00478287
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CopyVariant$ErrorLast
    • String ID:
    • API String ID: 2286883814-0
    • Opcode ID: b83959a3d9adaf97d7338538a2dc96912ff920ad2de9dc32a9933265cc4ebbad
    • Instruction ID: 2d87100fc18953c9afe9b7e879878e48daa4ef19e0256d9a4550ae3fa38499cf
    • Opcode Fuzzy Hash: b83959a3d9adaf97d7338538a2dc96912ff920ad2de9dc32a9933265cc4ebbad
    • Instruction Fuzzy Hash: 5F517C751543409FC310DF69C880A9BBBE4FF88314F448A6EF9499B352DB39E909CB99
    APIs
    • socket.WSOCK32(00000002,00000002,00000011), ref: 00474068
    • WSAGetLastError.WSOCK32(00000000,00000002,00000002,00000011), ref: 00474076
    • #21.WSOCK32 ref: 004740E0
    • WSAGetLastError.WSOCK32(00000000), ref: 004740EB
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ErrorLast$socket
    • String ID:
    • API String ID: 1881357543-0
    • Opcode ID: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
    • Instruction ID: ff1742a21ceaee7448286ece46cbaad1fa76dded649dcd1b12ff87c083dae87e
    • Opcode Fuzzy Hash: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
    • Instruction Fuzzy Hash: 7641D9717403006AE720BF6ADC47F5672C89B54B18F14496EF648BF2C3D6FAA881869C
    APIs
    • ClientToScreen.USER32(044051D8,?), ref: 00441CDE
    • GetWindowRect.USER32(?,?), ref: 00441D5A
    • PtInRect.USER32(?,?,?), ref: 00441D6F
    • MessageBeep.USER32(00000000), ref: 00441DF2
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Rect$BeepClientMessageScreenWindow
    • String ID:
    • API String ID: 1352109105-0
    • Opcode ID: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
    • Instruction ID: 11ad13a84751b34e4f8a983c71a6a29643224e7bbeba0240db3aabd8edeb2108
    • Opcode Fuzzy Hash: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
    • Instruction Fuzzy Hash: E64192B5A042418FE710DF18D884AABB7E5FFC9311F18866FE8518B360D734AC85CBA5
    APIs
    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042387E
    • __isleadbyte_l.LIBCMT ref: 004238B2
    • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 004238E3
    • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 00423951
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
    • String ID:
    • API String ID: 3058430110-0
    • Opcode ID: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
    • Instruction ID: 550681b3841f0f34ee613cb5364b25607849a03987ccfca5eaaec14299199b49
    • Opcode Fuzzy Hash: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
    • Instruction Fuzzy Hash: A931C270B00265EFDB20EF64D8849AA7BF5EF01312B9445AAF0A09F291D338CE81CB55
    APIs
    • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D10A
    • GetLastError.KERNEL32(?,00000000), ref: 0045D12B
    • DeleteFileW.KERNEL32(00000000,?), ref: 0045D14C
    • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0045D16A
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CreateHardLink$DeleteErrorFileLast
    • String ID:
    • API String ID: 3321077145-0
    • Opcode ID: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
    • Instruction ID: 240381fd0e223f31e6bb83dc4f900fe278965bce5f9bbaa9f824fb1079ab41c9
    • Opcode Fuzzy Hash: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
    • Instruction Fuzzy Hash: 393180B5900301ABCB10AF71C985A1BF7E8AF84755F10891EF85497392C739FC45CB68
    APIs
    • GetParent.USER32(?), ref: 004505BF
    • DefDlgProcW.USER32(?,00000138,?,?,004A83D8,?,004A83D8,?), ref: 00450610
    • DefDlgProcW.USER32(?,00000133,?,?,004A83D8,?,004A83D8,?), ref: 0045065A
    • DefDlgProcW.USER32(?,00000134,?,?,004A83D8,?,004A83D8,?), ref: 00450688
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Proc$Parent
    • String ID:
    • API String ID: 2351499541-0
    • Opcode ID: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
    • Instruction ID: e3e31f905615dd8bfbe674c7a91f48f64006a8638b4dc9b760805e547d05c650
    • Opcode Fuzzy Hash: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
    • Instruction Fuzzy Hash: 8C3128362411006BC2209B299C58DBB7B58EBC7336F14465BFA54832D3CB769826C768
    APIs
      • Part of subcall function 00438C85: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00438C95
      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
    • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 00461420
    • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 0046144F
    • __itow.LIBCMT ref: 00461461
    • __itow.LIBCMT ref: 004614AB
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$__itow$_wcslen
    • String ID:
    • API String ID: 2875217250-0
    • Opcode ID: 82b5a91de389f3ed99ce10dfea336eb0a106409adacd96f57f902ff0f5c50cc9
    • Instruction ID: e79f257049278b8cb2759ef4fb2c338f5c267666469b61911c1ede6aa8d1a802
    • Opcode Fuzzy Hash: 82b5a91de389f3ed99ce10dfea336eb0a106409adacd96f57f902ff0f5c50cc9
    • Instruction Fuzzy Hash: A3216D7270031067D200BE169C86FAFB794EB94714F48043FFE00AB141EA69E94687EB
    APIs
    • _memset.LIBCMT ref: 0040E202
    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: IconNotifyShell__memset
    • String ID:
    • API String ID: 928536360-0
    • Opcode ID: 28e982a20f1f395b00174df5a3410fef7b9b47565da835109e87ded28aa3a174
    • Instruction ID: 78b4575d80434d0c6f25efcc2626706039a9295b791a6152a92a9d33d5007447
    • Opcode Fuzzy Hash: 28e982a20f1f395b00174df5a3410fef7b9b47565da835109e87ded28aa3a174
    • Instruction Fuzzy Hash: 93318F70608701DFE320CF25D845B97BBE8BB55304F00886EE99A93390E778A958CF5A
    APIs
    • GetForegroundWindow.USER32 ref: 00472806
      • Part of subcall function 00443EEF: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 00443F11
      • Part of subcall function 00443EEF: GetCurrentThreadId.KERNEL32 ref: 00443F18
      • Part of subcall function 00443EEF: AttachThreadInput.USER32(00000000), ref: 00443F1F
    • GetCaretPos.USER32(?), ref: 0047281A
    • ClientToScreen.USER32(00000000,?), ref: 00472856
    • GetForegroundWindow.USER32 ref: 0047285C
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
    • String ID:
    • API String ID: 2759813231-0
    • Opcode ID: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
    • Instruction ID: 38f02bd9b1f6bed34cfa7ce2d7f69328ba3456287a0ba45db7850a86b8391dd2
    • Opcode Fuzzy Hash: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
    • Instruction Fuzzy Hash: FF2195716403056FE310EF65CC42F5BB7E8AF84708F144D2EF544AB282D6FAB9858795
    APIs
      • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
    • GetWindowLongW.USER32(?,000000EC), ref: 0047728E
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772A9
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772C0
    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772D0
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Window$Long$AttributesLayered
    • String ID:
    • API String ID: 2169480361-0
    • Opcode ID: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
    • Instruction ID: faea1ea985e506ac999786301d765d91882fdca708237d94abe4bce3661c65f1
    • Opcode Fuzzy Hash: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
    • Instruction Fuzzy Hash: 5F11B431205510ABD310FB29DD45F9BB798FF91720F10862EF455E72E2C7A8AC45C7A8
    APIs
    • SendMessageW.USER32 ref: 00448CB8
    • GetWindowLongW.USER32(?,000000EC), ref: 00448CE0
    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448D19
    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D62
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend$LongWindow
    • String ID:
    • API String ID: 312131281-0
    • Opcode ID: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
    • Instruction ID: 9d6bf2a2f0cb0d5184a29e15ea511504db1ac53b4253ca88fa0f688086887250
    • Opcode Fuzzy Hash: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
    • Instruction Fuzzy Hash: B12174715053019BF3208F18D98879FB7E4FBD5325F140B2EF594962D0DBB58449C796
    APIs
    • select.WSOCK32 ref: 0045890A
    • __WSAFDIsSet.WSOCK32(00000000,00000000), ref: 00458919
    • accept.WSOCK32(00000000,00000000,00000000,00000000,00000000), ref: 00458927
    • WSAGetLastError.WSOCK32(00000000), ref: 00458952
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ErrorLastacceptselect
    • String ID:
    • API String ID: 385091864-0
    • Opcode ID: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
    • Instruction ID: 93f38c3b8a65fd8a68e5265ae944391143789c71a4918893f245a539b4228a7d
    • Opcode Fuzzy Hash: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
    • Instruction Fuzzy Hash: 1F2166712043019BD314EF29C842BABB7E5AFC4714F144A2EF994DB2C1DBB4A985CB99
    APIs
    • SendMessageW.USER32(?,000000B0,?,?), ref: 00438D6F
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D82
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D9A
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438DB4
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
    • Instruction ID: 707762f1bc06eebb59e9357f9c77b20c0e090dcf7cedc03b298b4f863176c0ea
    • Opcode Fuzzy Hash: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
    • Instruction Fuzzy Hash: 77113AB6204305AFD210EF58DC84F6BF7E8EBE8750F20491EF580D7290D6B1A8468BA1
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 004441B8
    • MessageBoxW.USER32(?,?,?,?), ref: 004441F6
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0044420C
    • CloseHandle.KERNEL32(00000000), ref: 00444213
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
    • String ID:
    • API String ID: 2880819207-0
    • Opcode ID: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
    • Instruction ID: a177bb78e812b0c83f085b16f259857c8a511f23e32e5024349264f8b0df3d09
    • Opcode Fuzzy Hash: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
    • Instruction Fuzzy Hash: C401E5364183105BD300DB28ED08A9BBBD8BFD9721F18067EF89893351E6B48948C7B6
    APIs
    • GetWindowRect.USER32(?,?), ref: 00434037
    • ScreenToClient.USER32(?,?), ref: 0043405B
    • ScreenToClient.USER32(?,?), ref: 00434085
    • InvalidateRect.USER32(?,?,?), ref: 004340A4
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ClientRectScreen$InvalidateWindow
    • String ID:
    • API String ID: 357397906-0
    • Opcode ID: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
    • Instruction ID: 02545dd0d615a745195cb6f618e51c1f9c2552a202a2369b8695847d2ce6fb2f
    • Opcode Fuzzy Hash: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
    • Instruction Fuzzy Hash: 24117EB9608302AFC304DF18D98095BBBE9FFD8650F10891EF88993350D770E9498BA2
    APIs
    • __wsplitpath.LIBCMT ref: 00436A45
      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
    • __wsplitpath.LIBCMT ref: 00436A6C
    • __wcsicoll.LIBCMT ref: 00436A93
    • __wcsicoll.LIBCMT ref: 00436AB0
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
    • String ID:
    • API String ID: 1187119602-0
    • Opcode ID: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
    • Instruction ID: cc447ddabc085245cf6c6bda96777749177fc915bba42f20b5b260b799017f3a
    • Opcode Fuzzy Hash: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
    • Instruction Fuzzy Hash: 690165B64043416BD724EB50D881EEBB3ED7BD8304F04C91EB5C982041FB38D24C87A6
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _wcslen$_malloc_wcscat_wcscpy
    • String ID:
    • API String ID: 1597257046-0
    • Opcode ID: 706683571849ac002a7b20560e5bb3d288224cd9b4b4795e270b1b1483253cbe
    • Instruction ID: 9df5ee2dcc5f1a759a9cde70f7b42babd8a8bdcc369222b22224423102f690bd
    • Opcode Fuzzy Hash: 706683571849ac002a7b20560e5bb3d288224cd9b4b4795e270b1b1483253cbe
    • Instruction Fuzzy Hash: BFF06D32200200AFC314EB66C885E6BB3EAEBC5324F04852EF556C7791DB39F841C764
    APIs
    • DeleteObject.GDI32(?), ref: 0045564E
    • DeleteObject.GDI32(?), ref: 0045565C
    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: DeleteDestroyObject$IconWindow
    • String ID:
    • API String ID: 3349847261-0
    • Opcode ID: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
    • Instruction ID: 3a9029eb8e47786e7dec82746d504bb216afab776d143f23dce7b1a7602128e4
    • Opcode Fuzzy Hash: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
    • Instruction Fuzzy Hash: 06F03C702006419BDB20AF65DDD8A2B77ACEF45322740456AFD04D7242DB28DC498B7D
    APIs
    • EnterCriticalSection.KERNEL32(?), ref: 0044B60B
    • InterlockedExchange.KERNEL32(?,?), ref: 0044B619
    • LeaveCriticalSection.KERNEL32(?), ref: 0044B630
    • LeaveCriticalSection.KERNEL32(?), ref: 0044B641
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CriticalSection$Leave$EnterExchangeInterlocked
    • String ID:
    • API String ID: 2223660684-0
    • Opcode ID: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
    • Instruction ID: 8f2921e390180aa9c6083979f061463a0462abb68b72a76a452ff5fd2bc04521
    • Opcode Fuzzy Hash: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
    • Instruction Fuzzy Hash: 35F08C362422019F82249B59EA488DBB3FDEBE97213009C2FE142C32108BB5F806CB75
    APIs
      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
    • MoveToEx.GDI32(?,?,00000000,00000000), ref: 0044728F
    • LineTo.GDI32(?,00000000,00000002), ref: 004472A0
    • EndPath.GDI32(?), ref: 004472B0
    • StrokePath.GDI32(?), ref: 004472BE
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
    • String ID:
    • API String ID: 2783949968-0
    • Opcode ID: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
    • Instruction ID: 15f667079dd022c0076d5117e5ffb33549464faf874781034dcdd6a9c0a79bb3
    • Opcode Fuzzy Hash: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
    • Instruction Fuzzy Hash: 46F09030109361BFE211DB10DC0AF9F3B98AB46310F10490CF641622D2C7B46845C7BA
    APIs
    • __getptd.LIBCMT ref: 00417D1A
      • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
      • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
    • __getptd.LIBCMT ref: 00417D31
    • __amsg_exit.LIBCMT ref: 00417D3F
    • __lock.LIBCMT ref: 00417D4F
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
    • String ID:
    • API String ID: 3521780317-0
    • Opcode ID: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
    • Instruction ID: 784cd6646040312d8c3929352b57c791f513dbd9ce30c249d09a92555f0e5bc7
    • Opcode Fuzzy Hash: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
    • Instruction Fuzzy Hash: D4F06D319447089AD720FB66E4067EA32B0AF01728F11856FA4415B7D2DB3C99C08B9E
    APIs
    • GetDesktopWindow.USER32 ref: 00471144
    • GetDC.USER32(00000000), ref: 0047114D
    • GetDeviceCaps.GDI32(00000000,00000074), ref: 0047115A
    • ReleaseDC.USER32(00000000,?), ref: 0047117B
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CapsDesktopDeviceReleaseWindow
    • String ID:
    • API String ID: 2889604237-0
    • Opcode ID: 7ae98ec32e7ecb3b3dcce3fa0880a21cdfb03288fed431c6a5b9678045c56ed1
    • Instruction ID: a1da8b046b56c0024f4e51319ca7c868ce9b42ab557c4db2e47d6af70bf9fcef
    • Opcode Fuzzy Hash: 7ae98ec32e7ecb3b3dcce3fa0880a21cdfb03288fed431c6a5b9678045c56ed1
    • Instruction Fuzzy Hash: 75F05E759042009FC310DF65DC4856EBBA4FB94351F108C3EFD05D2251DB7889059B99
    APIs
    • GetDesktopWindow.USER32 ref: 00471102
    • GetDC.USER32(00000000), ref: 0047110B
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00471118
    • ReleaseDC.USER32(00000000,?), ref: 00471139
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CapsDesktopDeviceReleaseWindow
    • String ID:
    • API String ID: 2889604237-0
    • Opcode ID: 41434c3b42d332ea2a6b4c6b6e148f7a1c007d00225415fbbd0f1b44bd974321
    • Instruction ID: 5204c471e266b2ed5cdb435334cd6f206910ee07043e0bb223494c3f632f6575
    • Opcode Fuzzy Hash: 41434c3b42d332ea2a6b4c6b6e148f7a1c007d00225415fbbd0f1b44bd974321
    • Instruction Fuzzy Hash: 78F05E759042009FD310EF65DC5896EBBA4FB94351F104C3EFC05D2251DB7489059B99
    APIs
    • SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
    • GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
    • GetCurrentThreadId.KERNEL32 ref: 004389DA
    • AttachThreadInput.USER32(00000000), ref: 004389E1
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
    • String ID:
    • API String ID: 2710830443-0
    • Opcode ID: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
    • Instruction ID: 438da6915ae72ab6a15f098678a9856147cbf2dc0a85cf0a700465948addd5b0
    • Opcode Fuzzy Hash: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
    • Instruction Fuzzy Hash: 14E012712853107BE72157509D0EFAF7B98AF18B11F14481EB241B50D0DAF8A941876E
    APIs
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004390CD
    • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 004390DB
    • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390EB
    • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390F0
      • Part of subcall function 00438FB6: GetProcessHeap.KERNEL32(00000000,?,00439504,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FC1
      • Part of subcall function 00438FB6: HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00438FC8
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
    • String ID:
    • API String ID: 146765662-0
    • Opcode ID: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
    • Instruction ID: e19b07cb6d87eea3d85dfea562759309df1919ba68b29a0146d7a5ec0ea3c710
    • Opcode Fuzzy Hash: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
    • Instruction Fuzzy Hash: 5DE0C976504311ABC620EB65DC48C4BB7E9EF883303114E1DF89693260CA74E881CB65
    APIs
    • __IsNonwritableInCurrentImage.LIBCMT ref: 00414070
      • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
    • __getptd_noexit.LIBCMT ref: 00414080
    • __freeptd.LIBCMT ref: 0041408A
    • ExitThread.KERNEL32 ref: 00414093
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
    • String ID:
    • API String ID: 3182216644-0
    • Opcode ID: 8d36a13342db4b304ef8dc93753bb3a2c99bc8fcde715e5eb4386f703f5cc90b
    • Instruction ID: 8c1b811a677bc0208766d104aadce1409d27245c16b3af4a320e27a455eae914
    • Opcode Fuzzy Hash: 8d36a13342db4b304ef8dc93753bb3a2c99bc8fcde715e5eb4386f703f5cc90b
    • Instruction Fuzzy Hash: F8D0EC7051024256D6207BA7ED097AA3A589B44B26B15446EA905801B1DF68D9C1862D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: BuffCharLower
    • String ID: $8'I
    • API String ID: 2358735015-3608026889
    • Opcode ID: 92e89182e83a79fcc858795c6dd2800d1cbafad6e1dd1b39fc05f9b242ff8c38
    • Instruction ID: a7f8098a2e281a9e8ed4437609b5b9db9d0b1a05940209186128a042e7efa40d
    • Opcode Fuzzy Hash: 92e89182e83a79fcc858795c6dd2800d1cbafad6e1dd1b39fc05f9b242ff8c38
    • Instruction Fuzzy Hash: C3E1AE745043018BCB24EF16D88166BB7E4BF94348F40482FF88597292EB79DD89CB9B
    APIs
    • OleSetContainedObject.OLE32(00000000,00000001), ref: 0047857A
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
      • Part of subcall function 00445513: OleSetContainedObject.OLE32(?,00000000), ref: 00445593
      • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(0425A7C0,?), ref: 00478270
      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(0425A7A0,?), ref: 00478287
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: CopyVariant$ContainedObject$ErrorLast_malloc
    • String ID: AutoIt3GUI$Container
    • API String ID: 3380330463-3941886329
    • Opcode ID: a9f97b6700f357a03770d98d5d55076cc5e2169ba658a06b5870c4020d3518f4
    • Instruction ID: 8a51a4197b359b89da059ec4b883cd23719ad159cb4f439b8c2c8f5fea4c1b32
    • Opcode Fuzzy Hash: a9f97b6700f357a03770d98d5d55076cc5e2169ba658a06b5870c4020d3518f4
    • Instruction Fuzzy Hash: FEA16A71240601AFC760EF69C880A6BB7E9FB88304F10892EF649CB361EB75E945CB55
    APIs
    • _wcslen.LIBCMT ref: 00409A61
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
    • CharUpperBuffW.USER32(?,?), ref: 00409AF5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
    • String ID: 0vH
    • API String ID: 1143807570-3662162768
    • Opcode ID: 10c5275b8b330f51518c97c620ea634175a8f57747cbee5f09d277a5a38459b6
    • Instruction ID: 5e67718e4417cbef977f4cc7974cb0b4b39b480e5382bb1977b3cac956c07efc
    • Opcode Fuzzy Hash: 10c5275b8b330f51518c97c620ea634175a8f57747cbee5f09d277a5a38459b6
    • Instruction Fuzzy Hash: 53515BB1A083009FC718CF18C48065BB7E1FF88314F54856EF9999B391D779E942CB96
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: HH$HH
    • API String ID: 0-1787419579
    • Opcode ID: 98e4e0c4654e9ee883f2d5525bee4943381c7dbfa94550294b5631a05538f410
    • Instruction ID: b2aab3850ea6996be17d3b26b1a0d96f4757dd5de2ef7d298d9c2790e2b3b10f
    • Opcode Fuzzy Hash: 98e4e0c4654e9ee883f2d5525bee4943381c7dbfa94550294b5631a05538f410
    • Instruction Fuzzy Hash: 1241BF367042009FC310EF69E881F5AF3A1EF99314F548A6EFA589B381D776E811CB95
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: InfoItemMenu_memset
    • String ID: 0
    • API String ID: 2223754486-4108050209
    • Opcode ID: ce65c440bf80129bbcc6313e77cf80a090ba972ba66f63425b345c08c22ab5c4
    • Instruction ID: 143d79469fb3e570aa9bb1e7a79db7ad77638f8ab3c2e89d41e08a42c99b444e
    • Opcode Fuzzy Hash: ce65c440bf80129bbcc6313e77cf80a090ba972ba66f63425b345c08c22ab5c4
    • Instruction Fuzzy Hash: CB3101721043009BF3249F18DC85BABBBE4EBC6310F14081FFA90C62A0E379D949C75A
    APIs
    • SendMessageW.USER32(?,00001132,00000000,?), ref: 0044846C
    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044847E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: '
    • API String ID: 3850602802-1997036262
    • Opcode ID: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
    • Instruction ID: cecdca06d5aa7ecc7109d5e1ff25192cbd540bafe2d1ef24ff7c1b98f096cb5f
    • Opcode Fuzzy Hash: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
    • Instruction Fuzzy Hash: 984179706083459FE710CF18C880BABB7E1FB89700F54882EF9888B351DB75A841CF5A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 420c90eefbee66cb17fc96aafe5d6c7f289d0dc3198559550cdedb7fe84e5db0
    • Instruction ID: 268d240ecd79f719a1425e83c09d650ed443e1bf0ac8ef4f8d51517adc50c1d2
    • Opcode Fuzzy Hash: 420c90eefbee66cb17fc96aafe5d6c7f289d0dc3198559550cdedb7fe84e5db0
    • Instruction Fuzzy Hash: B6210D765042206BEB15DF08D844B97B7A4FBDA310F44492BEE9897250D379E848C7AA
    APIs
    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00451305
    • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00451313
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: Combobox
    • API String ID: 3850602802-2096851135
    • Opcode ID: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
    • Instruction ID: f266216a818347eeb58d59163185d0479ace604409515c443b0f4894c7ad90f2
    • Opcode Fuzzy Hash: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
    • Instruction Fuzzy Hash: D9110A72A0430067E6109AA4DC80F5BB3D8EB99735F10071BFA24E72E1D774FC448768
    APIs
    • GetWindowTextLengthW.USER32(00000000), ref: 004515DA
    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004515EA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: LengthMessageSendTextWindow
    • String ID: edit
    • API String ID: 2978978980-2167791130
    • Opcode ID: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
    • Instruction ID: b80de1f22085cd2d24dcce0fe83431d10f7d2aff66e66183492c5b70af3c9e13
    • Opcode Fuzzy Hash: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
    • Instruction Fuzzy Hash: 2011E4716003006BD6109A64D884F6BB3DCEBD8335F104B1EFA61D32E1D779EC458729
    APIs
    • Sleep.KERNEL32(00000000), ref: 00474833
    • GlobalMemoryStatusEx.KERNEL32 ref: 00474846
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: GlobalMemorySleepStatus
    • String ID: @
    • API String ID: 2783356886-2766056989
    • Opcode ID: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
    • Instruction ID: 41c327e25453105c4ca6c880754d33c67e761007402a238c65fd2e715fefe222
    • Opcode Fuzzy Hash: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
    • Instruction Fuzzy Hash: 4421C230929A14B7C2107F6ABD4BB5E7BB8AF44716F008C5DF5C562094DF785268836F
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: htonsinet_addr
    • String ID: 255.255.255.255
    • API String ID: 3832099526-2422070025
    • Opcode ID: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
    • Instruction ID: e3b5e028fda38c0aed97ec3d425ece65e45bc088e5f3683a6f0e3ee8de0e9224
    • Opcode Fuzzy Hash: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
    • Instruction Fuzzy Hash: 6F11253620030057DA10EB69C882F9BB394EFC4728F00896BFA105B283D679F45A832E
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469547
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 455545452-1403004172
    • Opcode ID: 2a5f42d5cc913dcbf403e63d26cd6d285d0c654fd31940a47a01bab376d2f8ef
    • Instruction ID: d7878a024921556205560296ec06e6abf53b779169672b4943ab7ad66f70e2c7
    • Opcode Fuzzy Hash: 2a5f42d5cc913dcbf403e63d26cd6d285d0c654fd31940a47a01bab376d2f8ef
    • Instruction Fuzzy Hash: 2601D6327011106B8600BB299C019AFB39DDBC2370F544A2FF965573D1EA39AC0E476A
    APIs
    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00442B8C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: InternetOpen
    • String ID: <local>
    • API String ID: 2038078732-4266983199
    • Opcode ID: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
    • Instruction ID: 525aca290fb55aeb65c4bf55ca0deee88c9418ef2a1db54778758d1eb2e06c8a
    • Opcode Fuzzy Hash: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
    • Instruction Fuzzy Hash: 9011A934144751AAF621DF108D86FB77794FB50B01F50480FF9866B2C0D6F4B848C766
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • SendMessageW.USER32(00000000,00000180,00000000,00000000), ref: 00469660
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 455545452-1403004172
    • Opcode ID: 389634397486f263f9664091ac854bf3d5cc0d0d4bfabdb75198ab1caf064492
    • Instruction ID: 486d2595d5a7427da4a9c048e684990a8dc9cac685a8154682435d05c4426571
    • Opcode Fuzzy Hash: 389634397486f263f9664091ac854bf3d5cc0d0d4bfabdb75198ab1caf064492
    • Instruction Fuzzy Hash: A101D87274121027C600BA259C01AEBB39CEB96354F04443BF94597291EA6DED0E43AA
    APIs
      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
    • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 004695D6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 455545452-1403004172
    • Opcode ID: fcd37a8ca242b19b50ca36153cbb95c8cae2390e12dca1dcf6e49807b7ddf919
    • Instruction ID: 72d13aeac174e9c1a3a177398698555a642000804846b33da1492f44d6438514
    • Opcode Fuzzy Hash: fcd37a8ca242b19b50ca36153cbb95c8cae2390e12dca1dcf6e49807b7ddf919
    • Instruction Fuzzy Hash: 4D01A77374111067C610BA6A9C01AEB739CABD2364F44443BF94597292EA7DED0E43AA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _strncmp
    • String ID: ,$UTF8)
    • API String ID: 909875538-2632631837
    • Opcode ID: 727c7c5760fb27673dbb24875b26f121239a8201232c39922ad2fa80f7f85d54
    • Instruction ID: 35c0b5e4e6bd282640ba12729024cfd3588da47ca1ed1c49f01331a057b7ec9b
    • Opcode Fuzzy Hash: 727c7c5760fb27673dbb24875b26f121239a8201232c39922ad2fa80f7f85d54
    • Instruction Fuzzy Hash: 7601B575A083805BE720DE20CC85BA773A1AB81319F58492ED8D5872A1F73DD449C75B
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: _strncmp
    • String ID: ,$UTF8)
    • API String ID: 909875538-2632631837
    • Opcode ID: abd9c85c193eb76a615b38e8260140970f327620044c052ec7ea970ca86f7e2a
    • Instruction ID: b3c6803870d1b21283bf32431af321d4190ac902c568a1d8b2e557ddf245ca97
    • Opcode Fuzzy Hash: abd9c85c193eb76a615b38e8260140970f327620044c052ec7ea970ca86f7e2a
    • Instruction Fuzzy Hash: 1E01D875A043805BE720DE20CC85B6773A19B4131AF68492FD8D6872A1F73DD449C75B
    APIs
    • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560BA
      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
    • wsprintfW.USER32 ref: 004560E9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: MessageSend_mallocwsprintf
    • String ID: %d/%02d/%02d
    • API String ID: 1262938277-328681919
    • Opcode ID: ae0d00370480c3e25b1e00bef44ab8e9cb382fa1ad95aa9018207b56710a469a
    • Instruction ID: 2a73c44ac592e0fe880a68d863bd42ca8887a008949f121bccc13d44bcf2ebb3
    • Opcode Fuzzy Hash: ae0d00370480c3e25b1e00bef44ab8e9cb382fa1ad95aa9018207b56710a469a
    • Instruction Fuzzy Hash: 13F08272744220A7E2105BA5AC01BBFB3D4EB84762F10443BFE44D12C0E66E8455D7BA
    APIs
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0044226C
    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0044227F
      • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FindMessagePostSleepWindow
    • String ID: Shell_TrayWnd
    • API String ID: 529655941-2988720461
    • Opcode ID: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
    • Instruction ID: f0ed9326d30a696a9ade51716a531e8bd1705000bbe21894ac7a57cb5589152b
    • Opcode Fuzzy Hash: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
    • Instruction Fuzzy Hash: 71D0A772F8130177E92077706D0FFCB26246F14710F010C3AB305AA1C0D4E8D440C358
    APIs
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00442240
    • PostMessageW.USER32(00000000), ref: 00442247
      • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: FindMessagePostSleepWindow
    • String ID: Shell_TrayWnd
    • API String ID: 529655941-2988720461
    • Opcode ID: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
    • Instruction ID: d1e5b9be119239975405e397b0c0efdc35250005003305bf123d4268f2ecb06f
    • Opcode Fuzzy Hash: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
    • Instruction Fuzzy Hash: 4DD05E72B813013BE92076706D0FF8B26246B14710F010C2AB205AA1C0D4E8A4408358
    APIs
    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00439522
      • Part of subcall function 00411A1F: _doexit.LIBCMT ref: 00411A2B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3362293437.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3362279722.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362338925.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362355369.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3362388465.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_AutoClicker-3.jbxd
    Similarity
    • API ID: Message_doexit
    • String ID: AutoIt$Error allocating memory.
    • API String ID: 1993061046-4017498283
    • Opcode ID: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
    • Instruction ID: 5d68346425d2699d55792fe39b85c2381918ba1f955abba655776c5540820644
    • Opcode Fuzzy Hash: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
    • Instruction Fuzzy Hash: 82B092343C038627E20437A01C0BF8C28049B64F42F220C2AB308384D259D90080231E