Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Rage.exe

Overview

General Information

Sample name:Rage.exe
Analysis ID:1577496
MD5:ca817109712a3e97bf8026cdc810743d
SHA1:961478cdfe1976d5cc30ceca7db9b3552b8aaf09
SHA256:6badd865383f71c6d26322fcf3b6b94a5a511981fcb04c8452ff20c8528e0059
Tags:18521511316185215113209bulletproofexeGuLoaderuser-abus3reports
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found API chain indicative of sandbox detection
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Rage.exe (PID: 2884 cmdline: "C:\Users\user\Desktop\Rage.exe" MD5: CA817109712A3E97BF8026CDC810743D)
    • AutoIt3.exe (PID: 6436 cmdline: "C:\ProgramData\wvtynvwe\AutoIt3.exe" C:\ProgramData\wvtynvwe\clxs.a3x MD5: 0ADB9B817F1DF7807576C2D7068DD931)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Rage.exeAvira: detected
Source: Rage.exeReversingLabs: Detection: 52%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: Rage.exeJoe Sandbox ML: detected
Source: Rage.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Rage.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_00406245 FindFirstFileA,FindClose,0_2_00406245
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_0040570A GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040570A
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0028A0FA SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0028A0FA
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027E387 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_0027E387
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0028A488 FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_0028A488
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002865F1 FindFirstFileW,FindNextFileW,FindClose,1_2_002865F1
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0024C642 FindFirstFileExW,1_2_0024C642
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00287248 FindFirstFileW,FindClose,1_2_00287248
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00287247 FindFirstFileW,1_2_00287247
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002872E9 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_002872E9
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027D836 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0027D836
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027DB69 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0027DB69
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00289F9F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00289F9F
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0028D7A1 InternetReadFile,SetEvent,GetLastError,SetEvent,1_2_0028D7A1
Source: AutoIt3.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: AutoIt3.exe.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: AutoIt3.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: AutoIt3.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
Source: AutoIt3.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: Rage.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: Rage.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: AutoIt3.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: AutoIt3.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
Source: AutoIt3.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: AutoIt3.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: AutoIt3.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: AutoIt3.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
Source: Rage.exe, 00000000.00000002.2056097910.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exe, 00000001.00000000.2055005198.00000000002E5000.00000002.00000001.01000000.00000005.sdmp, AutoIt3.exe.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: AutoIt3.exe.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
Source: AutoIt3.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_004051A7 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004051A7
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0028F6C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_0028F6C7
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0028F45C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_0028F45C
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027A54A GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,1_2_0027A54A
Source: AutoIt3.exe, 00000001.00000003.2111337921.0000000003AA3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _WINAPI_REGISTERRAWINPUTDEVICES-#memstr_4591a5ae-0
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002A9ED5 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_002A9ED5
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00284678: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,1_2_00284678
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00271A91 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_00271A91
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_004031CE EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,CoUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031CE
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027F122 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_0027F122
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_004049E60_2_004049E6
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002380371_2_00238037
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002320071_2_00232007
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0022E0BE1_2_0022E0BE
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0021E1A01_2_0021E1A0
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0021225D1_2_0021225D
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0024A28E1_2_0024A28E
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002322C21_2_002322C2
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0022C59E1_2_0022C59E
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0029C7A31_2_0029C7A3
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0024E89F1_2_0024E89F
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0028291A1_2_0028291A
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00246AFB1_2_00246AFB
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00278B271_2_00278B27
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0023CE301_2_0023CE30
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002471691_2_00247169
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002A51D21_2_002A51D2
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002192401_2_00219240
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002194991_2_00219499
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002317241_2_00231724
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00231A961_2_00231A96
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00219B601_2_00219B60
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00237BAB1_2_00237BAB
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00231D401_2_00231D40
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00237DDA1_2_00237DDA
Source: Joe Sandbox ViewDropped File: C:\ProgramData\wvtynvwe\AutoIt3.exe 98E4F904F7DE1644E519D09371B8AFCBBF40FF3BD56D76CE4DF48479A4AB884B
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: String function: 0022FD60 appears 40 times
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: String function: 00230DC0 appears 46 times
Source: Rage.exe, 00000000.00000002.2056097910.0000000000AB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs Rage.exe
Source: Rage.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal68.evad.winEXE@4/6@0/0
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0028410F GetLastError,FormatMessageW,1_2_0028410F
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_004031CE EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,CoUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031CE
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027194F AdjustTokenPrivileges,CloseHandle,1_2_0027194F
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00271F53 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_00271F53
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_00404473 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404473
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0029AFDB CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,1_2_0029AFDB
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_004020CB CoCreateInstance,MultiByteToWideChar,0_2_004020CB
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00283923 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,1_2_00283923
Source: C:\Users\user\Desktop\Rage.exeFile created: C:\Users\user\AppData\Local\Temp\nsmE8C2.tmpJump to behavior
Source: Rage.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Rage.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Rage.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Rage.exeReversingLabs: Detection: 52%
Source: C:\Users\user\Desktop\Rage.exeFile read: C:\Users\user\Desktop\Rage.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Rage.exe "C:\Users\user\Desktop\Rage.exe"
Source: C:\Users\user\Desktop\Rage.exeProcess created: C:\ProgramData\wvtynvwe\AutoIt3.exe "C:\ProgramData\wvtynvwe\AutoIt3.exe" C:\ProgramData\wvtynvwe\clxs.a3x
Source: C:\Users\user\Desktop\Rage.exeProcess created: C:\ProgramData\wvtynvwe\AutoIt3.exe "C:\ProgramData\wvtynvwe\AutoIt3.exe" C:\ProgramData\wvtynvwe\clxs.a3xJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: wsock32.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: version.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: winmm.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: mpr.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: wininet.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: userenv.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: wldp.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: ntvdm64.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: textshaping.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: wintypes.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: wintypes.dllJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Rage.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: Rage.exeStatic file information: File size 1401522 > 1048576
Source: Rage.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00215D78 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00215D78
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00260332 push edi; ret 1_2_00260333
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00230E06 push ecx; ret 1_2_00230E19
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0022DBFA push cs; iretd 1_2_0022DBFD
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0022DC00 push eax; iretd 1_2_0022DC01
Source: C:\Users\user\Desktop\Rage.exeFile created: C:\ProgramData\wvtynvwe\AutoIt3.exeJump to dropped file
Source: C:\Users\user\Desktop\Rage.exeFile created: C:\ProgramData\wvtynvwe\AutoIt3.exeJump to dropped file
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002A25A0 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_002A25A0
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0022FC8A GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_0022FC8A
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Rage.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_1-97217
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeAPI coverage: 3.6 %
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_00406245 FindFirstFileA,FindClose,0_2_00406245
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_0040570A GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040570A
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0028A0FA SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0028A0FA
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027E387 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_0027E387
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0028A488 FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_0028A488
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002865F1 FindFirstFileW,FindNextFileW,FindClose,1_2_002865F1
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0024C642 FindFirstFileExW,1_2_0024C642
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00287248 FindFirstFileW,FindClose,1_2_00287248
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00287247 FindFirstFileW,1_2_00287247
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002872E9 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_002872E9
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027D836 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0027D836
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027DB69 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0027DB69
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00289F9F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00289F9F
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00215D78 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00215D78
Source: Amcache.hve.1.drBinary or memory string: VMware
Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.1.drBinary or memory string: vmci.sys
Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.1.drBinary or memory string: VMware20,1
Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Rage.exeAPI call chain: ExitProcess graph end nodegraph_0-3316
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0028F3FF BlockInput,1_2_0028F3FF
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00213312 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00213312
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00215D78 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00215D78
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00235078 mov eax, dword ptr fs:[00000030h]1_2_00235078
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00272093 GetProcessHeap,HeapAlloc,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,CreateThread,1_2_00272093
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002429B2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_002429B2
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00230BCF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00230BCF
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00230D65 SetUnhandledExceptionFilter,1_2_00230D65
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00230FB1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00230FB1
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00271A91 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_00271A91
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00213312 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00213312
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027BB02 SendInput,keybd_event,1_2_0027BB02
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0027EBB3 mouse_event,1_2_0027EBB3
Source: C:\Users\user\Desktop\Rage.exeProcess created: C:\ProgramData\wvtynvwe\AutoIt3.exe "C:\ProgramData\wvtynvwe\AutoIt3.exe" C:\ProgramData\wvtynvwe\clxs.a3xJump to behavior
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_002713F2 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,1_2_002713F2
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00271EF3 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_00271EF3
Source: AutoIt3.exe, 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmp, AutoIt3.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: AutoIt3.exeBinary or memory string: Shell_TrayWnd
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00230A28 cpuid 1_2_00230A28
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0026E59A GetLocalTime,1_2_0026E59A
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0026E5F8 GetUserNameW,1_2_0026E5F8
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_0024BCF2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,1_2_0024BCF2
Source: C:\Users\user\Desktop\Rage.exeCode function: 0_2_004031CE EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,CoUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031CE
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe
Source: AutoIt3.exeBinary or memory string: WIN_81
Source: AutoIt3.exe, 00000001.00000003.2107581440.0000000001382000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIN_XP
Source: AutoIt3.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: AutoIt3.exeBinary or memory string: WIN_XPe
Source: AutoIt3.exeBinary or memory string: WIN_VISTA
Source: AutoIt3.exeBinary or memory string: WIN_7
Source: AutoIt3.exeBinary or memory string: WIN_8
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00292163 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_00292163
Source: C:\ProgramData\wvtynvwe\AutoIt3.exeCode function: 1_2_00291B61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,1_2_00291B61
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
2
Valid Accounts
2
Valid Accounts
2
Valid Accounts
31
Input Capture
2
System Time Discovery
Remote Services31
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Virtualization/Sandbox Evasion
LSASS Memory131
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
Access Token Manipulation
1
Disable or Modify Tools
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook12
Process Injection
21
Access Token Manipulation
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
12
Process Injection
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Deobfuscate/Decode Files or Information
Cached Domain Credentials1
Account Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Obfuscated Files or Information
DCSync1
System Owner/User Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc Filesystem2
File and Directory Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow16
System Information Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Rage.exe53%ReversingLabsWin32.Trojan.Privateloader
Rage.exe100%AviraHEUR/AGEN.1355636
Rage.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\ProgramData\wvtynvwe\AutoIt3.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.autoitscript.com/autoit3/JRage.exe, 00000000.00000002.2056097910.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exe, 00000001.00000000.2055005198.00000000002E5000.00000002.00000001.01000000.00000005.sdmp, AutoIt3.exe.0.drfalse
    high
    http://upx.sf.netAmcache.hve.1.drfalse
      high
      http://nsis.sf.net/NSIS_ErrorRage.exefalse
        high
        http://nsis.sf.net/NSIS_ErrorErrorRage.exefalse
          high
          https://www.autoitscript.com/autoit3/AutoIt3.exe.0.drfalse
            high
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1577496
            Start date and time:2024-12-18 14:26:24 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 3m 28s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:3
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Rage.exe
            Detection:MAL
            Classification:mal68.evad.winEXE@4/6@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 72
            • Number of non-executed functions: 313
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): dllhost.exe
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: Rage.exe
            No simulations
            No context
            No context
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\ProgramData\wvtynvwe\AutoIt3.execopia111224mp.htaGet hashmaliciousUnknownBrowse
              FX6KTgnipP.exeGet hashmaliciousFormBookBrowse
                uhbrQkYNzx.exeGet hashmaliciousFormBookBrowse
                  qPLzfnxGbj.exeGet hashmaliciousFormBookBrowse
                    ngPebbPhbp.exeGet hashmaliciousRHADAMANTHYSBrowse
                      FS04dlvJrq.exeGet hashmaliciousFormBookBrowse
                        M1Y6kc9FpE.exeGet hashmaliciousFormBookBrowse
                          mJIvCBk5vF.exeGet hashmaliciousFormBookBrowse
                            lcbF0sywlU.exeGet hashmaliciousFormBookBrowse
                              Process:C:\ProgramData\wvtynvwe\AutoIt3.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):622080
                              Entropy (8bit):7.9997308156842095
                              Encrypted:true
                              SSDEEP:12288:VmDWsllXiXi1W6/qvdYO0q2OIaFdI0bYkqmYdGGWQYt:VmVlXiAO+nOIaHYdGac
                              MD5:DBF76F233EFEB642BDF11A19274F1024
                              SHA1:DE7704F63F2D59545348665A81CF8C04DCE3B5E4
                              SHA-256:268ADE4ED11213FAFAD41161A2A3465972269EF1132095E798FE1E59FF15054C
                              SHA-512:35A09918FDC969380D2F225F0FCE9944290D3B2F6443A8B9F0B0D3551B5F3AEDCA78BFBC53FA59596C28316D910E073A09E0855BDA16508DBBBEA8EE05E450F1
                              Malicious:false
                              Reputation:low
                              Preview:..l...~I...LJ..2....9N'...|.B0.q...../...k......N..1/.M S...GaU.x....+..2C..j..#7..W.(.j...";..J._%.....W...<)..u..t8.~L.+...2G[......x....9&.G..5.b..k./..7N...).?..Z....3.....Q...a.(`..._f-.n......A.7.5..;..[..;.gA.f../t.#b....%..O:....=.*..qu.EE......p...>Dym.5.....&..a..a....E........ p....Y*.....79.?.....u...S......H..Z.....=WGM..9...[U..u$H0.."pC.?.Y...U.*....I'.N._R,.fo5..:......Yr~...'.{2%......+.5..e.Z...Jmp.....Tz.vL.....k^ D..u.m!].wA......7....A..Hnq...f7..._...]r.......Oo..Q..T...Y.....7<H.....L..T...gajT.s{.}....P.>.A. ....J..7.E....m)(.$.w.;..~....B..7w2.....n..m.......c.......N..vi.k...2....U...7\...)Q.6..O.....Y..$......Wk.a...os.f....i..6.7.k.i..{x.....V!.....qC9e.~_..-..W..3<.Pt3..{......A....1m...N...+g.......5.b2........a.!...Tx.MJ ..>..V.....T.F.h.`..NN..{...x.8..|.(.~...>.$..I..].....X.....C.|..|m.s..xy.n..&.$`.x......mZ.7..c.....sLs<|8.p..=h.F.x[._^. 2W.2.?q)m.n.#.m...........1I..|..6m.IG3F`.>....m...<8.?..@.{...
                              Process:C:\Users\user\Desktop\Rage.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):947288
                              Entropy (8bit):6.629681466265794
                              Encrypted:false
                              SSDEEP:24576:fYgAon+KfqNbXD2XJ2PH1ddATgs/u2kaCB+l:f37+KSbq5e1diEnHaCK
                              MD5:0ADB9B817F1DF7807576C2D7068DD931
                              SHA1:4A1B94A9A5113106F40CD8EA724703734D15F118
                              SHA-256:98E4F904F7DE1644E519D09371B8AFCBBF40FF3BD56D76CE4DF48479A4AB884B
                              SHA-512:883AA88F2DBA4214BB534FBDAF69712127357A3D0F5666667525DB3C1FA351598F067068DFC9E7C7A45FED4248D7DCA729BA4F75764341E47048429F9CA8846A
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: copia111224mp.hta, Detection: malicious, Browse
                              • Filename: FX6KTgnipP.exe, Detection: malicious, Browse
                              • Filename: uhbrQkYNzx.exe, Detection: malicious, Browse
                              • Filename: qPLzfnxGbj.exe, Detection: malicious, Browse
                              • Filename: ngPebbPhbp.exe, Detection: malicious, Browse
                              • Filename: FS04dlvJrq.exe, Detection: malicious, Browse
                              • Filename: M1Y6kc9FpE.exe, Detection: malicious, Browse
                              • Filename: mJIvCBk5vF.exe, Detection: malicious, Browse
                              • Filename: lcbF0sywlU.exe, Detection: malicious, Browse
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L...).(c.........."...............................@..................................L....@...@.......@.........................|....P..P............N..X&...0..Pv...........................C..........@............................................text...|........................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc...P....P......................@..@.reloc..Pv...0...x..................@..B................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Rage.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):250864
                              Entropy (8bit):7.999388677232713
                              Encrypted:true
                              SSDEEP:6144:ZJF8chnNsqla1cCrZlnrfH59NHE28pqRXoYWHnTfE:7FfhnNq19ND7HE28sWdno
                              MD5:0F310D0DD203531155EDB3816D108F7B
                              SHA1:5BB3EED68D98FE1D6B58593A9F94DD836910141B
                              SHA-256:49EB3055447DB8CE038E572FF2A8B48234E14590064EFB9857BBF4779BCCBCC0
                              SHA-512:BE820A8350304B355253B854B911AC5ECD6A6A544D3F71FE1093316214BDF2DE40DE38E8910499733423983F61DE2C64E95FEF5099C0852A68AC7D08994954FB
                              Malicious:false
                              Reputation:low
                              Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M........+..M...F.f.q..^,+.W.9>.r.nw.i@.../9...w.6..;..$dr..yO.n....-.....qH..O....?@....L.9"...]g....{.q_.1N(...+.................."..O...."..OkC.R......%x....}...q..U-...(....%....V..?p.h.....l)".N.#.R......v.g@6.[..G...I.h...%D'7...Y.....6(..)w....+...........7.`....8.u....h..0p.R%. X....^+.B..=H.{.X......U...+...U+.......O....B).Om.......zx.5...x...(nU.j....06.f".].X.:..).....H.}....8....tX.....=.....`.'.....?...".i('.......y.}......}...u...h.C.]2.:.....fZ:..q....D..e...o........>l..Xs.....y@$..f.....c...+.n.j(...,jJ.k.;..........r.5.m}jc'l5V.o.^....H...u.h..[c...E].O..|...}..xf.u....X.J.n..%..K..C...o?4.._?......[9..~....W.N....[5o%....$..U.c.o...:6*.J.....aT....|*e.<N.4.U..0..".[....Z.A....:....:8.=...?M.....-....]..<....{)`..`..m#b`.E.g[_..?.A...`W..~x....%&>..q.....i.iz.z.5@^.j.%.-..86.Q7Gk...j..%..s.).(3.S.%}e..-..S'...}fE.nQJ.}...-..JZ
                              Process:C:\Users\user\Desktop\Rage.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):810
                              Entropy (8bit):7.7008570368813745
                              Encrypted:false
                              SSDEEP:24:MydjnKgYFhOZsLyFze7F9PxLsPtTuPagzj:MydzZGycDq5uyg
                              MD5:D05B9A6C0174AD4C6A05720C2D44501B
                              SHA1:CABE5CD3BD6EECA163D4C95C43CE5026BA277753
                              SHA-256:153F2D0E2960CA4D2308A6EC33DF33C5F05ACFA1D99445C75B9AE14539DB2232
                              SHA-512:BAA048D004408F0297CA9DDEBBD391211925EA6F166BFFCD77DB9932AF8717EC11E3963C41B7FCA8CF34961884CCC20B491268F3B22C92D59DD134E8DB0CE2C1
                              Malicious:false
                              Reputation:low
                              Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M........+..M...F.f.q..^,+.W.9>.r.nw.i@.../9...w.6..;..$dr..yO.n....-.....qH..O....?@....L.9"...]g....x.._.1N(...+...................].......]..kC.R......%x....}...q..U-...(....%....V..?p.h.....l)".N.#.R......v.g@6.[..G...I.h...%D'7...Y.....6(..)w....+...........7.`....8.u....h..0p.R%. *....^,.B..=H.{.X............6.......?.......!...m.....?...x.5...l.s.l......u.!..r..~....%....|........(...,..#..........`.]9....*.q;..@T.(<.....>.`.S.P@....uC !l..;..&.. ..7...0i.......x..}.U.-..X.L.j.c8|#.......j..3..........G|.~.hS.u$..Z.......6.w....hI..ent...]t..XD......<.....|......l..5.M...o.1Ur.......:.i....|*..ex.5.Xx..-.\._Nq.j.....*.!..W..!.s.H?....0I.F.kF...,.....AU3!EA06
                              Process:C:\Users\user\Desktop\Rage.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):622080
                              Entropy (8bit):7.999725875866043
                              Encrypted:true
                              SSDEEP:12288:DchkQgw6LFW6dEfmeW7ixERPvLYP7hNaWTZmarRsR4o60h/fKJmk8SP8:4hyblaf2iivi3a4c49yYP8
                              MD5:160F088E0C2CFC575144BAF3C6490757
                              SHA1:BA3B72EFA7AC73BC530B512103FC4F35B78B5D9D
                              SHA-256:0D65174F3D8E4D8BC12FAD4110930C1EB4E711285366CB68A703684B0325D5E3
                              SHA-512:AA1ACC4F9B8ADE2FA821607C09BC61B539551AD87F9CE2180A84FD80FBC8E48D7669DE35516A40D2609F9972A27816FBFBB983EFBE7E8EB8519913BB437CC468
                              Malicious:false
                              Preview:..yxV.$E......v^T1..R.r.4cS...\~.....d......!c.`K$..71..I.%I@:...D.5m....g..........B.in;y:.....&...6$J..Wb..*v.<.XU.....P..*.....FH..kW}>|"..<s|f.......YO..'... ...l.q.}....U.b._...{C..=....^.~U......7iX.8.j!61.m^.K..H}.S.%u... |BeN>.t. ........%j...I..Ab..O)..r.-.K...l.e(..-+ Y.......:6........V....o..Y:.6...h6~0.1.S.......[zg...e...*r]...!.D.t.a.Ey\..&. ACy/D...n..6.M.n........~.u.^u.q4.$..s.N.r..q....... C.....|..0...V...4....H&<H.Iqrn.3P..%d....>...y..|ZL..B..P.I....../.....[.c..w.q.`k......~....(.bx.$$L.H..7N...?..hf........,.B...v.mI.0...0...mD......(_.GK..@*...C..G<"$..b. ..d.s.".-.1...;DG..7.t..@(.-.....I.Q$.%.(.2...X.P.N.3%...).|=.gb.n...K.;.3.f..2.L%......./..e..j1.5y.0.u..>F...K0.....}#&....o..=.u..v.TW.....g..^V...M.k.%]....C.K..g.q.9....G&...V..c...R..)..Pcry..n..<.:U...9Vy.(..O...J.5.&.Y.C.k..Ex...K..j!.i..&Y.....X.M.1...0l.3...:...`.v..b|..e... {|......J..y[l.....?.*.... .;6....5.2..E..x...{....9.U...q..3.
                              Process:C:\ProgramData\wvtynvwe\AutoIt3.exe
                              File Type:MS Windows registry file, NT/2000 or above
                              Category:dropped
                              Size (bytes):1835008
                              Entropy (8bit):4.418976133379459
                              Encrypted:false
                              SSDEEP:6144:ESvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNd0uhiTw:PvloTMW+EZMM6DFyn03w
                              MD5:30245D87ADCE3C0A0481509D7ABBD162
                              SHA1:F95EDD9A91212EB432F6427F04FE9CDCB4D5E611
                              SHA-256:AF43A9CDB797A46EA4F05E77572DE743BE4912F9F2A4A12AF77FE41FB3B7A371
                              SHA-512:D78905DE20A8DFFE3879F7A17CD87D0784817E7E3E2A91D853B8E7DD26EB2BF0A31602354E2AE161BCEEBA8A0FD9EEB8781034B322E6B63DB1452F1688BB8C73
                              Malicious:false
                              Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmJ.?.PQ...............................................................................................................................................................................................................................................................................................................................................W(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Entropy (8bit):7.995122468475881
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:Rage.exe
                              File size:1'401'522 bytes
                              MD5:ca817109712a3e97bf8026cdc810743d
                              SHA1:961478cdfe1976d5cc30ceca7db9b3552b8aaf09
                              SHA256:6badd865383f71c6d26322fcf3b6b94a5a511981fcb04c8452ff20c8528e0059
                              SHA512:de1c67f87a14f7f3c1416c253a117970974c82e87f94a3b176980edfef0164f2dd4621d81ca0cae95d794a2998e325137ce76ebccc5121ab005ca391efcbec3e
                              SSDEEP:24576:/cHSfhDMKnkUTgZGLvbPKqCRrLA3FcFfhk1Llhyblaf2iivi3a4c49yYPp:iSZYjUaQvbJQgFcoplMBu2/vvj4cep
                              TLSH:7A5533179D79F447CF504DBBC6B8633A5EC48AD8D8F9DB4B47C9D21278E1A27842C888
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@............/...........s.../...............+.......Rich............................PE..L...^..Y.................b....9....
                              Icon Hash:3d2e0f95332b3399
                              Entrypoint:0x4031ce
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x597FCC5E [Tue Aug 1 00:33:34 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                              Instruction
                              sub esp, 00000184h
                              push ebx
                              push esi
                              push edi
                              xor ebx, ebx
                              push 00008001h
                              mov dword ptr [esp+18h], ebx
                              mov dword ptr [esp+10h], 0040A198h
                              mov dword ptr [esp+20h], ebx
                              mov byte ptr [esp+14h], 00000020h
                              call dword ptr [004080A0h]
                              call dword ptr [0040809Ch]
                              and eax, BFFFFFFFh
                              cmp ax, 00000006h
                              mov dword ptr [007A2F4Ch], eax
                              je 00007F17546EC7E3h
                              push ebx
                              call 00007F17546EF89Ah
                              cmp eax, ebx
                              je 00007F17546EC7D9h
                              push 00000C00h
                              call eax
                              mov esi, 00408298h
                              push esi
                              call 00007F17546EF816h
                              push esi
                              call dword ptr [00408098h]
                              lea esi, dword ptr [esi+eax+01h]
                              cmp byte ptr [esi], bl
                              jne 00007F17546EC7BDh
                              push 0000000Ah
                              call 00007F17546EF86Eh
                              push 00000008h
                              call 00007F17546EF867h
                              push 00000006h
                              mov dword ptr [007A2F44h], eax
                              call 00007F17546EF85Bh
                              cmp eax, ebx
                              je 00007F17546EC7E1h
                              push 0000001Eh
                              call eax
                              test eax, eax
                              je 00007F17546EC7D9h
                              or byte ptr [007A2F4Fh], 00000040h
                              push ebp
                              call dword ptr [00408044h]
                              push ebx
                              call dword ptr [00408288h]
                              mov dword ptr [007A3018h], eax
                              push ebx
                              lea eax, dword ptr [esp+38h]
                              push 00000160h
                              push eax
                              push ebx
                              push 0079E500h
                              call dword ptr [00408178h]
                              push 0040A188h
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x84280xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3ac0000xa50.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x602d0x62003185076a5a29defdf887b84542b0b282False0.6696827168367347data6.442241024363186IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x80000x12480x140034765c826af6bd742ec098b21c19a239False0.4287109375data5.0453837222906515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xa0000x3990580x400cef4e1d3e6f981154be7da00aaf384f5unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .ndata0x3a40000x80000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x3ac0000xa500xc0052f3fab1bd39f34b7703451e89302346False0.4029947916666667data4.191234591104813IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x3ac1900x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                              RT_DIALOG0x3ac4780x100dataEnglishUnited States0.5234375
                              RT_DIALOG0x3ac5780x11cdataEnglishUnited States0.6056338028169014
                              RT_DIALOG0x3ac6980x60dataEnglishUnited States0.7291666666666666
                              RT_GROUP_ICON0x3ac6f80x14dataEnglishUnited States1.2
                              RT_MANIFEST0x3ac7100x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                              DLLImport
                              KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                              USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                              SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                              ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                              ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              No network behavior found

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:08:27:15
                              Start date:18/12/2024
                              Path:C:\Users\user\Desktop\Rage.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\Rage.exe"
                              Imagebase:0x400000
                              File size:1'401'522 bytes
                              MD5 hash:CA817109712A3E97BF8026CDC810743D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:08:27:15
                              Start date:18/12/2024
                              Path:C:\ProgramData\wvtynvwe\AutoIt3.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\ProgramData\wvtynvwe\AutoIt3.exe" C:\ProgramData\wvtynvwe\clxs.a3x
                              Imagebase:0x210000
                              File size:947'288 bytes
                              MD5 hash:0ADB9B817F1DF7807576C2D7068DD931
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Antivirus matches:
                              • Detection: 0%, ReversingLabs
                              Reputation:moderate
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:12.1%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:20.8%
                                Total number of Nodes:1315
                                Total number of Limit Nodes:17
                                execution_graph 3517 4025c4 3526 402a9f 3517->3526 3519 40263c 3520 405b53 ReadFile 3522 4025ce 3520->3522 3521 40263e 3529 405ea0 wsprintfA 3521->3529 3522->3519 3522->3520 3522->3521 3523 40264e 3522->3523 3523->3519 3525 402664 SetFilePointer 3523->3525 3525->3519 3527 405f64 17 API calls 3526->3527 3528 402ab4 3527->3528 3528->3522 3529->3519 3530 4047c4 3531 4047f0 3530->3531 3532 4047d4 3530->3532 3534 404823 3531->3534 3535 4047f6 SHGetPathFromIDListA 3531->3535 3541 405642 GetDlgItemTextA 3532->3541 3537 40480d SendMessageA 3535->3537 3538 404806 3535->3538 3536 4047e1 SendMessageA 3536->3531 3537->3534 3539 40140b 2 API calls 3538->3539 3539->3537 3541->3536 3542 402245 3543 402ac1 17 API calls 3542->3543 3544 40224b 3543->3544 3545 402ac1 17 API calls 3544->3545 3546 402254 3545->3546 3547 402ac1 17 API calls 3546->3547 3548 40225d 3547->3548 3549 406245 2 API calls 3548->3549 3550 402266 3549->3550 3551 402277 lstrlenA lstrlenA 3550->3551 3556 40226a 3550->3556 3553 405069 24 API calls 3551->3553 3552 405069 24 API calls 3554 402272 3552->3554 3555 4022b3 SHFileOperationA 3553->3555 3555->3554 3555->3556 3556->3552 3557 4028c5 3558 402a9f 17 API calls 3557->3558 3559 4028cb 3558->3559 3560 402716 3559->3560 3561 402900 3559->3561 3563 4028dd 3559->3563 3561->3560 3562 405f64 17 API calls 3561->3562 3562->3560 3563->3560 3565 405ea0 wsprintfA 3563->3565 3565->3560 3566 401746 3567 402ac1 17 API calls 3566->3567 3568 40174d 3567->3568 3569 405b0a 2 API calls 3568->3569 3570 401754 3569->3570 3570->3570 3571 401947 3572 402ac1 17 API calls 3571->3572 3573 40194e lstrlenA 3572->3573 3574 402577 3573->3574 3575 4022c7 3576 4022ce 3575->3576 3579 4022e1 3575->3579 3577 405f64 17 API calls 3576->3577 3578 4022db 3577->3578 3580 40565e MessageBoxIndirectA 3578->3580 3580->3579 3584 4020cb 3585 402ac1 17 API calls 3584->3585 3586 4020d2 3585->3586 3587 402ac1 17 API calls 3586->3587 3588 4020dc 3587->3588 3589 402ac1 17 API calls 3588->3589 3590 4020e6 3589->3590 3591 402ac1 17 API calls 3590->3591 3592 4020f0 3591->3592 3593 402ac1 17 API calls 3592->3593 3594 4020fa 3593->3594 3595 40213c CoCreateInstance 3594->3595 3596 402ac1 17 API calls 3594->3596 3599 40215b 3595->3599 3601 402206 3595->3601 3596->3595 3597 401423 24 API calls 3598 40223c 3597->3598 3600 4021e6 MultiByteToWideChar 3599->3600 3599->3601 3600->3601 3601->3597 3601->3598 3602 40414c 3603 404162 3602->3603 3611 40426e 3602->3611 3633 404003 3603->3633 3604 4042dd 3606 4043a7 3604->3606 3607 4042e7 GetDlgItem 3604->3607 3645 40406a 3606->3645 3609 404365 3607->3609 3610 4042fd 3607->3610 3608 4041b8 3613 404003 18 API calls 3608->3613 3609->3606 3618 404377 3609->3618 3610->3609 3617 404323 SendMessageA LoadCursorA SetCursor 3610->3617 3611->3604 3611->3606 3612 4042b2 GetDlgItem SendMessageA 3611->3612 3638 404025 EnableWindow 3612->3638 3616 4041c5 CheckDlgButton 3613->3616 3636 404025 EnableWindow 3616->3636 3642 4043f0 3617->3642 3622 40437d SendMessageA 3618->3622 3623 40438e 3618->3623 3619 4042d8 3639 4043cc 3619->3639 3622->3623 3624 4043a2 3623->3624 3625 404394 SendMessageA 3623->3625 3625->3624 3627 4041e3 GetDlgItem 3637 404038 SendMessageA 3627->3637 3630 4041f9 SendMessageA 3631 404220 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3630->3631 3632 404217 GetSysColor 3630->3632 3631->3624 3632->3631 3634 405f64 17 API calls 3633->3634 3635 40400e SetDlgItemTextA 3634->3635 3635->3608 3636->3627 3637->3630 3638->3619 3640 4043da 3639->3640 3641 4043df SendMessageA 3639->3641 3640->3641 3641->3604 3659 405624 ShellExecuteExA 3642->3659 3644 404356 LoadCursorA SetCursor 3644->3609 3646 404082 GetWindowLongA 3645->3646 3656 40410b 3645->3656 3647 404093 3646->3647 3646->3656 3648 4040a2 GetSysColor 3647->3648 3649 4040a5 3647->3649 3648->3649 3650 4040b5 SetBkMode 3649->3650 3651 4040ab SetTextColor 3649->3651 3652 4040d3 3650->3652 3653 4040cd GetSysColor 3650->3653 3651->3650 3654 4040e4 3652->3654 3655 4040da SetBkColor 3652->3655 3653->3652 3654->3656 3657 4040f7 DeleteObject 3654->3657 3658 4040fe CreateBrushIndirect 3654->3658 3655->3654 3656->3624 3657->3658 3658->3656 3659->3644 3266 4031ce SetErrorMode GetVersion 3267 403215 3266->3267 3268 40320f 3266->3268 3270 40626c 3 API calls 3267->3270 3269 4062da 5 API calls 3268->3269 3269->3267 3271 40322b lstrlenA 3270->3271 3271->3267 3272 40323a 3271->3272 3273 4062da 5 API calls 3272->3273 3274 403241 3273->3274 3275 4062da 5 API calls 3274->3275 3276 403248 3275->3276 3277 4062da 5 API calls 3276->3277 3278 403254 #17 OleInitialize SHGetFileInfoA 3277->3278 3357 405f42 lstrcpynA 3278->3357 3281 4032a0 GetCommandLineA 3358 405f42 lstrcpynA 3281->3358 3283 4032b2 GetModuleHandleA 3284 4032c9 3283->3284 3285 405905 CharNextA 3284->3285 3286 4032dd CharNextA 3285->3286 3294 4032ed 3286->3294 3287 4033b7 3288 4033ca GetTempPathA 3287->3288 3359 40319d 3288->3359 3290 4033e2 3291 4033e6 GetWindowsDirectoryA lstrcatA 3290->3291 3292 40343c DeleteFileA 3290->3292 3295 40319d 12 API calls 3291->3295 3369 402d48 GetTickCount GetModuleFileNameA 3292->3369 3293 405905 CharNextA 3293->3294 3294->3287 3294->3293 3298 4033b9 3294->3298 3297 403402 3295->3297 3297->3292 3302 403406 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3297->3302 3454 405f42 lstrcpynA 3298->3454 3299 403450 3300 4034ea ExitProcess CoUninitialize 3299->3300 3303 4034d6 3299->3303 3308 405905 CharNextA 3299->3308 3304 403500 3300->3304 3305 40361e 3300->3305 3306 40319d 12 API calls 3302->3306 3397 403792 3303->3397 3309 40565e MessageBoxIndirectA 3304->3309 3310 4036a0 ExitProcess 3305->3310 3311 403626 GetCurrentProcess OpenProcessToken 3305->3311 3312 403434 3306->3312 3314 40346b 3308->3314 3316 40350e ExitProcess 3309->3316 3317 403671 3311->3317 3318 403641 LookupPrivilegeValueA AdjustTokenPrivileges 3311->3318 3312->3292 3312->3300 3320 4034b1 3314->3320 3321 403516 3314->3321 3319 4062da 5 API calls 3317->3319 3318->3317 3322 403678 3319->3322 3324 4059c8 18 API calls 3320->3324 3323 4055c9 5 API calls 3321->3323 3325 40368d ExitWindowsEx 3322->3325 3326 403699 3322->3326 3327 40351b lstrcatA 3323->3327 3328 4034bc 3324->3328 3325->3310 3325->3326 3462 40140b 3326->3462 3330 403537 lstrcatA lstrcmpiA 3327->3330 3331 40352c lstrcatA 3327->3331 3328->3300 3455 405f42 lstrcpynA 3328->3455 3330->3300 3332 403553 3330->3332 3331->3330 3334 403558 3332->3334 3335 40355f 3332->3335 3338 40552f 4 API calls 3334->3338 3337 4055ac 2 API calls 3335->3337 3336 4034cb 3456 405f42 lstrcpynA 3336->3456 3340 403564 SetCurrentDirectoryA 3337->3340 3341 40355d 3338->3341 3342 403573 3340->3342 3343 40357e 3340->3343 3341->3340 3457 405f42 lstrcpynA 3342->3457 3458 405f42 lstrcpynA 3343->3458 3346 405f64 17 API calls 3347 4035bd DeleteFileA 3346->3347 3348 4035ca CopyFileA 3347->3348 3354 40358c 3347->3354 3348->3354 3349 403612 3350 405d21 36 API calls 3349->3350 3352 403619 3350->3352 3351 405d21 36 API calls 3351->3354 3352->3300 3353 405f64 17 API calls 3353->3354 3354->3346 3354->3349 3354->3351 3354->3353 3356 4035fe CloseHandle 3354->3356 3459 4055e1 CreateProcessA 3354->3459 3356->3354 3357->3281 3358->3283 3360 4061ac 5 API calls 3359->3360 3361 4031a9 3360->3361 3362 4031b3 3361->3362 3363 4058da 3 API calls 3361->3363 3362->3290 3364 4031bb 3363->3364 3365 4055ac 2 API calls 3364->3365 3366 4031c1 3365->3366 3465 405b0a 3366->3465 3469 405adb GetFileAttributesA CreateFileA 3369->3469 3371 402d88 3390 402d98 3371->3390 3470 405f42 lstrcpynA 3371->3470 3373 402dae 3374 405921 2 API calls 3373->3374 3375 402db4 3374->3375 3471 405f42 lstrcpynA 3375->3471 3377 402dbf GetFileSize 3378 402ebb 3377->3378 3394 402dd6 3377->3394 3472 402ce4 3378->3472 3380 402ec4 3382 402ef4 GlobalAlloc 3380->3382 3380->3390 3484 403186 SetFilePointer 3380->3484 3381 403170 ReadFile 3381->3394 3483 403186 SetFilePointer 3382->3483 3384 402f27 3386 402ce4 6 API calls 3384->3386 3386->3390 3387 402edd 3391 403170 ReadFile 3387->3391 3388 402f0f 3389 402f81 31 API calls 3388->3389 3395 402f1b 3389->3395 3390->3299 3392 402ee8 3391->3392 3392->3382 3392->3390 3393 402ce4 6 API calls 3393->3394 3394->3378 3394->3381 3394->3384 3394->3390 3394->3393 3395->3390 3395->3395 3396 402f58 SetFilePointer 3395->3396 3396->3390 3398 4062da 5 API calls 3397->3398 3399 4037a6 3398->3399 3400 4037ac GetUserDefaultUILanguage 3399->3400 3401 4037be 3399->3401 3489 405ea0 wsprintfA 3400->3489 3402 405e29 3 API calls 3401->3402 3405 4037e9 3402->3405 3404 4037bc 3490 403a57 3404->3490 3406 403807 lstrcatA 3405->3406 3407 405e29 3 API calls 3405->3407 3406->3404 3407->3406 3410 4059c8 18 API calls 3411 403839 3410->3411 3412 4038c2 3411->3412 3414 405e29 3 API calls 3411->3414 3413 4059c8 18 API calls 3412->3413 3416 4038c8 3413->3416 3417 403865 3414->3417 3415 4038d8 LoadImageA 3419 40397e 3415->3419 3420 4038ff RegisterClassA 3415->3420 3416->3415 3418 405f64 17 API calls 3416->3418 3417->3412 3421 403881 lstrlenA 3417->3421 3424 405905 CharNextA 3417->3424 3418->3415 3423 40140b 2 API calls 3419->3423 3422 403935 SystemParametersInfoA CreateWindowExA 3420->3422 3453 4034e6 3420->3453 3425 4038b5 3421->3425 3426 40388f lstrcmpiA 3421->3426 3422->3419 3427 403984 3423->3427 3428 40387f 3424->3428 3430 4058da 3 API calls 3425->3430 3426->3425 3429 40389f GetFileAttributesA 3426->3429 3432 403a57 18 API calls 3427->3432 3427->3453 3428->3421 3431 4038ab 3429->3431 3433 4038bb 3430->3433 3431->3425 3434 405921 2 API calls 3431->3434 3435 403995 3432->3435 3498 405f42 lstrcpynA 3433->3498 3434->3425 3437 4039a1 ShowWindow 3435->3437 3438 403a24 3435->3438 3440 40626c 3 API calls 3437->3440 3499 40513b OleInitialize 3438->3499 3442 4039b9 3440->3442 3441 403a2a 3444 403a46 3441->3444 3445 403a2e 3441->3445 3443 4039c7 GetClassInfoA 3442->3443 3446 40626c 3 API calls 3442->3446 3448 4039f1 DialogBoxParamA 3443->3448 3449 4039db GetClassInfoA RegisterClassA 3443->3449 3447 40140b 2 API calls 3444->3447 3451 40140b 2 API calls 3445->3451 3445->3453 3446->3443 3447->3453 3450 40140b 2 API calls 3448->3450 3449->3448 3452 403a19 3450->3452 3451->3453 3452->3453 3453->3300 3454->3288 3455->3336 3456->3303 3457->3343 3458->3354 3460 405620 3459->3460 3461 405614 CloseHandle 3459->3461 3460->3354 3461->3460 3463 401389 2 API calls 3462->3463 3464 401420 3463->3464 3464->3310 3466 405b15 GetTickCount GetTempFileNameA 3465->3466 3467 405b42 3466->3467 3468 4031cc 3466->3468 3467->3466 3467->3468 3468->3290 3469->3371 3470->3373 3471->3377 3473 402d05 3472->3473 3474 402ced 3472->3474 3477 402d15 GetTickCount 3473->3477 3478 402d0d 3473->3478 3475 402cf6 DestroyWindow 3474->3475 3476 402cfd 3474->3476 3475->3476 3476->3380 3480 402d23 CreateDialogParamA ShowWindow 3477->3480 3481 402d46 3477->3481 3485 406316 3478->3485 3480->3481 3481->3380 3483->3388 3484->3387 3486 406333 PeekMessageA 3485->3486 3487 402d13 3486->3487 3488 406329 DispatchMessageA 3486->3488 3487->3380 3488->3486 3489->3404 3491 403a6b 3490->3491 3506 405ea0 wsprintfA 3491->3506 3493 403adc 3507 403b10 3493->3507 3495 403ae1 3496 403817 3495->3496 3497 405f64 17 API calls 3495->3497 3496->3410 3497->3495 3498->3412 3510 40404f 3499->3510 3501 40404f SendMessageA 3503 405197 OleUninitialize 3501->3503 3502 40515e 3505 405185 3502->3505 3513 401389 3502->3513 3503->3441 3505->3501 3506->3493 3508 405f64 17 API calls 3507->3508 3509 403b1e SetWindowTextA 3508->3509 3509->3495 3511 404067 3510->3511 3512 404058 SendMessageA 3510->3512 3511->3502 3512->3511 3515 401390 3513->3515 3514 4013fe 3514->3502 3515->3514 3516 4013cb MulDiv SendMessageA 3515->3516 3516->3515 3660 4026ce 3661 4026d4 3660->3661 3662 4026d8 FindNextFileA 3661->3662 3663 4026ea 3661->3663 3662->3663 3664 402729 3662->3664 3666 405f42 lstrcpynA 3664->3666 3666->3663 3667 403750 3668 40375b 3667->3668 3669 403762 GlobalAlloc 3668->3669 3670 40375f 3668->3670 3669->3670 3671 4023d0 3672 402ac1 17 API calls 3671->3672 3673 4023e2 3672->3673 3674 402ac1 17 API calls 3673->3674 3675 4023ec 3674->3675 3688 402b51 3675->3688 3678 402421 3681 40242d 3678->3681 3683 402a9f 17 API calls 3678->3683 3679 402716 3680 402ac1 17 API calls 3682 40241a lstrlenA 3680->3682 3684 40244c RegSetValueExA 3681->3684 3686 402f81 31 API calls 3681->3686 3682->3678 3683->3681 3685 402462 RegCloseKey 3684->3685 3685->3679 3686->3684 3689 402b6c 3688->3689 3692 405df6 3689->3692 3693 405e05 3692->3693 3694 405e10 RegCreateKeyExA 3693->3694 3695 4023fc 3693->3695 3694->3695 3695->3678 3695->3679 3695->3680 3696 401cd4 3697 402a9f 17 API calls 3696->3697 3698 401cda IsWindow 3697->3698 3699 401a0e 3698->3699 3700 4014d6 3701 402a9f 17 API calls 3700->3701 3702 4014dc Sleep 3701->3702 3704 402951 3702->3704 3142 401759 3181 402ac1 3142->3181 3144 401760 3145 401786 3144->3145 3146 40177e 3144->3146 3209 405f42 lstrcpynA 3145->3209 3208 405f42 lstrcpynA 3146->3208 3149 401784 3153 4061ac 5 API calls 3149->3153 3150 401791 3151 4058da 3 API calls 3150->3151 3152 401797 lstrcatA 3151->3152 3152->3149 3170 4017a3 3153->3170 3154 4017ae 3155 406245 2 API calls 3154->3155 3158 4017ba CompareFileTime 3154->3158 3154->3170 3155->3154 3156 405ab6 2 API calls 3156->3170 3158->3154 3159 40187e 3160 405069 24 API calls 3159->3160 3161 401888 3160->3161 3188 402f81 3161->3188 3162 405069 24 API calls 3165 40186a 3162->3165 3163 405f42 lstrcpynA 3163->3170 3167 4018af SetFileTime 3169 4018c1 CloseHandle 3167->3169 3168 405f64 17 API calls 3168->3170 3169->3165 3171 4018d2 3169->3171 3170->3154 3170->3156 3170->3159 3170->3163 3170->3168 3180 401855 3170->3180 3187 405adb GetFileAttributesA CreateFileA 3170->3187 3210 40565e 3170->3210 3172 4018d7 3171->3172 3173 4018ea 3171->3173 3174 405f64 17 API calls 3172->3174 3175 405f64 17 API calls 3173->3175 3177 4018df lstrcatA 3174->3177 3178 4018f2 3175->3178 3177->3178 3179 40565e MessageBoxIndirectA 3178->3179 3179->3165 3180->3162 3180->3165 3182 402acd 3181->3182 3183 405f64 17 API calls 3182->3183 3184 402aee 3183->3184 3185 402afa 3184->3185 3186 4061ac 5 API calls 3184->3186 3185->3144 3186->3185 3187->3170 3190 402f97 3188->3190 3189 402fc5 3214 403170 3189->3214 3190->3189 3217 403186 SetFilePointer 3190->3217 3194 402fe2 GetTickCount 3197 40189b 3194->3197 3204 40300e 3194->3204 3195 403109 3196 40314b 3195->3196 3201 40310d 3195->3201 3199 403170 ReadFile 3196->3199 3197->3167 3197->3169 3198 403170 ReadFile 3198->3204 3199->3197 3200 403170 ReadFile 3200->3201 3201->3197 3201->3200 3202 405b82 WriteFile 3201->3202 3202->3201 3203 403064 GetTickCount 3203->3204 3204->3197 3204->3198 3204->3203 3205 403089 MulDiv wsprintfA 3204->3205 3207 405b82 WriteFile 3204->3207 3206 405069 24 API calls 3205->3206 3206->3204 3207->3204 3208->3149 3209->3150 3211 405673 3210->3211 3212 4056bf 3211->3212 3213 405687 MessageBoxIndirectA 3211->3213 3212->3170 3213->3212 3215 405b53 ReadFile 3214->3215 3216 402fd0 3215->3216 3216->3194 3216->3195 3216->3197 3217->3189 3705 401659 3706 402ac1 17 API calls 3705->3706 3707 40165f 3706->3707 3708 406245 2 API calls 3707->3708 3709 401665 3708->3709 3710 401959 3711 402a9f 17 API calls 3710->3711 3712 401960 3711->3712 3713 402a9f 17 API calls 3712->3713 3714 40196d 3713->3714 3715 402ac1 17 API calls 3714->3715 3716 401984 lstrlenA 3715->3716 3717 401994 3716->3717 3720 4019d4 3717->3720 3722 405f42 lstrcpynA 3717->3722 3719 4019c4 3719->3720 3721 4019c9 lstrlenA 3719->3721 3721->3720 3722->3719 3723 401e59 3724 402ac1 17 API calls 3723->3724 3725 401e5f 3724->3725 3726 402ac1 17 API calls 3725->3726 3727 401e68 3726->3727 3728 402ac1 17 API calls 3727->3728 3729 401e71 3728->3729 3730 402ac1 17 API calls 3729->3730 3731 401e7a 3730->3731 3732 401423 24 API calls 3731->3732 3733 401e81 3732->3733 3740 405624 ShellExecuteExA 3733->3740 3735 401ebc 3737 402716 3735->3737 3741 40634f WaitForSingleObject 3735->3741 3738 401ed6 CloseHandle 3738->3737 3740->3735 3742 406369 3741->3742 3743 40637b GetExitCodeProcess 3742->3743 3744 406316 2 API calls 3742->3744 3743->3738 3745 406370 WaitForSingleObject 3744->3745 3745->3742 3746 401f5b 3747 402ac1 17 API calls 3746->3747 3748 401f62 3747->3748 3749 4062da 5 API calls 3748->3749 3750 401f71 3749->3750 3751 401ff1 3750->3751 3752 401f89 GlobalAlloc 3750->3752 3752->3751 3753 401f9d 3752->3753 3754 4062da 5 API calls 3753->3754 3755 401fa4 3754->3755 3756 4062da 5 API calls 3755->3756 3757 401fae 3756->3757 3757->3751 3761 405ea0 wsprintfA 3757->3761 3759 401fe5 3762 405ea0 wsprintfA 3759->3762 3761->3759 3762->3751 3763 40255b 3764 402ac1 17 API calls 3763->3764 3765 402562 3764->3765 3768 405adb GetFileAttributesA CreateFileA 3765->3768 3767 40256e 3768->3767 3769 401edb 3770 402ac1 17 API calls 3769->3770 3771 401ee1 3770->3771 3772 405069 24 API calls 3771->3772 3773 401eeb 3772->3773 3774 4055e1 2 API calls 3773->3774 3775 401ef1 3774->3775 3776 401f12 CloseHandle 3775->3776 3777 40634f 5 API calls 3775->3777 3779 402716 3775->3779 3776->3779 3780 401f06 3777->3780 3780->3776 3782 405ea0 wsprintfA 3780->3782 3782->3776 3783 401b5d 3784 401b6a 3783->3784 3785 401bae 3783->3785 3786 4022ce 3784->3786 3792 401b81 3784->3792 3787 401bb2 3785->3787 3788 401bd7 GlobalAlloc 3785->3788 3790 405f64 17 API calls 3786->3790 3797 401bf2 3787->3797 3804 405f42 lstrcpynA 3787->3804 3789 405f64 17 API calls 3788->3789 3789->3797 3791 4022db 3790->3791 3796 40565e MessageBoxIndirectA 3791->3796 3802 405f42 lstrcpynA 3792->3802 3795 401bc4 GlobalFree 3795->3797 3796->3797 3798 401b90 3803 405f42 lstrcpynA 3798->3803 3800 401b9f 3805 405f42 lstrcpynA 3800->3805 3802->3798 3803->3800 3804->3795 3805->3797 3806 404fdd 3807 405001 3806->3807 3808 404fed 3806->3808 3810 405009 IsWindowVisible 3807->3810 3814 405020 3807->3814 3809 404ff3 3808->3809 3818 40504a 3808->3818 3812 40404f SendMessageA 3809->3812 3813 405016 3810->3813 3810->3818 3811 40504f CallWindowProcA 3815 404ffd 3811->3815 3812->3815 3819 404934 SendMessageA 3813->3819 3814->3811 3824 4049b4 3814->3824 3818->3811 3820 404993 SendMessageA 3819->3820 3821 404957 GetMessagePos ScreenToClient SendMessageA 3819->3821 3823 40498b 3820->3823 3822 404990 3821->3822 3821->3823 3822->3820 3823->3814 3833 405f42 lstrcpynA 3824->3833 3826 4049c7 3834 405ea0 wsprintfA 3826->3834 3828 4049d1 3829 40140b 2 API calls 3828->3829 3830 4049da 3829->3830 3835 405f42 lstrcpynA 3830->3835 3832 4049e1 3832->3818 3833->3826 3834->3828 3835->3832 3836 401a5e 3837 402a9f 17 API calls 3836->3837 3838 401a64 3837->3838 3839 402a9f 17 API calls 3838->3839 3840 401a0e 3839->3840 3841 4024df 3851 402b01 3841->3851 3844 402a9f 17 API calls 3845 4024f2 3844->3845 3846 402519 RegEnumValueA 3845->3846 3847 40250d RegEnumKeyA 3845->3847 3849 402716 3845->3849 3848 40252e RegCloseKey 3846->3848 3847->3848 3848->3849 3852 402ac1 17 API calls 3851->3852 3853 402b18 3852->3853 3854 405dc8 RegOpenKeyExA 3853->3854 3855 4024e9 3854->3855 3855->3844 3856 402c61 3857 402c70 SetTimer 3856->3857 3858 402c89 3856->3858 3857->3858 3859 402cde 3858->3859 3860 402ca3 MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3858->3860 3860->3859 3861 401563 3862 401596 ShowWindow 3861->3862 3864 401567 3861->3864 3863 4028fe 3862->3863 3866 405ea0 wsprintfA 3864->3866 3866->3863 3867 4049e6 GetDlgItem GetDlgItem 3868 404a38 7 API calls 3867->3868 3881 404c50 3867->3881 3869 404adb DeleteObject 3868->3869 3870 404ace SendMessageA 3868->3870 3871 404ae4 3869->3871 3870->3869 3873 404b1b 3871->3873 3874 405f64 17 API calls 3871->3874 3872 404d34 3876 404de0 3872->3876 3877 404c43 3872->3877 3883 404d8d SendMessageA 3872->3883 3875 404003 18 API calls 3873->3875 3878 404afd SendMessageA SendMessageA 3874->3878 3882 404b2f 3875->3882 3879 404df2 3876->3879 3880 404dea SendMessageA 3876->3880 3884 40406a 8 API calls 3877->3884 3878->3871 3891 404e04 ImageList_Destroy 3879->3891 3892 404e0b 3879->3892 3896 404e1b 3879->3896 3880->3879 3881->3872 3886 404934 5 API calls 3881->3886 3899 404cc1 3881->3899 3887 404003 18 API calls 3882->3887 3883->3877 3889 404da2 SendMessageA 3883->3889 3890 404fd6 3884->3890 3885 404d26 SendMessageA 3885->3872 3886->3899 3900 404b3d 3887->3900 3888 404f8a 3888->3877 3897 404f9c ShowWindow GetDlgItem ShowWindow 3888->3897 3894 404db5 3889->3894 3891->3892 3895 404e14 GlobalFree 3892->3895 3892->3896 3893 404c11 GetWindowLongA SetWindowLongA 3898 404c2a 3893->3898 3904 404dc6 SendMessageA 3894->3904 3895->3896 3896->3888 3910 4049b4 4 API calls 3896->3910 3914 404e56 3896->3914 3897->3877 3901 404c30 ShowWindow 3898->3901 3902 404c48 3898->3902 3899->3872 3899->3885 3900->3893 3903 404b8c SendMessageA 3900->3903 3905 404c0b 3900->3905 3908 404bc8 SendMessageA 3900->3908 3909 404bd9 SendMessageA 3900->3909 3918 404038 SendMessageA 3901->3918 3919 404038 SendMessageA 3902->3919 3903->3900 3904->3876 3905->3893 3905->3898 3908->3900 3909->3900 3910->3914 3911 404f60 InvalidateRect 3911->3888 3912 404f76 3911->3912 3920 4048ef 3912->3920 3913 404e84 SendMessageA 3917 404e9a 3913->3917 3914->3913 3914->3917 3916 404f0e SendMessageA SendMessageA 3916->3917 3917->3911 3917->3916 3918->3877 3919->3881 3923 40482a 3920->3923 3922 404904 3922->3888 3924 404840 3923->3924 3925 405f64 17 API calls 3924->3925 3926 4048a4 3925->3926 3927 405f64 17 API calls 3926->3927 3928 4048af 3927->3928 3929 405f64 17 API calls 3928->3929 3930 4048c5 lstrlenA wsprintfA SetDlgItemTextA 3929->3930 3930->3922 3931 40166a 3932 402ac1 17 API calls 3931->3932 3933 401671 3932->3933 3934 402ac1 17 API calls 3933->3934 3935 40167a 3934->3935 3936 402ac1 17 API calls 3935->3936 3937 401683 MoveFileA 3936->3937 3938 401696 3937->3938 3939 40168f 3937->3939 3940 406245 2 API calls 3938->3940 3943 40223c 3938->3943 3941 401423 24 API calls 3939->3941 3942 4016a5 3940->3942 3941->3943 3942->3943 3944 405d21 36 API calls 3942->3944 3944->3939 3945 40246d 3946 402b01 17 API calls 3945->3946 3947 402477 3946->3947 3948 402ac1 17 API calls 3947->3948 3949 402480 3948->3949 3950 40248a RegQueryValueExA 3949->3950 3953 402716 3949->3953 3951 4024b0 RegCloseKey 3950->3951 3952 4024aa 3950->3952 3951->3953 3952->3951 3956 405ea0 wsprintfA 3952->3956 3956->3951 3957 4019ed 3958 402ac1 17 API calls 3957->3958 3959 4019f4 3958->3959 3960 402ac1 17 API calls 3959->3960 3961 4019fd 3960->3961 3962 401a04 lstrcmpiA 3961->3962 3963 401a16 lstrcmpA 3961->3963 3964 401a0a 3962->3964 3963->3964 3965 40156f 3966 401586 3965->3966 3967 40157f ShowWindow 3965->3967 3968 402951 3966->3968 3969 401596 ShowWindow 3966->3969 3967->3966 3969->3968 3970 404473 3971 4044b0 3970->3971 3972 40449f 3970->3972 3974 4044bc GetDlgItem 3971->3974 3980 40451b 3971->3980 4031 405642 GetDlgItemTextA 3972->4031 3976 4044d0 3974->3976 3975 4044aa 3978 4061ac 5 API calls 3975->3978 3982 4044e4 SetWindowTextA 3976->3982 3987 405973 4 API calls 3976->3987 3977 4045ff 3979 4047a9 3977->3979 4033 405642 GetDlgItemTextA 3977->4033 3978->3971 3986 40406a 8 API calls 3979->3986 3980->3977 3980->3979 3983 405f64 17 API calls 3980->3983 3985 404003 18 API calls 3982->3985 3988 40458f SHBrowseForFolderA 3983->3988 3984 40462f 3989 4059c8 18 API calls 3984->3989 3990 404500 3985->3990 3991 4047bd 3986->3991 3992 4044da 3987->3992 3988->3977 3993 4045a7 CoTaskMemFree 3988->3993 3994 404635 3989->3994 3995 404003 18 API calls 3990->3995 3992->3982 3996 4058da 3 API calls 3992->3996 3997 4058da 3 API calls 3993->3997 4034 405f42 lstrcpynA 3994->4034 3998 40450e 3995->3998 3996->3982 3999 4045b4 3997->3999 4032 404038 SendMessageA 3998->4032 4002 4045eb SetDlgItemTextA 3999->4002 4007 405f64 17 API calls 3999->4007 4002->3977 4003 404514 4005 4062da 5 API calls 4003->4005 4004 40464c 4006 4062da 5 API calls 4004->4006 4005->3980 4014 404653 4006->4014 4008 4045d3 lstrcmpiA 4007->4008 4008->4002 4011 4045e4 lstrcatA 4008->4011 4009 40468f 4035 405f42 lstrcpynA 4009->4035 4011->4002 4012 404696 4013 405973 4 API calls 4012->4013 4015 40469c GetDiskFreeSpaceA 4013->4015 4014->4009 4017 405921 2 API calls 4014->4017 4019 4046e7 4014->4019 4018 4046c0 MulDiv 4015->4018 4015->4019 4017->4014 4018->4019 4020 404758 4019->4020 4021 4048ef 20 API calls 4019->4021 4022 40477b 4020->4022 4024 40140b 2 API calls 4020->4024 4023 404745 4021->4023 4036 404025 EnableWindow 4022->4036 4026 40475a SetDlgItemTextA 4023->4026 4027 40474a 4023->4027 4024->4022 4026->4020 4029 40482a 20 API calls 4027->4029 4028 404797 4028->3979 4030 4043cc SendMessageA 4028->4030 4029->4020 4030->3979 4031->3975 4032->4003 4033->3984 4034->4004 4035->4012 4036->4028 4037 4014f4 SetForegroundWindow 4038 402951 4037->4038 4039 401cf5 4040 402a9f 17 API calls 4039->4040 4041 401cfc 4040->4041 4042 402a9f 17 API calls 4041->4042 4043 401d08 GetDlgItem 4042->4043 4044 402577 4043->4044 4045 4022f6 4046 4022fe 4045->4046 4048 402304 4045->4048 4049 402ac1 17 API calls 4046->4049 4047 402314 4051 402322 4047->4051 4052 402ac1 17 API calls 4047->4052 4048->4047 4050 402ac1 17 API calls 4048->4050 4049->4048 4050->4047 4053 402ac1 17 API calls 4051->4053 4052->4051 4054 40232b WritePrivateProfileStringA 4053->4054 4055 4026f8 4056 402ac1 17 API calls 4055->4056 4057 4026ff FindFirstFileA 4056->4057 4058 402722 4057->4058 4059 402712 4057->4059 4060 402729 4058->4060 4063 405ea0 wsprintfA 4058->4063 4064 405f42 lstrcpynA 4060->4064 4063->4060 4064->4059 4065 40237b 4066 402382 4065->4066 4067 4023ad 4065->4067 4069 402b01 17 API calls 4066->4069 4068 402ac1 17 API calls 4067->4068 4071 4023b4 4068->4071 4070 402389 4069->4070 4073 402ac1 17 API calls 4070->4073 4075 4023c1 4070->4075 4076 402b7f 4071->4076 4074 40239a RegDeleteValueA RegCloseKey 4073->4074 4074->4075 4077 402b95 4076->4077 4078 402bab 4077->4078 4080 402bb4 4077->4080 4078->4075 4081 405dc8 RegOpenKeyExA 4080->4081 4082 402be2 4081->4082 4083 402c08 RegEnumKeyA 4082->4083 4084 402c1f RegCloseKey 4082->4084 4085 402c40 RegCloseKey 4082->4085 4088 402bb4 6 API calls 4082->4088 4090 402c33 4082->4090 4083->4082 4083->4084 4086 4062da 5 API calls 4084->4086 4085->4090 4087 402c2f 4086->4087 4089 402c4e RegDeleteKeyA 4087->4089 4087->4090 4088->4082 4089->4090 4090->4078 4091 40257d 4092 402582 4091->4092 4093 402596 4091->4093 4094 402a9f 17 API calls 4092->4094 4095 402ac1 17 API calls 4093->4095 4097 40258b 4094->4097 4096 40259d lstrlenA 4095->4096 4096->4097 4098 4025bf 4097->4098 4099 405b82 WriteFile 4097->4099 4099->4098 4100 4018fd 4101 401934 4100->4101 4102 402ac1 17 API calls 4101->4102 4103 401939 4102->4103 4104 40570a 67 API calls 4103->4104 4105 401942 4104->4105 4106 401ffd 4107 4020bd 4106->4107 4108 40200f 4106->4108 4111 401423 24 API calls 4107->4111 4109 402ac1 17 API calls 4108->4109 4110 402016 4109->4110 4112 402ac1 17 API calls 4110->4112 4116 40223c 4111->4116 4113 40201f 4112->4113 4114 402034 LoadLibraryExA 4113->4114 4115 402027 GetModuleHandleA 4113->4115 4114->4107 4117 402044 GetProcAddress 4114->4117 4115->4114 4115->4117 4118 402090 4117->4118 4119 402053 4117->4119 4120 405069 24 API calls 4118->4120 4121 402063 4119->4121 4122 401423 24 API calls 4119->4122 4120->4121 4121->4116 4123 4020b1 FreeLibrary 4121->4123 4122->4121 4123->4116 4124 401000 4125 401037 BeginPaint GetClientRect 4124->4125 4126 40100c DefWindowProcA 4124->4126 4128 4010f3 4125->4128 4129 401179 4126->4129 4130 401073 CreateBrushIndirect FillRect DeleteObject 4128->4130 4131 4010fc 4128->4131 4130->4128 4132 401102 CreateFontIndirectA 4131->4132 4133 401167 EndPaint 4131->4133 4132->4133 4134 401112 6 API calls 4132->4134 4133->4129 4134->4133 4135 401900 4136 402ac1 17 API calls 4135->4136 4137 401907 4136->4137 4138 40565e MessageBoxIndirectA 4137->4138 4139 401910 4138->4139 4140 401502 4141 40151d 4140->4141 4142 40150a 4140->4142 4143 402a9f 17 API calls 4142->4143 4143->4141 4144 402682 4145 402689 4144->4145 4147 4028fe 4144->4147 4146 402a9f 17 API calls 4145->4146 4148 402690 4146->4148 4149 40269f SetFilePointer 4148->4149 4149->4147 4150 4026af 4149->4150 4152 405ea0 wsprintfA 4150->4152 4152->4147 4153 401c04 4154 402a9f 17 API calls 4153->4154 4155 401c0b 4154->4155 4156 402a9f 17 API calls 4155->4156 4157 401c18 4156->4157 4158 401c2d 4157->4158 4159 402ac1 17 API calls 4157->4159 4160 401c3d 4158->4160 4163 402ac1 17 API calls 4158->4163 4159->4158 4161 401c94 4160->4161 4162 401c48 4160->4162 4165 402ac1 17 API calls 4161->4165 4164 402a9f 17 API calls 4162->4164 4163->4160 4166 401c4d 4164->4166 4167 401c99 4165->4167 4168 402a9f 17 API calls 4166->4168 4169 402ac1 17 API calls 4167->4169 4170 401c59 4168->4170 4171 401ca2 FindWindowExA 4169->4171 4172 401c84 SendMessageA 4170->4172 4173 401c66 SendMessageTimeoutA 4170->4173 4174 401cc0 4171->4174 4172->4174 4173->4174 3218 401389 3220 401390 3218->3220 3219 4013fe 3220->3219 3221 4013cb MulDiv SendMessageA 3220->3221 3221->3220 4175 401490 4176 405069 24 API calls 4175->4176 4177 401497 4176->4177 4178 401d95 GetDC 4179 402a9f 17 API calls 4178->4179 4180 401da7 GetDeviceCaps MulDiv ReleaseDC 4179->4180 4181 402a9f 17 API calls 4180->4181 4182 401dd8 4181->4182 4183 405f64 17 API calls 4182->4183 4184 401e15 CreateFontIndirectA 4183->4184 4185 402577 4184->4185 4186 404117 lstrcpynA lstrlenA 4187 401d1a 4188 402a9f 17 API calls 4187->4188 4189 401d28 SetWindowLongA 4188->4189 4190 402951 4189->4190 4196 40149d 4197 4022e1 4196->4197 4198 4014ab PostQuitMessage 4196->4198 4198->4197 4199 40159d 4200 402ac1 17 API calls 4199->4200 4201 4015a4 SetFileAttributesA 4200->4201 4202 4015b6 4201->4202 4203 401a1e 4204 402ac1 17 API calls 4203->4204 4205 401a27 ExpandEnvironmentStringsA 4204->4205 4206 401a3b 4205->4206 4208 401a4e 4205->4208 4207 401a40 lstrcmpA 4206->4207 4206->4208 4207->4208 4209 40171f 4210 402ac1 17 API calls 4209->4210 4211 401726 SearchPathA 4210->4211 4212 401741 4211->4212 2953 405624 ShellExecuteExA 4213 401e25 4214 402a9f 17 API calls 4213->4214 4215 401e2b 4214->4215 4216 402a9f 17 API calls 4215->4216 4217 401e37 4216->4217 4218 401e43 ShowWindow 4217->4218 4219 401e4e EnableWindow 4217->4219 4220 402951 4218->4220 4219->4220 4221 4051a7 4222 405352 4221->4222 4223 4051c9 GetDlgItem GetDlgItem GetDlgItem 4221->4223 4225 405382 4222->4225 4226 40535a GetDlgItem CreateThread CloseHandle 4222->4226 4266 404038 SendMessageA 4223->4266 4228 4053b0 4225->4228 4229 4053d1 4225->4229 4230 405398 ShowWindow ShowWindow 4225->4230 4226->4225 4227 405239 4232 405240 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4227->4232 4231 40540b 4228->4231 4234 4053c0 4228->4234 4235 4053e4 ShowWindow 4228->4235 4236 40406a 8 API calls 4229->4236 4268 404038 SendMessageA 4230->4268 4231->4229 4241 405418 SendMessageA 4231->4241 4239 405292 SendMessageA SendMessageA 4232->4239 4240 4052ae 4232->4240 4269 403fdc 4234->4269 4237 405404 4235->4237 4238 4053f6 4235->4238 4243 4053dd 4236->4243 4245 403fdc SendMessageA 4237->4245 4244 405069 24 API calls 4238->4244 4239->4240 4246 4052c1 4240->4246 4247 4052b3 SendMessageA 4240->4247 4241->4243 4248 405431 CreatePopupMenu 4241->4248 4244->4237 4245->4231 4250 404003 18 API calls 4246->4250 4247->4246 4249 405f64 17 API calls 4248->4249 4251 405441 AppendMenuA 4249->4251 4252 4052d1 4250->4252 4253 405472 TrackPopupMenu 4251->4253 4254 40545f GetWindowRect 4251->4254 4255 4052da ShowWindow 4252->4255 4256 40530e GetDlgItem SendMessageA 4252->4256 4253->4243 4258 40548e 4253->4258 4254->4253 4259 4052f0 ShowWindow 4255->4259 4260 4052fd 4255->4260 4256->4243 4257 405335 SendMessageA SendMessageA 4256->4257 4257->4243 4261 4054ad SendMessageA 4258->4261 4259->4260 4267 404038 SendMessageA 4260->4267 4261->4261 4263 4054ca OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4261->4263 4264 4054ec SendMessageA 4263->4264 4264->4264 4265 40550e GlobalUnlock SetClipboardData CloseClipboard 4264->4265 4265->4243 4266->4227 4267->4256 4268->4228 4270 403fe3 4269->4270 4271 403fe9 SendMessageA 4269->4271 4270->4271 4271->4229 4272 401f2b 4273 402ac1 17 API calls 4272->4273 4274 401f32 4273->4274 4275 406245 2 API calls 4274->4275 4276 401f38 4275->4276 4278 401f4a 4276->4278 4279 405ea0 wsprintfA 4276->4279 4279->4278 4280 40292c SendMessageA 4281 402951 4280->4281 4282 402946 InvalidateRect 4280->4282 4282->4281 4283 40442c 4284 404462 4283->4284 4285 40443c 4283->4285 4287 40406a 8 API calls 4284->4287 4286 404003 18 API calls 4285->4286 4289 404449 SetDlgItemTextA 4286->4289 4288 40446e 4287->4288 4289->4284 4290 403b2f 4291 403c82 4290->4291 4292 403b47 4290->4292 4294 403cd3 4291->4294 4295 403c93 GetDlgItem GetDlgItem 4291->4295 4292->4291 4293 403b53 4292->4293 4297 403b71 4293->4297 4298 403b5e SetWindowPos 4293->4298 4296 403d2d 4294->4296 4304 401389 2 API calls 4294->4304 4299 404003 18 API calls 4295->4299 4300 40404f SendMessageA 4296->4300 4320 403c7d 4296->4320 4301 403b76 ShowWindow 4297->4301 4302 403b8e 4297->4302 4298->4297 4303 403cbd SetClassLongA 4299->4303 4319 403d3f 4300->4319 4301->4302 4305 403bb0 4302->4305 4306 403b96 DestroyWindow 4302->4306 4307 40140b 2 API calls 4303->4307 4310 403d05 4304->4310 4308 403bb5 SetWindowLongA 4305->4308 4309 403bc6 4305->4309 4358 403f8c 4306->4358 4307->4294 4308->4320 4311 403bd2 GetDlgItem 4309->4311 4327 403c3d 4309->4327 4310->4296 4312 403d09 SendMessageA 4310->4312 4315 403c02 4311->4315 4316 403be5 SendMessageA IsWindowEnabled 4311->4316 4312->4320 4313 40140b 2 API calls 4313->4319 4314 403f8e DestroyWindow EndDialog 4314->4358 4322 403c0f 4315->4322 4325 403c56 SendMessageA 4315->4325 4326 403c22 4315->4326 4332 403c07 4315->4332 4316->4315 4316->4320 4317 40406a 8 API calls 4317->4320 4318 403fbd ShowWindow 4318->4320 4319->4313 4319->4314 4319->4320 4321 405f64 17 API calls 4319->4321 4324 404003 18 API calls 4319->4324 4333 404003 18 API calls 4319->4333 4349 403ece DestroyWindow 4319->4349 4321->4319 4322->4325 4322->4332 4323 403fdc SendMessageA 4323->4327 4324->4319 4325->4327 4328 403c2a 4326->4328 4329 403c3f 4326->4329 4327->4317 4331 40140b 2 API calls 4328->4331 4330 40140b 2 API calls 4329->4330 4330->4332 4331->4332 4332->4323 4332->4327 4334 403dba GetDlgItem 4333->4334 4335 403dd7 ShowWindow EnableWindow 4334->4335 4336 403dcf 4334->4336 4359 404025 EnableWindow 4335->4359 4336->4335 4338 403e01 EnableWindow 4343 403e15 4338->4343 4339 403e1a GetSystemMenu EnableMenuItem SendMessageA 4340 403e4a SendMessageA 4339->4340 4339->4343 4340->4343 4342 403b10 18 API calls 4342->4343 4343->4339 4343->4342 4360 404038 SendMessageA 4343->4360 4361 405f42 lstrcpynA 4343->4361 4345 403e79 lstrlenA 4346 405f64 17 API calls 4345->4346 4347 403e8a SetWindowTextA 4346->4347 4348 401389 2 API calls 4347->4348 4348->4319 4350 403ee8 CreateDialogParamA 4349->4350 4349->4358 4351 403f1b 4350->4351 4350->4358 4352 404003 18 API calls 4351->4352 4353 403f26 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4352->4353 4354 401389 2 API calls 4353->4354 4355 403f6c 4354->4355 4355->4320 4356 403f74 ShowWindow 4355->4356 4357 40404f SendMessageA 4356->4357 4357->4358 4358->4318 4358->4320 4359->4338 4360->4343 4361->4345 4368 4026b4 4369 4026ba 4368->4369 4370 402951 4369->4370 4371 4026c2 FindClose 4369->4371 4371->4370 4372 402736 4373 402ac1 17 API calls 4372->4373 4374 402744 4373->4374 4375 40275a 4374->4375 4376 402ac1 17 API calls 4374->4376 4377 405ab6 2 API calls 4375->4377 4376->4375 4378 402760 4377->4378 4400 405adb GetFileAttributesA CreateFileA 4378->4400 4380 40276d 4381 402816 4380->4381 4382 402779 GlobalAlloc 4380->4382 4385 402831 4381->4385 4386 40281e DeleteFileA 4381->4386 4383 402792 4382->4383 4384 40280d CloseHandle 4382->4384 4401 403186 SetFilePointer 4383->4401 4384->4381 4386->4385 4388 402798 4389 403170 ReadFile 4388->4389 4390 4027a1 GlobalAlloc 4389->4390 4391 4027b1 4390->4391 4392 4027eb 4390->4392 4394 402f81 31 API calls 4391->4394 4393 405b82 WriteFile 4392->4393 4395 4027f7 GlobalFree 4393->4395 4399 4027be 4394->4399 4396 402f81 31 API calls 4395->4396 4397 40280a 4396->4397 4397->4384 4398 4027e2 GlobalFree 4398->4392 4399->4398 4400->4380 4401->4388 4402 402837 4403 402a9f 17 API calls 4402->4403 4404 40283d 4403->4404 4405 402865 4404->4405 4406 40287c 4404->4406 4414 402716 4404->4414 4409 40286a 4405->4409 4410 402879 4405->4410 4407 402896 4406->4407 4408 402886 4406->4408 4412 405f64 17 API calls 4407->4412 4411 402a9f 17 API calls 4408->4411 4416 405f42 lstrcpynA 4409->4416 4417 405ea0 wsprintfA 4410->4417 4411->4414 4412->4414 4416->4414 4417->4414 4418 4014b7 4419 4014bd 4418->4419 4420 401389 2 API calls 4419->4420 4421 4014c5 4420->4421 2954 4036b8 2955 4036d0 2954->2955 2956 4036c2 CloseHandle 2954->2956 2961 4036fd 2955->2961 2956->2955 2962 40370b 2961->2962 2963 4036d5 2962->2963 2964 403710 FreeLibrary GlobalFree 2962->2964 2965 40570a 2963->2965 2964->2963 2964->2964 3002 4059c8 2965->3002 2968 405732 DeleteFileA 2997 4036e1 2968->2997 2969 405749 2970 405877 2969->2970 3017 405f42 lstrcpynA 2969->3017 2970->2997 3050 406245 FindFirstFileA 2970->3050 2972 40576f 2973 405782 2972->2973 2974 405775 lstrcatA 2972->2974 3018 405921 lstrlenA 2973->3018 2976 405788 2974->2976 2978 405796 lstrcatA 2976->2978 2980 4057a1 lstrlenA FindFirstFileA 2976->2980 2978->2980 2980->2970 3000 4057c5 2980->3000 2984 4056c2 5 API calls 2985 4058b1 2984->2985 2986 4058cb 2985->2986 2990 4058b5 2985->2990 2987 405069 24 API calls 2986->2987 2987->2997 2988 405856 FindNextFileA 2991 40586e FindClose 2988->2991 2988->3000 2992 405069 24 API calls 2990->2992 2990->2997 2991->2970 2993 4058c2 2992->2993 2994 405d21 36 API calls 2993->2994 2994->2997 2996 40570a 60 API calls 2996->3000 2998 405069 24 API calls 2998->2988 3000->2988 3000->2996 3000->2998 3022 405905 3000->3022 3026 405f42 lstrcpynA 3000->3026 3027 4056c2 3000->3027 3035 405069 3000->3035 3046 405d21 MoveFileExA 3000->3046 3056 405f42 lstrcpynA 3002->3056 3004 4059d9 3057 405973 CharNextA CharNextA 3004->3057 3007 40572a 3007->2968 3007->2969 3010 405a1a lstrlenA 3011 405a25 3010->3011 3015 405a02 3010->3015 3013 4058da 3 API calls 3011->3013 3012 406245 2 API calls 3012->3015 3014 405a2a GetFileAttributesA 3013->3014 3014->3007 3015->3007 3015->3010 3015->3012 3016 405921 2 API calls 3015->3016 3016->3010 3017->2972 3019 40592e 3018->3019 3020 405933 CharPrevA 3019->3020 3021 40593f 3019->3021 3020->3019 3020->3021 3021->2976 3023 40590b 3022->3023 3024 40591e 3023->3024 3025 405911 CharNextA 3023->3025 3024->3000 3025->3023 3026->3000 3072 405ab6 GetFileAttributesA 3027->3072 3030 4056ef 3030->3000 3031 4056e5 DeleteFileA 3033 4056eb 3031->3033 3032 4056dd RemoveDirectoryA 3032->3033 3033->3030 3034 4056fb SetFileAttributesA 3033->3034 3034->3030 3036 405084 3035->3036 3045 405127 3035->3045 3037 4050a1 lstrlenA 3036->3037 3075 405f64 3036->3075 3039 4050ca 3037->3039 3040 4050af lstrlenA 3037->3040 3042 4050d0 SetWindowTextA 3039->3042 3043 4050dd 3039->3043 3041 4050c1 lstrcatA 3040->3041 3040->3045 3041->3039 3042->3043 3044 4050e3 SendMessageA SendMessageA SendMessageA 3043->3044 3043->3045 3044->3045 3045->3000 3047 405d42 3046->3047 3048 405d35 3046->3048 3047->3000 3104 405bb1 3048->3104 3051 40589b 3050->3051 3052 40625b FindClose 3050->3052 3051->2997 3053 4058da lstrlenA CharPrevA 3051->3053 3052->3051 3054 4058f4 lstrcatA 3053->3054 3055 4058a5 3053->3055 3054->3055 3055->2984 3056->3004 3058 40598e 3057->3058 3062 40599e 3057->3062 3060 405999 CharNextA 3058->3060 3058->3062 3059 4059be 3059->3007 3063 4061ac 3059->3063 3060->3059 3061 405905 CharNextA 3061->3062 3062->3059 3062->3061 3064 4061b8 3063->3064 3066 406215 CharNextA 3064->3066 3068 405905 CharNextA 3064->3068 3069 406220 3064->3069 3070 406203 CharNextA 3064->3070 3071 406210 CharNextA 3064->3071 3065 406224 CharPrevA 3065->3069 3066->3064 3066->3069 3067 4059ef 3067->3007 3067->3015 3068->3064 3069->3065 3069->3067 3070->3064 3071->3066 3073 4056ce 3072->3073 3074 405ac8 SetFileAttributesA 3072->3074 3073->3030 3073->3031 3073->3032 3074->3073 3076 405f71 3075->3076 3077 406193 3076->3077 3080 40616d lstrlenA 3076->3080 3081 405f64 10 API calls 3076->3081 3084 406089 GetSystemDirectoryA 3076->3084 3086 40609c GetWindowsDirectoryA 3076->3086 3087 4061ac 5 API calls 3076->3087 3088 405f64 10 API calls 3076->3088 3089 406116 lstrcatA 3076->3089 3090 4060d0 SHGetSpecialFolderLocation 3076->3090 3092 405e29 3076->3092 3097 405ea0 wsprintfA 3076->3097 3098 405f42 lstrcpynA 3076->3098 3078 4061a8 3077->3078 3099 405f42 lstrcpynA 3077->3099 3078->3037 3080->3076 3081->3080 3084->3076 3086->3076 3087->3076 3088->3076 3089->3076 3090->3076 3091 4060e8 SHGetPathFromIDListA CoTaskMemFree 3090->3091 3091->3076 3100 405dc8 3092->3100 3095 405e8c 3095->3076 3096 405e5d RegQueryValueExA RegCloseKey 3096->3095 3097->3076 3098->3076 3099->3078 3101 405dd7 3100->3101 3102 405de0 RegOpenKeyExA 3101->3102 3103 405ddb 3101->3103 3102->3103 3103->3095 3103->3096 3105 405bd7 3104->3105 3106 405bfd GetShortPathNameA 3104->3106 3131 405adb GetFileAttributesA CreateFileA 3105->3131 3108 405c12 3106->3108 3109 405d1c 3106->3109 3108->3109 3111 405c1a wsprintfA 3108->3111 3109->3047 3110 405be1 CloseHandle GetShortPathNameA 3110->3109 3112 405bf5 3110->3112 3113 405f64 17 API calls 3111->3113 3112->3106 3112->3109 3114 405c42 3113->3114 3132 405adb GetFileAttributesA CreateFileA 3114->3132 3116 405c4f 3116->3109 3117 405c5e GetFileSize GlobalAlloc 3116->3117 3118 405c80 3117->3118 3119 405d15 CloseHandle 3117->3119 3133 405b53 ReadFile 3118->3133 3119->3109 3124 405cb3 3126 405a40 4 API calls 3124->3126 3125 405c9f lstrcpyA 3127 405cc1 3125->3127 3126->3127 3128 405cf8 SetFilePointer 3127->3128 3140 405b82 WriteFile 3128->3140 3131->3110 3132->3116 3134 405b71 3133->3134 3134->3119 3135 405a40 lstrlenA 3134->3135 3136 405a81 lstrlenA 3135->3136 3137 405a89 3136->3137 3138 405a5a lstrcmpiA 3136->3138 3137->3124 3137->3125 3138->3137 3139 405a78 CharNextA 3138->3139 3139->3136 3141 405ba0 GlobalFree 3140->3141 3141->3119 4422 401b39 4423 402ac1 17 API calls 4422->4423 4424 401b40 4423->4424 4425 402a9f 17 API calls 4424->4425 4426 401b49 wsprintfA 4425->4426 4427 402951 4426->4427 4428 40233a 4429 402ac1 17 API calls 4428->4429 4430 40234b 4429->4430 4431 402ac1 17 API calls 4430->4431 4432 402354 4431->4432 4433 402ac1 17 API calls 4432->4433 4434 40235e GetPrivateProfileStringA 4433->4434 3222 4015bb 3223 402ac1 17 API calls 3222->3223 3224 4015c2 3223->3224 3225 405973 4 API calls 3224->3225 3235 4015ca 3225->3235 3226 401624 3228 401652 3226->3228 3229 401629 3226->3229 3227 405905 CharNextA 3227->3235 3231 401423 24 API calls 3228->3231 3242 401423 3229->3242 3239 40164a 3231->3239 3235->3226 3235->3227 3238 4015f3 3235->3238 3240 40160c GetFileAttributesA 3235->3240 3246 4055c9 3235->3246 3254 4055ac CreateDirectoryA 3235->3254 3237 40163b SetCurrentDirectoryA 3237->3239 3238->3235 3249 40552f CreateDirectoryA 3238->3249 3240->3235 3243 405069 24 API calls 3242->3243 3244 401431 3243->3244 3245 405f42 lstrcpynA 3244->3245 3245->3237 3257 4062da GetModuleHandleA 3246->3257 3250 405580 GetLastError 3249->3250 3251 40557c 3249->3251 3250->3251 3252 40558f SetFileSecurityA 3250->3252 3251->3238 3252->3251 3253 4055a5 GetLastError 3252->3253 3253->3251 3255 4055c0 GetLastError 3254->3255 3256 4055bc 3254->3256 3255->3256 3256->3235 3258 406300 GetProcAddress 3257->3258 3259 4062f6 3257->3259 3261 4055d0 3258->3261 3263 40626c GetSystemDirectoryA 3259->3263 3261->3235 3262 4062fc 3262->3258 3262->3261 3264 40628e wsprintfA LoadLibraryExA 3263->3264 3264->3262 4435 401d3b GetDlgItem GetClientRect 4436 402ac1 17 API calls 4435->4436 4437 401d6b LoadImageA SendMessageA 4436->4437 4438 402951 4437->4438 4439 401d89 DeleteObject 4437->4439 4439->4438 4440 4016bb 4441 402ac1 17 API calls 4440->4441 4442 4016c1 GetFullPathNameA 4441->4442 4443 4016d8 4442->4443 4449 4016f9 4442->4449 4446 406245 2 API calls 4443->4446 4443->4449 4444 402951 4445 40170d GetShortPathNameA 4445->4444 4447 4016e9 4446->4447 4447->4449 4450 405f42 lstrcpynA 4447->4450 4449->4444 4449->4445 4450->4449

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 4031ce-40320d SetErrorMode GetVersion 1 403220 0->1 2 40320f-403217 call 4062da 0->2 4 403225-403238 call 40626c lstrlenA 1->4 2->1 7 403219 2->7 9 40323a-403256 call 4062da * 3 4->9 7->1 16 403267-4032c7 #17 OleInitialize SHGetFileInfoA call 405f42 GetCommandLineA call 405f42 GetModuleHandleA 9->16 17 403258-40325e 9->17 24 4032d3-4032e8 call 405905 CharNextA 16->24 25 4032c9-4032ce 16->25 17->16 21 403260 17->21 21->16 28 4033ad-4033b1 24->28 25->24 29 4033b7 28->29 30 4032ed-4032f0 28->30 31 4033ca-4033e4 GetTempPathA call 40319d 29->31 32 4032f2-4032f6 30->32 33 4032f8-403300 30->33 42 4033e6-403404 GetWindowsDirectoryA lstrcatA call 40319d 31->42 43 40343c-403456 DeleteFileA call 402d48 31->43 32->32 32->33 34 403302-403303 33->34 35 403308-40330b 33->35 34->35 37 403311-403315 35->37 38 40339d-4033aa call 405905 35->38 40 403317-40331d 37->40 41 40332d-40335a 37->41 38->28 57 4033ac 38->57 45 403323 40->45 46 40331f-403321 40->46 47 40335c-403362 41->47 48 40336d-40339b 41->48 42->43 61 403406-403436 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 40319d 42->61 58 4034ea-4034fa ExitProcess CoUninitialize 43->58 59 40345c-403462 43->59 45->41 46->41 46->45 52 403364-403366 47->52 53 403368 47->53 48->38 55 4033b9-4033c5 call 405f42 48->55 52->48 52->53 53->48 55->31 57->28 64 403500-403510 call 40565e ExitProcess 58->64 65 40361e-403624 58->65 62 403464-40346f call 405905 59->62 63 4034da-4034e1 call 403792 59->63 61->43 61->58 80 403471-40349a 62->80 81 4034a5-4034af 62->81 73 4034e6 63->73 70 4036a0-4036a8 65->70 71 403626-40363f GetCurrentProcess OpenProcessToken 65->71 75 4036aa 70->75 76 4036ae-4036b2 ExitProcess 70->76 78 403671-40367f call 4062da 71->78 79 403641-40366b LookupPrivilegeValueA AdjustTokenPrivileges 71->79 73->58 75->76 90 403681-40368b 78->90 91 40368d-403697 ExitWindowsEx 78->91 79->78 83 40349c-40349e 80->83 84 4034b1-4034be call 4059c8 81->84 85 403516-40352a call 4055c9 lstrcatA 81->85 83->81 87 4034a0-4034a3 83->87 84->58 99 4034c0-4034d6 call 405f42 * 2 84->99 97 403537-403551 lstrcatA lstrcmpiA 85->97 98 40352c-403532 lstrcatA 85->98 87->81 87->83 90->91 92 403699-40369b call 40140b 90->92 91->70 91->92 92->70 97->58 100 403553-403556 97->100 98->97 99->63 102 403558-40355d call 40552f 100->102 103 40355f call 4055ac 100->103 108 403564-403571 SetCurrentDirectoryA 102->108 103->108 111 403573-403579 call 405f42 108->111 112 40357e-4035a6 call 405f42 108->112 111->112 116 4035ac-4035c8 call 405f64 DeleteFileA 112->116 119 403609-403610 116->119 120 4035ca-4035da CopyFileA 116->120 119->116 121 403612-403619 call 405d21 119->121 120->119 122 4035dc-4035fc call 405d21 call 405f64 call 4055e1 120->122 121->58 122->119 131 4035fe-403605 CloseHandle 122->131 131->119
                                APIs
                                • SetErrorMode.KERNELBASE ref: 004031F3
                                • GetVersion.KERNEL32 ref: 004031F9
                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040322C
                                • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403268
                                • OleInitialize.OLE32(00000000), ref: 0040326F
                                • SHGetFileInfoA.SHELL32(0079E500,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 0040328B
                                • GetCommandLineA.KERNEL32(007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 004032A0
                                • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\Rage.exe",00000000,?,00000006,00000008,0000000A), ref: 004032B3
                                • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Rage.exe",00000020,?,00000006,00000008,0000000A), ref: 004032DE
                                • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 004033DB
                                • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004033EC
                                • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004033F8
                                • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 0040340C
                                • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403414
                                • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403425
                                • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040342D
                                • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403441
                                  • Part of subcall function 004062DA: GetModuleHandleA.KERNEL32(?,?,?,00403241,0000000A), ref: 004062EC
                                  • Part of subcall function 004062DA: GetProcAddress.KERNEL32(00000000,?), ref: 00406307
                                  • Part of subcall function 00405F42: lstrcpynA.KERNEL32(?,?,00000400,004032A0,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F4F
                                  • Part of subcall function 00403792: GetUserDefaultUILanguage.KERNELBASE(00000002,75923410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Rage.exe",00000000), ref: 004037AC
                                  • Part of subcall function 00403792: lstrlenA.KERNEL32(open C:\ProgramData\wvtynvwe\AutoIt3.exe,?,?,?,open C:\ProgramData\wvtynvwe\AutoIt3.exe,00000000,C:\ProgramData\wvtynvwe,1033,0079F540,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F540,00000000,00000002,75923410), ref: 00403882
                                  • Part of subcall function 00403792: lstrcmpiA.KERNEL32(?,.exe), ref: 00403895
                                  • Part of subcall function 00403792: GetFileAttributesA.KERNEL32(open C:\ProgramData\wvtynvwe\AutoIt3.exe), ref: 004038A0
                                  • Part of subcall function 00403792: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\ProgramData\wvtynvwe), ref: 004038E9
                                  • Part of subcall function 00403792: RegisterClassA.USER32(007A26E0), ref: 00403926
                                • ExitProcess.KERNEL32(?,?,00000006,00000008,0000000A), ref: 004034EA
                                  • Part of subcall function 004036B8: CloseHandle.KERNEL32(FFFFFFFF,004034EF,?,?,00000006,00000008,0000000A), ref: 004036C3
                                • CoUninitialize.COMBASE(?,?,00000006,00000008,0000000A), ref: 004034EF
                                • ExitProcess.KERNEL32 ref: 00403510
                                • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 0040362D
                                • OpenProcessToken.ADVAPI32(00000000), ref: 00403634
                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040364C
                                • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 0040366B
                                • ExitWindowsEx.USER32(00000002,80040002), ref: 0040368F
                                • ExitProcess.KERNEL32 ref: 004036B2
                                  • Part of subcall function 0040565E: MessageBoxIndirectA.USER32(0040A218), ref: 004056B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Process$Exit$FileHandle$EnvironmentModulePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDefaultDeleteDirectoryErrorImageIndirectInfoInitializeLanguageLineLoadLookupMessageModeNextOpenPrivilegePrivilegesProcRegisterUninitializeUserValueVersionlstrcmpilstrcpyn
                                • String ID: "$"C:\Users\user\Desktop\Rage.exe"$.tmp$1033$C:\ProgramData\wvtynvwe$C:\ProgramData\wvtynvwe$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Rage.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                • API String ID: 3861850387-1526231467
                                • Opcode ID: 54dfbb4b5d42e962b35138971a0652499d0f60d33a266ff226056ae41e917d95
                                • Instruction ID: ea326dcf1c0b3132f51e3ff7546da7ae9c11cd61220b9029df30233a3f69a636
                                • Opcode Fuzzy Hash: 54dfbb4b5d42e962b35138971a0652499d0f60d33a266ff226056ae41e917d95
                                • Instruction Fuzzy Hash: FAC1C570104741AAD7216F759E49A2F3FADAB8630AF04457FF581B51E2CB7C8A05CB2E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 132 403792-4037aa call 4062da 135 4037ac-4037b7 GetUserDefaultUILanguage call 405ea0 132->135 136 4037be-4037ef call 405e29 132->136 139 4037bc 135->139 142 4037f1-403802 call 405e29 136->142 143 403807-40380d lstrcatA 136->143 141 403812-40383b call 403a57 call 4059c8 139->141 149 403841-403846 141->149 150 4038c2-4038ca call 4059c8 141->150 142->143 143->141 149->150 151 403848-40386c call 405e29 149->151 155 4038d8-4038fd LoadImageA 150->155 156 4038cc-4038d3 call 405f64 150->156 151->150 158 40386e-403870 151->158 160 40397e-403986 call 40140b 155->160 161 4038ff-40392f RegisterClassA 155->161 156->155 162 403881-40388d lstrlenA 158->162 163 403872-40387f call 405905 158->163 174 403990-40399b call 403a57 160->174 175 403988-40398b 160->175 164 403935-403979 SystemParametersInfoA CreateWindowExA 161->164 165 403a4d 161->165 169 4038b5-4038bd call 4058da call 405f42 162->169 170 40388f-40389d lstrcmpiA 162->170 163->162 164->160 168 403a4f-403a56 165->168 169->150 170->169 173 40389f-4038a9 GetFileAttributesA 170->173 177 4038ab-4038ad 173->177 178 4038af-4038b0 call 405921 173->178 184 4039a1-4039bb ShowWindow call 40626c 174->184 185 403a24-403a2c call 40513b 174->185 175->168 177->169 177->178 178->169 190 4039c7-4039d9 GetClassInfoA 184->190 191 4039bd-4039c2 call 40626c 184->191 192 403a46-403a48 call 40140b 185->192 193 403a2e-403a34 185->193 196 4039f1-403a22 DialogBoxParamA call 40140b call 4036e2 190->196 197 4039db-4039eb GetClassInfoA RegisterClassA 190->197 191->190 192->165 193->175 198 403a3a-403a41 call 40140b 193->198 196->168 197->196 198->175
                                APIs
                                  • Part of subcall function 004062DA: GetModuleHandleA.KERNEL32(?,?,?,00403241,0000000A), ref: 004062EC
                                  • Part of subcall function 004062DA: GetProcAddress.KERNEL32(00000000,?), ref: 00406307
                                • GetUserDefaultUILanguage.KERNELBASE(00000002,75923410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Rage.exe",00000000), ref: 004037AC
                                  • Part of subcall function 00405EA0: wsprintfA.USER32 ref: 00405EAD
                                • lstrcatA.KERNEL32(1033,0079F540,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F540,00000000,00000002,75923410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Rage.exe",00000000), ref: 0040380D
                                • lstrlenA.KERNEL32(open C:\ProgramData\wvtynvwe\AutoIt3.exe,?,?,?,open C:\ProgramData\wvtynvwe\AutoIt3.exe,00000000,C:\ProgramData\wvtynvwe,1033,0079F540,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F540,00000000,00000002,75923410), ref: 00403882
                                • lstrcmpiA.KERNEL32(?,.exe), ref: 00403895
                                • GetFileAttributesA.KERNEL32(open C:\ProgramData\wvtynvwe\AutoIt3.exe), ref: 004038A0
                                • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\ProgramData\wvtynvwe), ref: 004038E9
                                • RegisterClassA.USER32(007A26E0), ref: 00403926
                                • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040393E
                                • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403973
                                • ShowWindow.USER32(00000005,00000000), ref: 004039A9
                                • GetClassInfoA.USER32(00000000,RichEdit20A,007A26E0), ref: 004039D5
                                • GetClassInfoA.USER32(00000000,RichEdit,007A26E0), ref: 004039E2
                                • RegisterClassA.USER32(007A26E0), ref: 004039EB
                                • DialogBoxParamA.USER32(?,00000000,00403B2F,00000000), ref: 00403A0A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                • String ID: "C:\Users\user\Desktop\Rage.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\ProgramData\wvtynvwe$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$open C:\ProgramData\wvtynvwe\AutoIt3.exe$&z
                                • API String ID: 606308-4152628808
                                • Opcode ID: 4573ba04ebc77884384a9dff4b57512f3d1cc68e7e8383aaaadbd8588d4d55f5
                                • Instruction ID: 6bdd0c24031e65af1bb83e80dbe2e3bb6674319255249ac8b849c9fe46f77251
                                • Opcode Fuzzy Hash: 4573ba04ebc77884384a9dff4b57512f3d1cc68e7e8383aaaadbd8588d4d55f5
                                • Instruction Fuzzy Hash: AE61D571240600BED610BF659D45F3B3AACEB85749F00857FF980B22E2DB7D99068B2D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 205 402d48-402d96 GetTickCount GetModuleFileNameA call 405adb 208 402da2-402dd0 call 405f42 call 405921 call 405f42 GetFileSize 205->208 209 402d98-402d9d 205->209 217 402dd6 208->217 218 402ebd-402ecb call 402ce4 208->218 211 402f7a-402f7e 209->211 220 402ddb-402df2 217->220 224 402f20-402f25 218->224 225 402ecd-402ed0 218->225 222 402df4 220->222 223 402df6-402dff call 403170 220->223 222->223 231 402e05-402e0c 223->231 232 402f27-402f2f call 402ce4 223->232 224->211 227 402ed2-402eea call 403186 call 403170 225->227 228 402ef4-402f1e GlobalAlloc call 403186 call 402f81 225->228 227->224 254 402eec-402ef2 227->254 228->224 252 402f31-402f42 228->252 236 402e88-402e8c 231->236 237 402e0e-402e22 call 405a96 231->237 232->224 242 402e96-402e9c 236->242 243 402e8e-402e95 call 402ce4 236->243 237->242 251 402e24-402e2b 237->251 248 402eab-402eb5 242->248 249 402e9e-402ea8 call 406391 242->249 243->242 248->220 253 402ebb 248->253 249->248 251->242 258 402e2d-402e34 251->258 259 402f44 252->259 260 402f4a-402f4f 252->260 253->218 254->224 254->228 258->242 261 402e36-402e3d 258->261 259->260 262 402f50-402f56 260->262 261->242 263 402e3f-402e46 261->263 262->262 264 402f58-402f73 SetFilePointer call 405a96 262->264 263->242 265 402e48-402e68 263->265 268 402f78 264->268 265->224 267 402e6e-402e72 265->267 269 402e74-402e78 267->269 270 402e7a-402e82 267->270 268->211 269->253 269->270 270->242 271 402e84-402e86 270->271 271->242
                                APIs
                                • GetTickCount.KERNEL32 ref: 00402D59
                                • GetModuleFileNameA.KERNELBASE(00000000,C:\Users\user\Desktop\Rage.exe,00000400), ref: 00402D75
                                  • Part of subcall function 00405ADB: GetFileAttributesA.KERNELBASE(00000003,00402D88,C:\Users\user\Desktop\Rage.exe,80000000,00000003), ref: 00405ADF
                                  • Part of subcall function 00405ADB: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B01
                                • GetFileSize.KERNEL32(00000000,00000000,007AB000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Rage.exe,C:\Users\user\Desktop\Rage.exe,80000000,00000003), ref: 00402DC1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: File$AttributesCountCreateModuleNameSizeTick
                                • String ID: "C:\Users\user\Desktop\Rage.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Rage.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                • API String ID: 4283519449-4189184754
                                • Opcode ID: fd2093084ae6f2f361c09d7edbe045a2102e248848af7ed0038dbebb5adda0e8
                                • Instruction ID: 431bbe5dcf390c8e3b41a4a2cddc22f4a4d5a60d02444a29ee6e72f21c3f1069
                                • Opcode Fuzzy Hash: fd2093084ae6f2f361c09d7edbe045a2102e248848af7ed0038dbebb5adda0e8
                                • Instruction Fuzzy Hash: F351E23194021AABDB109F65DE89B9F7BB8EB05354F10413BFA04B62D1D7BC8D818B9D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 272 401759-40177c call 402ac1 call 405947 277 401786-401798 call 405f42 call 4058da lstrcatA 272->277 278 40177e-401784 call 405f42 272->278 283 40179d-4017a3 call 4061ac 277->283 278->283 288 4017a8-4017ac 283->288 289 4017ae-4017b8 call 406245 288->289 290 4017df-4017e2 288->290 297 4017ca-4017dc 289->297 298 4017ba-4017c8 CompareFileTime 289->298 292 4017e4-4017e5 call 405ab6 290->292 293 4017ea-401806 call 405adb 290->293 292->293 300 401808-40180b 293->300 301 40187e-4018a7 call 405069 call 402f81 293->301 297->290 298->297 303 401860-40186a call 405069 300->303 304 40180d-40184f call 405f42 * 2 call 405f64 call 405f42 call 40565e 300->304 314 4018a9-4018ad 301->314 315 4018af-4018bb SetFileTime 301->315 316 401873-401879 303->316 304->288 336 401855-401856 304->336 314->315 319 4018c1-4018cc CloseHandle 314->319 315->319 317 40295a 316->317 320 40295c-402960 317->320 322 402951-402954 319->322 323 4018d2-4018d5 319->323 322->317 325 4018d7-4018e8 call 405f64 lstrcatA 323->325 326 4018ea-4018ed call 405f64 323->326 332 4018f2-4022e6 call 40565e 325->332 326->332 332->320 332->322 336->316 338 401858-401859 336->338 338->303
                                APIs
                                • lstrcatA.KERNEL32(00000000,00000000,open,C:\ProgramData\wvtynvwe,00000000,00000000,00000031), ref: 00401798
                                • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,C:\ProgramData\wvtynvwe,00000000,00000000,00000031), ref: 004017C2
                                  • Part of subcall function 00405F42: lstrcpynA.KERNEL32(?,?,00000400,004032A0,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F4F
                                  • Part of subcall function 00405069: lstrlenA.KERNEL32(0079ED20,00000000,00790475,759223A0,?,?,?,?,?,?,?,?,?,004030B9,00000000,?), ref: 004050A2
                                  • Part of subcall function 00405069: lstrlenA.KERNEL32(004030B9,0079ED20,00000000,00790475,759223A0,?,?,?,?,?,?,?,?,?,004030B9,00000000), ref: 004050B2
                                  • Part of subcall function 00405069: lstrcatA.KERNEL32(0079ED20,004030B9,004030B9,0079ED20,00000000,00790475,759223A0), ref: 004050C5
                                  • Part of subcall function 00405069: SetWindowTextA.USER32(0079ED20,0079ED20), ref: 004050D7
                                  • Part of subcall function 00405069: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050FD
                                  • Part of subcall function 00405069: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405117
                                  • Part of subcall function 00405069: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405125
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                • String ID: C:\ProgramData\wvtynvwe$C:\ProgramData\wvtynvwe\clxs.a3x$open$open C:\ProgramData\wvtynvwe\AutoIt3.exe
                                • API String ID: 1941528284-3126961360
                                • Opcode ID: 0d43fd7dd8353952853e9013bf133ef40285121c9ea51c1581a1687533a7fe47
                                • Instruction ID: dd9c0c15e66697baca7a35a40d3b20135c8550c1c4c1c20121428b1abfe738c2
                                • Opcode Fuzzy Hash: 0d43fd7dd8353952853e9013bf133ef40285121c9ea51c1581a1687533a7fe47
                                • Instruction Fuzzy Hash: 7041E531904516BACF10BBB5CC45DAF3679EF41328B20837BF522B20E1C67C8A419E6E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 339 40626c-40628c GetSystemDirectoryA 340 406290-406292 339->340 341 40628e 339->341 342 4062a2-4062a4 340->342 343 406294-40629c 340->343 341->340 344 4062a5-4062d7 wsprintfA LoadLibraryExA 342->344 343->342 345 40629e-4062a0 343->345 345->344
                                APIs
                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406283
                                • wsprintfA.USER32 ref: 004062BC
                                • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004062D0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                • String ID: %s%s.dll$UXTHEME$\
                                • API String ID: 2200240437-4240819195
                                • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                • Instruction ID: faee1f553c32e40c51e8eba8ef91b672ff9b85d18c2ea7a865910a86d6ce685a
                                • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                • Instruction Fuzzy Hash: 34F0F630500609ABEF14AB64DD0DFEB375CAB08304F1404BEA686F10C1EAB8D9258B68

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 346 402f81-402f95 347 402f97 346->347 348 402f9e-402fa7 346->348 347->348 349 402fb0-402fb5 348->349 350 402fa9 348->350 351 402fc5-402fd2 call 403170 349->351 352 402fb7-402fc0 call 403186 349->352 350->349 356 402fd8-402fdc 351->356 357 40315e 351->357 352->351 358 402fe2-403008 GetTickCount 356->358 359 403109-40310b 356->359 360 403160-403161 357->360 363 403166 358->363 364 40300e-403016 358->364 361 40314b-40314e 359->361 362 40310d-403110 359->362 365 403169-40316d 360->365 366 403150 361->366 367 403153-40315c call 403170 361->367 362->363 368 403112 362->368 363->365 369 403018 364->369 370 40301b-403029 call 403170 364->370 366->367 367->357 380 403163 367->380 373 403115-40311b 368->373 369->370 370->357 379 40302f-403038 370->379 376 40311d 373->376 377 40311f-40312d call 403170 373->377 376->377 377->357 383 40312f-403134 call 405b82 377->383 382 40303e-40305e call 4063ff 379->382 380->363 388 403101-403103 382->388 389 403064-403077 GetTickCount 382->389 387 403139-40313b 383->387 390 403105-403107 387->390 391 40313d-403147 387->391 388->360 392 403079-403081 389->392 393 4030bc-4030be 389->393 390->360 391->373 394 403149 391->394 395 403083-403087 392->395 396 403089-4030b9 MulDiv wsprintfA call 405069 392->396 397 4030c0-4030c4 393->397 398 4030f5-4030f9 393->398 394->363 395->393 395->396 396->393 401 4030c6-4030cd call 405b82 397->401 402 4030db-4030e6 397->402 398->364 399 4030ff 398->399 399->363 406 4030d2-4030d4 401->406 404 4030e9-4030ed 402->404 404->382 407 4030f3 404->407 406->390 408 4030d6-4030d9 406->408 407->363 408->404
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CountTick$wsprintf
                                • String ID: ... %d%%
                                • API String ID: 551687249-2449383134
                                • Opcode ID: 395bbff9825787910bb7d588d8f06c8aea948aff440e28438afa561c5abaef61
                                • Instruction ID: 4f4b31f3c2c8719a6221e0ae45b4e5efb49971fa938741557c66a7ddabd37736
                                • Opcode Fuzzy Hash: 395bbff9825787910bb7d588d8f06c8aea948aff440e28438afa561c5abaef61
                                • Instruction Fuzzy Hash: CE516E319012199BCB10DFA5DA44A9F7BB8EB08756F14413BF910BB2D0D7789F40CBA9

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 409 405b0a-405b14 410 405b15-405b40 GetTickCount GetTempFileNameA 409->410 411 405b42-405b44 410->411 412 405b4f-405b51 410->412 411->410 414 405b46 411->414 413 405b49-405b4c 412->413 414->413
                                APIs
                                • GetTickCount.KERNEL32 ref: 00405B1E
                                • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B38
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CountFileNameTempTick
                                • String ID: "C:\Users\user\Desktop\Rage.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                • API String ID: 1716503409-1349086275
                                • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                • Instruction ID: bf28a9a74c6123c17d6ea431a1df647465e9dab3760c1a926ea6b161aa6db928
                                • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                • Instruction Fuzzy Hash: C8F082363042046BEB109F56DD04B9BBBADDFD1750F10803BFA489B280D6B4A9548B58

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 415 4015bb-4015ce call 402ac1 call 405973 420 4015d0-4015e3 call 405905 415->420 421 401624-401627 415->421 429 4015e5-4015e8 420->429 430 4015fb-4015fc call 4055ac 420->430 423 401652-40223c call 401423 421->423 424 401629-401644 call 401423 call 405f42 SetCurrentDirectoryA 421->424 437 402951-402960 423->437 438 402716-40271d 423->438 424->437 442 40164a-40164d 424->442 429->430 434 4015ea-4015f1 call 4055c9 429->434 436 401601-401603 430->436 434->430 446 4015f3-4015f9 call 40552f 434->446 443 401605-40160a 436->443 444 40161a-401622 436->444 438->437 442->437 448 401617 443->448 449 40160c-401615 GetFileAttributesA 443->449 444->420 444->421 446->436 448->444 449->444 449->448
                                APIs
                                  • Part of subcall function 00405973: CharNextA.USER32(?,?,007A0948,?,004059DF,007A0948,007A0948,75923410,?,C:\Users\user\AppData\Local\Temp\,0040572A,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405981
                                  • Part of subcall function 00405973: CharNextA.USER32(00000000), ref: 00405986
                                  • Part of subcall function 00405973: CharNextA.USER32(00000000), ref: 0040599A
                                • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                  • Part of subcall function 0040552F: CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405572
                                • SetCurrentDirectoryA.KERNELBASE(00000000,C:\ProgramData\wvtynvwe,00000000,00000000,000000F0), ref: 0040163C
                                Strings
                                • C:\ProgramData\wvtynvwe, xrefs: 00401631
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                • String ID: C:\ProgramData\wvtynvwe
                                • API String ID: 1892508949-2371683539
                                • Opcode ID: 4b67de153c8d73bd22696679ffb2b688d2c98a0fa6de6dd23771108c840cb84a
                                • Instruction ID: f5f4b3145e6fc53207d119520a298daebfb9a90f2eaea5cdf5ae3df67ae6ba32
                                • Opcode Fuzzy Hash: 4b67de153c8d73bd22696679ffb2b688d2c98a0fa6de6dd23771108c840cb84a
                                • Instruction Fuzzy Hash: D711C831608156EBCF217B654D4157F26B09A92324B28057FE9D1B22E2D63D4D429A2E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 452 401389-40138e 453 4013fa-4013fc 452->453 454 401390-4013a0 453->454 455 4013fe 453->455 454->455 456 4013a2-4013a3 call 401434 454->456 457 401400-401401 455->457 459 4013a8-4013ad 456->459 460 401404-401409 459->460 461 4013af-4013b7 call 40136d 459->461 460->457 464 4013b9-4013bb 461->464 465 4013bd-4013c2 461->465 466 4013c4-4013c9 464->466 465->466 466->453 467 4013cb-4013f4 MulDiv SendMessageA 466->467 467->453
                                APIs
                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: f1e14ae547b8f36b78d572cd64f3e527c113299c5085ae7931b2eb67e5d22d6e
                                • Instruction ID: b093ac6dabfd3bf5cd98619b9c3e878c543c382afaa1261ab96434968757bf0e
                                • Opcode Fuzzy Hash: f1e14ae547b8f36b78d572cd64f3e527c113299c5085ae7931b2eb67e5d22d6e
                                • Instruction Fuzzy Hash: C601F4316202209FE7094B389D04B6A36A8E751354F10813FF955F65F2D678CC028B4C

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 468 4062da-4062f4 GetModuleHandleA 469 406300-40630d GetProcAddress 468->469 470 4062f6-4062f7 call 40626c 468->470 472 406311-406313 469->472 473 4062fc-4062fe 470->473 473->469 474 40630f 473->474 474->472
                                APIs
                                • GetModuleHandleA.KERNEL32(?,?,?,00403241,0000000A), ref: 004062EC
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00406307
                                  • Part of subcall function 0040626C: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406283
                                  • Part of subcall function 0040626C: wsprintfA.USER32 ref: 004062BC
                                  • Part of subcall function 0040626C: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004062D0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                • String ID:
                                • API String ID: 2547128583-0
                                • Opcode ID: 30985bc18176bda4dfc46ca2d396654736e9499ca8d22b71f2c1527f66d3312f
                                • Instruction ID: 6d4d7ac2ac74d54284c03329a575cd53d6fd54091c86bc9b4f5055757ed92d74
                                • Opcode Fuzzy Hash: 30985bc18176bda4dfc46ca2d396654736e9499ca8d22b71f2c1527f66d3312f
                                • Instruction Fuzzy Hash: B0E0863260421057D21066715E04A3B72A89F84700302043EF946F2140DB389C3697AD

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 475 405adb-405b07 GetFileAttributesA CreateFileA
                                APIs
                                • GetFileAttributesA.KERNELBASE(00000003,00402D88,C:\Users\user\Desktop\Rage.exe,80000000,00000003), ref: 00405ADF
                                • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B01
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: File$AttributesCreate
                                • String ID:
                                • API String ID: 415043291-0
                                • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                                • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 476 405ab6-405ac6 GetFileAttributesA 477 405ad5-405ad8 476->477 478 405ac8-405acf SetFileAttributesA 476->478 478->477
                                APIs
                                • GetFileAttributesA.KERNELBASE(?,?,004056CE,?,?,00000000,004058B1,?,?,?,?), ref: 00405ABB
                                • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405ACF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: AttributesFile
                                • String ID:
                                • API String ID: 3188754299-0
                                • Opcode ID: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                                • Instruction ID: aac931f15d2d7ee1e7e221b8fb91e87f1231b7c2176c4a2b53cffd82f2b4ddf1
                                • Opcode Fuzzy Hash: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                                • Instruction Fuzzy Hash: 63D0C972504121ABD2102728AE0889BBB55DB54271712CB35F8A9A26F1DB304C569AA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 479 4055ac-4055ba CreateDirectoryA 480 4055c0 GetLastError 479->480 481 4055bc-4055be 479->481 482 4055c6 480->482 481->482
                                APIs
                                • CreateDirectoryA.KERNELBASE(?,00000000,004031C1,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E2,?,00000006,00000008,0000000A), ref: 004055B2
                                • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 004055C0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CreateDirectoryErrorLast
                                • String ID:
                                • API String ID: 1375471231-0
                                • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                • Instruction ID: d679fad9c672f6a8ccfbb6da76b293a182284e12660a0008c2510280bf930a01
                                • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                • Instruction Fuzzy Hash: 34C04C70214601FED6515B319F09B1B7EE6EB90781F11843A6146E41F4DA348455D92E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 496 405b53-405b6f ReadFile 497 405b71-405b74 496->497 498 405b7b 496->498 497->498 499 405b76-405b79 497->499 500 405b7d-405b7f 498->500 499->500
                                APIs
                                • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403183,00000000,00000000,00402FD0,000000FF,00000004,00000000,00000000,00000000), ref: 00405B67
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                • Instruction ID: b7d91c5420632eddea9312ae655271143aa9063ea302fc5b9ab1ab8bce17f77e
                                • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                • Instruction Fuzzy Hash: C3E0EC3221065EABDF109E559C40EEB7B6CFB053A0F008476FD25E3150E631F8219FA4
                                APIs
                                • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403139,00000000,0078A0F8,000000FF,0078A0F8,000000FF,000000FF,00000004,00000000), ref: 00405B96
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: FileWrite
                                • String ID:
                                • API String ID: 3934441357-0
                                • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                • Instruction ID: dc12008b84dc55f9eae4749af390a7f63d9cada5657987a7308dd9f5849e87fb
                                • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                • Instruction Fuzzy Hash: D6E0EC3221065AABDF609E559C04AEB7B6CEB05360F004436F915E2150D675F921DBB8
                                APIs
                                • ShellExecuteExA.SHELL32(?,00401EBC,?), ref: 00405633
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: ExecuteShell
                                • String ID:
                                • API String ID: 587946157-0
                                • Opcode ID: 3dbb5c45fd0362357dc29e094c299a4b113cabf0b50495ccaf1730ce731ee503
                                • Instruction ID: fedc52184ae6edd1acf052e6849869f1d6de8b7351bc39b82099fbd6471e80b9
                                • Opcode Fuzzy Hash: 3dbb5c45fd0362357dc29e094c299a4b113cabf0b50495ccaf1730ce731ee503
                                • Instruction Fuzzy Hash: ECC092B2000200DFE301CF90CB18F077BE8AF55306F028058E1C49A160C7788810CB69
                                APIs
                                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F0F,?), ref: 00403194
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                APIs
                                • CloseHandle.KERNEL32(FFFFFFFF,004034EF,?,?,00000006,00000008,0000000A), ref: 004036C3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CloseHandle
                                • String ID:
                                • API String ID: 2962429428-0
                                • Opcode ID: 1614ba02b2613583747f204f4b2df3f5a1e6ee72f31db953788cc790fd2339e2
                                • Instruction ID: e5b7db38883734f5cd43fd9a982a580d4974862b55da1e12b5eb97a8bd040236
                                • Opcode Fuzzy Hash: 1614ba02b2613583747f204f4b2df3f5a1e6ee72f31db953788cc790fd2339e2
                                • Instruction Fuzzy Hash: 0BC01230500704A6C5706F759E4F9053A545B81735F500735F0B5B11F1CB7C665AA55E
                                APIs
                                • GetDlgItem.USER32(?,000003F9), ref: 004049FE
                                • GetDlgItem.USER32(?,00000408), ref: 00404A09
                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A53
                                • LoadBitmapA.USER32(0000006E), ref: 00404A66
                                • SetWindowLongA.USER32(?,000000FC,00404FDD), ref: 00404A7F
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A93
                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404AA5
                                • SendMessageA.USER32(?,00001109,00000002), ref: 00404ABB
                                • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404AC7
                                • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404AD9
                                • DeleteObject.GDI32(00000000), ref: 00404ADC
                                • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B07
                                • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B13
                                • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404BA8
                                • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404BD3
                                • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404BE7
                                • GetWindowLongA.USER32(?,000000F0), ref: 00404C16
                                • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C24
                                • ShowWindow.USER32(?,00000005), ref: 00404C35
                                • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D32
                                • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404D97
                                • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404DAC
                                • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404DD0
                                • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404DF0
                                • ImageList_Destroy.COMCTL32(?), ref: 00404E05
                                • GlobalFree.KERNEL32(?), ref: 00404E15
                                • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404E8E
                                • SendMessageA.USER32(?,00001102,?,?), ref: 00404F37
                                • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404F46
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F66
                                • ShowWindow.USER32(?,00000000), ref: 00404FB4
                                • GetDlgItem.USER32(?,000003FE), ref: 00404FBF
                                • ShowWindow.USER32(00000000), ref: 00404FC6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                • String ID: $M$N
                                • API String ID: 1638840714-813528018
                                • Opcode ID: 93a5dea554acafdd7f9fa93af182cc67e10ddeacb3b9749c107691ee74c0e35b
                                • Instruction ID: feb09b03230ec9de5227bb28ba9f3f750fb888e87e2cf3f84613fbf0b179ef39
                                • Opcode Fuzzy Hash: 93a5dea554acafdd7f9fa93af182cc67e10ddeacb3b9749c107691ee74c0e35b
                                • Instruction Fuzzy Hash: FC028FB0900209EFEB149F68DD85AAE7BB5FB84315F10813AF610B62E1C7789D52DF58
                                APIs
                                • GetDlgItem.USER32(?,00000403), ref: 00405206
                                • GetDlgItem.USER32(?,000003EE), ref: 00405215
                                • GetClientRect.USER32(?,?), ref: 00405252
                                • GetSystemMetrics.USER32(00000002), ref: 00405259
                                • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040527A
                                • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 0040528B
                                • SendMessageA.USER32(?,00001001,00000000,?), ref: 0040529E
                                • SendMessageA.USER32(?,00001026,00000000,?), ref: 004052AC
                                • SendMessageA.USER32(?,00001024,00000000,?), ref: 004052BF
                                • ShowWindow.USER32(00000000,?,0000001B,?), ref: 004052E1
                                • ShowWindow.USER32(?,00000008), ref: 004052F5
                                • GetDlgItem.USER32(?,000003EC), ref: 00405316
                                • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405326
                                • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040533F
                                • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 0040534B
                                • GetDlgItem.USER32(?,000003F8), ref: 00405224
                                  • Part of subcall function 00404038: SendMessageA.USER32(00000028,?,00000001,00403E68), ref: 00404046
                                • GetDlgItem.USER32(?,000003EC), ref: 00405367
                                • CreateThread.KERNEL32(00000000,00000000,Function_0000513B,00000000), ref: 00405375
                                • CloseHandle.KERNEL32(00000000), ref: 0040537C
                                • ShowWindow.USER32(00000000), ref: 0040539F
                                • ShowWindow.USER32(?,00000008), ref: 004053A6
                                • ShowWindow.USER32(00000008), ref: 004053EC
                                • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405420
                                • CreatePopupMenu.USER32 ref: 00405431
                                • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405446
                                • GetWindowRect.USER32(?,000000FF), ref: 00405466
                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040547F
                                • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054BB
                                • OpenClipboard.USER32(00000000), ref: 004054CB
                                • EmptyClipboard.USER32 ref: 004054D1
                                • GlobalAlloc.KERNEL32(00000042,?), ref: 004054DA
                                • GlobalLock.KERNEL32(00000000), ref: 004054E4
                                • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054F8
                                • GlobalUnlock.KERNEL32(00000000), ref: 00405511
                                • SetClipboardData.USER32(00000001,00000000), ref: 0040551C
                                • CloseClipboard.USER32 ref: 00405522
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                • String ID:
                                • API String ID: 590372296-0
                                • Opcode ID: 5bb85f9fd3fc5e549709c94d4a210579cba1b9e23c5744368082747204fdc146
                                • Instruction ID: 09962e5fca3f90e9578524edcc49537ab2d17e1ad14151c73511ea412a4409f5
                                • Opcode Fuzzy Hash: 5bb85f9fd3fc5e549709c94d4a210579cba1b9e23c5744368082747204fdc146
                                • Instruction Fuzzy Hash: 47A17B70900608BFDF119FA4DE89EAE7BB9FB48344F10402AFA41B61A1C7794E51DF68
                                APIs
                                • GetDlgItem.USER32(?,000003FB), ref: 004044C2
                                • SetWindowTextA.USER32(00000000,?), ref: 004044EC
                                • SHBrowseForFolderA.SHELL32(?,0079E918,?), ref: 0040459D
                                • CoTaskMemFree.OLE32(00000000), ref: 004045A8
                                • lstrcmpiA.KERNEL32(open C:\ProgramData\wvtynvwe\AutoIt3.exe,0079F540), ref: 004045DA
                                • lstrcatA.KERNEL32(?,open C:\ProgramData\wvtynvwe\AutoIt3.exe), ref: 004045E6
                                • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004045F8
                                  • Part of subcall function 00405642: GetDlgItemTextA.USER32(?,?,00000400,0040462F), ref: 00405655
                                  • Part of subcall function 004061AC: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Rage.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031A9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E2,?,00000006,00000008,0000000A), ref: 00406204
                                  • Part of subcall function 004061AC: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406211
                                  • Part of subcall function 004061AC: CharNextA.USER32(?,"C:\Users\user\Desktop\Rage.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031A9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E2,?,00000006,00000008,0000000A), ref: 00406216
                                  • Part of subcall function 004061AC: CharPrevA.USER32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031A9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E2,?,00000006,00000008,0000000A), ref: 00406226
                                • GetDiskFreeSpaceA.KERNEL32(0079E510,?,?,0000040F,?,0079E510,0079E510,?,00000001,0079E510,?,?,000003FB,?), ref: 004046B6
                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004046D1
                                  • Part of subcall function 0040482A: lstrlenA.KERNEL32(0079F540,0079F540,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404745,000000DF,00000000,00000400,?), ref: 004048C8
                                  • Part of subcall function 0040482A: wsprintfA.USER32 ref: 004048D0
                                  • Part of subcall function 0040482A: SetDlgItemTextA.USER32(?,0079F540), ref: 004048E3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                • String ID: A$C:\ProgramData\wvtynvwe$open C:\ProgramData\wvtynvwe\AutoIt3.exe
                                • API String ID: 2624150263-3232468740
                                • Opcode ID: 3c0359a4e2499cb1b58791620b1c2069b725a9ac35f7ca23850945cc9ffa1be5
                                • Instruction ID: a2e4fbb223646fa704944566a3391d0c17d9cbc2cbed741d1673875fbf363f5e
                                • Opcode Fuzzy Hash: 3c0359a4e2499cb1b58791620b1c2069b725a9ac35f7ca23850945cc9ffa1be5
                                • Instruction Fuzzy Hash: C6A16EB1900209ABDB11EFA5CD41AAFB7B8EF85314F10843BF701B62D1D77C8A418B69
                                APIs
                                • DeleteFileA.KERNEL32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405733
                                • lstrcatA.KERNEL32(007A0548,\*.*,007A0548,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040577B
                                • lstrcatA.KERNEL32(?,0040A014,?,007A0548,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040579C
                                • lstrlenA.KERNEL32(?,?,0040A014,?,007A0548,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057A2
                                • FindFirstFileA.KERNEL32(007A0548,?,?,?,0040A014,?,007A0548,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057B3
                                • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405860
                                • FindClose.KERNEL32(00000000), ref: 00405871
                                Strings
                                • "C:\Users\user\Desktop\Rage.exe", xrefs: 0040570A
                                • \*.*, xrefs: 00405775
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405717
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                • String ID: "C:\Users\user\Desktop\Rage.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                • API String ID: 2035342205-2828151234
                                • Opcode ID: bac28e60cfd6598e6d244b6c6dd5f2b57952399981f623fc13e4ff0d7e2d0873
                                • Instruction ID: d13e86c599d1992239359fe06af11ecde70b93afebcb442c30f9b7feac53d967
                                • Opcode Fuzzy Hash: bac28e60cfd6598e6d244b6c6dd5f2b57952399981f623fc13e4ff0d7e2d0873
                                • Instruction Fuzzy Hash: 82519131800A04AADB217B658C45BBF7BB8DF42754F24807FF851721D1D73C8952DEAA
                                APIs
                                • CoCreateInstance.OLE32(00408408,?,00000001,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040214D
                                • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021FC
                                Strings
                                • C:\ProgramData\wvtynvwe, xrefs: 0040218D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: ByteCharCreateInstanceMultiWide
                                • String ID: C:\ProgramData\wvtynvwe
                                • API String ID: 123533781-2371683539
                                • Opcode ID: a26c2beb0f30681b548f380fb14fd97755e4f2b8dcf256f461589d36fb4f9269
                                • Instruction ID: cf8f7130570b1b92896c88b61f7317bf39c47c02c96b55d236e0d8f8a2b8e87b
                                • Opcode Fuzzy Hash: a26c2beb0f30681b548f380fb14fd97755e4f2b8dcf256f461589d36fb4f9269
                                • Instruction Fuzzy Hash: F95136B5A00208BFCF10DFE4C988A9DBBB5EF48314F2041AAF915EB2D1DA799941CF54
                                APIs
                                • FindFirstFileA.KERNEL32(75923410,007A0D90,007A0948,00405A0B,007A0948,007A0948,00000000,007A0948,007A0948,75923410,?,C:\Users\user\AppData\Local\Temp\,0040572A,?,75923410,C:\Users\user\AppData\Local\Temp\), ref: 00406250
                                • FindClose.KERNEL32(00000000), ref: 0040625C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Find$CloseFileFirst
                                • String ID:
                                • API String ID: 2295610775-0
                                • Opcode ID: c24f07e19fd736ab640c4fa4be5052e5aaef0f0ac654c0d60e62e1f7b242b1f9
                                • Instruction ID: 33d6f2eefb205aa3b7ff26f6f1897bb94b895816ac4b0862ae3820c4f049c28d
                                • Opcode Fuzzy Hash: c24f07e19fd736ab640c4fa4be5052e5aaef0f0ac654c0d60e62e1f7b242b1f9
                                • Instruction Fuzzy Hash: F0D012329091205BC21067786E0C84B7A589F46370B214B7AB4AAF15E0C6388C6287E9
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402707
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: FileFindFirst
                                • String ID:
                                • API String ID: 1974802433-0
                                • Opcode ID: 2bd42633c05d02f52777b451ddda99a2743e6e135658162a4d387a3c6b531069
                                • Instruction ID: e695779f9ce9b998070782fd5a459e3569f6455c2d57c993d98b78b2031c355d
                                • Opcode Fuzzy Hash: 2bd42633c05d02f52777b451ddda99a2743e6e135658162a4d387a3c6b531069
                                • Instruction Fuzzy Hash: 8DF0A0726041119AD701E7B49D49AEEB768DB21324F60017BE695E20C2C6B88A469B2A
                                APIs
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B6B
                                • ShowWindow.USER32(?), ref: 00403B88
                                • DestroyWindow.USER32 ref: 00403B9C
                                • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BB8
                                • GetDlgItem.USER32(?,?), ref: 00403BD9
                                • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BED
                                • IsWindowEnabled.USER32(00000000), ref: 00403BF4
                                • GetDlgItem.USER32(?,00000001), ref: 00403CA2
                                • GetDlgItem.USER32(?,00000002), ref: 00403CAC
                                • SetClassLongA.USER32(?,000000F2,?), ref: 00403CC6
                                • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D17
                                • GetDlgItem.USER32(?,00000003), ref: 00403DBD
                                • ShowWindow.USER32(00000000,?), ref: 00403DDE
                                • EnableWindow.USER32(?,?), ref: 00403DF0
                                • EnableWindow.USER32(?,?), ref: 00403E0B
                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E21
                                • EnableMenuItem.USER32(00000000), ref: 00403E28
                                • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E40
                                • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E53
                                • lstrlenA.KERNEL32(0079F540,?,0079F540,00000000), ref: 00403E7D
                                • SetWindowTextA.USER32(?,0079F540), ref: 00403E8C
                                • ShowWindow.USER32(?,0000000A), ref: 00403FC0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                • String ID:
                                • API String ID: 184305955-0
                                • Opcode ID: 7f76a5b8156c78a94673a487ddb43565ec2e9110f562ab6c46483f56c2dcbdcf
                                • Instruction ID: b3be4a8df41bbb1a34e3297708249d174a72e40218f8278c8686e9c74d2bf613
                                • Opcode Fuzzy Hash: 7f76a5b8156c78a94673a487ddb43565ec2e9110f562ab6c46483f56c2dcbdcf
                                • Instruction Fuzzy Hash: 8CC1E071504205AFEB216F25ED89E2B3ABDEB85306F00443EF641B11F1CB3D9A529B6D
                                APIs
                                • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004041D7
                                • GetDlgItem.USER32(00000000,000003E8), ref: 004041EB
                                • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404209
                                • GetSysColor.USER32(?), ref: 0040421A
                                • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404229
                                • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404238
                                • lstrlenA.KERNEL32(?), ref: 0040423B
                                • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 0040424A
                                • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 0040425F
                                • GetDlgItem.USER32(?,0000040A), ref: 004042C1
                                • SendMessageA.USER32(00000000), ref: 004042C4
                                • GetDlgItem.USER32(?,000003E8), ref: 004042EF
                                • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040432F
                                • LoadCursorA.USER32(00000000,00007F02), ref: 0040433E
                                • SetCursor.USER32(00000000), ref: 00404347
                                • LoadCursorA.USER32(00000000,00007F00), ref: 0040435D
                                • SetCursor.USER32(00000000), ref: 00404360
                                • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040438C
                                • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                • String ID: N$open C:\ProgramData\wvtynvwe\AutoIt3.exe
                                • API String ID: 3103080414-3750366646
                                • Opcode ID: 3fdeaefca53a56e234a94c61e234fdb8f55c9ed1e1da13f1627204f87759fe70
                                • Instruction ID: fe94f9ee99578da6acd451f42b216120b5917c0b2e2c3b2ca95fb8a58add93f4
                                • Opcode Fuzzy Hash: 3fdeaefca53a56e234a94c61e234fdb8f55c9ed1e1da13f1627204f87759fe70
                                • Instruction Fuzzy Hash: 3E61A5B1A40209BFEB109F61DD45F6A7B79FB84704F10802AFB04BA2D1D778A951CF98
                                APIs
                                • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                • BeginPaint.USER32(?,?), ref: 00401047
                                • GetClientRect.USER32(?,?), ref: 0040105B
                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                • DeleteObject.GDI32(?), ref: 004010ED
                                • CreateFontIndirectA.GDI32(?), ref: 00401105
                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                • DrawTextA.USER32(00000000,007A2740,000000FF,00000010,00000820), ref: 00401156
                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                • DeleteObject.GDI32(?), ref: 00401165
                                • EndPaint.USER32(?,?), ref: 0040116E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                • String ID: F
                                • API String ID: 941294808-1304234792
                                • Opcode ID: 5d259313e85fbaf708a0b03883ff4ad94c3fd8dcebbcebd210a7d21844077b3d
                                • Instruction ID: 38fadef1db352f82975619da7fddedca022a80716c75150ab5a709db8b4f24fa
                                • Opcode Fuzzy Hash: 5d259313e85fbaf708a0b03883ff4ad94c3fd8dcebbcebd210a7d21844077b3d
                                • Instruction Fuzzy Hash: CB416C71800249AFCB058F95DE459AFBBB9FF45314F00802EF9A1AA1A0C778DA55DFA4
                                APIs
                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405D42,?,?), ref: 00405BE2
                                • GetShortPathNameA.KERNEL32(?,007A12D0,00000400), ref: 00405BEB
                                  • Part of subcall function 00405A40: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405C9B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A50
                                  • Part of subcall function 00405A40: lstrlenA.KERNEL32(00000000,?,00000000,00405C9B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A82
                                • GetShortPathNameA.KERNEL32(?,007A16D0,00000400), ref: 00405C08
                                • wsprintfA.USER32 ref: 00405C26
                                • GetFileSize.KERNEL32(00000000,00000000,007A16D0,C0000000,00000004,007A16D0,?,?,?,?,?), ref: 00405C61
                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405C70
                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CA8
                                • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,007A0ED0,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405CFE
                                • GlobalFree.KERNEL32(00000000), ref: 00405D0F
                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D16
                                  • Part of subcall function 00405ADB: GetFileAttributesA.KERNELBASE(00000003,00402D88,C:\Users\user\Desktop\Rage.exe,80000000,00000003), ref: 00405ADF
                                  • Part of subcall function 00405ADB: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B01
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                • String ID: %s=%s$[Rename]
                                • API String ID: 2171350718-1727408572
                                • Opcode ID: 36d44f5c9853182170fdc09cfff86aa36828fe8a00fb97525ec3968d79f5ff8e
                                • Instruction ID: 637a3d628f16c5af013d2b0d1efa584cc5f297bc3ade19b8e2238539b1010773
                                • Opcode Fuzzy Hash: 36d44f5c9853182170fdc09cfff86aa36828fe8a00fb97525ec3968d79f5ff8e
                                • Instruction Fuzzy Hash: E6311231205B157BD2203B659D48F6B3A6CDF85754F28053AFA01F62D2EA3CE8018EBD
                                APIs
                                • GetSystemDirectoryA.KERNEL32(open C:\ProgramData\wvtynvwe\AutoIt3.exe,00000400), ref: 0040608F
                                • GetWindowsDirectoryA.KERNEL32(open C:\ProgramData\wvtynvwe\AutoIt3.exe,00000400,?,0079ED20,00000000,004050A1,0079ED20,00000000), ref: 004060A2
                                • SHGetSpecialFolderLocation.SHELL32(004050A1,759223A0,?,0079ED20,00000000,004050A1,0079ED20,00000000), ref: 004060DE
                                • SHGetPathFromIDListA.SHELL32(759223A0,open C:\ProgramData\wvtynvwe\AutoIt3.exe), ref: 004060EC
                                • CoTaskMemFree.OLE32(759223A0), ref: 004060F8
                                • lstrcatA.KERNEL32(open C:\ProgramData\wvtynvwe\AutoIt3.exe,\Microsoft\Internet Explorer\Quick Launch), ref: 0040611C
                                • lstrlenA.KERNEL32(open C:\ProgramData\wvtynvwe\AutoIt3.exe,?,0079ED20,00000000,004050A1,0079ED20,00000000,00000000,00790475,759223A0), ref: 0040616E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$open C:\ProgramData\wvtynvwe\AutoIt3.exe
                                • API String ID: 717251189-2195795450
                                • Opcode ID: 4550c8ed14394774286f8022b57fa57a0b33301bca964282d4e54840fc3ca20a
                                • Instruction ID: 657cab0ace126491ae758d46bb2980ba0dc5c343891863a13133d2e564576f3a
                                • Opcode Fuzzy Hash: 4550c8ed14394774286f8022b57fa57a0b33301bca964282d4e54840fc3ca20a
                                • Instruction Fuzzy Hash: 87611471900111AFEF109F68DC85BBA3BA4AB46314F12413FE943BA2D2C77D4962CB4E
                                APIs
                                • lstrlenA.KERNEL32(0079ED20,00000000,00790475,759223A0,?,?,?,?,?,?,?,?,?,004030B9,00000000,?), ref: 004050A2
                                • lstrlenA.KERNEL32(004030B9,0079ED20,00000000,00790475,759223A0,?,?,?,?,?,?,?,?,?,004030B9,00000000), ref: 004050B2
                                • lstrcatA.KERNEL32(0079ED20,004030B9,004030B9,0079ED20,00000000,00790475,759223A0), ref: 004050C5
                                • SetWindowTextA.USER32(0079ED20,0079ED20), ref: 004050D7
                                • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050FD
                                • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405117
                                • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405125
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                • String ID: y
                                • API String ID: 2531174081-1062152503
                                • Opcode ID: df9fa322c0453a065a888b8f71298073a1822c311b4ca3682e0548b8907b6f01
                                • Instruction ID: 89683e74244f30e825ec863f7a89f7bffe3770603979b342a6609b7659f93117
                                • Opcode Fuzzy Hash: df9fa322c0453a065a888b8f71298073a1822c311b4ca3682e0548b8907b6f01
                                • Instruction Fuzzy Hash: F5218C71900518BACF119FA5DD84A9FBFA9EB09354F14807AF544AA290C7788A40CFA8
                                APIs
                                • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Rage.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031A9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E2,?,00000006,00000008,0000000A), ref: 00406204
                                • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406211
                                • CharNextA.USER32(?,"C:\Users\user\Desktop\Rage.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031A9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E2,?,00000006,00000008,0000000A), ref: 00406216
                                • CharPrevA.USER32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000,004031A9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E2,?,00000006,00000008,0000000A), ref: 00406226
                                Strings
                                • "C:\Users\user\Desktop\Rage.exe", xrefs: 004061E8
                                • *?|<>/":, xrefs: 004061F4
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 004061AD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Char$Next$Prev
                                • String ID: "C:\Users\user\Desktop\Rage.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                • API String ID: 589700163-3651791744
                                • Opcode ID: 5f1665aab2a45dc98a0c2aad5c019af140aadccb050e4449eaa375ca2787231f
                                • Instruction ID: bdcb7cc7c91d871583b49daff1dd0f9603b265494e114170260e43a32c5c6c09
                                • Opcode Fuzzy Hash: 5f1665aab2a45dc98a0c2aad5c019af140aadccb050e4449eaa375ca2787231f
                                • Instruction Fuzzy Hash: BB1108618047A129EB3226245C44B7B7FC88F577A0F1A00BFE4D6762C3C67C5C628A6D
                                APIs
                                • GetWindowLongA.USER32(?,000000EB), ref: 00404087
                                • GetSysColor.USER32(00000000), ref: 004040A3
                                • SetTextColor.GDI32(?,00000000), ref: 004040AF
                                • SetBkMode.GDI32(?,?), ref: 004040BB
                                • GetSysColor.USER32(?), ref: 004040CE
                                • SetBkColor.GDI32(?,?), ref: 004040DE
                                • DeleteObject.GDI32(?), ref: 004040F8
                                • CreateBrushIndirect.GDI32(?), ref: 00404102
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                • String ID:
                                • API String ID: 2320649405-0
                                • Opcode ID: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                                • Instruction ID: e72f94c4e22ee448d473b15cc8768ff49957eee448288f542271c02bb7392c6c
                                • Opcode Fuzzy Hash: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                                • Instruction Fuzzy Hash: 2E218471500704ABC7319F68DD08B4BBBF8AF41714F048939EA95F66A0D734E944CB54
                                APIs
                                • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040494F
                                • GetMessagePos.USER32 ref: 00404957
                                • ScreenToClient.USER32(?,?), ref: 00404971
                                • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404983
                                • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004049A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Message$Send$ClientScreen
                                • String ID: f
                                • API String ID: 41195575-1993550816
                                • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                • Instruction ID: 9f87d1f96637cd95e02eacff83315fbabeb05544dbb8078b13e3fe085f54f252
                                • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                • Instruction Fuzzy Hash: 54015275900219BAEB10DBA4DD45BFFBBBCAF55711F10412BBA50B61C0C7B459018BA5
                                APIs
                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C7C
                                • MulDiv.KERNEL32(001562AE,00000064,001562B2), ref: 00402CA7
                                • wsprintfA.USER32 ref: 00402CB7
                                • SetWindowTextA.USER32(?,?), ref: 00402CC7
                                • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CD9
                                Strings
                                • verifying installer: %d%%, xrefs: 00402CB1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Text$ItemTimerWindowwsprintf
                                • String ID: verifying installer: %d%%
                                • API String ID: 1451636040-82062127
                                • Opcode ID: eef9a404b70e8a65b08e01be9a087e60fbea96a6756cd33d7edc079d4ddd97f4
                                • Instruction ID: e89b30bbe7a1ffbacd4e8467669da5a94a5c2e7b600bd1dad6d6b5a2d11bc3bf
                                • Opcode Fuzzy Hash: eef9a404b70e8a65b08e01be9a087e60fbea96a6756cd33d7edc079d4ddd97f4
                                • Instruction Fuzzy Hash: 0601177054020DFBEF249F61DD4AEEE3769EB04304F008039FA06B92D0DBB999558F59
                                APIs
                                • CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405572
                                • GetLastError.KERNEL32 ref: 00405586
                                • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 0040559B
                                • GetLastError.KERNEL32 ref: 004055A5
                                Strings
                                • C:\Users\user\Desktop, xrefs: 0040552F
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405555
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                • API String ID: 3449924974-1521822154
                                • Opcode ID: 5ed0d1f38f2075833211856a8ebf7d2689aced5b3dcb66e6179e3f4d9a7ce916
                                • Instruction ID: 376828453cd42821b5cd8262128f85d8abda27f03043a04a3675b82aceba1981
                                • Opcode Fuzzy Hash: 5ed0d1f38f2075833211856a8ebf7d2689aced5b3dcb66e6179e3f4d9a7ce916
                                • Instruction Fuzzy Hash: 5A010871D10219EADF009BA1DD04BEFBBB9EB04355F00803AD544B6290E7789608CFA9
                                APIs
                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040278A
                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027A6
                                • GlobalFree.KERNEL32(?), ref: 004027E5
                                • GlobalFree.KERNEL32(00000000), ref: 004027F8
                                • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402810
                                • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402824
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                • String ID:
                                • API String ID: 2667972263-0
                                • Opcode ID: b45102d8d3259269e52f498ae29a62b13b390da9ee7db00c21edc77376252bc5
                                • Instruction ID: 890f56038aeb86756f8426a045e697074279617aee550660c002ceda6b1f970f
                                • Opcode Fuzzy Hash: b45102d8d3259269e52f498ae29a62b13b390da9ee7db00c21edc77376252bc5
                                • Instruction Fuzzy Hash: 76219F71C00124BBCF216FA5DE49D9E7A79EF05364F14423AF924762E1CA794D418FA8
                                APIs
                                • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00402028
                                  • Part of subcall function 00405069: lstrlenA.KERNEL32(0079ED20,00000000,00790475,759223A0,?,?,?,?,?,?,?,?,?,004030B9,00000000,?), ref: 004050A2
                                  • Part of subcall function 00405069: lstrlenA.KERNEL32(004030B9,0079ED20,00000000,00790475,759223A0,?,?,?,?,?,?,?,?,?,004030B9,00000000), ref: 004050B2
                                  • Part of subcall function 00405069: lstrcatA.KERNEL32(0079ED20,004030B9,004030B9,0079ED20,00000000,00790475,759223A0), ref: 004050C5
                                  • Part of subcall function 00405069: SetWindowTextA.USER32(0079ED20,0079ED20), ref: 004050D7
                                  • Part of subcall function 00405069: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050FD
                                  • Part of subcall function 00405069: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405117
                                  • Part of subcall function 00405069: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405125
                                • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402038
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00402048
                                • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                • String ID: /z
                                • API String ID: 2987980305-1190999251
                                • Opcode ID: 199b9ca66f2f3be16db449d9886261fcca56c35d48349b9125478b6062e0a185
                                • Instruction ID: ff4e9d8d41e245f71de90d7843dd5b4391991aa6675031779f7ddf1c1e2711a8
                                • Opcode Fuzzy Hash: 199b9ca66f2f3be16db449d9886261fcca56c35d48349b9125478b6062e0a185
                                • Instruction Fuzzy Hash: 5F21C971604215A7CF207FA58E49B5E7660AB45354F20413FF711B21D1CBBD4942965E
                                APIs
                                • GetDC.USER32(?), ref: 00401D98
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                                • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                                • CreateFontIndirectA.GDI32(0040B7F0), ref: 00401E1A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CapsCreateDeviceFontIndirectRelease
                                • String ID:
                                • API String ID: 3808545654-0
                                • Opcode ID: 307c2f7223b588f157dad04ceaa6757d338b1b0beccffd4f2c8b683e5c007d1d
                                • Instruction ID: 32ee968f6fa2a45aa154ac920770c0068bb4b7ad8556ade5f6a0693a6ec5f363
                                • Opcode Fuzzy Hash: 307c2f7223b588f157dad04ceaa6757d338b1b0beccffd4f2c8b683e5c007d1d
                                • Instruction Fuzzy Hash: 17019E72944645AFE7406BB1AE4AB9A3FF8EB55305F108439F241BA2F2CB7804058F7D
                                APIs
                                • GetDlgItem.USER32(?), ref: 00401D3F
                                • GetClientRect.USER32(00000000,?), ref: 00401D4C
                                • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                                • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                                • DeleteObject.GDI32(00000000), ref: 00401D8A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                • String ID:
                                • API String ID: 1849352358-0
                                • Opcode ID: 5170087556e431b5de60660a5e52828f9803fa97d1a281977de149f3ddbae3c9
                                • Instruction ID: 3a9f69e16af6b344df11f7afd522e3a5d0d390235353beccb8f2623f7f64b8ac
                                • Opcode Fuzzy Hash: 5170087556e431b5de60660a5e52828f9803fa97d1a281977de149f3ddbae3c9
                                • Instruction Fuzzy Hash: 79F0FFB2600515BFDB01EBA4DE88DAFB7BCEB44301B04446AF645F2191CA748D018B38
                                APIs
                                • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                                • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: MessageSend$Timeout
                                • String ID: !
                                • API String ID: 1777923405-2657877971
                                • Opcode ID: 41634464237ffc4a490c33a013805357df40b2c394da3d94f718f411ee4b7c5f
                                • Instruction ID: 47ba27bed09b34a83addf96e827a594e01ed27391bdeb3cad423947a258da186
                                • Opcode Fuzzy Hash: 41634464237ffc4a490c33a013805357df40b2c394da3d94f718f411ee4b7c5f
                                • Instruction Fuzzy Hash: 13218F71A44209BEEB05DFA5D946AED7BB0EB84304F14803EF505F61E1DA7889408F28
                                APIs
                                • lstrlenA.KERNEL32(0079F540,0079F540,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404745,000000DF,00000000,00000400,?), ref: 004048C8
                                • wsprintfA.USER32 ref: 004048D0
                                • SetDlgItemTextA.USER32(?,0079F540), ref: 004048E3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: ItemTextlstrlenwsprintf
                                • String ID: %u.%u%s%s
                                • API String ID: 3540041739-3551169577
                                • Opcode ID: 9b343dceee09ed7e7f6ed0b0987783c5ae876ff08b8d7c4f564122da271ac9eb
                                • Instruction ID: d40bf1ec6497005f72ea1027000651d0cda96484cb7ea430e24c6b5614f4196a
                                • Opcode Fuzzy Hash: 9b343dceee09ed7e7f6ed0b0987783c5ae876ff08b8d7c4f564122da271ac9eb
                                • Instruction Fuzzy Hash: 6A11E77760452827DB00757D9C45EAF3288DB86374F25463BFA25F61D1E978CC1281E8
                                APIs
                                • lstrlenA.KERNEL32(C:\ProgramData\wvtynvwe\clxs.a3x,00000023,?,00000000,00000002,00000011,00000002), ref: 0040241B
                                • RegSetValueExA.ADVAPI32(?,?,?,?,C:\ProgramData\wvtynvwe\clxs.a3x,00000000,?,00000000,00000002,00000011,00000002), ref: 00402458
                                • RegCloseKey.ADVAPI32(?,?,?,C:\ProgramData\wvtynvwe\clxs.a3x,00000000,?,00000000,00000002,00000011,00000002), ref: 0040253C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CloseValuelstrlen
                                • String ID: C:\ProgramData\wvtynvwe\clxs.a3x
                                • API String ID: 2655323295-3552521189
                                • Opcode ID: 95db2493a43c4bc9c0e441acb49331a876144abc02b3507964f67482ed42c715
                                • Instruction ID: da24eaaec51cc95816ca64b213a576443ad0086fe66887fe7dbf5dd976a128c9
                                • Opcode Fuzzy Hash: 95db2493a43c4bc9c0e441acb49331a876144abc02b3507964f67482ed42c715
                                • Instruction Fuzzy Hash: 99115171E00215BEDF10FFA5DE89AAEBA74EB54754F20403BF908F61D1CAB84D419B29
                                APIs
                                  • Part of subcall function 00405F42: lstrcpynA.KERNEL32(?,?,00000400,004032A0,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F4F
                                  • Part of subcall function 00405973: CharNextA.USER32(?,?,007A0948,?,004059DF,007A0948,007A0948,75923410,?,C:\Users\user\AppData\Local\Temp\,0040572A,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405981
                                  • Part of subcall function 00405973: CharNextA.USER32(00000000), ref: 00405986
                                  • Part of subcall function 00405973: CharNextA.USER32(00000000), ref: 0040599A
                                • lstrlenA.KERNEL32(007A0948,00000000,007A0948,007A0948,75923410,?,C:\Users\user\AppData\Local\Temp\,0040572A,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A1B
                                • GetFileAttributesA.KERNEL32(007A0948,007A0948,007A0948,007A0948,007A0948,007A0948,00000000,007A0948,007A0948,75923410,?,C:\Users\user\AppData\Local\Temp\,0040572A,?,75923410,C:\Users\user\AppData\Local\Temp\), ref: 00405A2B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\$Hz
                                • API String ID: 3248276644-1641514571
                                • Opcode ID: c9df4ada7f727d87a35fee49361aeb73f7da85869d5f85a71a166c7ad75332dd
                                • Instruction ID: 5f745b3ca97bfd8df9e0b525eb7d85b75c6d739f83cdbb59465524be199bd04b
                                • Opcode Fuzzy Hash: c9df4ada7f727d87a35fee49361aeb73f7da85869d5f85a71a166c7ad75332dd
                                • Instruction Fuzzy Hash: 8CF0C875205D5156D622323A1C46B9F1745CE87378716463BF8A1B12D3DA3C88139DBE
                                APIs
                                • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031BB,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E2,?,00000006,00000008,0000000A), ref: 004058E0
                                • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031BB,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E2,?,00000006,00000008,0000000A), ref: 004058E9
                                • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 004058FA
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 004058DA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CharPrevlstrcatlstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 2659869361-823278215
                                • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                • Instruction ID: eba76a58ea1ff6bfef612508d9b3474851936f6545664b5d745be25ef5a18ef4
                                • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                • Instruction Fuzzy Hash: F9D0A9A2201A316AD21237158C09ECB2A0CCF06340B050076F308B21A1CA3C0E428BFE
                                APIs
                                • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C19
                                • RegCloseKey.ADVAPI32(?), ref: 00402C22
                                • RegCloseKey.ADVAPI32(?), ref: 00402C43
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Close$Enum
                                • String ID:
                                • API String ID: 464197530-0
                                • Opcode ID: 24478c4bf15825225cc5c8a9b60ec975c192d416f9cfe0da761514a225b2f336
                                • Instruction ID: fed2cd56577fe7b035228b0b929bbd134fccf085ba74c4e7284a1f4fa6732296
                                • Opcode Fuzzy Hash: 24478c4bf15825225cc5c8a9b60ec975c192d416f9cfe0da761514a225b2f336
                                • Instruction Fuzzy Hash: 96118832500119BBEF01AF91CF09F9E3B79EF18341F104036BA05B50E0E7B4EE51AAA8
                                APIs
                                • DestroyWindow.USER32(00000000,00000000,00402EC4,00000001), ref: 00402CF7
                                • GetTickCount.KERNEL32 ref: 00402D15
                                • CreateDialogParamA.USER32(0000006F,00000000,00402C61,00000000), ref: 00402D32
                                • ShowWindow.USER32(00000000,00000005), ref: 00402D40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                • String ID:
                                • API String ID: 2102729457-0
                                • Opcode ID: b2f7b9a99862a26ec52413e932bcd24799532df146b5b51e48da17ed45f9cf5d
                                • Instruction ID: 2d9097a6a3a823d92573342c87c8e140217056fb4289b76a45e4b4044a0a9852
                                • Opcode Fuzzy Hash: b2f7b9a99862a26ec52413e932bcd24799532df146b5b51e48da17ed45f9cf5d
                                • Instruction Fuzzy Hash: 6DF05E30401621EBC6206B28BFCEE8E7B74BB45B02712457BF459B11F8DB7C48868B9C
                                APIs
                                • IsWindowVisible.USER32(?), ref: 0040500C
                                • CallWindowProcA.USER32(?,?,?,?), ref: 0040505D
                                  • Part of subcall function 0040404F: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 00404061
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Window$CallMessageProcSendVisible
                                • String ID:
                                • API String ID: 3748168415-3916222277
                                • Opcode ID: 6250ec76a35d91786fe0f3bbb491aaaf262455cd01ad0a4232066028cfa3f1df
                                • Instruction ID: b168498847f37538db73494297a7dd182b81320d309b40d671ad71c289bb08e9
                                • Opcode Fuzzy Hash: 6250ec76a35d91786fe0f3bbb491aaaf262455cd01ad0a4232066028cfa3f1df
                                • Instruction Fuzzy Hash: DA0171B1100609AFEF205F21DD85AAF3A26EB84754F144037F601B62D3C77E8C929E9D
                                APIs
                                • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,open C:\ProgramData\wvtynvwe\AutoIt3.exe,0079ED20,?,?,?,00000002,open C:\ProgramData\wvtynvwe\AutoIt3.exe,?,0040606D,80000002), ref: 00405E6F
                                • RegCloseKey.ADVAPI32(?,?,0040606D,80000002,Software\Microsoft\Windows\CurrentVersion,open C:\ProgramData\wvtynvwe\AutoIt3.exe,open C:\ProgramData\wvtynvwe\AutoIt3.exe,open C:\ProgramData\wvtynvwe\AutoIt3.exe,?,0079ED20), ref: 00405E7A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CloseQueryValue
                                • String ID: open C:\ProgramData\wvtynvwe\AutoIt3.exe
                                • API String ID: 3356406503-1147314467
                                • Opcode ID: fbc34f94f804cf7f8ceee3a94302c0ccfb61d5b85e95000fdd84f5b54f9224ff
                                • Instruction ID: a652aa08729c3d21628c8661c06e1e1b2c4f4dfec8f44bbca4e9ccaac311a026
                                • Opcode Fuzzy Hash: fbc34f94f804cf7f8ceee3a94302c0ccfb61d5b85e95000fdd84f5b54f9224ff
                                • Instruction Fuzzy Hash: 1E019A72500609AADF228F20CC09FDB3FA8EF05360F00802AF945A21A0D378DA14CBA8
                                APIs
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A0D48,Error launching installer), ref: 0040560A
                                • CloseHandle.KERNEL32(?), ref: 00405617
                                Strings
                                • Error launching installer, xrefs: 004055F4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CloseCreateHandleProcess
                                • String ID: Error launching installer
                                • API String ID: 3712363035-66219284
                                • Opcode ID: 70af5941f3bc690bdcd9881a93690d3303993229d12fc254cd5844f1ea8daab6
                                • Instruction ID: 62883942ff3fec4e096c12bfbc0e4171e63133af1454ac2aa76c170e6ce59af3
                                • Opcode Fuzzy Hash: 70af5941f3bc690bdcd9881a93690d3303993229d12fc254cd5844f1ea8daab6
                                • Instruction Fuzzy Hash: 4DE046F1600209BFEB009FA0ED09F7F7AACEB40744F408820BD14F6190D679A8008AB8
                                APIs
                                • FreeLibrary.KERNEL32(?,75923410,00000000,C:\Users\user\AppData\Local\Temp\,004036D5,004034EF,?,?,00000006,00000008,0000000A), ref: 00403717
                                • GlobalFree.KERNEL32(00000000), ref: 0040371E
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 004036FD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: Free$GlobalLibrary
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 1100898210-823278215
                                • Opcode ID: 4d9750b91f9c818690002108793fa6d5ed1a6d42b958517d28de6e516f48fa46
                                • Instruction ID: c0f64fe77bbbc42f413017ec02fd14b49542df8adbdba9c58a8dfc12e9d6b7a7
                                • Opcode Fuzzy Hash: 4d9750b91f9c818690002108793fa6d5ed1a6d42b958517d28de6e516f48fa46
                                • Instruction Fuzzy Hash: 7DE0C2334011209BC621AF04EE0872E777CAF89B23F06842BF8407B36087781C524BCC
                                APIs
                                • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DB4,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Rage.exe,C:\Users\user\Desktop\Rage.exe,80000000,00000003), ref: 00405927
                                • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DB4,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Rage.exe,C:\Users\user\Desktop\Rage.exe,80000000,00000003), ref: 00405935
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: CharPrevlstrlen
                                • String ID: C:\Users\user\Desktop
                                • API String ID: 2709904686-1246513382
                                • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                • Instruction ID: 699ee4e888cd28ae38f9bca6902325149b4c823d91dd7122b0a75dbe1f7ac172
                                • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                • Instruction Fuzzy Hash: BED0C7F2409DB0AEE7036314DC04B9F6A48DF16750F1A0466E181A61A5C67C4D424BBD
                                APIs
                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405C9B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A50
                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405A68
                                • CharNextA.USER32(00000000,?,00000000,00405C9B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A79
                                • lstrlenA.KERNEL32(00000000,?,00000000,00405C9B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A82
                                Memory Dump Source
                                • Source File: 00000000.00000002.2055378408.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2055350780.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055395448.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055464181.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2055872847.00000000007AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Rage.jbxd
                                Similarity
                                • API ID: lstrlen$CharNextlstrcmpi
                                • String ID:
                                • API String ID: 190613189-0
                                • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                                • Instruction ID: 7766273d4772ca776c7068fad2e72d6e4ea3cdc9eabdeecb7889bf38aa2ec68c
                                • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                                • Instruction Fuzzy Hash: F8F0F631200918BFC702DFA5CD40DAEBBA8EF06350B2541B9E844F7210D634EE019FA9

                                Execution Graph

                                Execution Coverage:3.8%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:2.5%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:58
                                execution_graph 97514 211044 97519 212735 97514->97519 97516 21104a 97555 230433 29 API calls __onexit 97516->97555 97518 211054 97556 2129da 97519->97556 97523 2127ac 97524 21bf07 8 API calls 97523->97524 97525 2127b6 97524->97525 97526 21bf07 8 API calls 97525->97526 97527 2127c0 97526->97527 97528 21bf07 8 API calls 97527->97528 97529 2127ca 97528->97529 97530 21bf07 8 API calls 97529->97530 97531 212808 97530->97531 97532 21bf07 8 API calls 97531->97532 97533 2128d4 97532->97533 97566 212d5e 97533->97566 97537 212906 97538 21bf07 8 API calls 97537->97538 97539 212910 97538->97539 97540 2230e0 9 API calls 97539->97540 97541 21293b 97540->97541 97587 2130ed 97541->97587 97543 212957 97544 212967 GetStdHandle 97543->97544 97545 2539c1 97544->97545 97546 2129bc 97544->97546 97545->97546 97547 2539ca 97545->97547 97549 2129c9 OleInitialize 97546->97549 97548 23016b 8 API calls 97547->97548 97550 2539d1 97548->97550 97549->97516 97594 2809d9 InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97550->97594 97552 2539da 97595 281200 CreateThread 97552->97595 97554 2539e6 CloseHandle 97554->97546 97555->97518 97596 212a33 97556->97596 97559 212a33 8 API calls 97560 212a12 97559->97560 97561 21bf07 8 API calls 97560->97561 97562 212a1e 97561->97562 97563 2184b7 8 API calls 97562->97563 97564 21276b 97563->97564 97565 213205 6 API calls 97564->97565 97565->97523 97567 21bf07 8 API calls 97566->97567 97568 212d6e 97567->97568 97569 21bf07 8 API calls 97568->97569 97570 212d76 97569->97570 97571 21bf07 8 API calls 97570->97571 97572 212d91 97571->97572 97573 23016b 8 API calls 97572->97573 97574 2128de 97573->97574 97575 21318c 97574->97575 97576 21319a 97575->97576 97577 21bf07 8 API calls 97576->97577 97578 2131a5 97577->97578 97579 21bf07 8 API calls 97578->97579 97580 2131b0 97579->97580 97581 21bf07 8 API calls 97580->97581 97582 2131bb 97581->97582 97583 21bf07 8 API calls 97582->97583 97584 2131c6 97583->97584 97585 23016b 8 API calls 97584->97585 97586 2131d8 RegisterWindowMessageW 97585->97586 97586->97537 97588 253c69 97587->97588 97589 2130fd 97587->97589 97603 283b63 8 API calls 97588->97603 97591 23016b 8 API calls 97589->97591 97592 213105 97591->97592 97592->97543 97593 253c74 97594->97552 97595->97554 97604 2811e6 14 API calls 97595->97604 97597 21bf07 8 API calls 97596->97597 97598 212a3e 97597->97598 97599 21bf07 8 API calls 97598->97599 97600 212a46 97599->97600 97601 21bf07 8 API calls 97600->97601 97602 212a08 97601->97602 97602->97559 97603->97593 96004 2527a2 96007 212a52 96004->96007 96008 212a91 mciSendStringW 96007->96008 96009 2539f4 DestroyWindow 96007->96009 96010 212d08 96008->96010 96011 212aad 96008->96011 96020 253a00 96009->96020 96010->96011 96013 212d17 UnregisterHotKey 96010->96013 96012 212abb 96011->96012 96011->96020 96039 212e70 96012->96039 96013->96010 96015 253a45 96021 253a69 96015->96021 96022 253a58 FreeLibrary 96015->96022 96016 253a1e FindClose 96016->96020 96018 212ad0 96018->96021 96026 212ade 96018->96026 96020->96015 96020->96016 96045 217953 96020->96045 96023 253a7d VirtualFree 96021->96023 96028 212b4b 96021->96028 96022->96015 96023->96021 96024 212b3a CoUninitialize 96024->96028 96025 253ac5 96031 253ad4 messages 96025->96031 96049 283c45 6 API calls messages 96025->96049 96026->96024 96028->96025 96029 212b56 96028->96029 96043 212f86 VirtualFreeEx CloseHandle 96029->96043 96035 253b63 96031->96035 96050 276d63 8 API calls messages 96031->96050 96033 212b7c 96033->96031 96034 212c61 96033->96034 96034->96035 96036 212caf 96034->96036 96036->96035 96044 212eb8 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 96036->96044 96038 212d03 96041 212e7d 96039->96041 96040 212ac2 96040->96015 96040->96018 96041->96040 96051 2778b9 8 API calls 96041->96051 96043->96033 96044->96038 96046 21795d 96045->96046 96047 21796c 96045->96047 96046->96020 96047->96046 96048 217971 CloseHandle 96047->96048 96048->96046 96049->96025 96050->96031 96051->96041 97605 23078b 97606 230797 CallCatchBlock 97605->97606 97635 230241 97606->97635 97608 23079e 97609 2308f1 97608->97609 97612 2307c8 97608->97612 97676 230bcf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97609->97676 97611 2308f8 97669 2351e2 97611->97669 97622 230807 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97612->97622 97646 24280d 97612->97646 97619 2307e7 97621 230868 97654 230ce9 97621->97654 97622->97621 97672 2351aa 38 API calls 3 library calls 97622->97672 97624 23086e 97658 2132a2 97624->97658 97629 23088a 97629->97611 97630 23088e 97629->97630 97631 230897 97630->97631 97674 235185 28 API calls _abort 97630->97674 97675 2303d0 13 API calls 2 library calls 97631->97675 97634 23089f 97634->97619 97636 23024a 97635->97636 97678 230a28 IsProcessorFeaturePresent 97636->97678 97638 230256 97679 233024 10 API calls 3 library calls 97638->97679 97640 23025b 97641 23025f 97640->97641 97680 2426a7 97640->97680 97641->97608 97644 230276 97644->97608 97647 242824 97646->97647 97648 230e1c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 97647->97648 97649 2307e1 97648->97649 97649->97619 97650 2427b1 97649->97650 97651 2427e0 97650->97651 97652 230e1c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 97651->97652 97653 242809 97652->97653 97653->97622 97755 2326d0 97654->97755 97657 230d0f 97657->97624 97659 213309 97658->97659 97660 2132ae IsThemeActive 97658->97660 97673 230d22 GetModuleHandleW 97659->97673 97757 2352d3 97660->97757 97662 2132d9 97763 235339 97662->97763 97664 2132e0 97770 21326d SystemParametersInfoW SystemParametersInfoW 97664->97770 97666 2132e7 97771 213312 97666->97771 98677 234f5f 97669->98677 97672->97621 97673->97629 97674->97631 97675->97634 97676->97611 97678->97638 97679->97640 97684 24d596 97680->97684 97683 23304d 8 API calls 3 library calls 97683->97641 97685 24d5b3 97684->97685 97686 24d5af 97684->97686 97685->97686 97690 244f8b 97685->97690 97702 230e1c 97686->97702 97688 230268 97688->97644 97688->97683 97691 244f97 CallCatchBlock 97690->97691 97709 2432ee EnterCriticalSection 97691->97709 97693 244f9e 97710 24543f 97693->97710 97695 244fad 97696 244fbc 97695->97696 97723 244e1f 29 API calls 97695->97723 97725 244fd8 LeaveCriticalSection _abort 97696->97725 97699 244fb7 97724 244ed5 GetStdHandle GetFileType 97699->97724 97700 244fcd __wsopen_s 97700->97685 97703 230e27 IsProcessorFeaturePresent 97702->97703 97704 230e25 97702->97704 97706 230fee 97703->97706 97704->97688 97754 230fb1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97706->97754 97708 2310d1 97708->97688 97709->97693 97711 24544b CallCatchBlock 97710->97711 97712 24546f 97711->97712 97713 245458 97711->97713 97726 2432ee EnterCriticalSection 97712->97726 97734 23f669 20 API calls __dosmaperr 97713->97734 97716 24545d 97735 242b7c 26 API calls __wsopen_s 97716->97735 97719 245467 __wsopen_s 97719->97695 97721 2454a7 97736 2454ce LeaveCriticalSection _abort 97721->97736 97722 24547b 97722->97721 97727 245390 97722->97727 97723->97699 97724->97696 97725->97700 97726->97722 97737 24500d 97727->97737 97729 2453af 97745 242d58 97729->97745 97732 245401 97732->97722 97733 2453a2 97733->97729 97744 243795 11 API calls 2 library calls 97733->97744 97734->97716 97735->97719 97736->97719 97742 24501a __dosmaperr 97737->97742 97738 24505a 97752 23f669 20 API calls __dosmaperr 97738->97752 97739 245045 RtlAllocateHeap 97740 245058 97739->97740 97739->97742 97740->97733 97742->97738 97742->97739 97751 23523d 7 API calls 2 library calls 97742->97751 97744->97733 97746 242d8c __dosmaperr 97745->97746 97747 242d63 RtlFreeHeap 97745->97747 97746->97732 97747->97746 97748 242d78 97747->97748 97753 23f669 20 API calls __dosmaperr 97748->97753 97750 242d7e GetLastError 97750->97746 97751->97742 97752->97740 97753->97750 97754->97708 97756 230cfc GetStartupInfoW 97755->97756 97756->97657 97758 2352df CallCatchBlock 97757->97758 97820 2432ee EnterCriticalSection 97758->97820 97760 2352ea pre_c_initialization 97821 23532a 97760->97821 97762 23531f __wsopen_s 97762->97662 97764 235345 97763->97764 97765 23535f 97763->97765 97764->97765 97825 23f669 20 API calls __dosmaperr 97764->97825 97765->97664 97767 23534f 97826 242b7c 26 API calls __wsopen_s 97767->97826 97769 23535a 97769->97664 97770->97666 97772 213322 __wsopen_s 97771->97772 97773 21bf07 8 API calls 97772->97773 97774 21332e GetCurrentDirectoryW 97773->97774 97827 214f60 97774->97827 97776 213355 IsDebuggerPresent 97777 213363 97776->97777 97778 253c7d MessageBoxA 97776->97778 97779 253c95 97777->97779 97780 213377 97777->97780 97778->97779 97931 2140e0 8 API calls 97779->97931 97895 213a1c 97780->97895 97787 2133e9 97789 253cc6 SetCurrentDirectoryW 97787->97789 97790 2133f1 97787->97790 97789->97790 97791 2133fc 97790->97791 97932 271ef3 AllocateAndInitializeSid CheckTokenMembership FreeSid 97790->97932 97927 21345a 7 API calls 97791->97927 97794 253ce1 97794->97791 97797 253cf3 97794->97797 97933 21551b 97797->97933 97798 213406 97801 2138f2 60 API calls 97798->97801 97804 21341b 97798->97804 97801->97804 97820->97760 97824 243336 LeaveCriticalSection 97821->97824 97823 235331 97823->97762 97824->97823 97825->97767 97826->97769 97828 21bf07 8 API calls 97827->97828 97829 214f76 97828->97829 97941 2160f5 97829->97941 97831 214f94 97832 21bceb 8 API calls 97831->97832 97833 214fa8 97832->97833 97834 21be6d 8 API calls 97833->97834 97835 214fb3 97834->97835 97955 2188e8 97835->97955 97838 21b25f 8 API calls 97839 214fcc 97838->97839 97840 21bdc1 39 API calls 97839->97840 97841 214fdc 97840->97841 97842 21b25f 8 API calls 97841->97842 97843 215002 97842->97843 97844 21bdc1 39 API calls 97843->97844 97845 215011 97844->97845 97846 21bf07 8 API calls 97845->97846 97847 21502f 97846->97847 97958 215151 97847->97958 97850 234db8 40 API calls 97851 215049 97850->97851 97852 215053 97851->97852 97853 254afd 97851->97853 97855 234db8 40 API calls 97852->97855 97854 215151 8 API calls 97853->97854 97856 254b11 97854->97856 97857 21505e 97855->97857 97860 215151 8 API calls 97856->97860 97857->97856 97858 215068 97857->97858 97859 234db8 40 API calls 97858->97859 97861 215073 97859->97861 97862 254b2d 97860->97862 97861->97862 97863 21507d 97861->97863 97865 21551b 10 API calls 97862->97865 97864 234db8 40 API calls 97863->97864 97866 215088 97864->97866 97867 254b50 97865->97867 97868 215092 97866->97868 97884 254b79 97866->97884 97869 215151 8 API calls 97867->97869 97871 2150b5 97868->97871 97874 21be6d 8 API calls 97868->97874 97870 254b5c 97869->97870 97873 21be6d 8 API calls 97870->97873 97879 217d51 8 API calls 97871->97879 97887 254bb4 97871->97887 97872 215151 8 API calls 97875 254b97 97872->97875 97876 254b6a 97873->97876 97877 2150a8 97874->97877 97878 21be6d 8 API calls 97875->97878 97880 215151 8 API calls 97876->97880 97881 215151 8 API calls 97877->97881 97882 254ba5 97878->97882 97883 2150c5 97879->97883 97880->97884 97881->97871 97885 215151 8 API calls 97882->97885 97886 2183b0 8 API calls 97883->97886 97884->97872 97885->97887 97888 2150d3 97886->97888 97964 218a10 97888->97964 97890 2188e8 8 API calls 97892 2150ee 97890->97892 97891 218a10 8 API calls 97891->97892 97892->97890 97892->97891 97893 215132 97892->97893 97894 215151 8 API calls 97892->97894 97893->97776 97894->97892 97896 213a29 __wsopen_s 97895->97896 97897 213a42 97896->97897 97899 2540b4 ___scrt_fastfail 97896->97899 97982 21557e 97897->97982 97901 2540d0 GetOpenFileNameW 97899->97901 97903 25411f 97901->97903 97904 2184b7 8 API calls 97903->97904 97906 254134 97904->97906 97906->97906 98676 2135ab 7 API calls 97927->98676 97929 213401 97930 21353a CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97929->97930 97930->97798 97931->97787 97932->97794 97934 2522f0 __wsopen_s 97933->97934 97935 215528 GetModuleFileNameW 97934->97935 97936 21b25f 8 API calls 97935->97936 97942 216102 __wsopen_s 97941->97942 97943 2184b7 8 API calls 97942->97943 97944 216134 97942->97944 97943->97944 97945 21627c 8 API calls 97944->97945 97953 21616a 97944->97953 97945->97944 97946 21b25f 8 API calls 97947 216261 97946->97947 97949 21684e 8 API calls 97947->97949 97948 21b25f 8 API calls 97948->97953 97951 21626d 97949->97951 97950 21627c 8 API calls 97950->97953 97951->97831 97953->97948 97953->97950 97954 216238 97953->97954 97975 21684e 97953->97975 97954->97946 97954->97951 97956 23016b 8 API calls 97955->97956 97957 214fbf 97956->97957 97957->97838 97959 215179 97958->97959 97960 21515b 97958->97960 97962 2184b7 8 API calls 97959->97962 97961 21503b 97960->97961 97963 21be6d 8 API calls 97960->97963 97961->97850 97962->97961 97963->97961 97965 218a26 97964->97965 97966 256728 97965->97966 97972 218a30 97965->97972 97981 22b71c 8 API calls 97966->97981 97967 256735 97969 21b3fe 8 API calls 97967->97969 97971 256753 97969->97971 97970 218b4b 97970->97892 97971->97971 97972->97967 97972->97970 97973 218b44 97972->97973 97974 23016b 8 API calls 97973->97974 97974->97970 97976 21685d 97975->97976 97980 21687e __fread_nolock 97975->97980 97979 23019b 8 API calls 97976->97979 97977 23016b 8 API calls 97978 216891 97977->97978 97978->97953 97979->97980 97980->97977 97981->97967 98040 2522f0 97982->98040 97985 2155c5 97987 21bceb 8 API calls 97985->97987 97986 2155aa 97988 2184b7 8 API calls 97986->97988 97989 2155b6 97987->97989 97988->97989 98042 2179ed 97989->98042 98041 21558b GetFullPathNameW 98040->98041 98041->97985 98041->97986 98676->97929 98678 234f6b IsInExceptionSpec 98677->98678 98679 234f72 98678->98679 98680 234f84 98678->98680 98716 2350b9 GetModuleHandleW 98679->98716 98701 2432ee EnterCriticalSection 98680->98701 98683 234f77 98683->98680 98717 2350fd GetModuleHandleExW 98683->98717 98684 235029 98705 235069 98684->98705 98688 235000 98693 235018 98688->98693 98698 2427b1 _abort 5 API calls 98688->98698 98690 234f8b 98690->98684 98690->98688 98702 242538 98690->98702 98691 235072 98725 2520c9 5 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 98691->98725 98692 235046 98708 235078 98692->98708 98694 2427b1 _abort 5 API calls 98693->98694 98694->98684 98698->98693 98701->98690 98726 242271 98702->98726 98745 243336 LeaveCriticalSection 98705->98745 98707 235042 98707->98691 98707->98692 98746 24399c 98708->98746 98711 2350a6 98714 2350fd _abort 8 API calls 98711->98714 98712 235086 GetPEB 98712->98711 98713 235096 GetCurrentProcess TerminateProcess 98712->98713 98713->98711 98715 2350ae ExitProcess 98714->98715 98716->98683 98718 235127 GetProcAddress 98717->98718 98719 23514a 98717->98719 98720 23513c 98718->98720 98721 235150 FreeLibrary 98719->98721 98722 235159 98719->98722 98720->98719 98721->98722 98723 230e1c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98722->98723 98724 234f83 98723->98724 98724->98680 98729 242220 98726->98729 98728 242295 98728->98688 98730 24222c CallCatchBlock 98729->98730 98737 2432ee EnterCriticalSection 98730->98737 98732 24223a 98738 2422c1 98732->98738 98736 242258 __wsopen_s 98736->98728 98737->98732 98739 2422e1 98738->98739 98742 2422e9 98738->98742 98740 230e1c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98739->98740 98741 242247 98740->98741 98744 242265 LeaveCriticalSection _abort 98741->98744 98742->98739 98743 242d58 _free 20 API calls 98742->98743 98743->98739 98744->98736 98745->98707 98747 2439b7 98746->98747 98748 2439c1 98746->98748 98750 230e1c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98747->98750 98753 243367 5 API calls 2 library calls 98748->98753 98751 235082 98750->98751 98751->98711 98751->98712 98752 2439d8 98752->98747 98753->98752 96052 21dced 96053 21dd13 96052->96053 96054 261965 96052->96054 96055 21de5d 96053->96055 96058 23016b 8 API calls 96053->96058 96057 261a25 96054->96057 96061 2619c9 96054->96061 96065 2619e9 96054->96065 96141 23019b 96055->96141 96153 283ef6 81 API calls __wsopen_s 96057->96153 96064 21dd3d 96058->96064 96059 261a20 96151 22e662 366 API calls 96061->96151 96066 23016b 8 API calls 96064->96066 96071 21de94 __fread_nolock 96064->96071 96065->96059 96152 283ef6 81 API calls __wsopen_s 96065->96152 96068 21dd8b 96066->96068 96067 23019b 8 API calls 96067->96071 96068->96061 96069 21ddc6 96068->96069 96118 2202f0 96069->96118 96071->96065 96071->96067 96072 21ddd9 96072->96059 96072->96071 96073 261a48 96072->96073 96074 21de27 96072->96074 96076 21d4d6 96072->96076 96154 283ef6 81 API calls __wsopen_s 96073->96154 96074->96055 96074->96076 96094 23016b 96076->96094 96078 21d539 96103 21c2cd 96078->96103 96081 23016b 8 API calls 96082 21d61e messages 96081->96082 96083 21d8c1 messages 96082->96083 96085 21be6d 8 API calls 96082->96085 96088 261f1c 96082->96088 96089 261f37 96082->96089 96110 21c34b 96082->96110 96155 21b3fe 96082->96155 96084 21c34b 8 API calls 96083->96084 96092 21d95c messages 96083->96092 96084->96092 96085->96082 96159 2755d9 8 API calls messages 96088->96159 96093 21d973 96092->96093 96150 22e284 8 API calls messages 96092->96150 96095 230170 ___std_exception_copy 96094->96095 96096 23018a 96095->96096 96099 23018c 96095->96099 96160 23523d 7 API calls 2 library calls 96095->96160 96096->96078 96098 2309fd 96162 233634 RaiseException 96098->96162 96099->96098 96161 233634 RaiseException 96099->96161 96102 230a1a 96102->96078 96107 21c2dd 96103->96107 96104 21c2e5 96104->96081 96105 23016b 8 API calls 96105->96107 96107->96104 96107->96105 96109 21c2cd 8 API calls 96107->96109 96163 21bf07 96107->96163 96168 21be6d 96107->96168 96109->96107 96111 21c359 96110->96111 96117 21c381 messages 96110->96117 96112 21c367 96111->96112 96113 21c34b 8 API calls 96111->96113 96114 21c36d 96112->96114 96115 21c34b 8 API calls 96112->96115 96113->96112 96114->96117 96172 21c780 96114->96172 96115->96114 96117->96082 96120 220326 messages 96118->96120 96119 230433 29 API calls pre_c_initialization 96119->96120 96120->96119 96121 230588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96120->96121 96122 2662cf 96120->96122 96124 221645 96120->96124 96125 23016b 8 API calls 96120->96125 96127 2661fe 96120->96127 96128 265c7f 96120->96128 96132 21be6d 8 API calls 96120->96132 96133 2305d2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96120->96133 96136 22044d messages 96120->96136 96137 21bf07 8 API calls 96120->96137 96138 2660b9 96120->96138 96140 220a5e messages 96120->96140 96177 221940 96120->96177 96239 221e00 40 API calls messages 96120->96239 96121->96120 96243 283ef6 81 API calls __wsopen_s 96122->96243 96129 21be6d 8 API calls 96124->96129 96124->96136 96125->96120 96242 283ef6 81 API calls __wsopen_s 96127->96242 96135 21be6d 8 API calls 96128->96135 96128->96136 96129->96136 96132->96120 96133->96120 96135->96136 96136->96072 96137->96120 96240 283ef6 81 API calls __wsopen_s 96138->96240 96241 283ef6 81 API calls __wsopen_s 96140->96241 96142 23016b ___std_exception_copy 96141->96142 96143 23018a 96142->96143 96146 23018c 96142->96146 97051 23523d 7 API calls 2 library calls 96142->97051 96143->96071 96145 2309fd 97053 233634 RaiseException 96145->97053 96146->96145 97052 233634 RaiseException 96146->97052 96149 230a1a 96149->96071 96150->96092 96151->96065 96152->96059 96153->96059 96154->96059 96156 21b412 96155->96156 96157 21b40c 96155->96157 96156->96082 96157->96156 96158 21be6d 8 API calls 96157->96158 96158->96156 96159->96089 96160->96095 96161->96098 96162->96102 96164 23019b 8 API calls 96163->96164 96165 21bf1c 96164->96165 96166 23016b 8 API calls 96165->96166 96167 21bf2a 96166->96167 96167->96107 96169 21be90 __fread_nolock 96168->96169 96170 21be81 96168->96170 96169->96107 96170->96169 96171 23019b 8 API calls 96170->96171 96171->96169 96173 21c78b messages 96172->96173 96175 21c7c6 messages 96173->96175 96176 22e29c 8 API calls messages 96173->96176 96175->96117 96176->96175 96178 221966 96177->96178 96179 2219de 96177->96179 96180 221973 96178->96180 96181 266b04 96178->96181 96182 2669f1 96179->96182 96195 2219ed 96179->96195 96191 266b28 96180->96191 96192 22197d 96180->96192 96250 2984db 366 API calls 2 library calls 96181->96250 96184 2669fc 96182->96184 96185 266af8 96182->96185 96248 22b2d6 366 API calls 96184->96248 96249 283ef6 81 API calls __wsopen_s 96185->96249 96188 266b59 96193 266b86 96188->96193 96194 266b64 96188->96194 96189 2202f0 366 API calls 96189->96195 96190 221b12 messages 96202 221990 messages 96190->96202 96216 21be6d 8 API calls 96190->96216 96238 2219d3 messages 96190->96238 96191->96188 96201 266b40 96191->96201 96200 21be6d 8 API calls 96192->96200 96192->96202 96253 295fe6 8 API calls 96193->96253 96252 2984db 366 API calls 2 library calls 96194->96252 96195->96189 96196 26691d 96195->96196 96199 221b65 96195->96199 96195->96202 96205 2668ac 96195->96205 96219 221b59 96195->96219 96222 221aa4 96195->96222 96247 283ef6 81 API calls __wsopen_s 96196->96247 96199->96120 96200->96202 96251 283ef6 81 API calls __wsopen_s 96201->96251 96203 266d7d 96202->96203 96202->96238 96321 297f8f 53 API calls __wsopen_s 96202->96321 96212 266db3 96203->96212 96345 2980ce 65 API calls 96203->96345 96204 266b91 96209 266c25 96204->96209 96210 266bac 96204->96210 96246 283ef6 81 API calls __wsopen_s 96205->96246 96318 2819ed 8 API calls 96209->96318 96254 2813a0 8 API calls 96210->96254 96215 21b3fe 8 API calls 96212->96215 96213 266d5b 96322 218e70 96213->96322 96215->96238 96216->96202 96218 266d91 96220 218e70 52 API calls 96218->96220 96219->96199 96245 283ef6 81 API calls __wsopen_s 96219->96245 96235 266d99 _wcslen 96220->96235 96222->96219 96244 221c50 8 API calls 96222->96244 96224 266c37 96319 21bc9b 8 API calls 96224->96319 96225 2668c1 messages 96225->96190 96225->96196 96225->96238 96229 221b05 96229->96190 96229->96219 96230 266d63 _wcslen 96230->96203 96233 21b3fe 8 API calls 96230->96233 96231 266bd6 96255 222ad0 96231->96255 96232 266c40 96320 2813a0 8 API calls 96232->96320 96233->96203 96235->96212 96236 21b3fe 8 API calls 96235->96236 96236->96212 96238->96120 96239->96120 96240->96140 96241->96136 96242->96136 96243->96136 96244->96229 96245->96238 96246->96225 96247->96202 96248->96190 96249->96181 96250->96202 96251->96238 96252->96202 96253->96204 96254->96231 96256 222f70 96255->96256 96257 222b36 96255->96257 96519 2305d2 5 API calls __Init_thread_wait 96256->96519 96259 222b50 96257->96259 96260 267b7c 96257->96260 96346 2230e0 96259->96346 96529 2979f9 366 API calls 96260->96529 96262 222f7a 96272 222fbb 96262->96272 96520 21b25f 96262->96520 96264 267b88 96264->96202 96267 2230e0 9 API calls 96268 222b76 96267->96268 96269 222bac 96268->96269 96268->96272 96271 267ba1 96269->96271 96290 222bc8 __fread_nolock 96269->96290 96270 267b91 96270->96202 96530 283ef6 81 API calls __wsopen_s 96271->96530 96272->96270 96274 21b3fe 8 API calls 96272->96274 96277 222ff9 96274->96277 96275 267bb4 96275->96202 96276 222f94 96526 230588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96276->96526 96527 22e662 366 API calls 96277->96527 96279 267bb9 96531 283ef6 81 API calls __wsopen_s 96279->96531 96282 267c1c 96533 2960a2 53 API calls _wcslen 96282->96533 96283 222cfc 96285 2230e0 9 API calls 96283->96285 96287 222d09 96285->96287 96286 23016b 8 API calls 96286->96290 96291 2230e0 9 API calls 96287->96291 96298 267d45 96287->96298 96288 223032 96528 22fe59 8 API calls 96288->96528 96289 23019b 8 API calls 96289->96290 96290->96275 96290->96277 96290->96279 96290->96286 96290->96289 96295 2202f0 366 API calls 96290->96295 96296 222cef 96290->96296 96297 267bfd 96290->96297 96294 222d23 96291->96294 96294->96298 96300 21be6d 8 API calls 96294->96300 96302 222d87 messages 96294->96302 96295->96290 96296->96282 96296->96283 96532 283ef6 81 API calls __wsopen_s 96297->96532 96298->96275 96534 283ef6 81 API calls __wsopen_s 96298->96534 96300->96302 96301 2230e0 9 API calls 96301->96302 96302->96275 96302->96288 96302->96298 96302->96301 96305 222e3b messages 96302->96305 96307 217953 CloseHandle 96302->96307 96356 287da4 96302->96356 96412 288d34 96302->96412 96415 29b4c6 96302->96415 96418 29a8ae 96302->96418 96426 29a4b4 96302->96426 96432 291758 96302->96432 96439 29a5ac 96302->96439 96447 299eea 96302->96447 96450 22be75 96302->96450 96505 29dd62 96302->96505 96514 216afb 96302->96514 96303 222edd 96303->96202 96305->96303 96518 22e29c 8 API calls messages 96305->96518 96307->96302 96318->96224 96319->96232 96320->96202 96321->96213 96323 218e82 96322->96323 96324 218e85 96322->96324 96323->96230 96325 218ebb 96324->96325 96326 218e8d 96324->96326 96327 256b10 96325->96327 96329 218ecd 96325->96329 96336 256a29 96325->96336 97047 235556 26 API calls 96326->97047 97050 235513 26 API calls 96327->97050 97048 22fe8f 51 API calls 96329->97048 96330 218e9d 96335 23016b 8 API calls 96330->96335 96333 256b28 96333->96333 96337 218ea7 96335->96337 96339 23019b 8 API calls 96336->96339 96340 256aa2 96336->96340 96338 21b25f 8 API calls 96337->96338 96338->96323 96342 256a72 96339->96342 97049 22fe8f 51 API calls 96340->97049 96341 23016b 8 API calls 96343 256a99 96341->96343 96342->96341 96344 21b25f 8 API calls 96343->96344 96344->96340 96345->96218 96347 223121 96346->96347 96348 2230fd 96346->96348 96535 2305d2 5 API calls __Init_thread_wait 96347->96535 96355 222b60 96348->96355 96537 2305d2 5 API calls __Init_thread_wait 96348->96537 96350 22312b 96350->96348 96536 230588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96350->96536 96353 229ec7 96353->96355 96538 230588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96353->96538 96355->96267 96357 287dc3 96356->96357 96358 287dce 96356->96358 96547 21c92d 96357->96547 96360 287eae 96358->96360 96362 21bf07 8 API calls 96358->96362 96361 23016b 8 API calls 96360->96361 96401 287ffe 96360->96401 96363 287ee1 96361->96363 96364 287def 96362->96364 96365 23019b 8 API calls 96363->96365 96367 21bf07 8 API calls 96364->96367 96366 287ef2 96365->96366 96368 217953 CloseHandle 96366->96368 96369 287df8 96367->96369 96370 287efd 96368->96370 96371 218e70 52 API calls 96369->96371 96372 21bf07 8 API calls 96370->96372 96373 287e04 96371->96373 96374 287f05 96372->96374 96552 21694e 8 API calls 96373->96552 96377 217953 CloseHandle 96374->96377 96376 287e19 96553 217af4 8 API calls 96376->96553 96379 287f0c 96377->96379 96381 218e70 52 API calls 96379->96381 96380 287e4c 96382 287ea4 96380->96382 96554 27dc8e lstrlenW GetFileAttributesW FindFirstFileW FindClose 96380->96554 96383 287f18 96381->96383 96386 21c92d 39 API calls 96382->96386 96385 217953 CloseHandle 96383->96385 96388 287f22 96385->96388 96386->96360 96387 287e5c 96387->96382 96389 287e60 96387->96389 96539 216e52 96388->96539 96390 21b25f 8 API calls 96389->96390 96392 287e6d 96390->96392 96555 27da81 12 API calls 96392->96555 96395 288038 GetLastError 96397 288051 96395->96397 96396 287f44 96556 216b12 13 API calls messages 96396->96556 96562 217923 CloseHandle messages 96397->96562 96400 287f52 96403 216afb 3 API calls 96400->96403 96401->96302 96402 287e76 96402->96382 96406 287f59 96403->96406 96404 287f9f 96405 23016b 8 API calls 96404->96405 96407 287fd3 96405->96407 96406->96404 96557 27d4bf 96406->96557 96408 21bf07 8 API calls 96407->96408 96410 287fe0 96408->96410 96410->96401 96561 274a0c 8 API calls __fread_nolock 96410->96561 96571 28a240 96412->96571 96414 288d44 96414->96302 96662 29b958 96415->96662 96420 29a90a 96418->96420 96425 29a8ca 96418->96425 96419 29a928 96421 21c92d 39 API calls 96419->96421 96423 29a990 96419->96423 96419->96425 96420->96419 96422 21c92d 39 API calls 96420->96422 96421->96423 96422->96419 96809 280287 96423->96809 96425->96302 96430 29a4c7 96426->96430 96427 218e70 52 API calls 96428 29a534 96427->96428 96877 2817be 96428->96877 96430->96427 96431 29a4d6 96430->96431 96431->96302 96433 21c92d 39 API calls 96432->96433 96434 29176c 96433->96434 96436 21c92d 39 API calls 96434->96436 96438 2917a9 96434->96438 96435 2917cc 96435->96302 96436->96438 96437 21b3fe 8 API calls 96437->96435 96438->96435 96438->96437 96440 29a607 96439->96440 96446 29a5c7 96439->96446 96441 21c92d 39 API calls 96440->96441 96443 29a625 96440->96443 96441->96443 96442 21c92d 39 API calls 96444 29a682 96442->96444 96443->96442 96443->96444 96443->96446 96445 280287 58 API calls 96444->96445 96445->96446 96446->96302 96921 2988b6 96447->96921 96449 299efa 96449->96302 96451 216ab6 8 API calls 96450->96451 96452 22be8d 96451->96452 96453 23016b 8 API calls 96452->96453 96457 268f7a 96452->96457 96455 22bea6 96453->96455 96456 23019b 8 API calls 96455->96456 96458 22beb7 96456->96458 96497 22bf1f 96457->96497 97039 28a607 39 API calls 96457->97039 96459 217953 CloseHandle 96458->96459 96460 22bec2 96459->96460 96462 21bf07 8 API calls 96460->96462 96461 21c92d 39 API calls 96463 268fdc 96461->96463 96464 22beca 96462->96464 96465 268fe4 96463->96465 96466 22bf2c 96463->96466 96468 217953 CloseHandle 96464->96468 96467 21c92d 39 API calls 96465->96467 97026 22fdc9 96466->97026 96473 22bf33 96467->96473 96470 22bed1 96468->96470 96471 218e70 52 API calls 96470->96471 96472 22bedd 96471->96472 96474 217953 CloseHandle 96472->96474 96476 22bf4e 96473->96476 96477 268ff9 96473->96477 96475 22bee7 96474->96475 96478 216e52 5 API calls 96475->96478 96479 217a14 8 API calls 96476->96479 96480 23019b 8 API calls 96477->96480 96481 22bef8 96478->96481 96482 22bf56 96479->96482 96483 268ffe 96480->96483 96484 22bf00 96481->96484 96485 268f72 96481->96485 97035 22bfbc 14 API calls 96482->97035 96487 269012 96483->96487 97031 2141c9 96483->97031 97034 216b12 13 API calls messages 96484->97034 97038 217923 CloseHandle messages 96485->97038 96491 281759 8 API calls 96487->96491 96492 269016 __fread_nolock 96487->96492 96489 22bf65 96489->96492 97036 217a59 8 API calls 96489->97036 96491->96492 96495 22bf0e 96496 216afb 3 API calls 96495->96496 96498 22bf15 96496->96498 96497->96461 96497->96466 96498->96497 96502 27d4bf 4 API calls 96498->96502 96499 22bfb3 96499->96302 96500 22bf79 96500->96499 96501 217953 CloseHandle 96500->96501 96503 22bfa7 96501->96503 96502->96497 96503->96499 97037 217923 CloseHandle messages 96503->97037 96506 28276a 10 API calls 96505->96506 96507 29dd76 96506->96507 96508 21c92d 39 API calls 96507->96508 96509 29dd90 96508->96509 96510 21c92d 39 API calls 96509->96510 96511 29dda7 96509->96511 96510->96511 96512 281759 8 API calls 96511->96512 96513 29ddc8 __fread_nolock 96512->96513 96513->96302 96515 216b11 96514->96515 96516 216b04 96514->96516 96515->96302 96517 216bfa 3 API calls 96516->96517 96517->96515 96518->96305 96519->96262 96521 21b26e _wcslen 96520->96521 96522 23019b 8 API calls 96521->96522 96523 21b296 __fread_nolock 96522->96523 96524 23016b 8 API calls 96523->96524 96525 21b2ac 96524->96525 96525->96276 96526->96272 96527->96288 96528->96288 96529->96264 96530->96275 96531->96275 96532->96275 96533->96294 96534->96275 96535->96350 96536->96348 96537->96353 96538->96355 96540 255985 96539->96540 96541 216e69 CreateFileW 96539->96541 96542 25598b CreateFileW 96540->96542 96544 216e88 96540->96544 96541->96544 96543 2559b3 96542->96543 96542->96544 96563 216bfa 96543->96563 96544->96395 96544->96396 96548 21c93e 96547->96548 96549 21c945 96547->96549 96548->96549 96569 236661 39 API calls 96548->96569 96549->96358 96551 21c988 96551->96358 96552->96376 96553->96380 96554->96387 96555->96402 96556->96400 96558 27d4ce 96557->96558 96559 27d4d9 WriteFile 96557->96559 96570 27d3f7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96558->96570 96559->96404 96561->96401 96562->96401 96564 216c11 96563->96564 96565 2558ec SetFilePointerEx 96564->96565 96566 216c98 SetFilePointerEx SetFilePointerEx 96564->96566 96567 2558db 96564->96567 96568 216c64 96564->96568 96566->96568 96567->96565 96568->96544 96569->96551 96570->96559 96572 28a25f 96571->96572 96573 28a345 96571->96573 96574 23016b 8 API calls 96572->96574 96628 28a607 39 API calls 96573->96628 96576 28a266 96574->96576 96577 23019b 8 API calls 96576->96577 96579 28a277 96577->96579 96578 28a327 96578->96414 96580 217953 CloseHandle 96579->96580 96582 28a282 96580->96582 96581 28a422 96622 28276a 96581->96622 96584 21bf07 8 API calls 96582->96584 96588 28a28a 96584->96588 96585 28a429 96593 27d4bf 4 API calls 96585->96593 96586 28a2ff 96586->96578 96586->96581 96587 28a390 96586->96587 96589 218e70 52 API calls 96587->96589 96590 217953 CloseHandle 96588->96590 96591 28a397 96589->96591 96592 28a291 96590->96592 96595 28a418 96591->96595 96616 28a3cb 96591->96616 96596 218e70 52 API calls 96592->96596 96594 28a405 96593->96594 96594->96578 96601 217953 CloseHandle 96594->96601 96644 27d517 16 API calls 96595->96644 96598 28a29d 96596->96598 96600 217953 CloseHandle 96598->96600 96602 28a2a7 96600->96602 96603 28a47b 96601->96603 96606 216e52 5 API calls 96602->96606 96645 217923 CloseHandle messages 96603->96645 96604 28a3eb 96634 2165a4 96604->96634 96610 28a2b6 96606->96610 96609 21be6d 8 API calls 96609->96604 96611 28a2ba 96610->96611 96612 28a31f 96610->96612 96626 216b12 13 API calls messages 96611->96626 96627 217923 CloseHandle messages 96612->96627 96629 217a14 96616->96629 96618 28a2c8 96619 216afb 3 API calls 96618->96619 96620 28a2cf 96619->96620 96620->96586 96621 27d4bf 4 API calls 96620->96621 96621->96586 96623 282778 96622->96623 96624 282773 96622->96624 96623->96585 96646 28183b 10 API calls __fread_nolock 96624->96646 96626->96618 96627->96578 96628->96586 96630 23019b 8 API calls 96629->96630 96631 217a39 96630->96631 96632 23016b 8 API calls 96631->96632 96633 217a47 96632->96633 96633->96604 96633->96609 96635 2165bb 96634->96635 96636 255629 96634->96636 96647 2165cc 96635->96647 96637 23016b 8 API calls 96636->96637 96640 255633 _wcslen 96637->96640 96639 2165c6 96643 27d517 16 API calls 96639->96643 96641 23019b 8 API calls 96640->96641 96642 25566c __fread_nolock 96641->96642 96643->96594 96644->96594 96645->96578 96646->96623 96648 2165dc _wcslen 96647->96648 96649 25568b 96648->96649 96650 2165ef 96648->96650 96652 23016b 8 API calls 96649->96652 96657 217cb3 96650->96657 96654 255695 96652->96654 96653 2165fc __fread_nolock 96653->96639 96655 23019b 8 API calls 96654->96655 96656 2556c5 __fread_nolock 96655->96656 96658 217cc9 96657->96658 96660 217cc4 __fread_nolock 96657->96660 96659 23019b 8 API calls 96658->96659 96661 2564be 96658->96661 96659->96660 96660->96653 96661->96661 96663 29b97c ___scrt_fastfail 96662->96663 96664 29b9f3 96663->96664 96665 29b9b7 96663->96665 96668 21c92d 39 API calls 96664->96668 96672 29b9ea 96664->96672 96666 21c92d 39 API calls 96665->96666 96669 29b9c2 96666->96669 96667 29ba4c 96670 218e70 52 API calls 96667->96670 96671 29ba04 96668->96671 96669->96672 96676 21c92d 39 API calls 96669->96676 96674 29ba6a 96670->96674 96675 21c92d 39 API calls 96671->96675 96672->96667 96673 21c92d 39 API calls 96672->96673 96673->96667 96753 214154 96674->96753 96675->96672 96677 29b9d7 96676->96677 96679 21c92d 39 API calls 96677->96679 96679->96672 96680 29ba74 96681 29ba7e 96680->96681 96682 29bb37 96680->96682 96684 218e70 52 API calls 96681->96684 96683 29bb69 GetCurrentDirectoryW 96682->96683 96685 218e70 52 API calls 96682->96685 96686 23019b 8 API calls 96683->96686 96687 29ba8f 96684->96687 96688 29bb4e 96685->96688 96689 29bb8e GetCurrentDirectoryW 96686->96689 96690 214154 8 API calls 96687->96690 96691 214154 8 API calls 96688->96691 96692 29bb9b 96689->96692 96693 29ba99 96690->96693 96699 29bb58 _wcslen 96691->96699 96698 29bbd4 96692->96698 96757 216ab6 96692->96757 96694 218e70 52 API calls 96693->96694 96695 29baaa 96694->96695 96697 214154 8 API calls 96695->96697 96701 29bab4 96697->96701 96704 29bbea 96698->96704 96705 29bbe6 96698->96705 96699->96683 96699->96698 96703 218e70 52 API calls 96701->96703 96702 216ab6 8 API calls 96706 29bbc4 96702->96706 96707 29bac5 96703->96707 96771 28107c 10 API calls 96704->96771 96709 29bcf9 CreateProcessW 96705->96709 96710 29bc57 96705->96710 96711 216ab6 8 API calls 96706->96711 96712 214154 8 API calls 96707->96712 96752 29bc8e _wcslen 96709->96752 96774 271a58 25 API calls 96710->96774 96711->96698 96715 29bacf 96712->96715 96713 29bbf3 96772 280fa2 10 API calls 96713->96772 96718 29bb05 GetSystemDirectoryW 96715->96718 96722 218e70 52 API calls 96715->96722 96717 29bc5c 96720 29bc89 96717->96720 96721 29bc82 96717->96721 96724 23019b 8 API calls 96718->96724 96719 29bc09 96773 280e63 8 API calls 96719->96773 96776 271d5e 6 API calls 96720->96776 96775 271a91 114 API calls 2 library calls 96721->96775 96727 29bae6 96722->96727 96725 29bb2a GetSystemDirectoryW 96724->96725 96725->96692 96731 214154 8 API calls 96727->96731 96729 29bc2f 96729->96705 96730 29bc87 96730->96752 96734 29baf0 _wcslen 96731->96734 96732 29bd8e CloseHandle 96735 29bd9e 96732->96735 96745 29bdf9 96732->96745 96733 29bd35 GetLastError 96744 29bd79 96733->96744 96734->96692 96734->96718 96737 29bdb0 96735->96737 96738 29bda5 CloseHandle 96735->96738 96739 29bdc2 96737->96739 96740 29bdb7 CloseHandle 96737->96740 96738->96737 96742 29bdc9 CloseHandle 96739->96742 96743 29bdd4 96739->96743 96740->96739 96741 29be05 96741->96744 96742->96743 96777 281295 20 API calls 96743->96777 96779 280a31 6 API calls 96744->96779 96745->96741 96750 29be31 CloseHandle 96745->96750 96748 29b4d8 96748->96302 96749 29bde5 96778 29be95 11 API calls 96749->96778 96750->96744 96752->96732 96752->96733 96754 21415e _wcslen 96753->96754 96755 23019b 8 API calls 96754->96755 96756 214173 96755->96756 96756->96680 96758 216ac6 96757->96758 96759 25587b 96757->96759 96764 23016b 8 API calls 96758->96764 96760 25588c 96759->96760 96780 2184b7 96759->96780 96792 21bceb 96760->96792 96763 255896 96763->96763 96765 216ad9 96764->96765 96766 216ae2 96765->96766 96767 216af4 96765->96767 96768 21b25f 8 API calls 96766->96768 96769 21bf07 8 API calls 96767->96769 96770 216aea 96768->96770 96769->96770 96770->96702 96771->96713 96772->96719 96773->96729 96774->96717 96775->96730 96776->96752 96777->96749 96778->96745 96779->96748 96781 2184c7 _wcslen 96780->96781 96782 2565bb 96780->96782 96785 218502 96781->96785 96786 2184dd 96781->96786 96799 2196d9 96782->96799 96784 2565c4 96784->96784 96788 23016b 8 API calls 96785->96788 96798 218894 8 API calls 96786->96798 96790 21850e 96788->96790 96789 2184e5 __fread_nolock 96789->96760 96791 23019b 8 API calls 96790->96791 96791->96789 96793 21bd05 96792->96793 96794 21bcf8 96792->96794 96795 23016b 8 API calls 96793->96795 96794->96763 96796 21bd0f 96795->96796 96797 23019b 8 API calls 96796->96797 96797->96794 96798->96789 96800 2196f0 __fread_nolock 96799->96800 96801 2196e7 96799->96801 96800->96784 96801->96800 96803 21c269 96801->96803 96804 21c279 __fread_nolock 96803->96804 96805 21c27c 96803->96805 96804->96800 96806 23016b 8 API calls 96805->96806 96807 21c287 96806->96807 96808 23019b 8 API calls 96807->96808 96808->96804 96841 2801bf 96809->96841 96811 2802ae __fread_nolock 96811->96425 96813 280308 96857 2804fe 56 API calls __fread_nolock 96813->96857 96814 280320 96816 280386 96814->96816 96819 280330 96814->96819 96816->96811 96817 28041c 96816->96817 96818 2803b6 96816->96818 96821 2804c5 96817->96821 96822 280425 96817->96822 96820 2803e6 96818->96820 96829 2803bb 96818->96829 96823 28276a 10 API calls 96819->96823 96840 280368 96819->96840 96820->96811 96859 21c9fb 39 API calls 96820->96859 96821->96811 96863 21c5df 39 API calls 96821->96863 96824 28042a 96822->96824 96825 2804a2 96822->96825 96833 28033c 96823->96833 96830 280430 96824->96830 96831 280469 96824->96831 96825->96811 96862 21c5df 39 API calls 96825->96862 96829->96811 96858 21c9fb 39 API calls 96829->96858 96830->96811 96860 21c5df 39 API calls 96830->96860 96831->96811 96861 21c5df 39 API calls 96831->96861 96837 28276a 10 API calls 96833->96837 96838 280353 __fread_nolock 96837->96838 96839 28276a 10 API calls 96838->96839 96839->96840 96848 281759 96840->96848 96842 28020c 96841->96842 96847 2801d0 96841->96847 96843 21c92d 39 API calls 96842->96843 96845 28020a 96843->96845 96844 218e70 52 API calls 96844->96847 96845->96811 96845->96813 96845->96814 96847->96844 96847->96845 96864 234db8 96847->96864 96849 281764 96848->96849 96850 23016b 8 API calls 96849->96850 96851 28176b 96850->96851 96852 281798 96851->96852 96853 281777 96851->96853 96855 23019b 8 API calls 96852->96855 96854 23019b 8 API calls 96853->96854 96856 281780 ___scrt_fastfail 96854->96856 96855->96856 96856->96811 96857->96811 96858->96811 96859->96811 96860->96811 96861->96811 96862->96811 96863->96811 96865 234dc6 96864->96865 96866 234e3b 96864->96866 96873 234deb 96865->96873 96874 23f669 20 API calls __dosmaperr 96865->96874 96876 234e4d 40 API calls 3 library calls 96866->96876 96869 234e48 96869->96847 96870 234dd2 96875 242b7c 26 API calls __wsopen_s 96870->96875 96872 234ddd 96872->96847 96873->96847 96874->96870 96875->96872 96876->96869 96878 2817cb 96877->96878 96879 23016b 8 API calls 96878->96879 96880 2817d2 96879->96880 96883 27fbca 96880->96883 96882 28180c 96882->96431 96884 21c269 8 API calls 96883->96884 96885 27fbdd CharLowerBuffW 96884->96885 96887 27fbf0 96885->96887 96886 21627c 8 API calls 96886->96887 96887->96886 96888 27fc2e 96887->96888 96900 27fbfa ___scrt_fastfail 96887->96900 96889 27fc40 96888->96889 96916 21627c 96888->96916 96891 23019b 8 API calls 96889->96891 96894 27fc6e 96891->96894 96896 27fc90 96894->96896 96919 27fb02 8 API calls 96894->96919 96895 27fccd 96897 23016b 8 API calls 96895->96897 96895->96900 96901 27fd21 96896->96901 96898 27fce7 96897->96898 96899 23019b 8 API calls 96898->96899 96899->96900 96900->96882 96902 21bf07 8 API calls 96901->96902 96903 27fd53 96902->96903 96904 21bf07 8 API calls 96903->96904 96905 27fd5c 96904->96905 96906 21bf07 8 API calls 96905->96906 96914 27fd65 96906->96914 96907 280029 96907->96895 96908 2184b7 8 API calls 96908->96914 96909 236718 GetStringTypeW 96909->96914 96910 21acc0 8 API calls 96910->96914 96912 236661 39 API calls 96912->96914 96913 27fd21 40 API calls 96913->96914 96914->96907 96914->96908 96914->96909 96914->96910 96914->96912 96914->96913 96915 21be6d 8 API calls 96914->96915 96920 236742 GetStringTypeW 96914->96920 96915->96914 96917 21c269 8 API calls 96916->96917 96918 216287 96917->96918 96918->96889 96919->96894 96920->96914 96922 218e70 52 API calls 96921->96922 96923 2988ed 96922->96923 96943 298932 messages 96923->96943 96957 299632 96923->96957 96925 298bde 96926 298dac 96925->96926 96930 298bec 96925->96930 97001 299843 59 API calls 96926->97001 96929 298dbb 96929->96930 96931 298dc7 96929->96931 96970 2987e3 96930->96970 96931->96943 96932 218e70 52 API calls 96946 2989a6 96932->96946 96937 298c25 96938 298c5f 96937->96938 96939 298c45 96937->96939 96987 217d51 96938->96987 96986 283ef6 81 API calls __wsopen_s 96939->96986 96942 298c50 GetCurrentProcess TerminateProcess 96942->96938 96943->96449 96946->96925 96946->96932 96946->96943 96984 274a0c 8 API calls __fread_nolock 96946->96984 96985 298e7c 41 API calls 96946->96985 96949 298e22 96949->96943 96953 298e36 FreeLibrary 96949->96953 96950 298c9e 96999 2994da 74 API calls 96950->96999 96953->96943 96955 298caf 96955->96949 96956 21b3fe 8 API calls 96955->96956 97000 221c50 8 API calls 96955->97000 97002 2994da 74 API calls 96955->97002 96956->96955 96958 21c269 8 API calls 96957->96958 96959 29964d CharLowerBuffW 96958->96959 97003 2796e3 96959->97003 96963 21bf07 8 API calls 96964 299689 96963->96964 97010 218685 8 API calls __fread_nolock 96964->97010 96966 29969d 96968 2196d9 8 API calls 96966->96968 96967 2997bd _wcslen 96967->96946 96969 2996a7 _wcslen 96968->96969 96969->96967 97011 298e7c 41 API calls 96969->97011 96971 298849 96970->96971 96972 2987fe 96970->96972 96976 2999f5 96971->96976 96973 23019b 8 API calls 96972->96973 96974 298820 96973->96974 96974->96971 96975 23016b 8 API calls 96974->96975 96975->96974 96977 299c0a messages 96976->96977 96982 299a19 _strcat _wcslen ___std_exception_copy 96976->96982 96977->96937 96978 21c92d 39 API calls 96978->96982 96979 21c5df 39 API calls 96979->96982 96980 21c9fb 39 API calls 96980->96982 96981 218e70 52 API calls 96981->96982 96982->96977 96982->96978 96982->96979 96982->96980 96982->96981 97014 27f7da 10 API calls _wcslen 96982->97014 96984->96946 96985->96946 96986->96942 96988 217d59 96987->96988 96989 23016b 8 API calls 96988->96989 96990 217d67 96989->96990 97015 218386 96990->97015 96993 2183b0 97018 21c700 96993->97018 96995 2183c0 96996 23019b 8 API calls 96995->96996 96997 21845c 96995->96997 96996->96997 96997->96955 96998 221c50 8 API calls 96997->96998 96998->96950 96999->96955 97000->96955 97001->96929 97002->96955 97005 279703 _wcslen 97003->97005 97004 2797f2 97004->96963 97004->96969 97005->97004 97007 2797f7 97005->97007 97008 279738 97005->97008 97007->97004 97013 22e2e5 41 API calls 97007->97013 97008->97004 97012 22e2e5 41 API calls 97008->97012 97010->96966 97011->96967 97012->97008 97013->97007 97014->96982 97016 23016b 8 API calls 97015->97016 97017 217d6f 97016->97017 97017->96993 97019 21c70b 97018->97019 97020 261228 97019->97020 97024 21c713 messages 97019->97024 97021 23016b 8 API calls 97020->97021 97023 261234 97021->97023 97022 21c71a 97022->96995 97024->97022 97025 21c780 8 API calls 97024->97025 97025->97024 97027 216bfa 3 API calls 97026->97027 97028 22fde7 97027->97028 97029 216bfa 3 API calls 97028->97029 97030 22fe08 97029->97030 97030->96473 97040 21b050 97031->97040 97034->96495 97035->96489 97036->96500 97037->96499 97038->96457 97039->96457 97041 21b0cb 97040->97041 97045 21b05e 97040->97045 97046 22f13c SetFilePointerEx 97041->97046 97043 2141da 97043->96487 97044 21b09c ReadFile 97044->97043 97044->97045 97045->97043 97045->97044 97046->97045 97047->96330 97048->96330 97049->96327 97050->96333 97051->96142 97052->96145 97053->96149 97054 220e6f 97055 220e83 97054->97055 97061 2213d5 97054->97061 97056 220e95 97055->97056 97059 23016b 8 API calls 97055->97059 97057 2655d0 97056->97057 97058 21b3fe 8 API calls 97056->97058 97060 220eee 97056->97060 97088 281a29 8 API calls 97057->97088 97058->97056 97059->97056 97062 222ad0 366 API calls 97060->97062 97080 22044d messages 97060->97080 97061->97056 97064 21be6d 8 API calls 97061->97064 97086 220326 messages 97062->97086 97064->97056 97065 2662cf 97092 283ef6 81 API calls __wsopen_s 97065->97092 97067 221645 97072 21be6d 8 API calls 97067->97072 97067->97080 97068 23016b 8 API calls 97068->97086 97070 2661fe 97091 283ef6 81 API calls __wsopen_s 97070->97091 97071 265c7f 97077 21be6d 8 API calls 97071->97077 97071->97080 97072->97080 97075 21be6d 8 API calls 97075->97086 97076 221940 366 API calls 97076->97086 97077->97080 97078 2305d2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97078->97086 97079 21bf07 8 API calls 97079->97086 97081 230433 29 API calls pre_c_initialization 97081->97086 97082 230588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97082->97086 97083 2660b9 97089 283ef6 81 API calls __wsopen_s 97083->97089 97085 220a5e messages 97090 283ef6 81 API calls __wsopen_s 97085->97090 97086->97065 97086->97067 97086->97068 97086->97070 97086->97071 97086->97075 97086->97076 97086->97078 97086->97079 97086->97080 97086->97081 97086->97082 97086->97083 97086->97085 97087 221e00 40 API calls messages 97086->97087 97087->97086 97088->97080 97089->97085 97090->97080 97091->97080 97092->97080 98754 21f48c 98757 21ca50 98754->98757 98758 21ca6b 98757->98758 98759 261461 98758->98759 98760 2614af 98758->98760 98778 21ca90 98758->98778 98763 26146b 98759->98763 98766 261478 98759->98766 98759->98778 98788 2961ff 98760->98788 98824 296690 366 API calls 98763->98824 98780 21cd60 98766->98780 98825 296b2d 366 API calls 2 library calls 98766->98825 98769 261742 98769->98769 98772 22e781 39 API calls 98772->98778 98774 21cd8e 98775 26168b 98827 296569 81 API calls 98775->98827 98778->98772 98778->98774 98778->98775 98779 21bdc1 39 API calls 98778->98779 98778->98780 98781 21b3fe 8 API calls 98778->98781 98784 21cf30 39 API calls 98778->98784 98785 2202f0 366 API calls 98778->98785 98786 21be6d 8 API calls 98778->98786 98811 22e73b 98778->98811 98817 22aa19 366 API calls 98778->98817 98818 2305d2 5 API calls __Init_thread_wait 98778->98818 98819 22bbd2 8 API calls 98778->98819 98820 230433 29 API calls __onexit 98778->98820 98821 230588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98778->98821 98822 22f4ed 81 API calls 98778->98822 98823 22f354 366 API calls 98778->98823 98826 26ff4f 8 API calls 98778->98826 98779->98778 98780->98774 98828 283ef6 81 API calls __wsopen_s 98780->98828 98781->98778 98784->98778 98785->98778 98786->98778 98789 296228 98788->98789 98790 29623e 98788->98790 98789->98790 98791 29622d 98789->98791 98809 296292 98790->98809 98830 2305d2 5 API calls __Init_thread_wait 98790->98830 98829 296690 366 API calls 98791->98829 98794 296263 98794->98809 98831 22bbd2 8 API calls 98794->98831 98795 296239 98795->98778 98796 22e73b 39 API calls 98796->98809 98799 29627c 98832 230433 29 API calls __onexit 98799->98832 98800 296405 98837 283ef6 81 API calls __wsopen_s 98800->98837 98802 21bdc1 39 API calls 98802->98809 98803 296286 98833 230588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98803->98833 98806 22f4ed 81 API calls 98806->98809 98808 2202f0 366 API calls 98808->98809 98809->98795 98809->98796 98809->98800 98809->98802 98809->98806 98809->98808 98834 22aa19 366 API calls 98809->98834 98835 296569 81 API calls 98809->98835 98836 22f354 366 API calls 98809->98836 98812 22e747 98811->98812 98814 22e774 98811->98814 98813 22e76c 98812->98813 98838 22e781 39 API calls 98812->98838 98813->98778 98814->98812 98839 22e781 39 API calls 98814->98839 98817->98778 98818->98778 98819->98778 98820->98778 98821->98778 98822->98778 98823->98778 98824->98766 98825->98780 98826->98778 98827->98780 98828->98769 98829->98795 98830->98794 98831->98799 98832->98803 98833->98809 98834->98809 98835->98809 98836->98809 98837->98795 98838->98813 98839->98812 98840 23f08e 98841 23f09a CallCatchBlock 98840->98841 98842 23f0a6 98841->98842 98843 23f0bb 98841->98843 98859 23f669 20 API calls __dosmaperr 98842->98859 98853 23951d EnterCriticalSection 98843->98853 98846 23f0ab 98860 242b7c 26 API calls __wsopen_s 98846->98860 98847 23f0c7 98854 23f0fb 98847->98854 98852 23f0b6 __wsopen_s 98853->98847 98862 23f126 98854->98862 98856 23f108 98857 23f0d4 98856->98857 98882 23f669 20 API calls __dosmaperr 98856->98882 98861 23f0f1 LeaveCriticalSection __fread_nolock 98857->98861 98859->98846 98860->98852 98861->98852 98863 23f134 98862->98863 98864 23f14e 98862->98864 98886 23f669 20 API calls __dosmaperr 98863->98886 98866 23dce5 __fread_nolock 26 API calls 98864->98866 98867 23f157 98866->98867 98883 249799 98867->98883 98868 23f139 98887 242b7c 26 API calls __wsopen_s 98868->98887 98872 23f25b 98874 23f268 98872->98874 98877 23f20e 98872->98877 98873 23f1df 98876 23f1fc 98873->98876 98873->98877 98889 23f669 20 API calls __dosmaperr 98874->98889 98888 23f43f 31 API calls 4 library calls 98876->98888 98879 23f144 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 98877->98879 98890 23f2bb 30 API calls 2 library calls 98877->98890 98879->98856 98880 23f206 98880->98879 98882->98857 98891 249616 98883->98891 98885 23f173 98885->98872 98885->98873 98885->98879 98886->98868 98887->98879 98888->98880 98889->98879 98890->98879 98892 249622 CallCatchBlock 98891->98892 98893 249642 98892->98893 98894 24962a 98892->98894 98895 2496f6 98893->98895 98900 24967a 98893->98900 98926 23f656 20 API calls __dosmaperr 98894->98926 98931 23f656 20 API calls __dosmaperr 98895->98931 98898 24962f 98927 23f669 20 API calls __dosmaperr 98898->98927 98899 2496fb 98932 23f669 20 API calls __dosmaperr 98899->98932 98916 2454d7 EnterCriticalSection 98900->98916 98904 249637 __wsopen_s 98904->98885 98905 249703 98933 242b7c 26 API calls __wsopen_s 98905->98933 98906 249680 98908 2496a4 98906->98908 98909 2496b9 98906->98909 98928 23f669 20 API calls __dosmaperr 98908->98928 98917 24971b 98909->98917 98912 2496a9 98929 23f656 20 API calls __dosmaperr 98912->98929 98914 2496b4 98930 2496ee LeaveCriticalSection __wsopen_s 98914->98930 98916->98906 98934 245754 98917->98934 98919 24972d 98920 249735 98919->98920 98921 249746 SetFilePointerEx 98919->98921 98947 23f669 20 API calls __dosmaperr 98920->98947 98923 24973a 98921->98923 98924 24975e GetLastError 98921->98924 98923->98914 98948 23f633 20 API calls __dosmaperr 98924->98948 98926->98898 98927->98904 98928->98912 98929->98914 98930->98904 98931->98899 98932->98905 98933->98904 98935 245776 98934->98935 98936 245761 98934->98936 98941 24579b 98935->98941 98951 23f656 20 API calls __dosmaperr 98935->98951 98949 23f656 20 API calls __dosmaperr 98936->98949 98938 245766 98950 23f669 20 API calls __dosmaperr 98938->98950 98941->98919 98942 2457a6 98952 23f669 20 API calls __dosmaperr 98942->98952 98944 24576e 98944->98919 98945 2457ae 98953 242b7c 26 API calls __wsopen_s 98945->98953 98947->98923 98948->98923 98949->98938 98950->98944 98951->98942 98952->98945 98953->98944 97093 261a68 97094 261a70 97093->97094 97097 21d4e5 97093->97097 97124 2779af 8 API calls __fread_nolock 97094->97124 97096 261a82 97125 277928 8 API calls __fread_nolock 97096->97125 97099 23016b 8 API calls 97097->97099 97101 21d539 97099->97101 97100 261aac 97102 2202f0 366 API calls 97100->97102 97104 21c2cd 8 API calls 97101->97104 97103 261ad3 97102->97103 97105 261ae7 97103->97105 97126 2960a2 53 API calls _wcslen 97103->97126 97107 21d563 97104->97107 97108 23016b 8 API calls 97107->97108 97118 21d61e messages 97108->97118 97109 261b04 97109->97097 97127 2779af 8 API calls __fread_nolock 97109->97127 97111 21c34b 8 API calls 97121 21d95c messages 97111->97121 97112 21b3fe 8 API calls 97112->97118 97114 261f1c 97128 2755d9 8 API calls messages 97114->97128 97115 261f37 97117 21be6d 8 API calls 97117->97118 97118->97112 97118->97114 97118->97115 97118->97117 97119 21c34b 8 API calls 97118->97119 97120 21d8c1 messages 97118->97120 97119->97118 97120->97111 97120->97121 97122 21d973 97121->97122 97123 22e284 8 API calls messages 97121->97123 97123->97121 97124->97096 97125->97100 97126->97109 97127->97109 97128->97115 98954 24948a 98955 249497 98954->98955 98959 2494af 98954->98959 99004 23f669 20 API calls __dosmaperr 98955->99004 98957 24949c 99005 242b7c 26 API calls __wsopen_s 98957->99005 98960 24950a 98959->98960 98968 2494a7 98959->98968 99006 250164 21 API calls 2 library calls 98959->99006 98962 23dce5 __fread_nolock 26 API calls 98960->98962 98963 249522 98962->98963 98974 248fc2 98963->98974 98965 249529 98966 23dce5 __fread_nolock 26 API calls 98965->98966 98965->98968 98967 249555 98966->98967 98967->98968 98969 23dce5 __fread_nolock 26 API calls 98967->98969 98970 249563 98969->98970 98970->98968 98971 23dce5 __fread_nolock 26 API calls 98970->98971 98972 249573 98971->98972 98973 23dce5 __fread_nolock 26 API calls 98972->98973 98973->98968 98975 248fce CallCatchBlock 98974->98975 98976 248fd6 98975->98976 98977 248fee 98975->98977 99008 23f656 20 API calls __dosmaperr 98976->99008 98978 2490b4 98977->98978 98983 249027 98977->98983 99015 23f656 20 API calls __dosmaperr 98978->99015 98981 248fdb 99009 23f669 20 API calls __dosmaperr 98981->99009 98985 249036 98983->98985 98986 24904b 98983->98986 98984 2490b9 99016 23f669 20 API calls __dosmaperr 98984->99016 99010 23f656 20 API calls __dosmaperr 98985->99010 99007 2454d7 EnterCriticalSection 98986->99007 98990 249043 99017 242b7c 26 API calls __wsopen_s 98990->99017 98991 24903b 99011 23f669 20 API calls __dosmaperr 98991->99011 98992 249051 98995 249082 98992->98995 98996 24906d 98992->98996 98993 248fe3 __wsopen_s 98993->98965 98998 2490d5 __fread_nolock 38 API calls 98995->98998 99012 23f669 20 API calls __dosmaperr 98996->99012 99001 24907d 98998->99001 99000 249072 99013 23f656 20 API calls __dosmaperr 99000->99013 99014 2490ac LeaveCriticalSection __wsopen_s 99001->99014 99004->98957 99005->98968 99006->98960 99007->98992 99008->98981 99009->98993 99010->98991 99011->98990 99012->99000 99013->99001 99014->98993 99015->98984 99016->98990 99017->98993 97129 21f470 97132 229fa5 97129->97132 97131 21f47c 97133 229fc6 97132->97133 97134 22a023 97132->97134 97133->97134 97136 2202f0 366 API calls 97133->97136 97138 22a067 97134->97138 97141 283ef6 81 API calls __wsopen_s 97134->97141 97139 229ff7 97136->97139 97137 26800f 97137->97137 97138->97131 97139->97134 97139->97138 97140 21be6d 8 API calls 97139->97140 97140->97134 97141->97137 97142 211033 97147 216686 97142->97147 97146 211042 97148 21bf07 8 API calls 97147->97148 97149 2166f4 97148->97149 97155 2155cc 97149->97155 97152 216791 97153 211038 97152->97153 97158 2168e6 8 API calls __fread_nolock 97152->97158 97154 230433 29 API calls __onexit 97153->97154 97154->97146 97159 2155f8 97155->97159 97158->97152 97160 2155eb 97159->97160 97161 215605 97159->97161 97160->97152 97161->97160 97162 21560c RegOpenKeyExW 97161->97162 97162->97160 97163 215626 RegQueryValueExW 97162->97163 97164 215647 97163->97164 97165 21565c RegCloseKey 97163->97165 97164->97165 97165->97160 97166 2655f4 97175 22e34f 97166->97175 97168 26560a 97170 265685 97168->97170 97184 22a9e5 9 API calls 97168->97184 97174 26617b 97170->97174 97186 283ef6 81 API calls __wsopen_s 97170->97186 97172 265665 97172->97170 97185 282393 8 API calls 97172->97185 97176 22e370 97175->97176 97177 22e35d 97175->97177 97179 22e3a3 97176->97179 97180 22e375 97176->97180 97178 21b3fe 8 API calls 97177->97178 97183 22e367 97178->97183 97181 21b3fe 8 API calls 97179->97181 97182 23016b 8 API calls 97180->97182 97181->97183 97182->97183 97183->97168 97184->97172 97185->97170 97186->97174 99018 261754 99019 222ad0 366 API calls 99018->99019 99020 261766 99019->99020 99022 21d250 99020->99022 99023 283ef6 81 API calls __wsopen_s 99020->99023 99023->99022 97187 22f9b1 97188 22f9bb 97187->97188 97189 22f9dc 97187->97189 97190 21c34b 8 API calls 97188->97190 97195 26fadc 97189->97195 97196 2755d9 8 API calls messages 97189->97196 97191 22f9cb 97190->97191 97193 21c34b 8 API calls 97191->97193 97194 22f9db 97193->97194 97196->97189 97197 221876 97198 23016b 8 API calls 97197->97198 97199 22187d 97198->97199 99024 21f595 99025 21ca50 366 API calls 99024->99025 99026 21f5a3 99025->99026 97200 263fb3 97216 21ee60 messages 97200->97216 97201 21f1c1 PeekMessageW 97201->97216 97202 21eeb7 GetInputState 97202->97201 97202->97216 97203 21f085 97205 263271 TranslateAcceleratorW 97205->97216 97206 21f223 TranslateMessage DispatchMessageW 97207 21f23f PeekMessageW 97206->97207 97207->97216 97208 21f0b4 timeGetTime 97208->97216 97209 21f25f Sleep 97227 21f270 97209->97227 97210 264127 Sleep 97210->97227 97211 22f27e timeGetTime 97211->97227 97212 26338d timeGetTime 97263 22a9e5 9 API calls 97212->97263 97215 2641be GetExitCodeProcess 97218 2641d4 WaitForSingleObject 97215->97218 97219 2641ea CloseHandle 97215->97219 97216->97201 97216->97202 97216->97203 97216->97205 97216->97206 97216->97207 97216->97208 97216->97209 97216->97210 97216->97212 97229 2202f0 366 API calls 97216->97229 97230 222ad0 366 API calls 97216->97230 97232 21f400 97216->97232 97239 21f680 97216->97239 97262 22f2a5 IsDialogMessageW GetClassLongW 97216->97262 97264 284384 8 API calls 97216->97264 97265 283ef6 81 API calls __wsopen_s 97216->97265 97217 2a331e GetForegroundWindow 97217->97227 97218->97216 97218->97219 97219->97227 97221 263cf5 97222 263cfd 97221->97222 97223 26425c Sleep 97223->97216 97227->97211 97227->97215 97227->97216 97227->97217 97227->97221 97227->97223 97266 295fb5 8 API calls 97227->97266 97267 27f1a7 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97227->97267 97268 27dc9c 46 API calls 97227->97268 97229->97216 97230->97216 97233 21f433 97232->97233 97234 21f41f 97232->97234 97302 283ef6 81 API calls __wsopen_s 97233->97302 97269 21e910 97234->97269 97236 21f42a 97236->97216 97238 264528 97238->97238 97240 21f6c0 97239->97240 97247 21f78c messages 97240->97247 97323 2305d2 5 API calls __Init_thread_wait 97240->97323 97241 2202f0 366 API calls 97241->97247 97244 26457d 97246 21bf07 8 API calls 97244->97246 97244->97247 97245 21bf07 8 API calls 97245->97247 97248 264597 97246->97248 97247->97241 97247->97245 97256 21be6d 8 API calls 97247->97256 97257 21fa91 97247->97257 97258 221c50 8 API calls 97247->97258 97260 283ef6 81 API calls 97247->97260 97318 21bdc1 97247->97318 97322 22b2d6 366 API calls 97247->97322 97326 2305d2 5 API calls __Init_thread_wait 97247->97326 97327 230433 29 API calls __onexit 97247->97327 97328 230588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97247->97328 97329 295131 101 API calls 97247->97329 97330 29721e 366 API calls 97247->97330 97324 230433 29 API calls __onexit 97248->97324 97252 2645a1 97325 230588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97252->97325 97256->97247 97257->97216 97258->97247 97260->97247 97262->97216 97263->97216 97264->97216 97265->97216 97266->97227 97267->97227 97268->97227 97270 21e92b 97269->97270 97271 2202f0 366 API calls 97270->97271 97273 21e94d 97271->97273 97274 21e9bb messages 97273->97274 97275 21ed85 97273->97275 97276 21ea73 97273->97276 97282 21eb68 97273->97282 97285 23016b 8 API calls 97273->97285 97288 263176 97273->97288 97297 21ead9 __fread_nolock messages 97273->97297 97274->97236 97275->97274 97286 23019b 8 API calls 97275->97286 97276->97275 97277 21ea7e 97276->97277 97279 23016b 8 API calls 97277->97279 97278 21ecaf 97280 263167 97278->97280 97281 21ecc4 97278->97281 97289 21ea85 __fread_nolock 97279->97289 97315 296062 8 API calls 97280->97315 97284 23016b 8 API calls 97281->97284 97287 23019b 8 API calls 97282->97287 97294 21eb1a 97284->97294 97285->97273 97286->97289 97287->97297 97316 283ef6 81 API calls __wsopen_s 97288->97316 97290 23016b 8 API calls 97289->97290 97291 21eaa6 97289->97291 97290->97291 97291->97297 97303 21d210 97291->97303 97293 263156 97314 283ef6 81 API calls __wsopen_s 97293->97314 97294->97236 97297->97278 97297->97293 97297->97294 97298 263131 97297->97298 97300 26310f 97297->97300 97311 214485 366 API calls 97297->97311 97313 283ef6 81 API calls __wsopen_s 97298->97313 97312 283ef6 81 API calls __wsopen_s 97300->97312 97302->97238 97304 21d276 97303->97304 97305 21d24a 97303->97305 97307 2202f0 366 API calls 97304->97307 97306 21f680 366 API calls 97305->97306 97309 21d250 97306->97309 97308 2617ee 97307->97308 97308->97309 97317 283ef6 81 API calls __wsopen_s 97308->97317 97309->97297 97309->97309 97311->97297 97312->97294 97313->97294 97314->97294 97315->97288 97316->97274 97317->97309 97319 21bdcc 97318->97319 97320 21bdfb 97319->97320 97331 21bf39 97319->97331 97320->97247 97322->97247 97323->97244 97324->97252 97325->97247 97326->97247 97327->97247 97328->97247 97329->97247 97330->97247 97348 21cf30 97331->97348 97333 21bf49 97334 21bf57 97333->97334 97335 260d59 97333->97335 97337 23016b 8 API calls 97334->97337 97336 21b3fe 8 API calls 97335->97336 97339 260d64 97336->97339 97338 21bf68 97337->97338 97340 21bf07 8 API calls 97338->97340 97341 21bf72 97340->97341 97342 21bf81 97341->97342 97343 21be6d 8 API calls 97341->97343 97344 23016b 8 API calls 97342->97344 97343->97342 97345 21bf8b 97344->97345 97356 21be0f 39 API calls 97345->97356 97347 21bfaf 97347->97320 97349 21d177 97348->97349 97353 21cf43 97348->97353 97349->97333 97351 21bf07 8 API calls 97351->97353 97353->97351 97354 21cfed 97353->97354 97357 2305d2 5 API calls __Init_thread_wait 97353->97357 97358 230433 29 API calls __onexit 97353->97358 97359 230588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97353->97359 97354->97333 97356->97347 97357->97353 97358->97353 97359->97353 99027 248792 99032 24854e 99027->99032 99030 2487ba 99037 24857f try_get_first_available_module 99032->99037 99034 24877e 99051 242b7c 26 API calls __wsopen_s 99034->99051 99036 2486d3 99036->99030 99044 250d24 99036->99044 99043 2486c8 99037->99043 99047 23919b 40 API calls 2 library calls 99037->99047 99039 24871c 99039->99043 99048 23919b 40 API calls 2 library calls 99039->99048 99041 24873b 99041->99043 99049 23919b 40 API calls 2 library calls 99041->99049 99043->99036 99050 23f669 20 API calls __dosmaperr 99043->99050 99052 250421 99044->99052 99046 250d3f 99046->99030 99047->99039 99048->99041 99049->99043 99050->99034 99051->99036 99055 25042d CallCatchBlock 99052->99055 99053 25043b 99110 23f669 20 API calls __dosmaperr 99053->99110 99055->99053 99057 250474 99055->99057 99056 250440 99111 242b7c 26 API calls __wsopen_s 99056->99111 99063 2509fb 99057->99063 99062 25044a __wsopen_s 99062->99046 99113 2507cf 99063->99113 99066 250a46 99131 2455b1 99066->99131 99067 250a2d 99145 23f656 20 API calls __dosmaperr 99067->99145 99070 250a32 99146 23f669 20 API calls __dosmaperr 99070->99146 99071 250a4b 99072 250a54 99071->99072 99073 250a6b 99071->99073 99147 23f656 20 API calls __dosmaperr 99072->99147 99144 25073a CreateFileW 99073->99144 99077 250a59 99148 23f669 20 API calls __dosmaperr 99077->99148 99078 250b21 GetFileType 99081 250b73 99078->99081 99082 250b2c GetLastError 99078->99082 99080 250af6 GetLastError 99150 23f633 20 API calls __dosmaperr 99080->99150 99153 2454fa 21 API calls 2 library calls 99081->99153 99151 23f633 20 API calls __dosmaperr 99082->99151 99083 250aa4 99083->99078 99083->99080 99149 25073a CreateFileW 99083->99149 99087 250b3a CloseHandle 99087->99070 99090 250b63 99087->99090 99089 250ae9 99089->99078 99089->99080 99152 23f669 20 API calls __dosmaperr 99090->99152 99092 250be0 99098 250c0d 99092->99098 99155 2504ed 72 API calls 3 library calls 99092->99155 99093 250b94 99093->99092 99154 25094b 72 API calls 3 library calls 99093->99154 99094 250b68 99094->99070 99097 250c06 99097->99098 99099 250c1e 99097->99099 99156 248a3e 99098->99156 99101 250498 99099->99101 99102 250c9c CloseHandle 99099->99102 99112 2504c1 LeaveCriticalSection __wsopen_s 99101->99112 99171 25073a CreateFileW 99102->99171 99104 250cc7 99105 250cd1 GetLastError 99104->99105 99106 250cfd 99104->99106 99172 23f633 20 API calls __dosmaperr 99105->99172 99106->99101 99108 250cdd 99173 2456c3 21 API calls 2 library calls 99108->99173 99110->99056 99111->99062 99112->99062 99114 2507f0 99113->99114 99120 25080a 99113->99120 99114->99120 99181 23f669 20 API calls __dosmaperr 99114->99181 99116 250842 99121 250871 99116->99121 99183 23f669 20 API calls __dosmaperr 99116->99183 99118 2507ff 99182 242b7c 26 API calls __wsopen_s 99118->99182 99174 25075f 99120->99174 99129 2508c4 99121->99129 99185 23da9d 26 API calls 2 library calls 99121->99185 99124 2508bf 99126 25093e 99124->99126 99124->99129 99125 250866 99184 242b7c 26 API calls __wsopen_s 99125->99184 99186 242b8c 11 API calls _abort 99126->99186 99129->99066 99129->99067 99130 25094a 99132 2455bd CallCatchBlock 99131->99132 99189 2432ee EnterCriticalSection 99132->99189 99134 2455c4 99135 2455e9 99134->99135 99140 245657 EnterCriticalSection 99134->99140 99142 24560b 99134->99142 99137 245390 __wsopen_s 21 API calls 99135->99137 99139 2455ee 99137->99139 99138 245634 __wsopen_s 99138->99071 99139->99142 99193 2454d7 EnterCriticalSection 99139->99193 99141 245664 LeaveCriticalSection 99140->99141 99140->99142 99141->99134 99190 2456ba 99142->99190 99144->99083 99145->99070 99146->99101 99147->99077 99148->99070 99149->99089 99150->99070 99151->99087 99152->99094 99153->99093 99154->99092 99155->99097 99157 245754 __wsopen_s 26 API calls 99156->99157 99160 248a4e 99157->99160 99158 248a54 99195 2456c3 21 API calls 2 library calls 99158->99195 99160->99158 99161 248a86 99160->99161 99163 245754 __wsopen_s 26 API calls 99160->99163 99161->99158 99164 245754 __wsopen_s 26 API calls 99161->99164 99162 248aac 99165 248ace 99162->99165 99196 23f633 20 API calls __dosmaperr 99162->99196 99166 248a7d 99163->99166 99167 248a92 CloseHandle 99164->99167 99165->99101 99169 245754 __wsopen_s 26 API calls 99166->99169 99167->99158 99170 248a9e GetLastError 99167->99170 99169->99161 99170->99158 99171->99104 99172->99108 99173->99106 99176 250777 99174->99176 99175 250792 99175->99116 99176->99175 99187 23f669 20 API calls __dosmaperr 99176->99187 99178 2507b6 99188 242b7c 26 API calls __wsopen_s 99178->99188 99180 2507c1 99180->99116 99181->99118 99182->99120 99183->99125 99184->99121 99185->99124 99186->99130 99187->99178 99188->99180 99189->99134 99194 243336 LeaveCriticalSection 99190->99194 99192 2456c1 99192->99138 99193->99142 99194->99192 99195->99162 99196->99165 99197 211098 99202 215d78 99197->99202 99201 2110a7 99203 21bf07 8 API calls 99202->99203 99204 215d8f GetVersionExW 99203->99204 99205 2184b7 8 API calls 99204->99205 99206 215ddc 99205->99206 99207 2196d9 8 API calls 99206->99207 99209 215e12 99206->99209 99208 215e06 99207->99208 99211 2179ed 8 API calls 99208->99211 99210 215ecc GetCurrentProcess IsWow64Process 99209->99210 99213 2550ad 99209->99213 99212 215ee8 99210->99212 99211->99209 99214 215f00 LoadLibraryA 99212->99214 99215 2550f2 GetSystemInfo 99212->99215 99216 215f11 GetProcAddress 99214->99216 99217 215f4d GetSystemInfo 99214->99217 99216->99217 99219 215f21 GetNativeSystemInfo 99216->99219 99218 215f27 99217->99218 99220 21109d 99218->99220 99221 215f2b FreeLibrary 99218->99221 99219->99218 99222 230433 29 API calls __onexit 99220->99222 99221->99220 99222->99201 99223 21105b 99228 21522e 99223->99228 99225 21106a 99259 230433 29 API calls __onexit 99225->99259 99227 211074 99229 21523e __wsopen_s 99228->99229 99230 21bf07 8 API calls 99229->99230 99231 2152f4 99230->99231 99232 21551b 10 API calls 99231->99232 99233 2152fd 99232->99233 99260 2151bf 99233->99260 99236 2165a4 8 API calls 99237 215316 99236->99237 99238 21684e 8 API calls 99237->99238 99239 215325 99238->99239 99240 21bf07 8 API calls 99239->99240 99241 21532e 99240->99241 99242 21bceb 8 API calls 99241->99242 99243 215337 RegOpenKeyExW 99242->99243 99244 254bc0 RegQueryValueExW 99243->99244 99248 215359 99243->99248 99245 254c56 RegCloseKey 99244->99245 99246 254bdd 99244->99246 99245->99248 99258 254c68 _wcslen 99245->99258 99247 23019b 8 API calls 99246->99247 99249 254bf6 99247->99249 99248->99225 99250 2141a6 8 API calls 99249->99250 99251 254c01 RegQueryValueExW 99250->99251 99252 254c1e 99251->99252 99255 254c38 messages 99251->99255 99253 2184b7 8 API calls 99252->99253 99253->99255 99254 21627c 8 API calls 99254->99258 99255->99245 99256 21b25f 8 API calls 99256->99258 99257 21684e 8 API calls 99257->99258 99258->99248 99258->99254 99258->99256 99258->99257 99259->99227 99261 2522f0 __wsopen_s 99260->99261 99262 2151cc GetFullPathNameW 99261->99262 99263 2151ee 99262->99263 99264 2184b7 8 API calls 99263->99264 99265 21520c 99264->99265 99265->99236 97360 21d9fa 97361 21da04 97360->97361 97370 21db74 97360->97370 97362 21cf30 39 API calls 97361->97362 97361->97370 97363 21da7e 97362->97363 97364 23016b 8 API calls 97363->97364 97365 21da97 97364->97365 97366 23019b 8 API calls 97365->97366 97367 21dab5 97366->97367 97368 23016b 8 API calls 97367->97368 97371 21dac6 __fread_nolock 97368->97371 97369 23016b 8 API calls 97373 21db2f 97369->97373 97372 23019b 8 API calls 97370->97372 97374 21d591 97370->97374 97377 21dbc9 97370->97377 97371->97369 97371->97370 97372->97370 97373->97370 97375 21cf30 39 API calls 97373->97375 97376 23016b 8 API calls 97374->97376 97375->97370 97385 21d61e messages 97376->97385 97378 21c34b 8 API calls 97388 21d95c messages 97378->97388 97379 21b3fe 8 API calls 97379->97385 97381 261f1c 97391 2755d9 8 API calls messages 97381->97391 97382 261f37 97384 21be6d 8 API calls 97384->97385 97385->97379 97385->97381 97385->97382 97385->97384 97386 21c34b 8 API calls 97385->97386 97387 21d8c1 messages 97385->97387 97386->97385 97387->97378 97387->97388 97389 21d973 97388->97389 97390 22e284 8 API calls messages 97388->97390 97390->97388 97391->97382 97392 21367c 97395 213696 97392->97395 97396 2136ad 97395->97396 97397 213711 97396->97397 97398 2136b2 97396->97398 97439 21370f 97396->97439 97402 213717 97397->97402 97403 253dce 97397->97403 97399 21378b PostQuitMessage 97398->97399 97400 2136bf 97398->97400 97407 213690 97399->97407 97404 2136ca 97400->97404 97405 253e3b 97400->97405 97401 2136f6 DefWindowProcW 97401->97407 97408 213743 SetTimer RegisterWindowMessageW 97402->97408 97409 21371e 97402->97409 97454 212f24 10 API calls 97403->97454 97410 213795 97404->97410 97411 2136d4 97404->97411 97467 27c80c 65 API calls ___scrt_fastfail 97405->97467 97408->97407 97412 21376c CreatePopupMenu 97408->97412 97415 213727 KillTimer 97409->97415 97416 253d6f 97409->97416 97444 22fcbb 97410->97444 97417 253e20 97411->97417 97418 2136df 97411->97418 97412->97407 97414 253def 97455 22f1c6 40 API calls 97414->97455 97440 21388e 97415->97440 97422 253d74 97416->97422 97423 253daa MoveWindow 97416->97423 97417->97401 97466 271367 8 API calls 97417->97466 97425 213779 97418->97425 97426 2136ea 97418->97426 97419 253e4d 97419->97401 97419->97407 97427 253d99 SetFocus 97422->97427 97428 253d7a 97422->97428 97423->97407 97452 2137a6 75 API calls ___scrt_fastfail 97425->97452 97426->97401 97436 21388e Shell_NotifyIconW 97426->97436 97427->97407 97428->97426 97433 253d83 97428->97433 97453 212f24 10 API calls 97433->97453 97434 213789 97434->97407 97437 253e14 97436->97437 97456 2138f2 97437->97456 97439->97401 97441 21373a 97440->97441 97442 2138a0 ___scrt_fastfail 97440->97442 97451 21572c DeleteObject DestroyWindow 97441->97451 97443 2138bf Shell_NotifyIconW 97442->97443 97443->97441 97445 22fcd3 ___scrt_fastfail 97444->97445 97446 22fd59 97444->97446 97468 215f59 97445->97468 97446->97407 97448 22fd42 KillTimer SetTimer 97448->97446 97449 22fcfa 97449->97448 97450 26fdcb Shell_NotifyIconW 97449->97450 97450->97448 97451->97407 97452->97434 97453->97407 97454->97414 97455->97426 97457 21391d ___scrt_fastfail 97456->97457 97502 215ce2 97457->97502 97460 2139a3 97462 2139c1 Shell_NotifyIconW 97460->97462 97463 2540a7 Shell_NotifyIconW 97460->97463 97464 215f59 55 API calls 97462->97464 97465 2139d7 97464->97465 97465->97439 97466->97439 97467->97419 97469 215f76 97468->97469 97470 216058 97468->97470 97471 217a14 8 API calls 97469->97471 97470->97449 97472 215f84 97471->97472 97473 215f91 97472->97473 97474 255101 LoadStringW 97472->97474 97475 2184b7 8 API calls 97473->97475 97477 25511b 97474->97477 97476 215fa6 97475->97476 97478 215fb3 97476->97478 97485 255137 97476->97485 97480 21be6d 8 API calls 97477->97480 97484 215fd9 ___scrt_fastfail 97477->97484 97478->97477 97479 215fbd 97478->97479 97481 2165a4 8 API calls 97479->97481 97480->97484 97482 215fcb 97481->97482 97498 217af4 8 API calls 97482->97498 97486 21603e Shell_NotifyIconW 97484->97486 97485->97484 97487 25517a 97485->97487 97488 21bf07 8 API calls 97485->97488 97486->97470 97501 22fe8f 51 API calls 97487->97501 97489 255161 97488->97489 97499 27a265 9 API calls 97489->97499 97492 25516c 97500 217af4 8 API calls 97492->97500 97493 255199 97495 2165a4 8 API calls 97493->97495 97496 2551aa 97495->97496 97497 2165a4 8 API calls 97496->97497 97497->97484 97498->97484 97499->97492 97500->97487 97501->97493 97503 213972 97502->97503 97504 215cfe 97502->97504 97503->97460 97506 27d034 42 API calls 97503->97506 97504->97503 97505 254eff DestroyIcon 97504->97505 97505->97503 97506->97460 97507 2664f9 97508 23016b 8 API calls 97507->97508 97509 266500 97508->97509 97511 23019b 8 API calls 97509->97511 97512 266519 __fread_nolock 97509->97512 97510 23019b 8 API calls 97513 26653e 97510->97513 97511->97512 97512->97510

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 389 215d78-215de7 call 21bf07 GetVersionExW call 2184b7 394 254f0c-254f1f 389->394 395 215ded 389->395 396 254f20-254f24 394->396 397 215def-215df1 395->397 398 254f27-254f33 396->398 399 254f26 396->399 400 215df7-215e56 call 2196d9 call 2179ed 397->400 401 254f4b 397->401 398->396 402 254f35-254f37 398->402 399->398 414 2550ad-2550b4 400->414 415 215e5c-215e5e 400->415 405 254f52-254f5e 401->405 402->397 404 254f3d-254f44 402->404 404->394 407 254f46 404->407 408 215ecc-215ee6 GetCurrentProcess IsWow64Process 405->408 407->401 410 215f45-215f4b 408->410 411 215ee8 408->411 413 215eee-215efa 410->413 411->413 420 215f00-215f0f LoadLibraryA 413->420 421 2550f2-2550f6 GetSystemInfo 413->421 418 2550d4-2550d7 414->418 419 2550b6 414->419 416 215e64-215e67 415->416 417 254fae-254fc1 415->417 416->408 422 215e69-215eab 416->422 423 254fc3-254fcc 417->423 424 254fea-254fec 417->424 426 2550c2-2550ca 418->426 427 2550d9-2550e8 418->427 425 2550bc 419->425 428 215f11-215f1f GetProcAddress 420->428 429 215f4d-215f57 GetSystemInfo 420->429 422->408 431 215ead-215eb0 422->431 432 254fce-254fd4 423->432 433 254fd9-254fe5 423->433 434 255021-255024 424->434 435 254fee-255003 424->435 425->426 426->418 427->425 436 2550ea-2550f0 427->436 428->429 437 215f21-215f25 GetNativeSystemInfo 428->437 430 215f27-215f29 429->430 444 215f32-215f44 430->444 445 215f2b-215f2c FreeLibrary 430->445 438 254f63-254f6d 431->438 439 215eb6-215ec0 431->439 432->408 433->408 442 255026-255041 434->442 443 25505f-255062 434->443 440 255005-25500b 435->440 441 255010-25501c 435->441 436->426 437->430 449 254f80-254f8a 438->449 450 254f6f-254f7b 438->450 439->405 446 215ec6 439->446 440->408 441->408 447 255043-255049 442->447 448 25504e-25505a 442->448 443->408 451 255068-25508f 443->451 445->444 446->408 447->408 448->408 452 254f9d-254fa9 449->452 453 254f8c-254f98 449->453 450->408 454 255091-255097 451->454 455 25509c-2550a8 451->455 452->408 453->408 454->408 455->408
                                APIs
                                • GetVersionExW.KERNEL32(?), ref: 00215DA7
                                  • Part of subcall function 002184B7: _wcslen.LIBCMT ref: 002184CA
                                • GetCurrentProcess.KERNEL32(?,002ADC2C,00000000,?,?), ref: 00215ED3
                                • IsWow64Process.KERNEL32(00000000,?,?), ref: 00215EDA
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00215F05
                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00215F17
                                • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00215F25
                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 00215F2C
                                • GetSystemInfo.KERNEL32(?,?,?), ref: 00215F51
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                • API String ID: 3290436268-3101561225
                                • Opcode ID: 2b2d5cab4a92bff5e40714b1aa0307f0826e6d59b581ca2de724dbd6f5bb9597
                                • Instruction ID: 7510206304eac0f8b6ff8f6439b33166a2220a067410cdb8b393e83bde4fc723
                                • Opcode Fuzzy Hash: 2b2d5cab4a92bff5e40714b1aa0307f0826e6d59b581ca2de724dbd6f5bb9597
                                • Instruction Fuzzy Hash: 5BA1C2318AA6D5CFC712DB68BCC91D87F98AB76300B0468D9E4879B261C67849DCCF35

                                Control-flow Graph

                                APIs
                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,002132EF,?), ref: 00213342
                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,002132EF,?), ref: 00213355
                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,002E2418,002E2400,?,?,?,?,?,?,002132EF,?), ref: 002133C1
                                  • Part of subcall function 002184B7: _wcslen.LIBCMT ref: 002184CA
                                  • Part of subcall function 002141E6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,002133E9,002E2418,?,?,?,?,?,?,?,002132EF,?), ref: 00214227
                                • SetCurrentDirectoryW.KERNEL32(?,00000001,002E2418,?,?,?,?,?,?,?,002132EF,?), ref: 00213442
                                • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00253C8A
                                • SetCurrentDirectoryW.KERNEL32(?,002E2418,?,?,?,?,?,?,?,002132EF,?), ref: 00253CCB
                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,002D31F4,002E2418,?,?,?,?,?,?,?,002132EF), ref: 00253D54
                                • ShellExecuteW.SHELL32(00000000,?,?), ref: 00253D5B
                                  • Part of subcall function 0021345A: GetSysColorBrush.USER32(0000000F), ref: 00213465
                                  • Part of subcall function 0021345A: LoadCursorW.USER32(00000000,00007F00), ref: 00213474
                                  • Part of subcall function 0021345A: LoadIconW.USER32(00000063), ref: 0021348A
                                  • Part of subcall function 0021345A: LoadIconW.USER32(000000A4), ref: 0021349C
                                  • Part of subcall function 0021345A: LoadIconW.USER32(000000A2), ref: 002134AE
                                  • Part of subcall function 0021345A: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 002134C6
                                  • Part of subcall function 0021345A: RegisterClassExW.USER32(?), ref: 00213517
                                  • Part of subcall function 0021353A: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00213568
                                  • Part of subcall function 0021353A: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00213589
                                  • Part of subcall function 0021353A: ShowWindow.USER32(00000000,?,?,?,?,?,?,002132EF,?), ref: 0021359D
                                  • Part of subcall function 0021353A: ShowWindow.USER32(00000000,?,?,?,?,?,?,002132EF,?), ref: 002135A6
                                  • Part of subcall function 002138F2: Shell_NotifyIconW.SHELL32(00000000,?), ref: 002139C3
                                Strings
                                • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00253C84
                                • AutoIt, xrefs: 00253C7F
                                • runas, xrefs: 00253D4F
                                • 0$., xrefs: 0021341C
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                • String ID: 0$.$AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                • API String ID: 683915450-3222768738
                                • Opcode ID: aa5e9ce240ad71260f5bc0a5d024ddbed6a01bd6d09322ef48d0ddbd7ece13a7
                                • Instruction ID: 09c39ae615bafa96197d06c6844f9cf07df340300642285a71eaf6ec113bbae2
                                • Opcode Fuzzy Hash: aa5e9ce240ad71260f5bc0a5d024ddbed6a01bd6d09322ef48d0ddbd7ece13a7
                                • Instruction Fuzzy Hash: 2351F831168385EAC705EF60EC59DEE7BE99FA5740F400469F482561A2CF708AADCF62
                                APIs
                                • GetCurrentProcess.KERNEL32(?,?,0023504E,?,002D98D8,0000000C,002351A5,?,00000002,00000000), ref: 00235099
                                • TerminateProcess.KERNEL32(00000000,?,0023504E,?,002D98D8,0000000C,002351A5,?,00000002,00000000), ref: 002350A0
                                • ExitProcess.KERNEL32 ref: 002350B2
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Process$CurrentExitTerminate
                                • String ID:
                                • API String ID: 1703294689-0
                                • Opcode ID: 36f4c2d85e2e77f8dced23ac8f6ccede10654e4be1f5f5866dc046c0953cf131
                                • Instruction ID: 01f7eaf234a3dba7e52098cc6a4747bd26a9a65eb39437faf1f72b9eaeb86af0
                                • Opcode Fuzzy Hash: 36f4c2d85e2e77f8dced23ac8f6ccede10654e4be1f5f5866dc046c0953cf131
                                • Instruction Fuzzy Hash: D3E0B671420658AFCF256F64ED0DE593B69EF45381F004054F81A8A522DF76DD62CFD0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 29b958-29b9b5 call 2326d0 3 29b9f3-29b9f7 0->3 4 29b9b7-29b9ca call 21c92d 0->4 5 29b9f9-29ba1a call 21c92d * 2 3->5 6 29ba3c-29ba3f 3->6 15 29b9cc-29b9f1 call 21c92d * 2 4->15 16 29ba27 4->16 30 29ba1e-29ba23 5->30 8 29ba41-29ba44 6->8 9 29ba54-29ba78 call 218e70 call 214154 6->9 12 29ba47-29ba4c call 21c92d 8->12 32 29ba7e-29bad7 call 218e70 call 214154 call 218e70 call 214154 call 218e70 call 214154 9->32 33 29bb37-29bb3f 9->33 12->9 15->30 20 29ba2a-29ba2e 16->20 26 29ba38-29ba3a 20->26 27 29ba30-29ba36 20->27 26->6 26->9 27->12 30->6 34 29ba25 30->34 80 29bad9-29baf4 call 218e70 call 214154 32->80 81 29bb05-29bb35 GetSystemDirectoryW call 23019b GetSystemDirectoryW 32->81 35 29bb69-29bb97 GetCurrentDirectoryW call 23019b GetCurrentDirectoryW 33->35 36 29bb41-29bb5c call 218e70 call 214154 33->36 34->20 45 29bb9b 35->45 36->35 50 29bb5e-29bb67 call 234cf3 36->50 48 29bb9f-29bba3 45->48 51 29bba5-29bbcf call 216ab6 * 3 48->51 52 29bbd4-29bbe4 call 280995 48->52 50->35 50->52 51->52 64 29bbea-29bc40 call 28107c call 280fa2 call 280e63 52->64 65 29bbe6-29bbe8 52->65 68 29bc4d-29bc51 64->68 96 29bc42 64->96 65->68 70 29bcf9-29bd1d CreateProcessW 68->70 71 29bc57-29bc80 call 271a58 68->71 78 29bd20-29bd33 call 2301a4 * 2 70->78 85 29bc89 call 271d5e 71->85 86 29bc82-29bc87 call 271a91 71->86 101 29bd8e-29bd9c CloseHandle 78->101 102 29bd35-29bd47 78->102 80->81 107 29baf6-29baff call 234cf3 80->107 81->45 100 29bc8e-29bc9b call 234cf3 85->100 86->100 96->68 115 29bc9d-29bca4 100->115 116 29bca6-29bcb6 call 234cf3 100->116 109 29bdfb 101->109 110 29bd9e-29bda3 101->110 105 29bd49 102->105 106 29bd4c-29bd5b 102->106 105->106 111 29bd5d 106->111 112 29bd60-29bd89 GetLastError call 217ab0 call 21e650 106->112 107->48 107->81 113 29bdff-29be03 109->113 117 29bdb0-29bdb5 110->117 118 29bda5-29bdab CloseHandle 110->118 111->112 130 29be44-29be55 call 280a31 112->130 122 29be11-29be1b 113->122 123 29be05-29be0f 113->123 115->115 115->116 133 29bcb8-29bcbf 116->133 134 29bcc1-29bcd1 call 234cf3 116->134 119 29bdc2-29bdc7 117->119 120 29bdb7-29bdbd CloseHandle 117->120 118->117 127 29bdc9-29bdcf CloseHandle 119->127 128 29bdd4-29bdf9 call 281295 call 29be95 119->128 120->119 131 29be1d 122->131 132 29be23-29be42 call 21e650 CloseHandle 122->132 123->130 127->128 128->113 131->132 132->130 133->133 133->134 146 29bcdc-29bcf7 call 2301a4 * 3 134->146 147 29bcd3-29bcda 134->147 146->78 147->146 147->147
                                APIs
                                • _wcslen.LIBCMT ref: 0029BAF7
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0029BB0F
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0029BB33
                                • _wcslen.LIBCMT ref: 0029BB5F
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0029BB73
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0029BB95
                                • _wcslen.LIBCMT ref: 0029BC91
                                  • Part of subcall function 00280E63: GetStdHandle.KERNEL32(000000F6), ref: 00280E82
                                • _wcslen.LIBCMT ref: 0029BCAA
                                • _wcslen.LIBCMT ref: 0029BCC5
                                • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0029BD15
                                • GetLastError.KERNEL32(00000000), ref: 0029BD66
                                • CloseHandle.KERNEL32(?), ref: 0029BD98
                                • CloseHandle.KERNEL32(00000000), ref: 0029BDA9
                                • CloseHandle.KERNEL32(00000000), ref: 0029BDBB
                                • CloseHandle.KERNEL32(00000000), ref: 0029BDCD
                                • CloseHandle.KERNEL32(?), ref: 0029BE42
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                • String ID:
                                • API String ID: 2178637699-0
                                • Opcode ID: affcf57f3988be9d1a217a8e00b2048f1458c078f19fb7a7489b1d9017f66212
                                • Instruction ID: ca6724a36d18a7ab5c6af5eedfbf4563dbdd407bcd924b5f7a50c24312a91fa0
                                • Opcode Fuzzy Hash: affcf57f3988be9d1a217a8e00b2048f1458c078f19fb7a7489b1d9017f66212
                                • Instruction Fuzzy Hash: 5EF1F1716243019FCB15EF24D991B6ABBE5BF85310F14845DF8894B2A2CB30EC64CF52
                                APIs
                                • GetInputState.USER32 ref: 0021EEB7
                                • timeGetTime.WINMM ref: 0021F0B7
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0021F1D8
                                • TranslateMessage.USER32(?), ref: 0021F22B
                                • DispatchMessageW.USER32(?), ref: 0021F239
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0021F24F
                                • Sleep.KERNEL32(0000000A), ref: 0021F261
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                • String ID:
                                • API String ID: 2189390790-0
                                • Opcode ID: 37d575e52bc3097892f3db420671824f99be948d93331dfc39e14451461abf1c
                                • Instruction ID: 0ff6d2634b5bc6467c9004829e3ac3a8fead14c52a4774bbb8cd5373549bfd8a
                                • Opcode Fuzzy Hash: 37d575e52bc3097892f3db420671824f99be948d93331dfc39e14451461abf1c
                                • Instruction Fuzzy Hash: 2F322570624342EFD724DF20C988BAAB7E4BF65300F14456DE8A987291C771E9E4CF92

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 520 213696-2136ab 521 21370b-21370d 520->521 522 2136ad-2136b0 520->522 521->522 525 21370f 521->525 523 213711 522->523 524 2136b2-2136b9 522->524 529 213717-21371c 523->529 530 253dce-253df6 call 212f24 call 22f1c6 523->530 526 21378b-213793 PostQuitMessage 524->526 527 2136bf-2136c4 524->527 528 2136f6-2136fe DefWindowProcW 525->528 535 21373f-213741 526->535 531 2136ca-2136ce 527->531 532 253e3b-253e4f call 27c80c 527->532 534 213704-21370a 528->534 536 213743-21376a SetTimer RegisterWindowMessageW 529->536 537 21371e-213721 529->537 565 253dfb-253e02 530->565 538 213795-21379f call 22fcbb 531->538 539 2136d4-2136d9 531->539 532->535 556 253e55 532->556 535->534 536->535 540 21376c-213777 CreatePopupMenu 536->540 543 213727-213735 KillTimer call 21388e 537->543 544 253d6f-253d72 537->544 558 2137a4 538->558 545 253e20-253e27 539->545 546 2136df-2136e4 539->546 540->535 561 21373a call 21572c 543->561 550 253d74-253d78 544->550 551 253daa-253dc9 MoveWindow 544->551 545->528 553 253e2d-253e36 call 271367 545->553 554 213779-213789 call 2137a6 546->554 555 2136ea-2136f0 546->555 559 253d99-253da5 SetFocus 550->559 560 253d7a-253d7d 550->560 551->535 553->528 554->535 555->528 555->565 556->528 558->535 559->535 560->555 566 253d83-253d94 call 212f24 560->566 561->535 565->528 569 253e08-253e1b call 21388e call 2138f2 565->569 566->535 569->528
                                APIs
                                • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00213690,?,?), ref: 002136FE
                                • KillTimer.USER32(?,00000001,?,?,?,?,?,00213690,?,?), ref: 0021372A
                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0021374D
                                • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00213690,?,?), ref: 00213758
                                • CreatePopupMenu.USER32 ref: 0021376C
                                • PostQuitMessage.USER32(00000000), ref: 0021378D
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                • String ID: 0$.$0$.$TaskbarCreated
                                • API String ID: 129472671-2258799765
                                • Opcode ID: fb6953a410d4f498f1f2a95de27da4a545c974e32100834c2da865c4197ddea7
                                • Instruction ID: 80eaefdbaf35312533add85c64b4137572d7aeed19cffab9d46da5ba8505dabd
                                • Opcode Fuzzy Hash: fb6953a410d4f498f1f2a95de27da4a545c974e32100834c2da865c4197ddea7
                                • Instruction Fuzzy Hash: 624128B11B4185E7DB18DF38AC4EBFA76EEE721350F001124F5078A2D1CAB48EB98A15

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 002135DE
                                • RegisterClassExW.USER32(00000030), ref: 00213608
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00213619
                                • InitCommonControlsEx.COMCTL32(?), ref: 00213636
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00213646
                                • LoadIconW.USER32(000000A9), ref: 0021365C
                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 0021366B
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                • API String ID: 2914291525-1005189915
                                • Opcode ID: 457471e30de67a931c84c9acb22c3041e3b778db85e13d789d588da90ed17f0e
                                • Instruction ID: f5c30992dd1c1a48037342d0e8d5ce8b56043d6f7f8ef3ca748c7be4c224e307
                                • Opcode Fuzzy Hash: 457471e30de67a931c84c9acb22c3041e3b778db85e13d789d588da90ed17f0e
                                • Instruction Fuzzy Hash: 5F21B4B1991258EFDB009F94FC89BDDBBB8FB09700F10511AF512AA2A0DBB555498F90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 577 2509fb-250a2b call 2507cf 580 250a46-250a52 call 2455b1 577->580 581 250a2d-250a38 call 23f656 577->581 587 250a54-250a69 call 23f656 call 23f669 580->587 588 250a6b-250ab4 call 25073a 580->588 586 250a3a-250a41 call 23f669 581->586 597 250d1d-250d23 586->597 587->586 595 250ab6-250abf 588->595 596 250b21-250b2a GetFileType 588->596 599 250af6-250b1c GetLastError call 23f633 595->599 600 250ac1-250ac5 595->600 601 250b73-250b76 596->601 602 250b2c-250b5d GetLastError call 23f633 CloseHandle 596->602 599->586 600->599 606 250ac7-250af4 call 25073a 600->606 604 250b7f-250b85 601->604 605 250b78-250b7d 601->605 602->586 616 250b63-250b6e call 23f669 602->616 609 250b89-250bd7 call 2454fa 604->609 610 250b87 604->610 605->609 606->596 606->599 619 250be7-250c0b call 2504ed 609->619 620 250bd9-250be5 call 25094b 609->620 610->609 616->586 627 250c0d 619->627 628 250c1e-250c61 619->628 620->619 626 250c0f-250c19 call 248a3e 620->626 626->597 627->626 629 250c63-250c67 628->629 630 250c82-250c90 628->630 629->630 632 250c69-250c7d 629->632 633 250c96-250c9a 630->633 634 250d1b 630->634 632->630 633->634 636 250c9c-250ccf CloseHandle call 25073a 633->636 634->597 639 250cd1-250cfd GetLastError call 23f633 call 2456c3 636->639 640 250d03-250d17 636->640 639->640 640->634
                                APIs
                                  • Part of subcall function 0025073A: CreateFileW.KERNELBASE(00000000,00000000,?,00250AA4,?,?,00000000,?,00250AA4,00000000,0000000C), ref: 00250757
                                • GetLastError.KERNEL32 ref: 00250B0F
                                • __dosmaperr.LIBCMT ref: 00250B16
                                • GetFileType.KERNELBASE(00000000), ref: 00250B22
                                • GetLastError.KERNEL32 ref: 00250B2C
                                • __dosmaperr.LIBCMT ref: 00250B35
                                • CloseHandle.KERNEL32(00000000), ref: 00250B55
                                • CloseHandle.KERNEL32(?), ref: 00250C9F
                                • GetLastError.KERNEL32 ref: 00250CD1
                                • __dosmaperr.LIBCMT ref: 00250CD8
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                • String ID: H
                                • API String ID: 4237864984-2852464175
                                • Opcode ID: 61acb7484e81ef79b35deaf9b50b15915fd7c45473c3e06701d24b25ddcbd506
                                • Instruction ID: b202575d992c3e96b15f7bfaa5fc59e00c97f1548c19310f929abf2dc48e7122
                                • Opcode Fuzzy Hash: 61acb7484e81ef79b35deaf9b50b15915fd7c45473c3e06701d24b25ddcbd506
                                • Instruction Fuzzy Hash: D6A13732A202458FDF199F68ECD6BAE7BA0EB06325F140159FC119F2A1CB309D26CF55

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 0021551B: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00254B50,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 00215539
                                  • Part of subcall function 002151BF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 002151E1
                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0021534B
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00254BD7
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00254C18
                                • RegCloseKey.ADVAPI32(?), ref: 00254C5A
                                • _wcslen.LIBCMT ref: 00254CC1
                                • _wcslen.LIBCMT ref: 00254CD0
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                • API String ID: 98802146-2727554177
                                • Opcode ID: 650e295cc43705b8a0215707d74bcbeac29758e7a6f1b7a27c90d38e9a5f0dd9
                                • Instruction ID: 46ae5856a729a089462af2d24b7f6ebed6a860e2f368274c8abc649c415a0e09
                                • Opcode Fuzzy Hash: 650e295cc43705b8a0215707d74bcbeac29758e7a6f1b7a27c90d38e9a5f0dd9
                                • Instruction Fuzzy Hash: DE7170715643419EC310EF65E889DABBBF8FF99341F40046EF845871A0EF709A98CBA1

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 00213465
                                • LoadCursorW.USER32(00000000,00007F00), ref: 00213474
                                • LoadIconW.USER32(00000063), ref: 0021348A
                                • LoadIconW.USER32(000000A4), ref: 0021349C
                                • LoadIconW.USER32(000000A2), ref: 002134AE
                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 002134C6
                                • RegisterClassExW.USER32(?), ref: 00213517
                                  • Part of subcall function 002135AB: GetSysColorBrush.USER32(0000000F), ref: 002135DE
                                  • Part of subcall function 002135AB: RegisterClassExW.USER32(00000030), ref: 00213608
                                  • Part of subcall function 002135AB: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00213619
                                  • Part of subcall function 002135AB: InitCommonControlsEx.COMCTL32(?), ref: 00213636
                                  • Part of subcall function 002135AB: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00213646
                                  • Part of subcall function 002135AB: LoadIconW.USER32(000000A9), ref: 0021365C
                                  • Part of subcall function 002135AB: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 0021366B
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                • String ID: #$0$AutoIt v3
                                • API String ID: 423443420-4155596026
                                • Opcode ID: d274beceb6f6c2527b979b17abcc7eaa6baf643202954959f7faad8596d52f2d
                                • Instruction ID: a23b0204ab4d3135c7ab95247dd96217fe1bb224d048a1e6d26655797058e15b
                                • Opcode Fuzzy Hash: d274beceb6f6c2527b979b17abcc7eaa6baf643202954959f7faad8596d52f2d
                                • Instruction Fuzzy Hash: 68214170D90398EBDB109F95FC8DB99BFBDFB08B50F00005AE506AA260C7B545498F90
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 0021CE8E
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Init_thread_footer
                                • String ID: p3.$p3.$p3.$p3.$p5.$p5.$x3.$x3.
                                • API String ID: 1385522511-1964687501
                                • Opcode ID: 1072b4fe1e15d902169015f39f3772a68e06624884f861dbb14cf6c68f69fc2a
                                • Instruction ID: 481c51044605f65576129d9e013cba23e84bc7ee3cccf689aa2b21fab497aec2
                                • Opcode Fuzzy Hash: 1072b4fe1e15d902169015f39f3772a68e06624884f861dbb14cf6c68f69fc2a
                                • Instruction Fuzzy Hash: BC32C378A642469FCB24CF54C885EBAB7F5EF54314F28805AE805AB251C774EEF1CB90
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID: D5.$D5.$D5.$D5.$D5.D5.$Variable must be of type 'Object'.
                                • API String ID: 0-44600119
                                • Opcode ID: 1982336acf7b0f94cfda2759eaf192157b12c88d0c39db933af0f6c8d808569c
                                • Instruction ID: f6ba520bb18a2ace03960080d3a1e4a20f572b286bc5359774b84508afa18384
                                • Opcode Fuzzy Hash: 1982336acf7b0f94cfda2759eaf192157b12c88d0c39db933af0f6c8d808569c
                                • Instruction Fuzzy Hash: 20C2DF71A20205DFCB24DF98C990BADB7F1BF19310F248169E855AB3A1D375ADA1CF90
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 002215A2
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Init_thread_footer
                                • String ID: D5.$D5.$D5.$D5.$D5.D5.
                                • API String ID: 1385522511-4281481159
                                • Opcode ID: c6e312a8dc0163b2d6ffa9dc3ea5abebd7e0c65595104cacbb29bcacd37c55a9
                                • Instruction ID: 9e3e6e9d3c066f7341fb3f6daa5f4ddc9dd1301d12acef70b3c7d08ae4891d3e
                                • Opcode Fuzzy Hash: c6e312a8dc0163b2d6ffa9dc3ea5abebd7e0c65595104cacbb29bcacd37c55a9
                                • Instruction Fuzzy Hash: 2DB2AB70A24361EFDB24CF54E4C4A2AB7E1BB99300F64495DE9858B352D771ECA0CF92

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1892 212a52-212a8b 1893 212a91-212aa7 mciSendStringW 1892->1893 1894 2539f4-2539f5 DestroyWindow 1892->1894 1895 212d08-212d15 1893->1895 1896 212aad-212ab5 1893->1896 1897 253a00-253a0d 1894->1897 1899 212d17-212d32 UnregisterHotKey 1895->1899 1900 212d3a-212d41 1895->1900 1896->1897 1898 212abb-212aca call 212e70 1896->1898 1903 253a3c-253a43 1897->1903 1904 253a0f-253a12 1897->1904 1912 212ad0-212ad8 1898->1912 1913 253a4a-253a56 1898->1913 1899->1900 1901 212d34-212d35 call 212712 1899->1901 1900->1896 1902 212d47 1900->1902 1901->1900 1902->1895 1903->1897 1907 253a45 1903->1907 1908 253a14-253a1c call 217953 1904->1908 1909 253a1e-253a21 FindClose 1904->1909 1907->1913 1911 253a27-253a34 1908->1911 1909->1911 1911->1903 1915 253a36-253a37 call 283c0b 1911->1915 1916 253a6e-253a7b 1912->1916 1917 212ade-212b03 call 21e650 1912->1917 1918 253a60-253a67 1913->1918 1919 253a58-253a5a FreeLibrary 1913->1919 1915->1903 1924 253aa2-253aa9 1916->1924 1925 253a7d-253a9a VirtualFree 1916->1925 1929 212b05 1917->1929 1930 212b3a-212b45 CoUninitialize 1917->1930 1918->1913 1923 253a69 1918->1923 1919->1918 1923->1916 1924->1916 1926 253aab 1924->1926 1925->1924 1928 253a9c-253a9d call 283c71 1925->1928 1932 253ab0-253ab4 1926->1932 1928->1924 1933 212b08-212b38 call 213047 call 212ff0 1929->1933 1930->1932 1934 212b4b-212b50 1930->1934 1932->1934 1935 253aba-253ac0 1932->1935 1933->1930 1937 253ac5-253ad2 call 283c45 1934->1937 1938 212b56-212b60 1934->1938 1935->1934 1950 253ad4 1937->1950 1941 212b66-212b71 call 21bd2c 1938->1941 1942 212d49-212d56 call 22fb27 1938->1942 1952 212b77 call 212f86 1941->1952 1942->1941 1953 212d5c 1942->1953 1955 253ad9-253afb call 23015d 1950->1955 1954 212b7c-212be7 call 212e17 call 2301a4 call 212dbe call 21bd2c call 21e650 call 212e40 call 2301a4 1952->1954 1953->1942 1954->1955 1981 212bed-212c11 call 2301a4 1954->1981 1961 253afd 1955->1961 1963 253b02-253b24 call 23015d 1961->1963 1969 253b26 1963->1969 1972 253b2b-253b4d call 23015d 1969->1972 1978 253b4f 1972->1978 1982 253b54-253b61 call 276d63 1978->1982 1981->1963 1987 212c17-212c3b call 2301a4 1981->1987 1988 253b63 1982->1988 1987->1972 1993 212c41-212c5b call 2301a4 1987->1993 1991 253b68-253b75 call 22bd6a 1988->1991 1996 253b77 1991->1996 1993->1982 1998 212c61-212c85 call 212e17 call 2301a4 1993->1998 1999 253b7c-253b89 call 283b9f 1996->1999 1998->1991 2007 212c8b-212c93 1998->2007 2005 253b8b 1999->2005 2008 253b90-253b9d call 283c26 2005->2008 2007->1999 2009 212c99-212caa call 21bd2c call 212f4c 2007->2009 2015 253b9f 2008->2015 2016 212caf-212cb7 2009->2016 2018 253ba4-253bb1 call 283c26 2015->2018 2016->2008 2017 212cbd-212ccb 2016->2017 2017->2018 2019 212cd1-212d07 call 21bd2c * 3 call 212eb8 2017->2019 2023 253bb3 2018->2023 2023->2023
                                APIs
                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00212A9B
                                • CoUninitialize.COMBASE ref: 00212B3A
                                • UnregisterHotKey.USER32(?), ref: 00212D1F
                                • DestroyWindow.USER32(?), ref: 002539F5
                                • FreeLibrary.KERNEL32(?), ref: 00253A5A
                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00253A87
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                • String ID: close all
                                • API String ID: 469580280-3243417748
                                • Opcode ID: fb0a4d8efefae61a61d8157346cf7e7958447affacd2cc31e0da0a9662e1f860
                                • Instruction ID: 0a885c4f0c5cfed830539ad04065353a0fee76eb38d529bde87dd6c8453eff2a
                                • Opcode Fuzzy Hash: fb0a4d8efefae61a61d8157346cf7e7958447affacd2cc31e0da0a9662e1f860
                                • Instruction Fuzzy Hash: BFD19A31721212CFCB29EF14C499BA9F7A0BF15705F1041ADE84A6B251CB70AD7ACF84

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2031 2490d5-2490e5 2032 2490e7-2490fa call 23f656 call 23f669 2031->2032 2033 2490ff-249101 2031->2033 2049 249481 2032->2049 2035 249107-24910d 2033->2035 2036 249469-249476 call 23f656 call 23f669 2033->2036 2035->2036 2039 249113-24913e 2035->2039 2054 24947c call 242b7c 2036->2054 2039->2036 2042 249144-24914d 2039->2042 2045 249167-249169 2042->2045 2046 24914f-249162 call 23f656 call 23f669 2042->2046 2047 249465-249467 2045->2047 2048 24916f-249173 2045->2048 2046->2054 2053 249484-249489 2047->2053 2048->2047 2052 249179-24917d 2048->2052 2049->2053 2052->2046 2056 24917f-249196 2052->2056 2054->2049 2059 2491b3-2491bc 2056->2059 2060 249198-24919b 2056->2060 2064 2491be-2491d5 call 23f656 call 23f669 call 242b7c 2059->2064 2065 2491da-2491e4 2059->2065 2062 2491a5-2491ae 2060->2062 2063 24919d-2491a3 2060->2063 2068 24924f-249269 2062->2068 2063->2062 2063->2064 2097 24939c 2064->2097 2066 2491e6-2491e8 2065->2066 2067 2491eb-2491ec call 243bb0 2065->2067 2066->2067 2075 2491f1-249209 call 242d58 * 2 2067->2075 2070 24933d-249346 call 24fc3b 2068->2070 2071 24926f-24927f 2068->2071 2084 249348-24935a 2070->2084 2085 2493b9 2070->2085 2071->2070 2074 249285-249287 2071->2074 2074->2070 2078 24928d-2492b3 2074->2078 2101 249226-24924c call 2497b4 2075->2101 2102 24920b-249221 call 23f669 call 23f656 2075->2102 2078->2070 2082 2492b9-2492cc 2078->2082 2082->2070 2087 2492ce-2492d0 2082->2087 2084->2085 2090 24935c-24936b GetConsoleMode 2084->2090 2089 2493bd-2493d5 ReadFile 2085->2089 2087->2070 2092 2492d2-2492fd 2087->2092 2094 2493d7-2493dd 2089->2094 2095 249431-24943c GetLastError 2089->2095 2090->2085 2096 24936d-249371 2090->2096 2092->2070 2100 2492ff-249312 2092->2100 2094->2095 2105 2493df 2094->2105 2103 249455-249458 2095->2103 2104 24943e-249450 call 23f669 call 23f656 2095->2104 2096->2089 2098 249373-24938d ReadConsoleW 2096->2098 2099 24939f-2493a9 call 242d58 2097->2099 2106 2493ae-2493b7 2098->2106 2107 24938f GetLastError 2098->2107 2099->2053 2100->2070 2111 249314-249316 2100->2111 2101->2068 2102->2097 2108 249395-24939b call 23f633 2103->2108 2109 24945e-249460 2103->2109 2104->2097 2115 2493e2-2493f4 2105->2115 2106->2115 2107->2108 2108->2097 2109->2099 2111->2070 2118 249318-249338 2111->2118 2115->2099 2122 2493f6-2493fa 2115->2122 2118->2070 2123 249413-24941e 2122->2123 2124 2493fc-24940c call 248df1 2122->2124 2130 249420 call 248f41 2123->2130 2131 24942a-24942f call 248c31 2123->2131 2136 24940f-249411 2124->2136 2137 249425-249428 2130->2137 2131->2137 2136->2099 2137->2136
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d9c2498e3146339f8dc3065cbaac63c129f101ed981d0b5a656a72e7c93cda1f
                                • Instruction ID: 43e649af67c7618116a104dee9bf30606abda1a7fcda968ac5c37e6d6ae165c6
                                • Opcode Fuzzy Hash: d9c2498e3146339f8dc3065cbaac63c129f101ed981d0b5a656a72e7c93cda1f
                                • Instruction Fuzzy Hash: 0AC10BB0D143469FCF19DFA8D845BAE7FB4AF4A310F140199E914A7392C77099A1CF61

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 00213205: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00213236
                                  • Part of subcall function 00213205: MapVirtualKeyW.USER32(00000010,00000000), ref: 0021323E
                                  • Part of subcall function 00213205: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00213249
                                  • Part of subcall function 00213205: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00213254
                                  • Part of subcall function 00213205: MapVirtualKeyW.USER32(00000011,00000000), ref: 0021325C
                                  • Part of subcall function 00213205: MapVirtualKeyW.USER32(00000012,00000000), ref: 00213264
                                  • Part of subcall function 0021318C: RegisterWindowMessageW.USER32(00000004,?,00212906), ref: 002131E4
                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 002129AC
                                • OleInitialize.OLE32 ref: 002129CA
                                • CloseHandle.KERNEL32(00000000,00000000), ref: 002539E7
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                • String ID: (&.$0$.$@(.$$.
                                • API String ID: 1986988660-2181936470
                                • Opcode ID: f664db8a76ab7c8a6d0eeb3c8ad04503eb35054f92c5243cee98604ed64ebee5
                                • Instruction ID: ac7cf924aac9a9872264c2cc134b4cf9d27dabf932fe09d86c273ee1fe160476
                                • Opcode Fuzzy Hash: f664db8a76ab7c8a6d0eeb3c8ad04503eb35054f92c5243cee98604ed64ebee5
                                • Instruction Fuzzy Hash: 9C719EB09A1284CF8788DF69BEAD6553AEDFB59304390412AE40BCB2A1EB70445DCF64

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2182 21353a-2135aa CreateWindowExW * 2 ShowWindow * 2
                                APIs
                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00213568
                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00213589
                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,002132EF,?), ref: 0021359D
                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,002132EF,?), ref: 002135A6
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$CreateShow
                                • String ID: AutoIt v3$edit
                                • API String ID: 1584632944-3779509399
                                • Opcode ID: 29a5e0459b1556e395a6ef8fc4719b49528c4c5c77788f19e1ede5df8ef56a9e
                                • Instruction ID: dc2a58fa33dae341418d3d76cf211366227d2eac3ddec1f97047fe1bf6e52859
                                • Opcode Fuzzy Hash: 29a5e0459b1556e395a6ef8fc4719b49528c4c5c77788f19e1ede5df8ef56a9e
                                • Instruction Fuzzy Hash: 8EF017706802D4BAE72507137C8CE376FBDD7C7F10B00005AB906AA5A0D6791859DEB0

                                Control-flow Graph

                                APIs
                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00255110
                                  • Part of subcall function 002184B7: _wcslen.LIBCMT ref: 002184CA
                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00216049
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: IconLoadNotifyShell_String_wcslen
                                • String ID: Line %d: $AutoIt -
                                • API String ID: 2289894680-4094128768
                                • Opcode ID: f9b316130ccd469d7e5267e383369104a391e9b33661c0fbd12dcacdc5377d3d
                                • Instruction ID: c5d5a2a5094776317031708229048898857541e6fba6d8ed746722cd32b97b82
                                • Opcode Fuzzy Hash: f9b316130ccd469d7e5267e383369104a391e9b33661c0fbd12dcacdc5377d3d
                                • Instruction Fuzzy Hash: BD41F871028315ABC311EB60DC85ADF77ECAFA5320F00495AF489920A1DB709AADCF92

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2508 2155f8-215603 2509 215675-215677 2508->2509 2510 215605-21560a 2508->2510 2511 215668-21566b 2509->2511 2510->2509 2512 21560c-215624 RegOpenKeyExW 2510->2512 2512->2509 2513 215626-215645 RegQueryValueExW 2512->2513 2514 215647-215652 2513->2514 2515 21565c-215667 RegCloseKey 2513->2515 2516 215654-215656 2514->2516 2517 21566c-215673 2514->2517 2515->2511 2518 21565a 2516->2518 2517->2518 2518->2515
                                APIs
                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,002155EB,SwapMouseButtons,00000004,?), ref: 0021561C
                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,002155EB,SwapMouseButtons,00000004,?), ref: 0021563D
                                • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,002155EB,SwapMouseButtons,00000004,?), ref: 0021565F
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID: Control Panel\Mouse
                                • API String ID: 3677997916-824357125
                                • Opcode ID: 18de85036ec732186bae9a38a18abbe9877a6a48cf1554faf42c6c4f779d1713
                                • Instruction ID: 582bcfa182d2042a794ace27976f90da1e837cc675e64035a3dcd6ded8c3be9c
                                • Opcode Fuzzy Hash: 18de85036ec732186bae9a38a18abbe9877a6a48cf1554faf42c6c4f779d1713
                                • Instruction Fuzzy Hash: 36115AB1620658FFDB208F64DC44EEFB7FCEF61744B4044A9B905D7120E6719E9497A0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2519 213a1c-213a3c call 2522f0 2522 2540b4-25411d call 2326d0 GetOpenFileNameW 2519->2522 2523 213a42-213a6d call 21557e call 2139de call 215379 call 216085 2519->2523 2529 254126-25412f call 2184b7 2522->2529 2530 25411f 2522->2530 2533 254134 2529->2533 2530->2529 2533->2533
                                APIs
                                • GetOpenFileNameW.COMDLG32(?), ref: 00254115
                                  • Part of subcall function 0021557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00215558,?,?,00254B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 0021559E
                                  • Part of subcall function 002139DE: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 002139FD
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Name$Path$FileFullLongOpen
                                • String ID: X$`u-
                                • API String ID: 779396738-3193000344
                                • Opcode ID: c1452ea3f2ab0c231f21c409b9190474f5deea63147756ad6a96c83732e6ed35
                                • Instruction ID: f77e5fdccd8212578db88e3771a7a034a265692dd56db336c0c2771f46c76426
                                • Opcode Fuzzy Hash: c1452ea3f2ab0c231f21c409b9190474f5deea63147756ad6a96c83732e6ed35
                                • Instruction Fuzzy Hash: 6921C671A202589BCB11DF94D8057EE7BFD9F59304F00405AE905A7381DBF85ADD8FA1
                                APIs
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 002309F8
                                  • Part of subcall function 00233634: RaiseException.KERNEL32(?,?,?,00230A1A,?,00000000,?,?,?,?,?,?,00230A1A,00000000,002D9758,00000000), ref: 00233694
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00230A15
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Exception@8Throw$ExceptionRaise
                                • String ID: Unknown exception
                                • API String ID: 3476068407-410509341
                                • Opcode ID: 2627cd1965b847cb78f67f368bd13151c09f4c34e3c08508aca3aa72fbcf3e73
                                • Instruction ID: ab42a90d4eebf8155d8231458711de780ef3a6206ec8632270879caaed4213c3
                                • Opcode Fuzzy Hash: 2627cd1965b847cb78f67f368bd13151c09f4c34e3c08508aca3aa72fbcf3e73
                                • Instruction Fuzzy Hash: 6BF0C8F453030E779B00BE64D8A6A9EB77C5E00B50F604121B928915E2EB70EE76C9E0
                                APIs
                                • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00298C52
                                • TerminateProcess.KERNEL32(00000000), ref: 00298C59
                                • FreeLibrary.KERNEL32(?,?,?,?), ref: 00298E3A
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Process$CurrentFreeLibraryTerminate
                                • String ID:
                                • API String ID: 146820519-0
                                • Opcode ID: 09538d7f10ca3011ac31a1a530330483c5a603e23782aa7d2e43fb9c929ec39f
                                • Instruction ID: e51b2b89003b9a44917757a8f58252c9882ac9846fa19f4ed3476679f9afedc4
                                • Opcode Fuzzy Hash: 09538d7f10ca3011ac31a1a530330483c5a603e23782aa7d2e43fb9c929ec39f
                                • Instruction Fuzzy Hash: F8126B719183419FCB14DF28C494B6ABBE5BF89314F18895DE8898B292CB30E955CF92
                                APIs
                                • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 00216CA1
                                • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 00216CB1
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: e64432800b024e6f9f742abd6fbf27f9b3c021f9c8d534a2f6c1853cac1dd8a8
                                • Instruction ID: ca6bfdfa2aac34eef1a830f5d0dd9cf021d6d3098b88c8bb6c0266c416dc814e
                                • Opcode Fuzzy Hash: e64432800b024e6f9f742abd6fbf27f9b3c021f9c8d534a2f6c1853cac1dd8a8
                                • Instruction Fuzzy Hash: 79314971A1061AEBDB14CF68C988BDDB7F5FB14314F14862AE81597240C7B1BEA4CBD0
                                APIs
                                  • Part of subcall function 00215F59: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00216049
                                • KillTimer.USER32(?,00000001,?,?), ref: 0022FD44
                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0022FD53
                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0026FDD3
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: IconNotifyShell_Timer$Kill
                                • String ID:
                                • API String ID: 3500052701-0
                                • Opcode ID: e6f030c6910ab61362db63fd32e24ad2abcf238eff3f63824f4b84a8629fb904
                                • Instruction ID: 6d517fcdd7408b6d1514fd403a3aadd19030397338f8b97a8c085502cf12c90e
                                • Opcode Fuzzy Hash: e6f030c6910ab61362db63fd32e24ad2abcf238eff3f63824f4b84a8629fb904
                                • Instruction Fuzzy Hash: 3431E570914354AFEB62CF209985BE6BBEC9F02308F0004AEE5DA57241C7746AC8CB51
                                APIs
                                • CloseHandle.KERNELBASE(00000000,00000000,?,?,0024895C,?,002D9CE8,0000000C), ref: 00248A94
                                • GetLastError.KERNEL32(?,0024895C,?,002D9CE8,0000000C), ref: 00248A9E
                                • __dosmaperr.LIBCMT ref: 00248AC9
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CloseErrorHandleLast__dosmaperr
                                • String ID:
                                • API String ID: 2583163307-0
                                • Opcode ID: 6ffd2cf037a9f8f64fe84bb2db47c216c0bfd07cd6b7633812ff132473d299bd
                                • Instruction ID: e482a5fe053b4401fe4b1d7e0bb0a738e702f9acbb20e69632290e1c44e3ba23
                                • Opcode Fuzzy Hash: 6ffd2cf037a9f8f64fe84bb2db47c216c0bfd07cd6b7633812ff132473d299bd
                                • Instruction Fuzzy Hash: A4016F3263557057D72C2734688577E678A4B81734F2D026BF8189B5D3DEF0CCE48690
                                APIs
                                • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,002497CA,FF8BC369,00000000,00000002,00000000), ref: 00249754
                                • GetLastError.KERNEL32(?,002497CA,FF8BC369,00000000,00000002,00000000,?,00245EF1,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,00236F61), ref: 0024975E
                                • __dosmaperr.LIBCMT ref: 00249765
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorFileLastPointer__dosmaperr
                                • String ID:
                                • API String ID: 2336955059-0
                                • Opcode ID: bf20627b49acec3d219e02a827fe947224c8445cd0e152aa59345182fb2e7c94
                                • Instruction ID: 4f65ba319b67859a9a6e2e76ed524444a8b43d95c85dee5ae43a3adfe18fd0cb
                                • Opcode Fuzzy Hash: bf20627b49acec3d219e02a827fe947224c8445cd0e152aa59345182fb2e7c94
                                • Instruction Fuzzy Hash: 4E014072A30115AFCB099F95EC45C5FB72DDB85330B240255F8158B191EA70DD61CF90
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 00222FB6
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Init_thread_footer
                                • String ID: CALL
                                • API String ID: 1385522511-4196123274
                                • Opcode ID: e033f44e25584a793f0560454fde1ec8876010813d2383fcb19e2b0171615167
                                • Instruction ID: 337c1591f13f79ca5e237a42e01f3e8286cca107aeb41238193c68b6fb7e9b38
                                • Opcode Fuzzy Hash: e033f44e25584a793f0560454fde1ec8876010813d2383fcb19e2b0171615167
                                • Instruction Fuzzy Hash: B422BB70628202EFC714DF54E480B2ABBF1BF98314F24895DF4868B361D772E9A5CB52
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 76bba8d88f2a25513cd42567a05a99749af598a82f45fdfa7b32ca1aca7eeceb
                                • Instruction ID: 5b539f1f0bbd584022f1667caa398e7fda251866cdd1cce9a096c5c8a93b0f1a
                                • Opcode Fuzzy Hash: 76bba8d88f2a25513cd42567a05a99749af598a82f45fdfa7b32ca1aca7eeceb
                                • Instruction Fuzzy Hash: B8321F70A20216EFDB20DFA4D885FAEB7B4EF10310F048459E855AB2A1D771ADB4CF91
                                APIs
                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,002133E9,002E2418,?,?,?,?,?,?,?,002132EF,?), ref: 00214227
                                  • Part of subcall function 002184B7: _wcslen.LIBCMT ref: 002184CA
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FullNamePath_wcslen
                                • String ID: $.
                                • API String ID: 4019309064-3373234421
                                • Opcode ID: fd4681343910f172e9813647b489a5572cfe025371f9114b0e21a32f19449970
                                • Instruction ID: 2816f9eb78188f5258d830addbf5e9b7fa89b822bf486c0dc6b0ecaf3aa2dfb4
                                • Opcode Fuzzy Hash: fd4681343910f172e9813647b489a5572cfe025371f9114b0e21a32f19449970
                                • Instruction Fuzzy Hash: 3611A175630209DBCB10FBA49845EDE73ECAF29350B4000A5B949D7281DEB4A7E88F51
                                APIs
                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 002139C3
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: IconNotifyShell_
                                • String ID:
                                • API String ID: 1144537725-0
                                • Opcode ID: c472efd6e6e9a7f1b71b66dc4a39ff6ac577a6d1a0a4cc4175d05bde5cd40b63
                                • Instruction ID: 2d6fc5c248506703c24495da978be0bc309f266761906f18f14a1f2fd9efd214
                                • Opcode Fuzzy Hash: c472efd6e6e9a7f1b71b66dc4a39ff6ac577a6d1a0a4cc4175d05bde5cd40b63
                                • Instruction Fuzzy Hash: AE315070514741CFD720DF24D889797BBE8FB59718F00092EE59A87280D7B5A998CF52
                                APIs
                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00213B33,?,00008000), ref: 00216E80
                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,00213B33,?,00008000), ref: 002559A2
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: de2fe4c428ed8643d6030f14b3b13e71828c334700f9e392cc7db59cce45f243
                                • Instruction ID: 51fe3e951f2677cbd89c06b5c54116ca738fff13ff785dc9e0726b33ff6571c7
                                • Opcode Fuzzy Hash: de2fe4c428ed8643d6030f14b3b13e71828c334700f9e392cc7db59cce45f243
                                • Instruction Fuzzy Hash: 44018031245221BAE3300A26DC0EF9B7F98EF12774F118310BE996A1E0CBB458A4CB90
                                APIs
                                • IsThemeActive.UXTHEME ref: 002132C4
                                  • Part of subcall function 0021326D: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00213282
                                  • Part of subcall function 0021326D: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00213299
                                  • Part of subcall function 00213312: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,002132EF,?), ref: 00213342
                                  • Part of subcall function 00213312: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,002132EF,?), ref: 00213355
                                  • Part of subcall function 00213312: GetFullPathNameW.KERNEL32(00007FFF,?,?,002E2418,002E2400,?,?,?,?,?,?,002132EF,?), ref: 002133C1
                                  • Part of subcall function 00213312: SetCurrentDirectoryW.KERNEL32(?,00000001,002E2418,?,?,?,?,?,?,?,002132EF,?), ref: 00213442
                                • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 002132FE
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                • String ID:
                                • API String ID: 1550534281-0
                                • Opcode ID: 448a1cb5e38f5a33abb6f705dd14ef1fd7dd3287fef69ede2fda8c8c70c3d2ff
                                • Instruction ID: 4a3eed90f2d379e199d4e156da4dd317943c5d73c0f0d1daefa8727ccbfed048
                                • Opcode Fuzzy Hash: 448a1cb5e38f5a33abb6f705dd14ef1fd7dd3287fef69ede2fda8c8c70c3d2ff
                                • Instruction Fuzzy Hash: 88F054719E4384DFE300AF60FC8EB6537E9A715705F504486B51A8D5E2CFB985A48F44
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 0029628D
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Init_thread_footer
                                • String ID:
                                • API String ID: 1385522511-0
                                • Opcode ID: 498ee51fbd034fc92570fdd8b833c9ea42c27b29ababbd19255b0ecce2379d9e
                                • Instruction ID: ef22c7262d5cc2cb512c760a1d5bd42d52392e59732e4fcce56cefba7695edd1
                                • Opcode Fuzzy Hash: 498ee51fbd034fc92570fdd8b833c9ea42c27b29ababbd19255b0ecce2379d9e
                                • Instruction Fuzzy Hash: 4A718A70A20216AFDF24DF94C8849BAB7F5FF59300F208069E9459B291D771AD61CB90
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 74e027878fd6e06fe2150e9be1bf67f0bbc4fe003902937a4daab5e5a7e508a7
                                • Instruction ID: 9a781c0cf8706432912384864dfa568308c6d50444fefea9fce04a42d9f2ca17
                                • Opcode Fuzzy Hash: 74e027878fd6e06fe2150e9be1bf67f0bbc4fe003902937a4daab5e5a7e508a7
                                • Instruction Fuzzy Hash: E051E5B5E20205EFDB50CF68E940E6A7BB1EB85364F198168EC489B392C771DD52CB90
                                APIs
                                • CharLowerBuffW.USER32(?,?), ref: 0027FBE3
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: BuffCharLower
                                • String ID:
                                • API String ID: 2358735015-0
                                • Opcode ID: 42fa32478ae2ce696d3c2542da5c5ef21d47ea4c687ad4a2bb7fe5411c285a93
                                • Instruction ID: a1545e5710080905fa6d5c4e2efcb5aa0cbf336601b014fe746af6a3082ddfe5
                                • Opcode Fuzzy Hash: 42fa32478ae2ce696d3c2542da5c5ef21d47ea4c687ad4a2bb7fe5411c285a93
                                • Instruction Fuzzy Hash: 964193B6A10209AFCB11EFA4C9819AF77B8EF58314F11853EE91A97241EB70DA54CB50
                                APIs
                                  • Part of subcall function 00216332: LoadLibraryA.KERNEL32(kernel32.dll,?,?,0021637F,?,?,002160AA,?,00000001,?,?,00000000), ref: 0021633E
                                  • Part of subcall function 00216332: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00216350
                                  • Part of subcall function 00216332: FreeLibrary.KERNEL32(00000000,?,?,0021637F,?,?,002160AA,?,00000001,?,?,00000000), ref: 00216362
                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,002160AA,?,00000001,?,?,00000000), ref: 0021639F
                                  • Part of subcall function 002162FB: LoadLibraryA.KERNEL32(kernel32.dll,?,?,002554C3,?,?,002160AA,?,00000001,?,?,00000000), ref: 00216304
                                  • Part of subcall function 002162FB: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00216316
                                  • Part of subcall function 002162FB: FreeLibrary.KERNEL32(00000000,?,?,002554C3,?,?,002160AA,?,00000001,?,?,00000000), ref: 00216329
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Library$Load$AddressFreeProc
                                • String ID:
                                • API String ID: 2632591731-0
                                • Opcode ID: 501a93f9441b67ee2a5c0785a993c3aa8cbe66435998730b0ac1b37282fd77f6
                                • Instruction ID: 71e2616a3f59892e74acba3691d1f811315b13a858bb7208fbb08b8ff575a277
                                • Opcode Fuzzy Hash: 501a93f9441b67ee2a5c0785a993c3aa8cbe66435998730b0ac1b37282fd77f6
                                • Instruction Fuzzy Hash: 85112731620215ABCF14FF20C80ABED77E59F60B11F508429F853A60C1DFB59EA59F50
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: __wsopen_s
                                • String ID:
                                • API String ID: 3347428461-0
                                • Opcode ID: 516e65b805c26c33863a301884115e0c71bef5d5cb3b45a0b3aaa1f3de16877a
                                • Instruction ID: 80b0c5778dffd4dc767baeee661e0af7ea3ac7afb537c2fe0c284788032dde4d
                                • Opcode Fuzzy Hash: 516e65b805c26c33863a301884115e0c71bef5d5cb3b45a0b3aaa1f3de16877a
                                • Instruction Fuzzy Hash: 48115A7591410AAFCF0ADF58E940A9E7BF5EF48314F104069FC08AB311DA30EA21CBA4
                                APIs
                                • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,00216B73,?,00010000,00000000,00000000,00000000,00000000), ref: 0021B0AC
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: dd11deb2b56066fcb1c6317c5325a108ebdee586325557a7489d9217cebad490
                                • Instruction ID: 4c08bb5f7ef1048e74caca2a3b5629a98a3f2a4f0f8425d4a0a4b17a425ac0b2
                                • Opcode Fuzzy Hash: dd11deb2b56066fcb1c6317c5325a108ebdee586325557a7489d9217cebad490
                                • Instruction Fuzzy Hash: 65114C31210705DFD721CF15D480BA7B7F9EF58354F10C42DE9AA8BA50C7B1A995CB60
                                APIs
                                  • Part of subcall function 0024500D: RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,002431B9,00000001,00000364,?,?,?,0000000A,00000000), ref: 0024504E
                                • _free.LIBCMT ref: 002453FC
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: AllocateHeap_free
                                • String ID:
                                • API String ID: 614378929-0
                                • Opcode ID: fba82c0aa068c5562b6699b73bb903d727f3ae0d836859c59312de60e55cd848
                                • Instruction ID: 171bf2b12c11b544822e0cc571b0d456c71613a3a8f6d01390d6a1ee48d585e0
                                • Opcode Fuzzy Hash: fba82c0aa068c5562b6699b73bb903d727f3ae0d836859c59312de60e55cd848
                                • Instruction Fuzzy Hash: E00166B3214705ABE3258E259841A5AFBDCEB89370F250A6DE1C483281EAB0A845CA70
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: aea155f1e03846a7945f3ef32b85c3da0dbec0b08e6aeb419bf15716d252f37c
                                • Instruction ID: b3445b25e908c883b6f931858965ba9af960d2565c833c4acd580d72bec27be2
                                • Opcode Fuzzy Hash: aea155f1e03846a7945f3ef32b85c3da0dbec0b08e6aeb419bf15716d252f37c
                                • Instruction Fuzzy Hash: 48F02DB2530B2097DB353E769C0575A33989F41735F110B15F865921D1DFB0D82A8F92
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen
                                • String ID:
                                • API String ID: 176396367-0
                                • Opcode ID: 41857fa16978e823efbc9f025671a5b1dff55116fb35f6b10a015bb473353f75
                                • Instruction ID: 17cb98d70e03b4d394c8f37d65fb0d1005dd23029796ca61a54ee25293a22063
                                • Opcode Fuzzy Hash: 41857fa16978e823efbc9f025671a5b1dff55116fb35f6b10a015bb473353f75
                                • Instruction Fuzzy Hash: 73F02DB25107047EC7105F28CC02E97BBA4EF54360F10822AFA19CB1D0DB31E4608BA0
                                APIs
                                • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,002431B9,00000001,00000364,?,?,?,0000000A,00000000), ref: 0024504E
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: AllocateHeap
                                • String ID:
                                • API String ID: 1279760036-0
                                • Opcode ID: 02f4c7d47f723c9d033cc5ceefc78f60fb2961375e6340695441a68cc1417e8b
                                • Instruction ID: 7801988a4f3316be47733992b0d01aa55e4c391811242ce75086dd50f1bfe655
                                • Opcode Fuzzy Hash: 02f4c7d47f723c9d033cc5ceefc78f60fb2961375e6340695441a68cc1417e8b
                                • Instruction Fuzzy Hash: 6EF0E935A35D35A7DB395E229C05F5A374CAF497A1F185015BC999A192CA70DC208AE0
                                APIs
                                • RtlAllocateHeap.NTDLL(00000000,?,?,?,00236A99,?,0000015D,?,?,?,?,002385D0,000000FF,00000000,?,?), ref: 00243BE2
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: AllocateHeap
                                • String ID:
                                • API String ID: 1279760036-0
                                • Opcode ID: 88251bf4c05d58d3ee66cb6f21b012c5ebc4b30c3e39385c4834b1f4e41af969
                                • Instruction ID: bd71dce6751245fb9dee9c8c5094ee2e51efdaf80397ea0425e7a4e55d4cf57d
                                • Opcode Fuzzy Hash: 88251bf4c05d58d3ee66cb6f21b012c5ebc4b30c3e39385c4834b1f4e41af969
                                • Instruction Fuzzy Hash: 5FE02B3163422297D724AE76AC06F5B768CDF417E4F150121FC0AD60D0DB60DD2089E1
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4b4e187bebb9d157d91d5b39e424ee48f939e8eb486e51a63516fd7e305421ff
                                • Instruction ID: 72dd019a997b13cbb2d0dcd2bc34fceeef98a08b97d07828bcb4ac7ae68a2440
                                • Opcode Fuzzy Hash: 4b4e187bebb9d157d91d5b39e424ee48f939e8eb486e51a63516fd7e305421ff
                                • Instruction Fuzzy Hash: 47F03071121712CFCB349F64D498896BBE5FF14316364897EE5D782520C771A894DF50
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: c74d7dccc2f7e84d4d85cf1989d359464e82f8b87dab7f09dde6bab7661a59d9
                                • Instruction ID: 9a72da6fd650d14e77c22c2f2c19015848cc288611fc2ea68f398a0273772503
                                • Opcode Fuzzy Hash: c74d7dccc2f7e84d4d85cf1989d359464e82f8b87dab7f09dde6bab7661a59d9
                                • Instruction Fuzzy Hash: A2F0E5B1B342016AE7205EB4A819BA2B7E4AB12314F14890AD8C982181C7F554F497A2
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: 6412a0ae6ecd37d4b62abd6a430ba8f2e1e73ab5a76ca7c94f9c94e1b993e723
                                • Instruction ID: 1a2cf42bddc16c21722a288c025d6a554a8634b701925c41058a495d5c5833e2
                                • Opcode Fuzzy Hash: 6412a0ae6ecd37d4b62abd6a430ba8f2e1e73ab5a76ca7c94f9c94e1b993e723
                                • Instruction Fuzzy Hash: 82F06571A202149BDF20DF94E881B9DB7F4BF15361F104429E899DB341D67699B08F90
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: __fread_nolock
                                • String ID:
                                • API String ID: 2638373210-0
                                • Opcode ID: 246872d857331b2299f9d721c1e21c3e63b90e22c0d4325a9684d784a7ce1dac
                                • Instruction ID: de424f07c4390cf330d40a969774f585084e15c100fc187a0630053232fefe43
                                • Opcode Fuzzy Hash: 246872d857331b2299f9d721c1e21c3e63b90e22c0d4325a9684d784a7ce1dac
                                • Instruction Fuzzy Hash: 49F0587141020DFFDF04CF80C941E9E7BB9FB04308F208445F9158A151D336DA21EBA0
                                APIs
                                • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,002541AF,002D4600,00000002), ref: 0027D4E6
                                  • Part of subcall function 0027D3F7: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,0027D4D9,?,?,?), ref: 0027D419
                                  • Part of subcall function 0027D3F7: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,0027D4D9,?,?,?,?,002541AF,002D4600,00000002), ref: 0027D42E
                                  • Part of subcall function 0027D3F7: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,0027D4D9,?,?,?,?,002541AF,002D4600,00000002), ref: 0027D43A
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: File$Pointer$Write
                                • String ID:
                                • API String ID: 3847668363-0
                                • Opcode ID: e31b1533fb8a36268061bac3e30134ce6bd4e03b5745f3d200c018db273601e7
                                • Instruction ID: 728047bcea0e65a8aa5d5004fe90b94ea51cf68c1aa3cd2d17c4ad16feb65643
                                • Opcode Fuzzy Hash: e31b1533fb8a36268061bac3e30134ce6bd4e03b5745f3d200c018db273601e7
                                • Instruction Fuzzy Hash: E8E06D76500708EFC7219F5ADC048AAB7F8FF81321710852FF99A82510D7B1EA14DF60
                                APIs
                                • Shell_NotifyIconW.SHELL32(00000002,?), ref: 002138EA
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: IconNotifyShell_
                                • String ID:
                                • API String ID: 1144537725-0
                                • Opcode ID: 60a8c7f99c250e21153112a6a1c2d803c82dafa79a57a0997e6827a348c29538
                                • Instruction ID: b88f173e3ff9c597a62f86e47ab1f7ec6b56ee3c1174e16a7a1ed5c6d03b6ac2
                                • Opcode Fuzzy Hash: 60a8c7f99c250e21153112a6a1c2d803c82dafa79a57a0997e6827a348c29538
                                • Instruction Fuzzy Hash: B6F03770914358DFE752DF24EC4A7D57BFCAB05708F0000E5A5859A182D774578CCF51
                                APIs
                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 002139FD
                                  • Part of subcall function 002184B7: _wcslen.LIBCMT ref: 002184CA
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: LongNamePath_wcslen
                                • String ID:
                                • API String ID: 541455249-0
                                • Opcode ID: fa4ce604db763e7092cec1c70816d53854a7f33c43c501f1fe4746cb53a13521
                                • Instruction ID: f5fa5998ce3a5c1c7adfd15371b5f41e63e9e84e0b58952a5e25094fa157737f
                                • Opcode Fuzzy Hash: fa4ce604db763e7092cec1c70816d53854a7f33c43c501f1fe4746cb53a13521
                                • Instruction Fuzzy Hash: 8CE0C276A002245BCB20E2989C0AFEA77EDDFC9790F0400B1FC09D7248DEB4ED84CA90
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: 8f94b91de263290469ed6a7476ecff10c293aac69619ba6a32b34dfa41940838
                                • Instruction ID: 26f4cd844764c0dbb97d0e9e948d2b035feacb527912c0d29e9613920d53d335
                                • Opcode Fuzzy Hash: 8f94b91de263290469ed6a7476ecff10c293aac69619ba6a32b34dfa41940838
                                • Instruction Fuzzy Hash: FBE08672F10115A7CF20CEE4A891BADB7B4BF25352F100161E959FA111C6239D718AA1
                                APIs
                                • CreateFileW.KERNELBASE(00000000,00000000,?,00250AA4,?,?,00000000,?,00250AA4,00000000,0000000C), ref: 00250757
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 7fe33caeb267d44adf8dd4a4a06199209f16e447d4c667970da883c455ea9110
                                • Instruction ID: 13b0505deeab42c8cb423434a91f6899ba14c6f3a6d8b99cf422bd11dd877a32
                                • Opcode Fuzzy Hash: 7fe33caeb267d44adf8dd4a4a06199209f16e447d4c667970da883c455ea9110
                                • Instruction Fuzzy Hash: 40D06C3210020DBBDF028F84ED06EDA3BAAFB48714F014000BE5856020C736E821AB90
                                APIs
                                  • Part of subcall function 00216E52: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00213B33,?,00008000), ref: 00216E80
                                • GetLastError.KERNEL32(00000002,00000000), ref: 00288038
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CreateErrorFileLast
                                • String ID:
                                • API String ID: 1214770103-0
                                • Opcode ID: 880c8dab720c8cebb303ef1dd12088578d648b2ff2dc0b149f1a15efaea11126
                                • Instruction ID: c26a0eaf185e542a90726149c4a741d2ba3386d5bfc7ffb4de5847f32fec496b
                                • Opcode Fuzzy Hash: 880c8dab720c8cebb303ef1dd12088578d648b2ff2dc0b149f1a15efaea11126
                                • Instruction Fuzzy Hash: 2681BE346283028FC715EF24C491BAEB7E1AFA8310F14455DF9865B292CB30EDA4CF92
                                APIs
                                • CloseHandle.KERNELBASE(?,?,00000000,00253A1C), ref: 00217973
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CloseHandle
                                • String ID:
                                • API String ID: 2962429428-0
                                • Opcode ID: ae571df75afff453cc48010fc45713bc1bf158b904a27f1d92060ab0fbbfffb9
                                • Instruction ID: 121d5198560fa13674189a9dd6928d03845219b3bc3e47a711e1b762004a936e
                                • Opcode Fuzzy Hash: ae571df75afff453cc48010fc45713bc1bf158b904a27f1d92060ab0fbbfffb9
                                • Instruction Fuzzy Hash: 19E09275814B12DFC7314F1AE804452FBF4FEE23613204A2FD0E682660D7B0589ACB50
                                APIs
                                • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0022FC94
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0026FC58
                                • IsIconic.USER32(00000000), ref: 0026FC61
                                • ShowWindow.USER32(00000000,00000009), ref: 0026FC6E
                                • SetForegroundWindow.USER32(00000000), ref: 0026FC78
                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0026FC8E
                                • GetCurrentThreadId.KERNEL32 ref: 0026FC95
                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0026FCA1
                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0026FCB2
                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0026FCBA
                                • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0026FCC2
                                • SetForegroundWindow.USER32(00000000), ref: 0026FCC5
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0026FCDA
                                • keybd_event.USER32(00000012,00000000), ref: 0026FCE5
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0026FCEF
                                • keybd_event.USER32(00000012,00000000), ref: 0026FCF4
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0026FCFD
                                • keybd_event.USER32(00000012,00000000), ref: 0026FD02
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0026FD0C
                                • keybd_event.USER32(00000012,00000000), ref: 0026FD11
                                • SetForegroundWindow.USER32(00000000), ref: 0026FD14
                                • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0026FD3B
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                • String ID: Shell_TrayWnd
                                • API String ID: 4125248594-2988720461
                                • Opcode ID: d118429ea41a3d5fa52d212cc79cb87813951cdff006adefaeb7844afebc875a
                                • Instruction ID: 48106e3a928c6f7a54ceef4179f4a8bbae94634fcb65d0fd5059e47d0a97d2ab
                                • Opcode Fuzzy Hash: d118429ea41a3d5fa52d212cc79cb87813951cdff006adefaeb7844afebc875a
                                • Instruction Fuzzy Hash: 97319671A502187BEF206BB56D4DF7F7E6CEB45B50F100066FA01E61D0DAB05D50AAA0
                                APIs
                                  • Part of subcall function 00271F53: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00271F9D
                                  • Part of subcall function 00271F53: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00271FCA
                                  • Part of subcall function 00271F53: GetLastError.KERNEL32 ref: 00271FDA
                                • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00271B16
                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00271B38
                                • CloseHandle.KERNEL32(?), ref: 00271B49
                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00271B61
                                • GetProcessWindowStation.USER32 ref: 00271B7A
                                • SetProcessWindowStation.USER32(00000000), ref: 00271B84
                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00271BA0
                                  • Part of subcall function 0027194F: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00271A8C), ref: 00271964
                                  • Part of subcall function 0027194F: CloseHandle.KERNEL32(?,?,00271A8C), ref: 00271979
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                • String ID: $default$winsta0$j-
                                • API String ID: 22674027-1767079194
                                • Opcode ID: ef69b83ac21880fd242e7272627962a8a0b8f8395472a641b9091a2a441609f9
                                • Instruction ID: 5cb582e57937b079b5e7840af108c720aa390ff73fcd099ea8345fe8d185b99c
                                • Opcode Fuzzy Hash: ef69b83ac21880fd242e7272627962a8a0b8f8395472a641b9091a2a441609f9
                                • Instruction Fuzzy Hash: BF818F7195020AAFDF219FA9DC49BEE7BBDFF05300F14801AF919A61A0DB718965CF21
                                APIs
                                  • Part of subcall function 00271989: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 002719A4
                                  • Part of subcall function 00271989: GetLastError.KERNEL32(?,00000000,00000000,?,?,0027142B,?,?,?), ref: 002719B0
                                  • Part of subcall function 00271989: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,0027142B,?,?,?), ref: 002719BF
                                  • Part of subcall function 00271989: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,0027142B,?,?,?), ref: 002719C6
                                  • Part of subcall function 00271989: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 002719DD
                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0027145C
                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00271490
                                • GetLengthSid.ADVAPI32(?), ref: 002714A7
                                • GetAce.ADVAPI32(?,00000000,?), ref: 002714E1
                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 002714FD
                                • GetLengthSid.ADVAPI32(?), ref: 00271514
                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 0027151C
                                • HeapAlloc.KERNEL32(00000000), ref: 00271523
                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00271544
                                • CopySid.ADVAPI32(00000000), ref: 0027154B
                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0027157A
                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0027159C
                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 002715AE
                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002715D5
                                • HeapFree.KERNEL32(00000000), ref: 002715DC
                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002715E5
                                • HeapFree.KERNEL32(00000000), ref: 002715EC
                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002715F5
                                • HeapFree.KERNEL32(00000000), ref: 002715FC
                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00271608
                                • HeapFree.KERNEL32(00000000), ref: 0027160F
                                  • Part of subcall function 00271A23: GetProcessHeap.KERNEL32(00000008,00271441,?,00000000,?,00271441,?), ref: 00271A31
                                  • Part of subcall function 00271A23: HeapAlloc.KERNEL32(00000000,?,00000000,?,00271441,?), ref: 00271A38
                                  • Part of subcall function 00271A23: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00271441,?), ref: 00271A47
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                • String ID:
                                • API String ID: 4175595110-0
                                • Opcode ID: 20da37b4b91617bb3b786c38bded12f364f4af1ee1e29c05c651bc2e011657a0
                                • Instruction ID: b72dc484247b13185fa29a03c5fa2fdea3d500ef86fd755fc778e2dc037d8ff9
                                • Opcode Fuzzy Hash: 20da37b4b91617bb3b786c38bded12f364f4af1ee1e29c05c651bc2e011657a0
                                • Instruction Fuzzy Hash: 617151B191020AEBDF10DFA9DC48FEEBBB9FF45310F148115E91AA7190DB719A25CB60
                                APIs
                                • OpenClipboard.USER32(002ADCD0), ref: 0028F486
                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0028F494
                                • GetClipboardData.USER32(0000000D), ref: 0028F4A0
                                • CloseClipboard.USER32 ref: 0028F4AC
                                • GlobalLock.KERNEL32(00000000), ref: 0028F4E4
                                • CloseClipboard.USER32 ref: 0028F4EE
                                • GlobalUnlock.KERNEL32(00000000), ref: 0028F519
                                • IsClipboardFormatAvailable.USER32(00000001), ref: 0028F526
                                • GetClipboardData.USER32(00000001), ref: 0028F52E
                                • GlobalLock.KERNEL32(00000000), ref: 0028F53F
                                • GlobalUnlock.KERNEL32(00000000), ref: 0028F57F
                                • IsClipboardFormatAvailable.USER32(0000000F), ref: 0028F595
                                • GetClipboardData.USER32(0000000F), ref: 0028F5A1
                                • GlobalLock.KERNEL32(00000000), ref: 0028F5B2
                                • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0028F5D4
                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0028F5F1
                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0028F62F
                                • GlobalUnlock.KERNEL32(00000000), ref: 0028F650
                                • CountClipboardFormats.USER32 ref: 0028F671
                                • CloseClipboard.USER32 ref: 0028F6B6
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                • String ID:
                                • API String ID: 420908878-0
                                • Opcode ID: 9942a419113a873e0ebda47ecd551b29a884faa6b3616dae5e6b6b1ac7ed3fba
                                • Instruction ID: 1ef8edb8408ee735828b142db1a328434076e0f333e510916c6edb08ddf285b6
                                • Opcode Fuzzy Hash: 9942a419113a873e0ebda47ecd551b29a884faa6b3616dae5e6b6b1ac7ed3fba
                                • Instruction Fuzzy Hash: 2361BC342113029FD310FF20E988F6A7BE8AF95714F044569F856872E2DF31E955CB62
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 00287318
                                • FindClose.KERNEL32(00000000), ref: 0028736C
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 002873A8
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 002873CF
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0028740C
                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00287439
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                • API String ID: 3830820486-3289030164
                                • Opcode ID: 59f0cb0d2992625af0e8ecfac36c82098bd04c601d9701fd26c195f509f8b278
                                • Instruction ID: c83bf03279c687beba0077b48b723a251efaf27be04b435289f87d979df4584f
                                • Opcode Fuzzy Hash: 59f0cb0d2992625af0e8ecfac36c82098bd04c601d9701fd26c195f509f8b278
                                • Instruction Fuzzy Hash: 26D15D72518344AFC310EFA4C895EBFB7FCAF98704F44091AF98586192EB74D954CB62
                                APIs
                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0028469A
                                • _wcslen.LIBCMT ref: 002846C7
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 002846F7
                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00284718
                                • RemoveDirectoryW.KERNEL32(?), ref: 00284728
                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 002847AF
                                • CloseHandle.KERNEL32(00000000), ref: 002847BA
                                • CloseHandle.KERNEL32(00000000), ref: 002847C5
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                • String ID: :$\$\??\%s
                                • API String ID: 1149970189-3457252023
                                • Opcode ID: 7dc3fa67d7479e9d07e126657af929d74383682f47fb9462f53a5d5e76b16d23
                                • Instruction ID: a0642e554ef20b26c884bddd1a9fd9c73d9ad1c72b97a0727938b7ccb46ddd7e
                                • Opcode Fuzzy Hash: 7dc3fa67d7479e9d07e126657af929d74383682f47fb9462f53a5d5e76b16d23
                                • Instruction Fuzzy Hash: 3331D87551021AABDB21EF60DC49FEB77BCEF8A740F1001B5F905D20A0EB7496548F24
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0028A11B
                                • FindNextFileW.KERNEL32(00000000,?), ref: 0028A176
                                • FindClose.KERNEL32(00000000), ref: 0028A181
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 0028A19D
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0028A1ED
                                • SetCurrentDirectoryW.KERNEL32(002D7B94), ref: 0028A20B
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0028A215
                                • FindClose.KERNEL32(00000000), ref: 0028A222
                                • FindClose.KERNEL32(00000000), ref: 0028A232
                                  • Part of subcall function 0027E2AE: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0027E2C9
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                • String ID: *.*
                                • API String ID: 2640511053-438819550
                                • Opcode ID: 7ac23dc67ba76040042895d5f6ca7e3dd3a0b44552dd9ac5cdd19b12e83b4264
                                • Instruction ID: b4fc96149dda564ce1fb54bd9a90119e7beab876e7f01668030d11e73e501914
                                • Opcode Fuzzy Hash: 7ac23dc67ba76040042895d5f6ca7e3dd3a0b44552dd9ac5cdd19b12e83b4264
                                • Instruction Fuzzy Hash: 3F31F23511221A6BEF20BFA4AC09ADE73AC9F06320F100193EC15A21E1EF75DE65CF61
                                APIs
                                  • Part of subcall function 0029D2F7: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0029C00D,?,?), ref: 0029D314
                                  • Part of subcall function 0029D2F7: _wcslen.LIBCMT ref: 0029D350
                                  • Part of subcall function 0029D2F7: _wcslen.LIBCMT ref: 0029D3C7
                                  • Part of subcall function 0029D2F7: _wcslen.LIBCMT ref: 0029D3FD
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0029C89D
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0029C908
                                • RegCloseKey.ADVAPI32(00000000), ref: 0029C92C
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0029C98B
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0029CA46
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0029CAB3
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0029CB48
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0029CB99
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0029CC42
                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0029CCE1
                                • RegCloseKey.ADVAPI32(00000000), ref: 0029CCEE
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                • String ID:
                                • API String ID: 3102970594-0
                                • Opcode ID: 793432684b173d6de12d0621b3a1804992075fb8a77855f5861eafb5644d1220
                                • Instruction ID: b978f576adf002d83873ab312f8dd8c7ed88b89110edec60417ac278266139c1
                                • Opcode Fuzzy Hash: 793432684b173d6de12d0621b3a1804992075fb8a77855f5861eafb5644d1220
                                • Instruction Fuzzy Hash: 91026F716142019FDB14DF24C895E2ABBE5FF48318F18849DF84ACB2A2DB31ED56CB91
                                APIs
                                • GetKeyboardState.USER32(?), ref: 0027A572
                                • GetAsyncKeyState.USER32(000000A0), ref: 0027A5F3
                                • GetKeyState.USER32(000000A0), ref: 0027A60E
                                • GetAsyncKeyState.USER32(000000A1), ref: 0027A628
                                • GetKeyState.USER32(000000A1), ref: 0027A63D
                                • GetAsyncKeyState.USER32(00000011), ref: 0027A655
                                • GetKeyState.USER32(00000011), ref: 0027A667
                                • GetAsyncKeyState.USER32(00000012), ref: 0027A67F
                                • GetKeyState.USER32(00000012), ref: 0027A691
                                • GetAsyncKeyState.USER32(0000005B), ref: 0027A6A9
                                • GetKeyState.USER32(0000005B), ref: 0027A6BB
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: c9eae779740dc5378ed4d2b900bcda4004fe96bb31523b7a888135222f0f1bc0
                                • Instruction ID: 6b078e52e09b6ea48ce1d4827862ee17a3141fe70b2620db0321512dea451354
                                • Opcode Fuzzy Hash: c9eae779740dc5378ed4d2b900bcda4004fe96bb31523b7a888135222f0f1bc0
                                • Instruction Fuzzy Hash: 0B41F5609247CB6AFF354F6084043A9BEA4AB91364F48C04AD6CB4A5C1DBB499E88B53
                                APIs
                                  • Part of subcall function 0021557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00215558,?,?,00254B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 0021559E
                                  • Part of subcall function 0027E9C5: GetFileAttributesW.KERNEL32(?,0027D755), ref: 0027E9C6
                                • FindFirstFileW.KERNEL32(?,?), ref: 0027D8E2
                                • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0027D99D
                                • MoveFileW.KERNEL32(?,?), ref: 0027D9B0
                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 0027D9CD
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0027D9F7
                                  • Part of subcall function 0027DA5C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0027D9DC,?,?), ref: 0027DA72
                                • FindClose.KERNEL32(00000000,?,?,?), ref: 0027DA13
                                • FindClose.KERNEL32(00000000), ref: 0027DA24
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                • String ID: \*.*
                                • API String ID: 1946585618-1173974218
                                • Opcode ID: b48712fe7e00b97b5fd4ed68cc0e580ab80b2fb705fed756b9a2dcbe9a8a663e
                                • Instruction ID: 3e628ba32edbcd35d6ec91ecc74a13943b38960af5445741c1eb83343fbc7430
                                • Opcode Fuzzy Hash: b48712fe7e00b97b5fd4ed68cc0e580ab80b2fb705fed756b9a2dcbe9a8a663e
                                • Instruction Fuzzy Hash: 0B614B31C1114DABCF05EFE0DA52AEDB7B5AF25300F6480A5E406B61A2EB316F59CF61
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                • String ID:
                                • API String ID: 1737998785-0
                                • Opcode ID: c9a3258f3f16de3c6935dd3bb77c37f504786c1b195d83941d6bacadb5fbbc67
                                • Instruction ID: 1bfa57938597908a79a9b67b786daf733cd5b8df0ee20307fc23638a2181b462
                                • Opcode Fuzzy Hash: c9a3258f3f16de3c6935dd3bb77c37f504786c1b195d83941d6bacadb5fbbc67
                                • Instruction Fuzzy Hash: 6141C0382156129FE710DF14E888F15BBE4EF44318F15C4A8E81A8FAA2CB75EC42CF90
                                APIs
                                • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00271CD9,?,?,00000000), ref: 0027209C
                                • HeapAlloc.KERNEL32(00000000,?,00271CD9,?,?,00000000), ref: 002720A3
                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00271CD9,?,?,00000000), ref: 002720B8
                                • GetCurrentProcess.KERNEL32(?,00000000,?,00271CD9,?,?,00000000), ref: 002720C0
                                • DuplicateHandle.KERNEL32(00000000,?,00271CD9,?,?,00000000), ref: 002720C3
                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00271CD9,?,?,00000000), ref: 002720D3
                                • GetCurrentProcess.KERNEL32(00271CD9,00000000,?,00271CD9,?,?,00000000), ref: 002720DB
                                • DuplicateHandle.KERNEL32(00000000,?,00271CD9,?,?,00000000), ref: 002720DE
                                • CreateThread.KERNEL32(00000000,00000000,00272104,00000000,00000000,00000000), ref: 002720F8
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                • String ID:
                                • API String ID: 1957940570-0
                                • Opcode ID: 1286cb1404f229b317a455351cb24578a1526681c65fc714776cefb25829287b
                                • Instruction ID: d48781b0702f12125460df9c999193c1e84d7ad56c5fe60a0cb24b80997fc81f
                                • Opcode Fuzzy Hash: 1286cb1404f229b317a455351cb24578a1526681c65fc714776cefb25829287b
                                • Instruction Fuzzy Hash: 4001CDB5240308FFE710AFA5EC4DF6B3BACEB8A711F404411FA09DB5A1DA709800CB20
                                APIs
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0025552E,?,?,00000000,00000000), ref: 00283933
                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,0025552E,?,?,00000000,00000000), ref: 0028394A
                                • LoadResource.KERNEL32(?,00000000,?,?,0025552E,?,?,00000000,00000000,?,?,?,?,?,?,002163C2), ref: 0028395A
                                • SizeofResource.KERNEL32(?,00000000,?,?,0025552E,?,?,00000000,00000000,?,?,?,?,?,?,002163C2), ref: 0028396B
                                • LockResource.KERNEL32(.U%,?,?,0025552E,?,?,00000000,00000000,?,?,?,?,?,?,002163C2,?), ref: 0028397A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                • String ID: .U%$SCRIPT
                                • API String ID: 3051347437-1560596366
                                • Opcode ID: c5fc965d41075eb084728e1959faa617007ffcc7e28184a520ab6efe957ee217
                                • Instruction ID: adcdf4f109ad3b0561bf133fa5ccbf4aea714f8c5b9f1aeab2591275608a624e
                                • Opcode Fuzzy Hash: c5fc965d41075eb084728e1959faa617007ffcc7e28184a520ab6efe957ee217
                                • Instruction Fuzzy Hash: 89117C74211701BFE7219B25EC48F277BB9EBC6B40F148268F84296690DBB1DD10C621
                                APIs
                                  • Part of subcall function 00271F53: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00271F9D
                                  • Part of subcall function 00271F53: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00271FCA
                                  • Part of subcall function 00271F53: GetLastError.KERNEL32 ref: 00271FDA
                                • ExitWindowsEx.USER32(?,00000000), ref: 0027F15E
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                • String ID: $ $@$SeShutdownPrivilege
                                • API String ID: 2234035333-3163812486
                                • Opcode ID: 6c83747f40005d0dd0a15c63b999d8362fa003c7439f44cda68985db1c27e0b1
                                • Instruction ID: 72aab5cb829b32ae0b684ae780fa17713c2a43912305e1396315ae388fa97ae4
                                • Opcode Fuzzy Hash: 6c83747f40005d0dd0a15c63b999d8362fa003c7439f44cda68985db1c27e0b1
                                • Instruction Fuzzy Hash: 3701A272638211EBE7646AB8EE8ABBF726C9B09350F558431FD0EE21D1DA705D208690
                                APIs
                                • socket.WSOCK32(00000002,00000001,00000006), ref: 00291BD3
                                • WSAGetLastError.WSOCK32 ref: 00291BE0
                                • bind.WSOCK32(00000000,?,00000010), ref: 00291C17
                                • WSAGetLastError.WSOCK32 ref: 00291C22
                                • closesocket.WSOCK32(00000000), ref: 00291C51
                                • listen.WSOCK32(00000000,00000005), ref: 00291C60
                                • WSAGetLastError.WSOCK32 ref: 00291C6A
                                • closesocket.WSOCK32(00000000), ref: 00291C99
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorLast$closesocket$bindlistensocket
                                • String ID:
                                • API String ID: 540024437-0
                                • Opcode ID: 06e4a604e2f53ead9863a5f9f1eba41cd43961cc5b8510296407c4cc273ba42a
                                • Instruction ID: ec0c7a51163a0da0499c32cb0c8e7b892767deee9572cc54da20e4a5da2f6eed
                                • Opcode Fuzzy Hash: 06e4a604e2f53ead9863a5f9f1eba41cd43961cc5b8510296407c4cc273ba42a
                                • Instruction Fuzzy Hash: 6E41A1346001029FDB10DF29D498B69BBE6BF46318F188199E8568F2D2C771EC92CBE1
                                APIs
                                • _free.LIBCMT ref: 0024BD74
                                • _free.LIBCMT ref: 0024BD98
                                • _free.LIBCMT ref: 0024BF1F
                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,002B46D0), ref: 0024BF31
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,002E221C,000000FF,00000000,0000003F,00000000,?,?), ref: 0024BFA9
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,002E2270,000000FF,?,0000003F,00000000,?), ref: 0024BFD6
                                • _free.LIBCMT ref: 0024C0EB
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                • String ID:
                                • API String ID: 314583886-0
                                • Opcode ID: a7f0a67c4d352fcffe148ba44d3a4df9d39f6f9fce3fcba5d7494d984b0b5642
                                • Instruction ID: 804c8966adf40061ca9adcbdb22121605e077d2f70c25ed0d9dea235f0f303a1
                                • Opcode Fuzzy Hash: a7f0a67c4d352fcffe148ba44d3a4df9d39f6f9fce3fcba5d7494d984b0b5642
                                • Instruction Fuzzy Hash: 4AC15671A20246EBCB2A9F389C45BAA7BBCEF41310F64409AE9859B251D770CD66CF50
                                APIs
                                  • Part of subcall function 0021557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00215558,?,?,00254B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 0021559E
                                  • Part of subcall function 0027E9C5: GetFileAttributesW.KERNEL32(?,0027D755), ref: 0027E9C6
                                • FindFirstFileW.KERNEL32(?,?), ref: 0027DBE0
                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 0027DC30
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0027DC41
                                • FindClose.KERNEL32(00000000), ref: 0027DC58
                                • FindClose.KERNEL32(00000000), ref: 0027DC61
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                • String ID: \*.*
                                • API String ID: 2649000838-1173974218
                                • Opcode ID: a80213143fadcaaf5d61fcfd8755b062cd734e9827ecf2452a0c8001c536f4c3
                                • Instruction ID: ea68ef9ec249eabed4c9ec21c0f79efb39d5cfefdb66b7e51b75a9ed20c843bc
                                • Opcode Fuzzy Hash: a80213143fadcaaf5d61fcfd8755b062cd734e9827ecf2452a0c8001c536f4c3
                                • Instruction Fuzzy Hash: 5331A4310283459BC301EF64D8859EFB7F9BEA2304F44495DF4D6921A1DB70DE59CB52
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 0028A4D5
                                • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 0028A5E8
                                  • Part of subcall function 002841CE: GetInputState.USER32 ref: 00284225
                                  • Part of subcall function 002841CE: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002842C0
                                • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 0028A505
                                • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 0028A5D2
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                • String ID: *.*
                                • API String ID: 1972594611-438819550
                                • Opcode ID: c78ee493ddc0a4321467f7435db651177f9a3b3546a8d683a820e0f3129bfb3e
                                • Instruction ID: 3202a20ead0f1a0e92ae16b597cb543d6d08c3419fbe3bb20b17fbc3d34c3dd2
                                • Opcode Fuzzy Hash: c78ee493ddc0a4321467f7435db651177f9a3b3546a8d683a820e0f3129bfb3e
                                • Instruction Fuzzy Hash: A741B275D1120AAFEF10EFA4C849AEEBBB4EF15310F504057E805A21D1DB359EA4CF51
                                APIs
                                • DefDlgProcW.USER32(?,?), ref: 002122EE
                                • GetSysColor.USER32(0000000F), ref: 002123C3
                                • SetBkColor.GDI32(?,00000000), ref: 002123D6
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Color$Proc
                                • String ID:
                                • API String ID: 929743424-0
                                • Opcode ID: 093223564c4ff768f2567eefa7d6ad57f8e453c3a3ebd717e30f08261674b78d
                                • Instruction ID: 94dafab31a09af7d1902b764338d372040ce78cf1eb50d01fa0d535f833c6865
                                • Opcode Fuzzy Hash: 093223564c4ff768f2567eefa7d6ad57f8e453c3a3ebd717e30f08261674b78d
                                • Instruction Fuzzy Hash: 1A8146B1234055FEE628AE3D8C5CEFF25CDDB67341B100109F912C5592CAB98EB9D63A
                                APIs
                                  • Part of subcall function 002939AB: inet_addr.WSOCK32(?), ref: 002939D7
                                  • Part of subcall function 002939AB: _wcslen.LIBCMT ref: 002939F8
                                • socket.WSOCK32(00000002,00000002,00000011), ref: 002921BA
                                • WSAGetLastError.WSOCK32 ref: 002921E1
                                • bind.WSOCK32(00000000,?,00000010), ref: 00292238
                                • WSAGetLastError.WSOCK32 ref: 00292243
                                • closesocket.WSOCK32(00000000), ref: 00292272
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                • String ID:
                                • API String ID: 1601658205-0
                                • Opcode ID: 1bac10aab1d12929e365ac44174421f509944249b2b67c82c51fbc11e46acc88
                                • Instruction ID: 8f207b322d764ca9a171fe198c8fb408907658cef0efabffaa1134173e2a18ed
                                • Opcode Fuzzy Hash: 1bac10aab1d12929e365ac44174421f509944249b2b67c82c51fbc11e46acc88
                                • Instruction Fuzzy Hash: 6351D475A10210AFDB10AF64D886F6A77E5AF55714F048088F916AF3D3CB70AD518BE1
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                • String ID:
                                • API String ID: 292994002-0
                                • Opcode ID: b7589f3a5dbe2c7b302ffae0ff195fda43e8a23dea508261ac9747dfe6fadb6e
                                • Instruction ID: 45fd348a2be782652ddde14de0c6181d532a003473237d6dfd15ab4e043c66b0
                                • Opcode Fuzzy Hash: b7589f3a5dbe2c7b302ffae0ff195fda43e8a23dea508261ac9747dfe6fadb6e
                                • Instruction Fuzzy Hash: AB213231711241CFE7148F2AD858B5A7BE9FF96720F488068E84ACB211DF31EC56CB90
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0029B00B
                                • Process32FirstW.KERNEL32(00000000,?), ref: 0029B019
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                • Process32NextW.KERNEL32(00000000,?), ref: 0029B0FB
                                • CloseHandle.KERNEL32(00000000), ref: 0029B10A
                                  • Part of subcall function 0022E2E5: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00254D4D,?), ref: 0022E30F
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                • String ID:
                                • API String ID: 1991900642-0
                                • Opcode ID: 6206e77ebcc4c02a2f401db04843ef05621dd4c1b8d6cfda3161b1739c9247fa
                                • Instruction ID: 93d33ebe6cb65b915bcea6ea3473a75654d84399d7e0913bf71a245a4ec8b413
                                • Opcode Fuzzy Hash: 6206e77ebcc4c02a2f401db04843ef05621dd4c1b8d6cfda3161b1739c9247fa
                                • Instruction Fuzzy Hash: BF5147B1518300AFC710EF24D886AABBBE8AF99754F40491DF98997251EB70D914CF92
                                APIs
                                • InternetReadFile.WININET(?,?,00000400,?), ref: 0028D7E6
                                • GetLastError.KERNEL32(?,00000000), ref: 0028D847
                                • SetEvent.KERNEL32(?,?,00000000), ref: 0028D85B
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorEventFileInternetLastRead
                                • String ID:
                                • API String ID: 234945975-0
                                • Opcode ID: baa5527f7117e2f30d8a4855ebfd5dca81cf1c654ba657197d6144f9cecf03d1
                                • Instruction ID: 4b7c56fe2712730b63722e57f703458977bef2b43b459f3b96dc511f7cedf249
                                • Opcode Fuzzy Hash: baa5527f7117e2f30d8a4855ebfd5dca81cf1c654ba657197d6144f9cecf03d1
                                • Instruction Fuzzy Hash: DA21C4795113059FEB20AF65D988B9BB7F8EF40314F10442AE542925C2D774EA19CB50
                                APIs
                                • lstrlenW.KERNEL32(?,00254686), ref: 0027E397
                                • GetFileAttributesW.KERNEL32(?), ref: 0027E3A6
                                • FindFirstFileW.KERNEL32(?,?), ref: 0027E3B7
                                • FindClose.KERNEL32(00000000), ref: 0027E3C3
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FileFind$AttributesCloseFirstlstrlen
                                • String ID:
                                • API String ID: 2695905019-0
                                • Opcode ID: 1970bd40e914e5e67bba7cff5ce04121e453f576577cf7b33d7a85ad0efc1016
                                • Instruction ID: 860fc77f5aa300d506c8a3ed8e616dbb33e476eee34c007c4782a80b2127dbf8
                                • Opcode Fuzzy Hash: 1970bd40e914e5e67bba7cff5ce04121e453f576577cf7b33d7a85ad0efc1016
                                • Instruction Fuzzy Hash: 93F0A0304219105786116B3CAC0D8BA77AC9E46335B508791F83AC24F4DBB09DB586A5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: LocalTime
                                • String ID: %.3d$X64
                                • API String ID: 481472006-1077770165
                                • Opcode ID: 154e0f3c1127cb3b1b93ff59557c5b6c0fca20c5b1bcf88fb737240bacd74886
                                • Instruction ID: cce5039adbb955d66b18903a301fcd3d9b5285aa80eac00c6e2005ead5a34134
                                • Opcode Fuzzy Hash: 154e0f3c1127cb3b1b93ff59557c5b6c0fca20c5b1bcf88fb737240bacd74886
                                • Instruction Fuzzy Hash: C7D012A5C34018EACFD0AAD0D948CBD737CA718700F514462F80791000EAB495B8EB22
                                APIs
                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 00242AAA
                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 00242AB4
                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 00242AC1
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                • String ID:
                                • API String ID: 3906539128-0
                                • Opcode ID: af9dd1208174080da7feb4de241c59bfde7ea5f1e59ee19f50f5040d8337ac08
                                • Instruction ID: 7705e7eb1c077ee235e68f2528ce15f982f40b079b7da365441e3c843f20c3fb
                                • Opcode Fuzzy Hash: af9dd1208174080da7feb4de241c59bfde7ea5f1e59ee19f50f5040d8337ac08
                                • Instruction Fuzzy Hash: 0931C27591122C9BCB21DF69D9897D8BBB8EF08310F5041DAE80CA6251EB309F958F55
                                APIs
                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00271F1C
                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00271F31
                                • FreeSid.ADVAPI32(?), ref: 00271F41
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                • String ID:
                                • API String ID: 3429775523-0
                                • Opcode ID: 080c2228eb90c98f987fa3705a92e3fcbf81d2c0cf4a878f39b1af9204978d2b
                                • Instruction ID: 3cdb987900c987d0f6d17c1ce74dd2fbedb44460a995f3bd7fac4bb512369edb
                                • Opcode Fuzzy Hash: 080c2228eb90c98f987fa3705a92e3fcbf81d2c0cf4a878f39b1af9204978d2b
                                • Instruction Fuzzy Hash: D5F0177595030DBBDF00DFE4DC89AAEBBBCFB04700F5084A5E902E2181E774AA448B10
                                APIs
                                • GetUserNameW.ADVAPI32(?,?), ref: 0026E60A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: NameUser
                                • String ID: X64
                                • API String ID: 2645101109-893830106
                                • Opcode ID: 592ec901c936cf5cb83379f7775b592a3e77d32d85a9613af27107f97569635c
                                • Instruction ID: 905f43ab15e305cfc55776cb012b521b9fab920b50766838bf65a371bce5882d
                                • Opcode Fuzzy Hash: 592ec901c936cf5cb83379f7775b592a3e77d32d85a9613af27107f97569635c
                                • Instruction Fuzzy Hash: EAD0C9B482112DEBCFA0CB90ECCCDDD737CBB14304F100151F106A2000DB7095489B10
                                APIs
                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,002951EE,?,?,00000035,?), ref: 0028413E
                                • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,002951EE,?,?,00000035,?), ref: 0028414E
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorFormatLastMessage
                                • String ID:
                                • API String ID: 3479602957-0
                                • Opcode ID: 6905b8a67fb648680d4667313bb1a6efde874f995e3244cfa0ccdd25b119791d
                                • Instruction ID: 15ece84dd4b50583e204702099822d9b9ab615a57ff4b1dafcc77aedb36c2fbf
                                • Opcode Fuzzy Hash: 6905b8a67fb648680d4667313bb1a6efde874f995e3244cfa0ccdd25b119791d
                                • Instruction Fuzzy Hash: 87F0E5382112266BEB2077659C4DFEB766EEFC5762F000165B909D31C1DA709944CBB1
                                APIs
                                • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0027BB39
                                • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 0027BB4C
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: InputSendkeybd_event
                                • String ID:
                                • API String ID: 3536248340-0
                                • Opcode ID: a310d895ba34812c20a87dba733154468fa4ab98076d759dec7d89fab62d8063
                                • Instruction ID: e9f0e4dece0f0be17a5215552c642bcd17cc68575d9b99553bb11173e9751e39
                                • Opcode Fuzzy Hash: a310d895ba34812c20a87dba733154468fa4ab98076d759dec7d89fab62d8063
                                • Instruction Fuzzy Hash: B2F06D7081024EABDB058FA0C80ABBEBFB0FF08309F00800AFD55A6191C3798611DF94
                                APIs
                                • BlockInput.USER32(00000001), ref: 0028F41A
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: BlockInput
                                • String ID:
                                • API String ID: 3456056419-0
                                • Opcode ID: 9ce11257d05ba49fa336035b7872a18a7aa21ce077f932f3b52b47401a04084e
                                • Instruction ID: 0ecf41ad06d89fcfd3aa0c766c2f4969750d1958d0e37b3f91b8a687d1334d91
                                • Opcode Fuzzy Hash: 9ce11257d05ba49fa336035b7872a18a7aa21ce077f932f3b52b47401a04084e
                                • Instruction Fuzzy Hash: DFE048352101055FD750AF69E904997B7DCAF74760F108426FD4AD7351DAB0E891CFA1
                                APIs
                                • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 0027EBDC
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: mouse_event
                                • String ID:
                                • API String ID: 2434400541-0
                                • Opcode ID: eea022790e7665953713e458ae3af7f649ce716869a2a5df1813612883bb812e
                                • Instruction ID: bf33c7138efaac6dec96bf9aaff753069ab8eb32a2644026a9c9df33e8915fb1
                                • Opcode Fuzzy Hash: eea022790e7665953713e458ae3af7f649ce716869a2a5df1813612883bb812e
                                • Instruction Fuzzy Hash: 83D02BB107010138EC1C4E3D4C1FF3A0E04F309318F43A6D8B20BC49A4E4F09820A031
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(Function_00020D71,0023077E), ref: 00230D6A
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 3c42b7e94f9b7291495dcc06d38a861a9a2cec158affa6c84e76e3b787ff058d
                                • Instruction ID: 1aa088fd8475c9657907cbb9c6068e37fb75526bfb819fc93aeec5806b2cf7c8
                                • Opcode Fuzzy Hash: 3c42b7e94f9b7291495dcc06d38a861a9a2cec158affa6c84e76e3b787ff058d
                                • Instruction Fuzzy Hash:
                                APIs
                                • DeleteObject.GDI32(00000000), ref: 0029348D
                                • DeleteObject.GDI32(00000000), ref: 002934A0
                                • DestroyWindow.USER32 ref: 002934AF
                                • GetDesktopWindow.USER32 ref: 002934CA
                                • GetWindowRect.USER32(00000000), ref: 002934D1
                                • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00293600
                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 0029360E
                                • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00293655
                                • GetClientRect.USER32(00000000,?), ref: 00293661
                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0029369D
                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002936BF
                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002936D2
                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002936DD
                                • GlobalLock.KERNEL32(00000000), ref: 002936E6
                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002936F5
                                • GlobalUnlock.KERNEL32(00000000), ref: 002936FE
                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00293705
                                • GlobalFree.KERNEL32(00000000), ref: 00293710
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00293722
                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,002B0C04,00000000), ref: 00293738
                                • GlobalFree.KERNEL32(00000000), ref: 00293748
                                • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 0029376E
                                • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 0029378D
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 002937AF
                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0029399C
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                • String ID: $AutoIt v3$DISPLAY$static
                                • API String ID: 2211948467-2373415609
                                • Opcode ID: 5b87505707a72a970b215af9b0d7a5ec10ca4ddf72de2838fb7edbbffd15f703
                                • Instruction ID: fd5664937c632ede1a27e184d522fe6eb80face8de6b23f9bcc50e4dee9d0465
                                • Opcode Fuzzy Hash: 5b87505707a72a970b215af9b0d7a5ec10ca4ddf72de2838fb7edbbffd15f703
                                • Instruction Fuzzy Hash: 4B027875A10205AFDB14DF64DC8DEAE7BB9FB49310F148158F916AB2A0CB74AE11CF60
                                APIs
                                • SetTextColor.GDI32(?,00000000), ref: 002A7A8E
                                • GetSysColorBrush.USER32(0000000F), ref: 002A7ABF
                                • GetSysColor.USER32(0000000F), ref: 002A7ACB
                                • SetBkColor.GDI32(?,000000FF), ref: 002A7AE5
                                • SelectObject.GDI32(?,?), ref: 002A7AF4
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 002A7B1F
                                • GetSysColor.USER32(00000010), ref: 002A7B27
                                • CreateSolidBrush.GDI32(00000000), ref: 002A7B2E
                                • FrameRect.USER32(?,?,00000000), ref: 002A7B3D
                                • DeleteObject.GDI32(00000000), ref: 002A7B44
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 002A7B8F
                                • FillRect.USER32(?,?,?), ref: 002A7BC1
                                • GetWindowLongW.USER32(?,000000F0), ref: 002A7BE3
                                  • Part of subcall function 002A7D47: GetSysColor.USER32(00000012), ref: 002A7D80
                                  • Part of subcall function 002A7D47: SetTextColor.GDI32(?,002A7A54), ref: 002A7D84
                                  • Part of subcall function 002A7D47: GetSysColorBrush.USER32(0000000F), ref: 002A7D9A
                                  • Part of subcall function 002A7D47: GetSysColor.USER32(0000000F), ref: 002A7DA5
                                  • Part of subcall function 002A7D47: GetSysColor.USER32(00000011), ref: 002A7DC2
                                  • Part of subcall function 002A7D47: CreatePen.GDI32(00000000,00000001,00743C00), ref: 002A7DD0
                                  • Part of subcall function 002A7D47: SelectObject.GDI32(?,00000000), ref: 002A7DE1
                                  • Part of subcall function 002A7D47: SetBkColor.GDI32(?,?), ref: 002A7DEA
                                  • Part of subcall function 002A7D47: SelectObject.GDI32(?,?), ref: 002A7DF7
                                  • Part of subcall function 002A7D47: InflateRect.USER32(?,000000FF,000000FF), ref: 002A7E16
                                  • Part of subcall function 002A7D47: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002A7E2D
                                  • Part of subcall function 002A7D47: GetWindowLongW.USER32(?,000000F0), ref: 002A7E3A
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                • String ID:
                                • API String ID: 4124339563-0
                                • Opcode ID: 3b466355812876d6fc58f6ffb67de705365022af4afa5e16f8e730da6d796cce
                                • Instruction ID: 6856044118514269d2c598ad7f2fea73241d2d80366b61e86119ba29aef47fd7
                                • Opcode Fuzzy Hash: 3b466355812876d6fc58f6ffb67de705365022af4afa5e16f8e730da6d796cce
                                • Instruction Fuzzy Hash: CBA19F71418302BFD7009F64EC48A6BBBA9FF4A325F100A19F666961E0DB71D9548B91
                                APIs
                                • DestroyWindow.USER32(?,?), ref: 002116B4
                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 00252B26
                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00252B5F
                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00252FA4
                                  • Part of subcall function 00211802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00211488,?,00000000,?,?,?,?,0021145A,00000000,?), ref: 00211865
                                • SendMessageW.USER32(?,00001053), ref: 00252FE0
                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00252FF7
                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 0025300D
                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 00253018
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                • String ID: 0
                                • API String ID: 2760611726-4108050209
                                • Opcode ID: b4431568435de298aba17d3e3e81d341166b140e681eae5866f481070bb12ad5
                                • Instruction ID: 78a836bd0a2c604ff7a5c1e7b7a821c56c0104f301292207b6380572baf2479f
                                • Opcode Fuzzy Hash: b4431568435de298aba17d3e3e81d341166b140e681eae5866f481070bb12ad5
                                • Instruction Fuzzy Hash: 8812E330620242DFC725CF14D888BA9B7F5FB56302F184529E9468B6A1CB31ECBACF54
                                APIs
                                • GetSysColor.USER32(00000012), ref: 002A7D80
                                • SetTextColor.GDI32(?,002A7A54), ref: 002A7D84
                                • GetSysColorBrush.USER32(0000000F), ref: 002A7D9A
                                • GetSysColor.USER32(0000000F), ref: 002A7DA5
                                • CreateSolidBrush.GDI32(?), ref: 002A7DAA
                                • GetSysColor.USER32(00000011), ref: 002A7DC2
                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 002A7DD0
                                • SelectObject.GDI32(?,00000000), ref: 002A7DE1
                                • SetBkColor.GDI32(?,?), ref: 002A7DEA
                                • SelectObject.GDI32(?,?), ref: 002A7DF7
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 002A7E16
                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002A7E2D
                                • GetWindowLongW.USER32(?,000000F0), ref: 002A7E3A
                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 002A7E89
                                • GetWindowTextW.USER32(?,00000000,00000001), ref: 002A7EB3
                                • InflateRect.USER32(?,000000FD,000000FD), ref: 002A7ED1
                                • DrawFocusRect.USER32(?,?), ref: 002A7EDC
                                • GetSysColor.USER32(00000011), ref: 002A7EED
                                • SetTextColor.GDI32(?,00000000), ref: 002A7EF5
                                • DrawTextW.USER32(?,Tz*,000000FF,?,00000000), ref: 002A7F07
                                • SelectObject.GDI32(?,?), ref: 002A7F1E
                                • DeleteObject.GDI32(?), ref: 002A7F29
                                • SelectObject.GDI32(?,?), ref: 002A7F2F
                                • DeleteObject.GDI32(?), ref: 002A7F34
                                • SetTextColor.GDI32(?,?), ref: 002A7F3A
                                • SetBkColor.GDI32(?,?), ref: 002A7F44
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                • String ID: Tz*
                                • API String ID: 1996641542-2594113492
                                • Opcode ID: 7e59b081abdcce14a7751afc9282c449a0558d860f8bbda7998f8d50cd0b0c13
                                • Instruction ID: 6e9d9642b96d2c6ce1b7b598957c7066fec3a0ca8d328b59fef52c7f6c5d6d88
                                • Opcode Fuzzy Hash: 7e59b081abdcce14a7751afc9282c449a0558d860f8bbda7998f8d50cd0b0c13
                                • Instruction Fuzzy Hash: AB613F71D10219AFDB119FA4EC49EEEBBB9EF0A320F114115F916AB2A0DB719D50CF90
                                APIs
                                • DestroyWindow.USER32(00000000), ref: 0029309B
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 002931C7
                                • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00293206
                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00293216
                                • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 0029325D
                                • GetClientRect.USER32(00000000,?), ref: 00293269
                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 002932B2
                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 002932C1
                                • GetStockObject.GDI32(00000011), ref: 002932D1
                                • SelectObject.GDI32(00000000,00000000), ref: 002932D5
                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 002932E5
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002932EE
                                • DeleteDC.GDI32(00000000), ref: 002932F7
                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00293323
                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 0029333A
                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 0029337A
                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0029338E
                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 0029339F
                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 002933D4
                                • GetStockObject.GDI32(00000011), ref: 002933DF
                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 002933EA
                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 002933F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                • API String ID: 2910397461-517079104
                                • Opcode ID: e30b805ef9e5e989d5a69ca7c77c738886179fb9a777f63f2eabe8e153caa2be
                                • Instruction ID: de3c3b46595f2d287b02dd838b394e935b679faf75ba0523da8f25493e680b8a
                                • Opcode Fuzzy Hash: e30b805ef9e5e989d5a69ca7c77c738886179fb9a777f63f2eabe8e153caa2be
                                • Instruction Fuzzy Hash: 59B15CB1A50205AFEB14DF68DC89FAEBBB9EB05710F004155FA15EB2A0DB74AD50CF90
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 00285447
                                • GetDriveTypeW.KERNEL32(?,002ADC30,?,\\.\,002ADCD0), ref: 00285524
                                • SetErrorMode.KERNEL32(00000000,002ADC30,?,\\.\,002ADCD0), ref: 00285690
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorMode$DriveType
                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                • API String ID: 2907320926-4222207086
                                • Opcode ID: 3852764b3c18f8e7b59d2857a5e4308f72b185156eb5ca93ee30eb45aa440270
                                • Instruction ID: 577edf60aaccd16f479ce3c6d5c7b3dc2897e76354cd07aa86aa141191ab9f4e
                                • Opcode Fuzzy Hash: 3852764b3c18f8e7b59d2857a5e4308f72b185156eb5ca93ee30eb45aa440270
                                • Instruction Fuzzy Hash: F061E1386359269BCB04FF24CA418BCBBB6AF15300B68C056E406AB3E5E7B4DD71CB41
                                APIs
                                • GetCursorPos.USER32(?), ref: 002A1A87
                                • GetDesktopWindow.USER32 ref: 002A1A9C
                                • GetWindowRect.USER32(00000000), ref: 002A1AA3
                                • GetWindowLongW.USER32(?,000000F0), ref: 002A1AF8
                                • DestroyWindow.USER32(?), ref: 002A1B18
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 002A1B4C
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002A1B6A
                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 002A1B7C
                                • SendMessageW.USER32(00000000,00000421,?,?), ref: 002A1B91
                                • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 002A1BA4
                                • IsWindowVisible.USER32(00000000), ref: 002A1C00
                                • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 002A1C1B
                                • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 002A1C2F
                                • GetWindowRect.USER32(00000000,?), ref: 002A1C47
                                • MonitorFromPoint.USER32(?,?,00000002), ref: 002A1C6D
                                • GetMonitorInfoW.USER32(00000000,?), ref: 002A1C87
                                • CopyRect.USER32(?,?), ref: 002A1C9E
                                • SendMessageW.USER32(00000000,00000412,00000000), ref: 002A1D09
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                • String ID: ($0$tooltips_class32
                                • API String ID: 698492251-4156429822
                                • Opcode ID: 811e20472b2a745f0c4a1ffa9cdb8a9d7261c4873d900599d8d328cbf7f664d4
                                • Instruction ID: 7acd22483ca17a0292abfe733211a7c33e3612e71a889f5f24fc2320d3a78ebe
                                • Opcode Fuzzy Hash: 811e20472b2a745f0c4a1ffa9cdb8a9d7261c4873d900599d8d328cbf7f664d4
                                • Instruction Fuzzy Hash: E4B19E71614301AFD704DF64D884B6ABBE5FF85360F00891DF5999B2A1DB30E864CF92
                                APIs
                                • CharUpperBuffW.USER32(?,?), ref: 002A0C44
                                • _wcslen.LIBCMT ref: 002A0C7E
                                • _wcslen.LIBCMT ref: 002A0CE8
                                • _wcslen.LIBCMT ref: 002A0D50
                                • _wcslen.LIBCMT ref: 002A0DD4
                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 002A0E24
                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 002A0E63
                                  • Part of subcall function 0022FD60: _wcslen.LIBCMT ref: 0022FD6B
                                  • Part of subcall function 00272ACF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00272AE8
                                  • Part of subcall function 00272ACF: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00272B1A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                • API String ID: 1103490817-719923060
                                • Opcode ID: db746ea4d45d91041a75afeaf2c695913a253b7a91dd09ed614877e0af9dbc88
                                • Instruction ID: 83fa8dd7a2a50af4282af54fdc7acb60e09e74143c0504ff78d435624119e4a3
                                • Opcode Fuzzy Hash: db746ea4d45d91041a75afeaf2c695913a253b7a91dd09ed614877e0af9dbc88
                                • Instruction Fuzzy Hash: A2E1AE312382418FC714DF24C58086AB3E6FF9A314B14896EF8969B7A1DF30ED65CB52
                                APIs
                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0021259A
                                • GetSystemMetrics.USER32(00000007), ref: 002125A2
                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 002125CD
                                • GetSystemMetrics.USER32(00000008), ref: 002125D5
                                • GetSystemMetrics.USER32(00000004), ref: 002125FA
                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00212617
                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00212627
                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0021265A
                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 0021266E
                                • GetClientRect.USER32(00000000,000000FF), ref: 0021268C
                                • GetStockObject.GDI32(00000011), ref: 002126A8
                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 002126B3
                                  • Part of subcall function 002119CD: GetCursorPos.USER32(?), ref: 002119E1
                                  • Part of subcall function 002119CD: ScreenToClient.USER32(00000000,?), ref: 002119FE
                                  • Part of subcall function 002119CD: GetAsyncKeyState.USER32(00000001), ref: 00211A23
                                  • Part of subcall function 002119CD: GetAsyncKeyState.USER32(00000002), ref: 00211A3D
                                • SetTimer.USER32(00000000,00000000,00000028,0021199C), ref: 002126DA
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                • String ID: AutoIt v3 GUI
                                • API String ID: 1458621304-248962490
                                • Opcode ID: b5486623882c62d858473e6aadd42da50d75f115ff032eec7313e4cec18e2a9a
                                • Instruction ID: 989254d11b70284ad74d62ee5c88ef7e85b769a2b9630b739a758cc30527d8c6
                                • Opcode Fuzzy Hash: b5486623882c62d858473e6aadd42da50d75f115ff032eec7313e4cec18e2a9a
                                • Instruction Fuzzy Hash: 26B19C71A1020ADFDB14DFA8DC89BEE7BB5FB49310F104119FA16AB290DB70A964CF54
                                APIs
                                  • Part of subcall function 00271989: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 002719A4
                                  • Part of subcall function 00271989: GetLastError.KERNEL32(?,00000000,00000000,?,?,0027142B,?,?,?), ref: 002719B0
                                  • Part of subcall function 00271989: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,0027142B,?,?,?), ref: 002719BF
                                  • Part of subcall function 00271989: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,0027142B,?,?,?), ref: 002719C6
                                  • Part of subcall function 00271989: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 002719DD
                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00271685
                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 002716B9
                                • GetLengthSid.ADVAPI32(?), ref: 002716D0
                                • GetAce.ADVAPI32(?,00000000,?), ref: 0027170A
                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00271726
                                • GetLengthSid.ADVAPI32(?), ref: 0027173D
                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00271745
                                • HeapAlloc.KERNEL32(00000000), ref: 0027174C
                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0027176D
                                • CopySid.ADVAPI32(00000000), ref: 00271774
                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 002717A3
                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 002717C5
                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 002717D7
                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002717FE
                                • HeapFree.KERNEL32(00000000), ref: 00271805
                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0027180E
                                • HeapFree.KERNEL32(00000000), ref: 00271815
                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0027181E
                                • HeapFree.KERNEL32(00000000), ref: 00271825
                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00271831
                                • HeapFree.KERNEL32(00000000), ref: 00271838
                                  • Part of subcall function 00271A23: GetProcessHeap.KERNEL32(00000008,00271441,?,00000000,?,00271441,?), ref: 00271A31
                                  • Part of subcall function 00271A23: HeapAlloc.KERNEL32(00000000,?,00000000,?,00271441,?), ref: 00271A38
                                  • Part of subcall function 00271A23: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00271441,?), ref: 00271A47
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                • String ID:
                                • API String ID: 4175595110-0
                                • Opcode ID: 9586da51cff9524491a1a7e5ea4afdffedf2766492b027de50f38f531e73ff24
                                • Instruction ID: bcfb0f67a99f2e5ac9de4360cb93dd0af03a18b2317f6d10ba3aa338f0f20992
                                • Opcode Fuzzy Hash: 9586da51cff9524491a1a7e5ea4afdffedf2766492b027de50f38f531e73ff24
                                • Instruction Fuzzy Hash: D97151B291020AABDF10DFA9DC49FEEBBB8FF05710F148115E919E7190DB719925CB60
                                APIs
                                • _wcslen.LIBCMT ref: 002A8CB9
                                • _wcslen.LIBCMT ref: 002A8CCD
                                • _wcslen.LIBCMT ref: 002A8CF0
                                • _wcslen.LIBCMT ref: 002A8D13
                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 002A8D51
                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,002A6551), ref: 002A8DAD
                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 002A8DE6
                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 002A8E29
                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 002A8E60
                                • FreeLibrary.KERNEL32(?), ref: 002A8E6C
                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 002A8E7C
                                • DestroyIcon.USER32(?,?,?,?,?,002A6551), ref: 002A8E8B
                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 002A8EA8
                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 002A8EB4
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                • String ID: .dll$.exe$.icl$Qe*
                                • API String ID: 799131459-2596870142
                                • Opcode ID: 78643f5d63d6bbc506b118ababbd1b6262ec3d9ab5756db1430d22873504d982
                                • Instruction ID: 60a08b1ec5a9bf976f2af8e33f0a04c3f95c5f5dc731c57b3659b25af9d0309c
                                • Opcode Fuzzy Hash: 78643f5d63d6bbc506b118ababbd1b6262ec3d9ab5756db1430d22873504d982
                                • Instruction Fuzzy Hash: 2F61FEB1A20615FBEB14DF64CC45BBE77A8BF1A710F104606F915D61D0DFB4AAA0CBA0
                                APIs
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0029CE1C
                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,002ADCD0,00000000,?,00000000,?,?), ref: 0029CEA3
                                • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0029CF03
                                • _wcslen.LIBCMT ref: 0029CF53
                                • _wcslen.LIBCMT ref: 0029CFCE
                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0029D011
                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0029D120
                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0029D1AC
                                • RegCloseKey.ADVAPI32(?), ref: 0029D1E0
                                • RegCloseKey.ADVAPI32(00000000), ref: 0029D1ED
                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0029D2BF
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                • API String ID: 9721498-966354055
                                • Opcode ID: d4d56cb406c1d078217d709de40348f4697e648e1e1fbd3d34c1864a8176ecb9
                                • Instruction ID: e889ce071a765645b1428e1e914c1deb936d5c7200a4e1ccff4bc44ac866d808
                                • Opcode Fuzzy Hash: d4d56cb406c1d078217d709de40348f4697e648e1e1fbd3d34c1864a8176ecb9
                                • Instruction Fuzzy Hash: 9E1258752242019FDB14DF24C881A6ABBE5FF88754F14849DF98A9B3A2CB31ED51CF81
                                APIs
                                • CharUpperBuffW.USER32(?,?), ref: 002A1325
                                • _wcslen.LIBCMT ref: 002A1360
                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 002A13B3
                                • _wcslen.LIBCMT ref: 002A13E9
                                • _wcslen.LIBCMT ref: 002A1465
                                • _wcslen.LIBCMT ref: 002A14E0
                                  • Part of subcall function 0022FD60: _wcslen.LIBCMT ref: 0022FD6B
                                  • Part of subcall function 00273478: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0027348A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                • API String ID: 1103490817-4258414348
                                • Opcode ID: c6178c44c4285aabe81e9a739259eb91081daa377149c5020dc4130e548e1ec3
                                • Instruction ID: 35739a5ceecc75e7e976ad0dd818781be668d37a9795d844e6295aab3ea55216
                                • Opcode Fuzzy Hash: c6178c44c4285aabe81e9a739259eb91081daa377149c5020dc4130e548e1ec3
                                • Instruction Fuzzy Hash: 40E1B1352243428FCB14DF24C44086AB7E6FF9A324F54499DF8969B7A1DB30ED65CB81
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$BuffCharUpper
                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                • API String ID: 1256254125-909552448
                                • Opcode ID: f56ec13d6ad3dc7a5b66e3751666c696a0efaa7f7449ffb811f3bb41e90d0ad9
                                • Instruction ID: 81c0b0623e9b84d8c125613f917a113bdecbc5b9d5a604cbcc9bcc9771e409e7
                                • Opcode Fuzzy Hash: f56ec13d6ad3dc7a5b66e3751666c696a0efaa7f7449ffb811f3bb41e90d0ad9
                                • Instruction Fuzzy Hash: E571F332A301278BCF209E7CD9406FE33A5AB71754F610569FC559B294EA34ED70EBA0
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                • API String ID: 0-1645009161
                                • Opcode ID: 10837b78e6e32694535cd905987aff561c4b7751c7366b39b536743fbe7fcbba
                                • Instruction ID: 1e7f03be841de3ae5271b17e043e6d9e56bdadc84ed950a9615201435ba17d5b
                                • Opcode Fuzzy Hash: 10837b78e6e32694535cd905987aff561c4b7751c7366b39b536743fbe7fcbba
                                • Instruction Fuzzy Hash: CF81EA71660206BBDB11EF60DC42FEF77A9AF26710F004010FD09AA186EB70DAB5CB95
                                APIs
                                • CharLowerBuffW.USER32(?,?), ref: 00284852
                                • _wcslen.LIBCMT ref: 0028485D
                                • _wcslen.LIBCMT ref: 002848B4
                                • _wcslen.LIBCMT ref: 002848F2
                                • GetDriveTypeW.KERNEL32(?), ref: 00284930
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00284978
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 002849B3
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 002849E1
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: SendString_wcslen$BuffCharDriveLowerType
                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                • API String ID: 1839972693-4113822522
                                • Opcode ID: 2882c4359c24ab53232cb658e20d476fcd29678a3cbdc30081d04d312650b332
                                • Instruction ID: e17ecf9b902c2a788b58b4053a45bc7126845b6b4132125b12efdcdf53f09ef5
                                • Opcode Fuzzy Hash: 2882c4359c24ab53232cb658e20d476fcd29678a3cbdc30081d04d312650b332
                                • Instruction Fuzzy Hash: 2071E2365243139FC710FF24C8908AAB7E4EFA5754F10492EF89697291EB34DDA5CB81
                                APIs
                                • LoadIconW.USER32(00000063), ref: 002762BD
                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 002762CF
                                • SetWindowTextW.USER32(?,?), ref: 002762E6
                                • GetDlgItem.USER32(?,000003EA), ref: 002762FB
                                • SetWindowTextW.USER32(00000000,?), ref: 00276301
                                • GetDlgItem.USER32(?,000003E9), ref: 00276311
                                • SetWindowTextW.USER32(00000000,?), ref: 00276317
                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00276338
                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00276352
                                • GetWindowRect.USER32(?,?), ref: 0027635B
                                • _wcslen.LIBCMT ref: 002763C2
                                • SetWindowTextW.USER32(?,?), ref: 002763FE
                                • GetDesktopWindow.USER32 ref: 00276404
                                • GetWindowRect.USER32(00000000), ref: 0027640B
                                • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00276462
                                • GetClientRect.USER32(?,?), ref: 0027646F
                                • PostMessageW.USER32(?,00000005,00000000,?), ref: 00276494
                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 002764BE
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                • String ID:
                                • API String ID: 895679908-0
                                • Opcode ID: b710c0dff8c2f7cf4c38dd9c2a92fde08a45510e7b5614ee721cd866435b6f58
                                • Instruction ID: c28fe2054059ed29e791e534f0ce10e60bf7d8618ff62ded2831e800c48222b9
                                • Opcode Fuzzy Hash: b710c0dff8c2f7cf4c38dd9c2a92fde08a45510e7b5614ee721cd866435b6f58
                                • Instruction Fuzzy Hash: 1971A031900B06EFDB20DFA8DE49BAEBBF5FF48B04F104518E54AA25A0DB75E954CB50
                                APIs
                                • LoadCursorW.USER32(00000000,00007F89), ref: 00290784
                                • LoadCursorW.USER32(00000000,00007F8A), ref: 0029078F
                                • LoadCursorW.USER32(00000000,00007F00), ref: 0029079A
                                • LoadCursorW.USER32(00000000,00007F03), ref: 002907A5
                                • LoadCursorW.USER32(00000000,00007F8B), ref: 002907B0
                                • LoadCursorW.USER32(00000000,00007F01), ref: 002907BB
                                • LoadCursorW.USER32(00000000,00007F81), ref: 002907C6
                                • LoadCursorW.USER32(00000000,00007F88), ref: 002907D1
                                • LoadCursorW.USER32(00000000,00007F80), ref: 002907DC
                                • LoadCursorW.USER32(00000000,00007F86), ref: 002907E7
                                • LoadCursorW.USER32(00000000,00007F83), ref: 002907F2
                                • LoadCursorW.USER32(00000000,00007F85), ref: 002907FD
                                • LoadCursorW.USER32(00000000,00007F82), ref: 00290808
                                • LoadCursorW.USER32(00000000,00007F84), ref: 00290813
                                • LoadCursorW.USER32(00000000,00007F04), ref: 0029081E
                                • LoadCursorW.USER32(00000000,00007F02), ref: 00290829
                                • GetCursorInfo.USER32(?), ref: 00290839
                                • GetLastError.KERNEL32 ref: 0029087B
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Cursor$Load$ErrorInfoLast
                                • String ID:
                                • API String ID: 3215588206-0
                                • Opcode ID: 0a7b164a97a0a2a1242f6dfddc089c471a99406bffa161d0e0a8d8cde407a025
                                • Instruction ID: a8e95e786be5544dbda9fa70f77276a0e1484e040b5d8d7c8c763a817eb2b8c2
                                • Opcode Fuzzy Hash: 0a7b164a97a0a2a1242f6dfddc089c471a99406bffa161d0e0a8d8cde407a025
                                • Instruction Fuzzy Hash: 6C415370E4831A6FDB109FBA8C8985EBFE8FF04754B50452AA11DE7291DA78E901CF91
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen
                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$k-
                                • API String ID: 176396367-2057780728
                                • Opcode ID: f7cd7362a1e2e734b46c95bf153511174df3399f1796a067699230608ee56cc5
                                • Instruction ID: 57ca1c3c1d66795877954e4af98d32fb6812c4ec1b20ddeaa1ec388581a4efcb
                                • Opcode Fuzzy Hash: f7cd7362a1e2e734b46c95bf153511174df3399f1796a067699230608ee56cc5
                                • Instruction Fuzzy Hash: 00E1D731A20516ABCB24DFB8C4456EDFBB5BF14710F14C11AE45AF7250DB30AEB5AB90
                                APIs
                                • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00230456
                                  • Part of subcall function 0023047D: InitializeCriticalSectionAndSpinCount.KERNEL32(002E170C,00000FA0,4738BCC2,?,?,?,?,00252753,000000FF), ref: 002304AC
                                  • Part of subcall function 0023047D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00252753,000000FF), ref: 002304B7
                                  • Part of subcall function 0023047D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00252753,000000FF), ref: 002304C8
                                  • Part of subcall function 0023047D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 002304DE
                                  • Part of subcall function 0023047D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 002304EC
                                  • Part of subcall function 0023047D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 002304FA
                                  • Part of subcall function 0023047D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00230525
                                  • Part of subcall function 0023047D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00230530
                                • ___scrt_fastfail.LIBCMT ref: 00230477
                                  • Part of subcall function 00230433: __onexit.LIBCMT ref: 00230439
                                Strings
                                • WakeAllConditionVariable, xrefs: 002304F2
                                • kernel32.dll, xrefs: 002304C3
                                • SleepConditionVariableCS, xrefs: 002304E4
                                • api-ms-win-core-synch-l1-2-0.dll, xrefs: 002304B2
                                • InitializeConditionVariable, xrefs: 002304D8
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                • API String ID: 66158676-1714406822
                                • Opcode ID: d006696aaa6de69ad12e407fae130e00cf80d94e1df3360ee8c17d06f508ee92
                                • Instruction ID: 04fab7a3f364eaf29e5dc48fd8983e9b25b4b1a584b06752dc1823f7ac8fe946
                                • Opcode Fuzzy Hash: d006696aaa6de69ad12e407fae130e00cf80d94e1df3360ee8c17d06f508ee92
                                • Instruction Fuzzy Hash: BB21F9B2AA07016FD7116FA4BCD9B6A77E4EB06FA1F400125F906966D0DF709C208E74
                                APIs
                                • CharLowerBuffW.USER32(00000000,00000000,002ADCD0), ref: 00284E81
                                • _wcslen.LIBCMT ref: 00284E95
                                • _wcslen.LIBCMT ref: 00284EF3
                                • _wcslen.LIBCMT ref: 00284F4E
                                • _wcslen.LIBCMT ref: 00284F99
                                • _wcslen.LIBCMT ref: 00285001
                                  • Part of subcall function 0022FD60: _wcslen.LIBCMT ref: 0022FD6B
                                • GetDriveTypeW.KERNEL32(?,002D7C10,00000061), ref: 0028509D
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$BuffCharDriveLowerType
                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                • API String ID: 2055661098-1000479233
                                • Opcode ID: da5cb63e95cb981621f34a4e0dea9b0b71f15fd2462bf090d96b1bd3d920ce51
                                • Instruction ID: 0261c708e49e65a563ffd0832bccf2579fdf8542f477a3f6e03b2d2a4b3bdcac
                                • Opcode Fuzzy Hash: da5cb63e95cb981621f34a4e0dea9b0b71f15fd2462bf090d96b1bd3d920ce51
                                • Instruction Fuzzy Hash: 14B1F2356293139FC710FF28C890A6AB7E5BFA4714F50491DF59687291EB30D8A4CB92
                                APIs
                                  • Part of subcall function 00212441: GetWindowLongW.USER32(00000000,000000EB), ref: 00212452
                                • DragQueryPoint.SHELL32(?,?), ref: 002A9AA6
                                  • Part of subcall function 002A7FD3: ClientToScreen.USER32(?,?), ref: 002A7FF9
                                  • Part of subcall function 002A7FD3: GetWindowRect.USER32(?,?), ref: 002A806F
                                  • Part of subcall function 002A7FD3: PtInRect.USER32(?,?,?), ref: 002A807F
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 002A9B0F
                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 002A9B1A
                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 002A9B3D
                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 002A9B84
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 002A9B9D
                                • SendMessageW.USER32(?,000000B1,?,?), ref: 002A9BB4
                                • SendMessageW.USER32(?,000000B1,?,?), ref: 002A9BD6
                                • DragFinish.SHELL32(?), ref: 002A9BDD
                                • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 002A9CD0
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p3.
                                • API String ID: 221274066-3864867779
                                • Opcode ID: a891cb6c544f4189e573d3dac938a014675a7ff536fd5bf4b11aaf9b0ba93d8a
                                • Instruction ID: 01ae77ac10f41558ac0867bd0c93d359069ab7d3b4f3857e6d3a5666fc24e528
                                • Opcode Fuzzy Hash: a891cb6c544f4189e573d3dac938a014675a7ff536fd5bf4b11aaf9b0ba93d8a
                                • Instruction Fuzzy Hash: BB617971518341AFC701EF60EC89D9FBBF8EF99310F40091EB592921A1DB70AA99CB52
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,002ADCD0), ref: 00294A18
                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00294A2A
                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,002ADCD0), ref: 00294A4F
                                • FreeLibrary.KERNEL32(00000000,?,002ADCD0), ref: 00294A9B
                                • StringFromGUID2.OLE32(?,?,00000028,?,002ADCD0), ref: 00294B05
                                • SysFreeString.OLEAUT32(00000009), ref: 00294BBF
                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00294C25
                                • SysFreeString.OLEAUT32(?), ref: 00294C4F
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                • String ID: GetModuleHandleExW$kernel32.dll
                                • API String ID: 354098117-199464113
                                • Opcode ID: dfea9d82ab174e979ff42495dbce85bbfe6b4192279460e662555dee23346d7e
                                • Instruction ID: 017ee25a8ad67ff15cec6a7e3eb7fa7526dc67605c3ee441842dc340fe94909e
                                • Opcode Fuzzy Hash: dfea9d82ab174e979ff42495dbce85bbfe6b4192279460e662555dee23346d7e
                                • Instruction Fuzzy Hash: 1E126E75A10105EFDF14DF94C888EAEB7B5FF49318F148098E9499B251DB31ED52CBA0
                                APIs
                                • GetMenuItemCount.USER32(002E2990), ref: 00253F4C
                                • GetMenuItemCount.USER32(002E2990), ref: 00253FFC
                                • GetCursorPos.USER32(?), ref: 00254040
                                • SetForegroundWindow.USER32(00000000), ref: 00254049
                                • TrackPopupMenuEx.USER32(002E2990,00000000,?,00000000,00000000,00000000), ref: 0025405C
                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00254068
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                • String ID: 0
                                • API String ID: 36266755-4108050209
                                • Opcode ID: ee7019294991357f49199d4a2b0494cae184a76d104af3dfef6a537b06e8c29d
                                • Instruction ID: e1962ff6d0b7dfefffd69ba2ff388c6b4b0e257e88184a3fbb85dada6b555d27
                                • Opcode Fuzzy Hash: ee7019294991357f49199d4a2b0494cae184a76d104af3dfef6a537b06e8c29d
                                • Instruction Fuzzy Hash: 95712A70610206BBEB21CF68DC49FAABFA9FF01368F204216F915A65E0C7B19D74CB54
                                APIs
                                • DestroyWindow.USER32(00000000,?), ref: 002A774A
                                  • Part of subcall function 002184B7: _wcslen.LIBCMT ref: 002184CA
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 002A77BE
                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 002A77E0
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002A77F3
                                • DestroyWindow.USER32(?), ref: 002A7814
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00210000,00000000), ref: 002A7843
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002A785C
                                • GetDesktopWindow.USER32 ref: 002A7875
                                • GetWindowRect.USER32(00000000), ref: 002A787C
                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 002A7894
                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 002A78AC
                                  • Part of subcall function 002121E4: GetWindowLongW.USER32(?,000000EB), ref: 002121F2
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                • String ID: 0$tooltips_class32
                                • API String ID: 2429346358-3619404913
                                • Opcode ID: 7d5187815138be71d3d1ca5bf05fb907f20ce22aa7d71ab3da594819485fdc14
                                • Instruction ID: 0132d1a9dc10289698268069129d05e923900ae3c4f946b517c226eb41420402
                                • Opcode Fuzzy Hash: 7d5187815138be71d3d1ca5bf05fb907f20ce22aa7d71ab3da594819485fdc14
                                • Instruction Fuzzy Hash: A971BA70558245AFD725CF18DC48FAABBEAFBCA300F14051DF98687261CB74A912DB29
                                APIs
                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0028CE0D
                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0028CE20
                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0028CE34
                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0028CE4D
                                • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0028CE90
                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0028CEA6
                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0028CEB1
                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0028CEE1
                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0028CF39
                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0028CF4D
                                • InternetCloseHandle.WININET(00000000), ref: 0028CF58
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                • String ID:
                                • API String ID: 3800310941-3916222277
                                • Opcode ID: 807d915aadd0af0d6349351ceaceea926767c4b67ff6d6a1efb9a90f5916aa99
                                • Instruction ID: 36b3a98a9826b3ea826bb139d3bfad9a81078e9458f42d915d29b8aa099b3fef
                                • Opcode Fuzzy Hash: 807d915aadd0af0d6349351ceaceea926767c4b67ff6d6a1efb9a90f5916aa99
                                • Instruction Fuzzy Hash: 82519074511209BFEB21AF60DC48AAB7BFDFF19744F10841AFA4686690DB34D914DBB0
                                APIs
                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 002A8EF1
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002A8F01
                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002A8F0C
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002A8F19
                                • GlobalLock.KERNEL32(00000000), ref: 002A8F27
                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002A8F36
                                • GlobalUnlock.KERNEL32(00000000), ref: 002A8F3F
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002A8F46
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 002A8F57
                                • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,002B0C04,?), ref: 002A8F70
                                • GlobalFree.KERNEL32(00000000), ref: 002A8F80
                                • GetObjectW.GDI32(?,00000018,?), ref: 002A8FA0
                                • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 002A8FD0
                                • DeleteObject.GDI32(?), ref: 002A8FF8
                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 002A900E
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                • String ID:
                                • API String ID: 3840717409-0
                                • Opcode ID: 653673be8d7729b49c46e7eb19e76bde0ed5ca86d12e2c45603067117fd4d341
                                • Instruction ID: 16c8761cb072cc2adce51abf1c469a6c4e8103d2537364085514b0159e5da3a0
                                • Opcode Fuzzy Hash: 653673be8d7729b49c46e7eb19e76bde0ed5ca86d12e2c45603067117fd4d341
                                • Instruction Fuzzy Hash: EA410675600205AFDB219F65EC8CEAABBB9EF8A751F104059F90AE7660DF709941CB20
                                APIs
                                • VariantInit.OLEAUT32(00000000), ref: 00281DD6
                                • VariantCopy.OLEAUT32(?,?), ref: 00281DDF
                                • VariantClear.OLEAUT32(?), ref: 00281DEB
                                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00281ECF
                                • VarR8FromDec.OLEAUT32(?,?), ref: 00281F2B
                                • VariantInit.OLEAUT32(?), ref: 00281FDC
                                • SysFreeString.OLEAUT32(?), ref: 00282060
                                • VariantClear.OLEAUT32(?), ref: 002820AC
                                • VariantClear.OLEAUT32(?), ref: 002820BB
                                • VariantInit.OLEAUT32(00000000), ref: 002820F7
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                • String ID: %4d%02d%02d%02d%02d%02d$Default
                                • API String ID: 1234038744-3931177956
                                • Opcode ID: b1094c77f4881c62af43584159b4d7ad2feab1ac127dc3a94f25301e2bf55395
                                • Instruction ID: 9257ea99b1bb120ba3df8558e50de61b0f01a77183349c0d754712ff4e29b69a
                                • Opcode Fuzzy Hash: b1094c77f4881c62af43584159b4d7ad2feab1ac127dc3a94f25301e2bf55395
                                • Instruction Fuzzy Hash: 78D13775A21616EBCB24AF64D884B69B7B8BF04701F108455FC05AB1C1CBB0ECB5DFA0
                                APIs
                                • GetDC.USER32(00000000), ref: 00292F35
                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00292F45
                                • CreateCompatibleDC.GDI32(?), ref: 00292F51
                                • SelectObject.GDI32(00000000,?), ref: 00292F5E
                                • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00292FCA
                                • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00293009
                                • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 0029302D
                                • SelectObject.GDI32(?,?), ref: 00293035
                                • DeleteObject.GDI32(?), ref: 0029303E
                                • DeleteDC.GDI32(?), ref: 00293045
                                • ReleaseDC.USER32(00000000,?), ref: 00293050
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                • String ID: (
                                • API String ID: 2598888154-3887548279
                                • Opcode ID: 127f41d9dbdc52a0a7673a61a5ef5090ff5e78882e2d1c01288c2261a15633ed
                                • Instruction ID: 4ae9707f14dec2687ce26b075c71eddc835ec4c07906de4ca14cb5cf6a359fc4
                                • Opcode Fuzzy Hash: 127f41d9dbdc52a0a7673a61a5ef5090ff5e78882e2d1c01288c2261a15633ed
                                • Instruction Fuzzy Hash: 0761E3B5D10219EFCF04CFA4D884EAEBBB5FF48310F208529E55AA7650E771A951CFA0
                                APIs
                                • ___free_lconv_mon.LIBCMT ref: 0024DE41
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024D9F9
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DA0B
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DA1D
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DA2F
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DA41
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DA53
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DA65
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DA77
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DA89
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DA9B
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DAAD
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DABF
                                  • Part of subcall function 0024D9DC: _free.LIBCMT ref: 0024DAD1
                                • _free.LIBCMT ref: 0024DE36
                                  • Part of subcall function 00242D58: RtlFreeHeap.NTDLL(00000000,00000000,?,0024DB71,002E1DC4,00000000,002E1DC4,00000000,?,0024DB98,002E1DC4,00000007,002E1DC4,?,0024DF95,002E1DC4), ref: 00242D6E
                                  • Part of subcall function 00242D58: GetLastError.KERNEL32(002E1DC4,?,0024DB71,002E1DC4,00000000,002E1DC4,00000000,?,0024DB98,002E1DC4,00000007,002E1DC4,?,0024DF95,002E1DC4,002E1DC4), ref: 00242D80
                                • _free.LIBCMT ref: 0024DE58
                                • _free.LIBCMT ref: 0024DE6D
                                • _free.LIBCMT ref: 0024DE78
                                • _free.LIBCMT ref: 0024DE9A
                                • _free.LIBCMT ref: 0024DEAD
                                • _free.LIBCMT ref: 0024DEBB
                                • _free.LIBCMT ref: 0024DEC6
                                • _free.LIBCMT ref: 0024DEFE
                                • _free.LIBCMT ref: 0024DF05
                                • _free.LIBCMT ref: 0024DF22
                                • _free.LIBCMT ref: 0024DF3A
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                • String ID:
                                • API String ID: 161543041-0
                                • Opcode ID: 42c12c48c069d8fc86f14d1687ab684df3d9a23f9352f475cf35c8816097d813
                                • Instruction ID: 9686f5dce7a33cf80f4f406405a679b5a402e687587a92876b26e350d80a594f
                                • Opcode Fuzzy Hash: 42c12c48c069d8fc86f14d1687ab684df3d9a23f9352f475cf35c8816097d813
                                • Instruction Fuzzy Hash: 93316D71A20706DFDB39AE39D845B5673E9EF20310F90492AF449DB1A1DF71ACE98B10
                                APIs
                                • GetClassNameW.USER32(?,?,00000100), ref: 00273F2B
                                • _wcslen.LIBCMT ref: 00273F36
                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00274026
                                • GetClassNameW.USER32(?,?,00000400), ref: 0027409B
                                • GetDlgCtrlID.USER32(?), ref: 002740EC
                                • GetWindowRect.USER32(?,?), ref: 00274111
                                • GetParent.USER32(?), ref: 0027412F
                                • ScreenToClient.USER32(00000000), ref: 00274136
                                • GetClassNameW.USER32(?,?,00000100), ref: 002741B0
                                • GetWindowTextW.USER32(?,?,00000400), ref: 002741EC
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                • String ID: %s%u
                                • API String ID: 4010501982-679674701
                                • Opcode ID: 49fc0282fabcac2281af1855e23b61b7e4768329f5e46ac11f7d1766207f771b
                                • Instruction ID: 4cd6686a92829ed04fec8af805847b9eb26b4e28d37554df48da47567ac183ac
                                • Opcode Fuzzy Hash: 49fc0282fabcac2281af1855e23b61b7e4768329f5e46ac11f7d1766207f771b
                                • Instruction Fuzzy Hash: 5391CF71224207AFD719EF24D884FEAB7A8FF44354F408529F99EC2191DB30E965CB91
                                APIs
                                • GetClassNameW.USER32(?,?,00000400), ref: 00275223
                                • GetWindowTextW.USER32(?,?,00000400), ref: 00275269
                                • _wcslen.LIBCMT ref: 0027527A
                                • CharUpperBuffW.USER32(?,00000000), ref: 00275286
                                • _wcsstr.LIBVCRUNTIME ref: 002752BB
                                • GetClassNameW.USER32(00000018,?,00000400), ref: 002752F3
                                • GetWindowTextW.USER32(?,?,00000400), ref: 0027532C
                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00275375
                                • GetClassNameW.USER32(?,?,00000400), ref: 002753AF
                                • GetWindowRect.USER32(?,?), ref: 0027541A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                • String ID: ThumbnailClass
                                • API String ID: 1311036022-1241985126
                                • Opcode ID: 5beeded7f57c1ac5ca875f78c185da929142629f99dfa9a91c5d9bddbe3818fc
                                • Instruction ID: d374b1827192b18c7e356a3911de68cc26ef6282c7495fab02c76a47e2110ad7
                                • Opcode Fuzzy Hash: 5beeded7f57c1ac5ca875f78c185da929142629f99dfa9a91c5d9bddbe3818fc
                                • Instruction Fuzzy Hash: E79102711247169FCB04CF10D895BAAB7E8FF44354F048469FD8E9A092DBB0ED65CBA1
                                APIs
                                  • Part of subcall function 00212441: GetWindowLongW.USER32(00000000,000000EB), ref: 00212452
                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 002A96B9
                                • GetFocus.USER32 ref: 002A96C9
                                • GetDlgCtrlID.USER32(00000000), ref: 002A96D4
                                • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?), ref: 002A977C
                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 002A982E
                                • GetMenuItemCount.USER32(?), ref: 002A984B
                                • GetMenuItemID.USER32(?,00000000), ref: 002A985B
                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 002A988D
                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 002A98CF
                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 002A9900
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                • String ID: 0
                                • API String ID: 1026556194-4108050209
                                • Opcode ID: dfc9db31b9353827d0c47c466dc38dedba2c5a822cd603c0201662acd30304e8
                                • Instruction ID: 6c85b7e9e45c14a5e2827396eb8713aa29d8fd8a40377a4a88c1996b917884fc
                                • Opcode Fuzzy Hash: dfc9db31b9353827d0c47c466dc38dedba2c5a822cd603c0201662acd30304e8
                                • Instruction Fuzzy Hash: B981E0B15243029FDB10CF26DC84AABBBE8FF8A314F100519F98597291DF71D9A4CBA1
                                APIs
                                • GetMenuItemInfoW.USER32(002E2990,000000FF,00000000,00000030), ref: 0027C888
                                • SetMenuItemInfoW.USER32(002E2990,00000004,00000000,00000030), ref: 0027C8BD
                                • Sleep.KERNEL32(000001F4), ref: 0027C8CF
                                • GetMenuItemCount.USER32(?), ref: 0027C915
                                • GetMenuItemID.USER32(?,00000000), ref: 0027C932
                                • GetMenuItemID.USER32(?,-00000001), ref: 0027C95E
                                • GetMenuItemID.USER32(?,?), ref: 0027C9A5
                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0027C9EB
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0027CA00
                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0027CA21
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$CheckCountRadioSleep
                                • String ID: 0
                                • API String ID: 1460738036-4108050209
                                • Opcode ID: 22c33ffdec1d368e16002cdf8845bb24013f1d96dfa50fe76466bbc8222c2234
                                • Instruction ID: 0d0172632e566c22756951c97cbf5e9ac55a5091e3697f924d5ba0799a22e7d2
                                • Opcode Fuzzy Hash: 22c33ffdec1d368e16002cdf8845bb24013f1d96dfa50fe76466bbc8222c2234
                                • Instruction Fuzzy Hash: 16618F7092025AEBDF11CF74DC88AFE7BA8FB05304F248159E94AA3251DB74AD25CB61
                                APIs
                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0027E3E9
                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0027E40F
                                • _wcslen.LIBCMT ref: 0027E419
                                • _wcsstr.LIBVCRUNTIME ref: 0027E469
                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0027E485
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                • API String ID: 1939486746-1459072770
                                • Opcode ID: 2888c9022411141650d68ec89aa70bdaf6998dae6b8bb56b0ce78d8b440d989e
                                • Instruction ID: 00df81f5126604e9cc289c3ed39e690e93909a1f8637bc49dac0277699c72422
                                • Opcode Fuzzy Hash: 2888c9022411141650d68ec89aa70bdaf6998dae6b8bb56b0ce78d8b440d989e
                                • Instruction Fuzzy Hash: A24149B25602147BEB00BB649C47EBF77ACDF56310F404096F809E6182FB749A219AB5
                                APIs
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0029D5C3
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0029D5EC
                                • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0029D6A7
                                  • Part of subcall function 0029D593: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0029D609
                                  • Part of subcall function 0029D593: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0029D61C
                                  • Part of subcall function 0029D593: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0029D62E
                                  • Part of subcall function 0029D593: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0029D664
                                  • Part of subcall function 0029D593: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0029D687
                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 0029D652
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                • String ID: RegDeleteKeyExW$advapi32.dll
                                • API String ID: 2734957052-4033151799
                                • Opcode ID: aa5b5bc65e2cca4d6cd13744dd4cff58c269e334daee7a8a781f19d010fe3ad6
                                • Instruction ID: 48bfd1f88fe790e658b4fa072d8f145c18bc8e054f0856d70dcc13a3b50e1790
                                • Opcode Fuzzy Hash: aa5b5bc65e2cca4d6cd13744dd4cff58c269e334daee7a8a781f19d010fe3ad6
                                • Instruction Fuzzy Hash: F3316171911129BBDB209F51EC88EFFBB7CEF46710F000165F90AE2144DB709E46AAA0
                                APIs
                                • timeGetTime.WINMM ref: 0027EEE0
                                  • Part of subcall function 0022F27E: timeGetTime.WINMM(?,?,0027EF00), ref: 0022F282
                                • Sleep.KERNEL32(0000000A), ref: 0027EF0D
                                • EnumThreadWindows.USER32(?,Function_0006EE91,00000000), ref: 0027EF31
                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0027EF53
                                • SetActiveWindow.USER32 ref: 0027EF72
                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0027EF80
                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 0027EF9F
                                • Sleep.KERNEL32(000000FA), ref: 0027EFAA
                                • IsWindow.USER32 ref: 0027EFB6
                                • EndDialog.USER32(00000000), ref: 0027EFC7
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                • String ID: BUTTON
                                • API String ID: 1194449130-3405671355
                                • Opcode ID: 7ff884b4bfe7af97c53d55404db94eeb4df8835f77186f150fdc60f7e5a8a8d0
                                • Instruction ID: 0038490cdbc3e3225892b71101fb062c1b64d7d38de69231ee9a4012096fc281
                                • Opcode Fuzzy Hash: 7ff884b4bfe7af97c53d55404db94eeb4df8835f77186f150fdc60f7e5a8a8d0
                                • Instruction Fuzzy Hash: FD21B070560245BFEF00AF70FCCCA2A3B6EF70A305B018495F41A86AB1CB718D208A75
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0027F289
                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0027F29F
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0027F2B0
                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0027F2C2
                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0027F2D3
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: SendString$_wcslen
                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                • API String ID: 2420728520-1007645807
                                • Opcode ID: 687012d000378705b4ff9b528204b68e761088e6aec26dd6137f73a129920e34
                                • Instruction ID: 2a572d523dab5b10d7fe7477b875c9566046f6abcfd7f28fa996db70eb4beae3
                                • Opcode Fuzzy Hash: 687012d000378705b4ff9b528204b68e761088e6aec26dd6137f73a129920e34
                                • Instruction Fuzzy Hash: BD11A732A7415979D710A7A1DC5AEFF6ABCDFE3B10F4004377801A21D1EAB01D65C9A1
                                APIs
                                • _free.LIBCMT ref: 00243024
                                  • Part of subcall function 00242D58: RtlFreeHeap.NTDLL(00000000,00000000,?,0024DB71,002E1DC4,00000000,002E1DC4,00000000,?,0024DB98,002E1DC4,00000007,002E1DC4,?,0024DF95,002E1DC4), ref: 00242D6E
                                  • Part of subcall function 00242D58: GetLastError.KERNEL32(002E1DC4,?,0024DB71,002E1DC4,00000000,002E1DC4,00000000,?,0024DB98,002E1DC4,00000007,002E1DC4,?,0024DF95,002E1DC4,002E1DC4), ref: 00242D80
                                • _free.LIBCMT ref: 00243030
                                • _free.LIBCMT ref: 0024303B
                                • _free.LIBCMT ref: 00243046
                                • _free.LIBCMT ref: 00243051
                                • _free.LIBCMT ref: 0024305C
                                • _free.LIBCMT ref: 00243067
                                • _free.LIBCMT ref: 00243072
                                • _free.LIBCMT ref: 0024307D
                                • _free.LIBCMT ref: 0024308B
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID: &+
                                • API String ID: 776569668-2337533688
                                • Opcode ID: 07bef7dfc890f6f18ad55844ea6b7eef80efc89d7fa31094cad4de1c8bbc4045
                                • Instruction ID: 430deb2eda655c37f05b9af225173e64733cbfd6a25531d63ce4241d09d00e8a
                                • Opcode Fuzzy Hash: 07bef7dfc890f6f18ad55844ea6b7eef80efc89d7fa31094cad4de1c8bbc4045
                                • Instruction Fuzzy Hash: FE119676520148EFCB09EF55C842CDD3B69EF05350B8145A5B9189F132D671DEE59F80
                                APIs
                                • GetKeyboardState.USER32(?), ref: 0027A8EE
                                • SetKeyboardState.USER32(?), ref: 0027A959
                                • GetAsyncKeyState.USER32(000000A0), ref: 0027A979
                                • GetKeyState.USER32(000000A0), ref: 0027A990
                                • GetAsyncKeyState.USER32(000000A1), ref: 0027A9BF
                                • GetKeyState.USER32(000000A1), ref: 0027A9D0
                                • GetAsyncKeyState.USER32(00000011), ref: 0027A9FC
                                • GetKeyState.USER32(00000011), ref: 0027AA0A
                                • GetAsyncKeyState.USER32(00000012), ref: 0027AA33
                                • GetKeyState.USER32(00000012), ref: 0027AA41
                                • GetAsyncKeyState.USER32(0000005B), ref: 0027AA6A
                                • GetKeyState.USER32(0000005B), ref: 0027AA78
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: dc74ccb9ca9101d9c65d4e213e24d235555f921b30e7fd14783023e91c9ef0f1
                                • Instruction ID: 2ae295b2c58bf278469f91eba465876fe77c47d3cddc5c3f4db639dd7d391b14
                                • Opcode Fuzzy Hash: dc74ccb9ca9101d9c65d4e213e24d235555f921b30e7fd14783023e91c9ef0f1
                                • Instruction Fuzzy Hash: 2A51162091478669EB35EFB088147AEBFB49F42350F08C58AD5CA1B5C2DA749A5CCB63
                                APIs
                                • GetDlgItem.USER32(?,00000001), ref: 00276571
                                • GetWindowRect.USER32(00000000,?), ref: 0027658A
                                • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 002765E8
                                • GetDlgItem.USER32(?,00000002), ref: 002765F8
                                • GetWindowRect.USER32(00000000,?), ref: 0027660A
                                • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 0027665E
                                • GetDlgItem.USER32(?,000003E9), ref: 0027666C
                                • GetWindowRect.USER32(00000000,?), ref: 0027667E
                                • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 002766C0
                                • GetDlgItem.USER32(?,000003EA), ref: 002766D3
                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 002766E9
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 002766F6
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$ItemMoveRect$Invalidate
                                • String ID:
                                • API String ID: 3096461208-0
                                • Opcode ID: 60df29c0656f53fdf47f1d1208c33faf70ac7bc1f70610f36164347dad3cdcf7
                                • Instruction ID: df14b03e1e1e6a6fb789a3d4c5eb9327d294197eeb9570da771eea76d761cae6
                                • Opcode Fuzzy Hash: 60df29c0656f53fdf47f1d1208c33faf70ac7bc1f70610f36164347dad3cdcf7
                                • Instruction Fuzzy Hash: 45515370B10606AFDF08CF68DD89AAEBBB9FB48700F548128F51AE7690DB709D14CB50
                                APIs
                                  • Part of subcall function 00211802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00211488,?,00000000,?,?,?,?,0021145A,00000000,?), ref: 00211865
                                • DestroyWindow.USER32(?), ref: 00211521
                                • KillTimer.USER32(00000000,?,?,?,?,0021145A,00000000,?), ref: 002115BB
                                • DestroyAcceleratorTable.USER32(00000000), ref: 002529D4
                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,0021145A,00000000,?), ref: 00252A02
                                • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,0021145A,00000000,?), ref: 00252A19
                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0021145A,00000000), ref: 00252A35
                                • DeleteObject.GDI32(00000000), ref: 00252A47
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                • String ID:
                                • API String ID: 641708696-0
                                • Opcode ID: 4669f734e8d36a9dbadbeb830ef90bdd19a6ede8320d0dc236fd65d4231cde8b
                                • Instruction ID: de762b2bc1b72eafa84d67f2564d9268bc52b4e6719d8685a542bc158d571373
                                • Opcode Fuzzy Hash: 4669f734e8d36a9dbadbeb830ef90bdd19a6ede8320d0dc236fd65d4231cde8b
                                • Instruction Fuzzy Hash: C761BE31520612EFDB358F14E988B69B7F6FB91312F605418E5434AAA0C7B0A9F8DF54
                                APIs
                                  • Part of subcall function 002121E4: GetWindowLongW.USER32(?,000000EB), ref: 002121F2
                                • GetSysColor.USER32(0000000F), ref: 00212102
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ColorLongWindow
                                • String ID:
                                • API String ID: 259745315-0
                                • Opcode ID: 7f39e7edee4e1a68a8f793c24c544b4b6c521b0a20bdcb2ef935a9122039d53b
                                • Instruction ID: a6b32bb69e06334ec8cff442fffdd0c74a7567b18aac7247dad413c92169d11a
                                • Opcode Fuzzy Hash: 7f39e7edee4e1a68a8f793c24c544b4b6c521b0a20bdcb2ef935a9122039d53b
                                • Instruction Fuzzy Hash: 3841D771110640EFDB20DF38AC48BFA37A5EB56361F144605FAAA872E2C7719DA6DB10
                                APIs
                                  • Part of subcall function 002184B7: _wcslen.LIBCMT ref: 002184CA
                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00271032
                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0027104E
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 0027106A
                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00271094
                                • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 002710BC
                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 002710C7
                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 002710CC
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                • API String ID: 323675364-22481851
                                • Opcode ID: 5dd5f49ccea3611fd4a31d3cc44690e0da0c342a7afc2f4c06a3bfaaded8acd7
                                • Instruction ID: 414719f116289d54b6e5ccb837510557a803213ebdac7ff2728697016406c1ef
                                • Opcode Fuzzy Hash: 5dd5f49ccea3611fd4a31d3cc44690e0da0c342a7afc2f4c06a3bfaaded8acd7
                                • Instruction Fuzzy Hash: A3410872C20229ABCF21EFA4DC959EDB7B9BF14300F444069F905A3161EB719D68CF50
                                APIs
                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 002A499A
                                • CreateCompatibleDC.GDI32(00000000), ref: 002A49A1
                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 002A49B4
                                • SelectObject.GDI32(00000000,00000000), ref: 002A49BC
                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 002A49C7
                                • DeleteDC.GDI32(00000000), ref: 002A49D1
                                • GetWindowLongW.USER32(?,000000EC), ref: 002A49DB
                                • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 002A49F1
                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 002A49FD
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                • String ID: static
                                • API String ID: 2559357485-2160076837
                                • Opcode ID: 9c6700fb86888c9c08eaabe1120197266d0ac969b10fab79c170ca01462d06f2
                                • Instruction ID: 4f1b1370657330cb9778acf1776ec250a248b7026d06d324929f910770f31495
                                • Opcode Fuzzy Hash: 9c6700fb86888c9c08eaabe1120197266d0ac969b10fab79c170ca01462d06f2
                                • Instruction Fuzzy Hash: BC317272110216BBDF11AF64DC08FDB3B69FF4E724F110211FA5AA60A0DB75E821DB94
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 002945B9
                                • CoInitialize.OLE32(00000000), ref: 002945E7
                                • CoUninitialize.OLE32 ref: 002945F1
                                • _wcslen.LIBCMT ref: 0029468A
                                • GetRunningObjectTable.OLE32(00000000,?), ref: 0029470E
                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00294832
                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 0029486B
                                • CoGetObject.OLE32(?,00000000,002B0B64,?), ref: 0029488A
                                • SetErrorMode.KERNEL32(00000000), ref: 0029489D
                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00294921
                                • VariantClear.OLEAUT32(?), ref: 00294935
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                • String ID:
                                • API String ID: 429561992-0
                                • Opcode ID: 3ac0f409fb2f2f2cbb6cc571ef5b0dc92259286b9076903d2fb212d9a812b554
                                • Instruction ID: dab30ed8c4e4ed87d602308b6f05d5c60111529804502a5b94b4a39768ba0a9b
                                • Opcode Fuzzy Hash: 3ac0f409fb2f2f2cbb6cc571ef5b0dc92259286b9076903d2fb212d9a812b554
                                • Instruction Fuzzy Hash: 6FC135B16243059F9B00EF68C884D6BB7E9FF89748F10495DF98A9B210DB70EC56CB52
                                APIs
                                • CoInitialize.OLE32(00000000), ref: 0028844D
                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 002884E9
                                • SHGetDesktopFolder.SHELL32(?), ref: 002884FD
                                • CoCreateInstance.OLE32(002B0CD4,00000000,00000001,002D7E8C,?), ref: 00288549
                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 002885CE
                                • CoTaskMemFree.OLE32(?,?), ref: 00288626
                                • SHBrowseForFolderW.SHELL32(?), ref: 002886B1
                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 002886D4
                                • CoTaskMemFree.OLE32(00000000), ref: 002886DB
                                • CoTaskMemFree.OLE32(00000000), ref: 00288730
                                • CoUninitialize.OLE32 ref: 00288736
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                • String ID:
                                • API String ID: 2762341140-0
                                • Opcode ID: 0bad67e33ae810f6bd0b1b16695cc7b4954312e0420661d9c8b2b63ea1d25605
                                • Instruction ID: 20c352ec0472475781689fd8c7037d631f58559423602d04fdebaae1690cb769
                                • Opcode Fuzzy Hash: 0bad67e33ae810f6bd0b1b16695cc7b4954312e0420661d9c8b2b63ea1d25605
                                • Instruction Fuzzy Hash: C8C12A79A10119AFCB14DFA4C888DAEBBF9FF49304B548098E51AEB661DB30ED45CF50
                                APIs
                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 002A5E63
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002A5E74
                                • CharNextW.USER32(00000158), ref: 002A5EA3
                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 002A5EE4
                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 002A5EFA
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002A5F0B
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$CharNext
                                • String ID:
                                • API String ID: 1350042424-0
                                • Opcode ID: e4eddc779b96fdf3e922181b3ba30c52439399c2613a57fa098c88b0a71f89ea
                                • Instruction ID: 675c10fda70af5c9fda9c553c35df24e741ee77456caab4b2973531280b322d2
                                • Opcode Fuzzy Hash: e4eddc779b96fdf3e922181b3ba30c52439399c2613a57fa098c88b0a71f89ea
                                • Instruction Fuzzy Hash: E6619070921619AFDF118F94DC88AFF7BB8EB07710F144145F921A6290CFB09A55CF60
                                APIs
                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0027033F
                                • SafeArrayAllocData.OLEAUT32(?), ref: 00270398
                                • VariantInit.OLEAUT32(?), ref: 002703AA
                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 002703CA
                                • VariantCopy.OLEAUT32(?,?), ref: 0027041D
                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00270431
                                • VariantClear.OLEAUT32(?), ref: 00270446
                                • SafeArrayDestroyData.OLEAUT32(?), ref: 00270453
                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0027045C
                                • VariantClear.OLEAUT32(?), ref: 0027046E
                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00270479
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                • String ID:
                                • API String ID: 2706829360-0
                                • Opcode ID: 80d396ed5ae4d5c78f39e88c0b9f16de99582fb3ffd746576192c14562bf6ef1
                                • Instruction ID: 360bc85cd7db3d49ce4df0cedae37a6d1a1903c6272507da1b280752580bb3aa
                                • Opcode Fuzzy Hash: 80d396ed5ae4d5c78f39e88c0b9f16de99582fb3ffd746576192c14562bf6ef1
                                • Instruction Fuzzy Hash: AB414175A10219EFCF00DF64D8989EEBBB9FF58344F008069E95AA7261CB70A955CF90
                                APIs
                                  • Part of subcall function 00212441: GetWindowLongW.USER32(00000000,000000EB), ref: 00212452
                                • GetSystemMetrics.USER32(0000000F), ref: 002AA926
                                • GetSystemMetrics.USER32(0000000F), ref: 002AA946
                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 002AAB83
                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 002AABA1
                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 002AABC2
                                • ShowWindow.USER32(00000003,00000000), ref: 002AABE1
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 002AAC06
                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 002AAC29
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                • String ID:
                                • API String ID: 1211466189-3916222277
                                • Opcode ID: 5ec35a4dcb12167bf506726cbe87c72272f10e5cb758756c665321736ed2feba
                                • Instruction ID: 253d40526dcd194ef5468982bb6a0d2b9582b3884956572bf6b256927d7d03d7
                                • Opcode Fuzzy Hash: 5ec35a4dcb12167bf506726cbe87c72272f10e5cb758756c665321736ed2feba
                                • Instruction Fuzzy Hash: D9B1AD3161021ADFDF14CF28C9897AE7BF2FF45704F188069EC4A9B295DB70A964CB61
                                APIs
                                • WSAStartup.WSOCK32(00000101,?), ref: 00290F19
                                • inet_addr.WSOCK32(?), ref: 00290F79
                                • gethostbyname.WSOCK32(?), ref: 00290F85
                                • IcmpCreateFile.IPHLPAPI ref: 00290F93
                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00291023
                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00291042
                                • IcmpCloseHandle.IPHLPAPI(?), ref: 00291116
                                • WSACleanup.WSOCK32 ref: 0029111C
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                • String ID: Ping
                                • API String ID: 1028309954-2246546115
                                • Opcode ID: a30c95e44d34ca94955a522826a84c895cf8f0849ebeab89db56e44485952fe3
                                • Instruction ID: 831f3f35f4ea625a0ae2d4b58e42c7f9cdd5d0f23fa756fbdd314ce0a7cb8fd7
                                • Opcode Fuzzy Hash: a30c95e44d34ca94955a522826a84c895cf8f0849ebeab89db56e44485952fe3
                                • Instruction Fuzzy Hash: C791B231614242AFDB20DF16C889F16BBE0FF44318F148599F5698B6A2C771EDA5CF81
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$BuffCharLower
                                • String ID: cdecl$none$stdcall$winapi
                                • API String ID: 707087890-567219261
                                • Opcode ID: cdeb96140cd4a64154b8e8c4f93c7f4f296a45e37101c13bd56d4fee617ee6d5
                                • Instruction ID: 9c604523d29cec2922259481fb816d0e69a7c5f3896c99bdbab957833b887384
                                • Opcode Fuzzy Hash: cdeb96140cd4a64154b8e8c4f93c7f4f296a45e37101c13bd56d4fee617ee6d5
                                • Instruction Fuzzy Hash: D8518F71A241179BCF14DFACC9519FDB3A5BF25364B20422DE826E7284EB35DDA0CB90
                                APIs
                                • CoInitialize.OLE32 ref: 002940D1
                                • CoUninitialize.OLE32 ref: 002940DC
                                • CoCreateInstance.OLE32(?,00000000,00000017,002B0B44,?), ref: 00294136
                                • IIDFromString.OLE32(?,?), ref: 002941A9
                                • VariantInit.OLEAUT32(?), ref: 00294241
                                • VariantClear.OLEAUT32(?), ref: 00294293
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                • API String ID: 636576611-1287834457
                                • Opcode ID: 6be0fa58018b972b481f2551101595e146cdb2251299ba6aa9ee316e9cbb9d6c
                                • Instruction ID: 0c42588ec63e11420af1ed824c78117ea71495f704801c4567007ca4316cdbfb
                                • Opcode Fuzzy Hash: 6be0fa58018b972b481f2551101595e146cdb2251299ba6aa9ee316e9cbb9d6c
                                • Instruction Fuzzy Hash: CC61B1706243019FDB10EF64D888F5ABBE4FF59714F000409F9899B291DB70EDA5CB92
                                APIs
                                • GetLocalTime.KERNEL32(?), ref: 00288BB1
                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00288BC1
                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00288BCD
                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00288C6A
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00288C7E
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00288CB0
                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00288CE6
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00288CEF
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CurrentDirectoryTime$File$Local$System
                                • String ID: *.*
                                • API String ID: 1464919966-438819550
                                • Opcode ID: 6421adc5d9fb143b552e332894b2399eef2cd8117e6fe19829273825892fb506
                                • Instruction ID: c2133a0158fbe8266246da0e393fbfcbc0738fe1ab541ae905e16a86ec2b0036
                                • Opcode Fuzzy Hash: 6421adc5d9fb143b552e332894b2399eef2cd8117e6fe19829273825892fb506
                                • Instruction Fuzzy Hash: A9616AB65243059FCB10EF20C844AAEB3E8FF99314F44885AF989C7291DB31E955CF92
                                APIs
                                  • Part of subcall function 00212441: GetWindowLongW.USER32(00000000,000000EB), ref: 00212452
                                  • Part of subcall function 002119CD: GetCursorPos.USER32(?), ref: 002119E1
                                  • Part of subcall function 002119CD: ScreenToClient.USER32(00000000,?), ref: 002119FE
                                  • Part of subcall function 002119CD: GetAsyncKeyState.USER32(00000001), ref: 00211A23
                                  • Part of subcall function 002119CD: GetAsyncKeyState.USER32(00000002), ref: 00211A3D
                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?), ref: 002A94CA
                                • ImageList_EndDrag.COMCTL32 ref: 002A94D0
                                • ReleaseCapture.USER32 ref: 002A94D6
                                • SetWindowTextW.USER32(?,00000000), ref: 002A9571
                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 002A9584
                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?), ref: 002A965E
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                • String ID: @GUI_DRAGFILE$@GUI_DROPID$p3.
                                • API String ID: 1924731296-3935515571
                                • Opcode ID: 2c7fb1211df965735ae23a7e4ec7e9d4c1cad1a82dea779cce857a85d60bcdb0
                                • Instruction ID: 3adfd77578e20566b73f5132f3fb68dea2b760b6987357685d0519aebceef019
                                • Opcode Fuzzy Hash: 2c7fb1211df965735ae23a7e4ec7e9d4c1cad1a82dea779cce857a85d60bcdb0
                                • Instruction Fuzzy Hash: 8B51A970614344AFD704EF20DC9AFAA77E8FF89710F500519FA96962E2CB709968CF52
                                APIs
                                • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00283D29
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00283D4A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: LoadString$_wcslen
                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                • API String ID: 4099089115-3080491070
                                • Opcode ID: 6870a5d922e2bb77e08e3cae5053219942dc4df7a88a3287b2dad680bb2cf864
                                • Instruction ID: 3f87b867692a1350ca41318b4772a779813c822f76b8f245c6568e3bf0d9c733
                                • Opcode Fuzzy Hash: 6870a5d922e2bb77e08e3cae5053219942dc4df7a88a3287b2dad680bb2cf864
                                • Instruction Fuzzy Hash: DB51923192014AAACF15FBE0DD46EEEB7B9AF24700F5040A5B405721A2EB752FB9DF50
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$BuffCharUpper
                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                • API String ID: 1256254125-769500911
                                • Opcode ID: 6fd45e56006809cf1c91095a47ae5fadf2475951073e3c8a969f52c6091dceb6
                                • Instruction ID: 96990b2f12e63c25ac27b25f7214a3b5048608e291a3547256b0e941449aa210
                                • Opcode Fuzzy Hash: 6fd45e56006809cf1c91095a47ae5fadf2475951073e3c8a969f52c6091dceb6
                                • Instruction Fuzzy Hash: 9A412932A201279BCB116F7DCC506BEB7A5BF60B54F20852AF429C7684E735CCA1CB91
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 00285CFA
                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00285D70
                                • GetLastError.KERNEL32 ref: 00285D7A
                                • SetErrorMode.KERNEL32(00000000,READY), ref: 00285E01
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Error$Mode$DiskFreeLastSpace
                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                • API String ID: 4194297153-14809454
                                • Opcode ID: 66b3dd55438911e55ed782224022a7d9b80e3609875bf521e75ede155deaf337
                                • Instruction ID: e1df3d3f8b074af30adbf4a69e4c9862dafc36f9ec728688690e922facbe4dbf
                                • Opcode Fuzzy Hash: 66b3dd55438911e55ed782224022a7d9b80e3609875bf521e75ede155deaf337
                                • Instruction Fuzzy Hash: 8C31B239A215169FCB10EF68C48CAAABBF5EF05304F148095E806DB3E2D775DD52CB91
                                APIs
                                • CreateMenu.USER32 ref: 002A45D8
                                • SetMenu.USER32(?,00000000), ref: 002A45E7
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002A466F
                                • IsMenu.USER32(?), ref: 002A4683
                                • CreatePopupMenu.USER32 ref: 002A468D
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 002A46BA
                                • DrawMenuBar.USER32 ref: 002A46C2
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                • String ID: 0$F
                                • API String ID: 161812096-3044882817
                                • Opcode ID: e4d59b8890fd470e959a5fc0ec50ae54b8cc30be64b1683feaf5cc14124da61c
                                • Instruction ID: 9a4c01abb42e1540bd43c7e1e90e18981536a4582a1de4e071e79784c0e8fae5
                                • Opcode Fuzzy Hash: e4d59b8890fd470e959a5fc0ec50ae54b8cc30be64b1683feaf5cc14124da61c
                                • Instruction Fuzzy Hash: 9C417E75A1130AEFDB14DF65E898AAA7BB9FF4A314F140028FA4697350DB70E924CF50
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                  • Part of subcall function 00274536: GetClassNameW.USER32(?,?,000000FF), ref: 00274559
                                • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 002727F4
                                • GetDlgCtrlID.USER32 ref: 002727FF
                                • GetParent.USER32 ref: 0027281B
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 0027281E
                                • GetDlgCtrlID.USER32(?), ref: 00272827
                                • GetParent.USER32(?), ref: 0027283B
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 0027283E
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                • String ID: ComboBox$ListBox
                                • API String ID: 711023334-1403004172
                                • Opcode ID: bb47d02d0c257ffa104206ad709eb2f82b5e57552bba72cef217035694bd89bf
                                • Instruction ID: 3de661b6a430662368631a82154a9a9eb316d5ca58df5e35cba60696ee8c9cea
                                • Opcode Fuzzy Hash: bb47d02d0c257ffa104206ad709eb2f82b5e57552bba72cef217035694bd89bf
                                • Instruction Fuzzy Hash: FF21CF70D10118EBCF05AFA0DC89EEEBBB8EF16310B004156F965A72A1CB7558288F60
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                  • Part of subcall function 00274536: GetClassNameW.USER32(?,?,000000FF), ref: 00274559
                                • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 002728D3
                                • GetDlgCtrlID.USER32 ref: 002728DE
                                • GetParent.USER32 ref: 002728FA
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 002728FD
                                • GetDlgCtrlID.USER32(?), ref: 00272906
                                • GetParent.USER32(?), ref: 0027291A
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 0027291D
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                • String ID: ComboBox$ListBox
                                • API String ID: 711023334-1403004172
                                • Opcode ID: dc36c38727a7e1732a55e81c83df33def7dab7913ad047d9f03dd7647fb28e35
                                • Instruction ID: 8e57f129a387af7b2f8ad9ca4a3dfa6d33ad5bc22daac17cbbcc33643cdde892
                                • Opcode Fuzzy Hash: dc36c38727a7e1732a55e81c83df33def7dab7913ad047d9f03dd7647fb28e35
                                • Instruction Fuzzy Hash: 7021CF71D10108EBCF11AFA0EC48EEEBBB8EF15300F108046B955A3291CB7588688F20
                                APIs
                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 002A43FC
                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 002A43FF
                                • GetWindowLongW.USER32(?,000000F0), ref: 002A4426
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 002A4449
                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 002A44C1
                                • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 002A450B
                                • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 002A4526
                                • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 002A4541
                                • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 002A4555
                                • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 002A4572
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$LongWindow
                                • String ID:
                                • API String ID: 312131281-0
                                • Opcode ID: e5d22ecb0eea0d7a621cd8ed3d9279540439d69a617dd6994c974cafab22964a
                                • Instruction ID: 629c0a3d43d36de98f6c2eb6d2117175ef592698fddb56fb1b7b1b73d13c0130
                                • Opcode Fuzzy Hash: e5d22ecb0eea0d7a621cd8ed3d9279540439d69a617dd6994c974cafab22964a
                                • Instruction Fuzzy Hash: 08618D75910248EFDB11DFA4CC81EEE77B8EF4A310F100159FA15A72A1CBB0A955CF50
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 0027BA2D
                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0027AABD,?,00000001), ref: 0027BA41
                                • GetWindowThreadProcessId.USER32(00000000), ref: 0027BA48
                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0027AABD,?,00000001), ref: 0027BA57
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0027BA69
                                • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0027AABD,?,00000001), ref: 0027BA82
                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0027AABD,?,00000001), ref: 0027BA94
                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0027AABD,?,00000001), ref: 0027BAD9
                                • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0027AABD,?,00000001), ref: 0027BAEE
                                • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0027AABD,?,00000001), ref: 0027BAF9
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                • String ID:
                                • API String ID: 2156557900-0
                                • Opcode ID: b176892c7b0566674f34145794c5f6f69c2175e78aa8b4f981855a9d780062d3
                                • Instruction ID: 33f80f0b02eecaae39c2f83e4b0c2db65ec0f65fff6e35830c4f16a68fc30906
                                • Opcode Fuzzy Hash: b176892c7b0566674f34145794c5f6f69c2175e78aa8b4f981855a9d780062d3
                                • Instruction Fuzzy Hash: A631BF76550205AFDB16FF15FC8CBA977A9AB46311F10C425FA09CB190DBB4ED408B50
                                APIs
                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00288907
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0028891B
                                • GetFileAttributesW.KERNEL32(?), ref: 00288945
                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 0028895F
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00288971
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 002889BA
                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00288A0A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CurrentDirectory$AttributesFile
                                • String ID: *.*
                                • API String ID: 769691225-438819550
                                • Opcode ID: ec3c2b1c5472f18d77c3bf183fbb645510fe971b1095ffc8094e20f3f70bef1a
                                • Instruction ID: 449da1fa6d776442a8ca649fe6a5a5ff9f08dd8004243f81f6b39fa14a0e9dc4
                                • Opcode Fuzzy Hash: ec3c2b1c5472f18d77c3bf183fbb645510fe971b1095ffc8094e20f3f70bef1a
                                • Instruction Fuzzy Hash: 2381C47A5253059FCB20FF14C844AAAB3E9BF95310F94881AF885C7291DB74ED64CF92
                                APIs
                                • SetWindowLongW.USER32(?,000000EB), ref: 00217387
                                  • Part of subcall function 00217417: GetClientRect.USER32(?,?), ref: 0021743D
                                  • Part of subcall function 00217417: GetWindowRect.USER32(?,?), ref: 0021747E
                                  • Part of subcall function 00217417: ScreenToClient.USER32(?,?), ref: 002174A6
                                • GetDC.USER32 ref: 00256045
                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00256058
                                • SelectObject.GDI32(00000000,00000000), ref: 00256066
                                • SelectObject.GDI32(00000000,00000000), ref: 0025607B
                                • ReleaseDC.USER32(?,00000000), ref: 00256083
                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00256114
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                • String ID: U
                                • API String ID: 4009187628-3372436214
                                • Opcode ID: e4f1b6240d3dad064a8a5061457c29c7f6855c6bb4a1314afe53d81f1f9c25b5
                                • Instruction ID: 55ff9c78242c5f9b9a95dcc8513f680cd6e9daa79cd5edae5e197793969bb6a7
                                • Opcode Fuzzy Hash: e4f1b6240d3dad064a8a5061457c29c7f6855c6bb4a1314afe53d81f1f9c25b5
                                • Instruction Fuzzy Hash: EF71E231420206DFCF258F64C888AFA7BB5FF49326F144269ED565B2A6C7318CA9DF50
                                APIs
                                • LoadStringW.USER32(00000066,?,00000FFF,002ADCEC), ref: 00283F3E
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                • LoadStringW.USER32(?,?,00000FFF,?), ref: 00283F64
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: LoadString$_wcslen
                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                • API String ID: 4099089115-2391861430
                                • Opcode ID: ef7152007894473380cf391ef8825f7f847f32538a5688957d6c53439ff5f971
                                • Instruction ID: 6155e26267ba0d91dfaec9a3e1958233805cf16874202af90057967e8827f8ff
                                • Opcode Fuzzy Hash: ef7152007894473380cf391ef8825f7f847f32538a5688957d6c53439ff5f971
                                • Instruction Fuzzy Hash: C9517E3181015AABCF15FBE0DC46EEEBB79AF24300F044165F505720A2DB712AE9DF90
                                APIs
                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0028CBCF
                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0028CBF7
                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0028CC27
                                • GetLastError.KERNEL32 ref: 0028CC7F
                                • SetEvent.KERNEL32(?), ref: 0028CC93
                                • InternetCloseHandle.WININET(00000000), ref: 0028CC9E
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                • String ID:
                                • API String ID: 3113390036-3916222277
                                • Opcode ID: 96f5934ce54004d48cf5bf8a1b28c32c4c56c4158c33b125540f007f8cc8dbc4
                                • Instruction ID: 13ebef76701dfe4920555846c2ab36e7215524712b205c49939854a818e5aae5
                                • Opcode Fuzzy Hash: 96f5934ce54004d48cf5bf8a1b28c32c4c56c4158c33b125540f007f8cc8dbc4
                                • Instruction Fuzzy Hash: 9C31CEB9521304AFD721AF65DD88AAB7BFCEB49744B20052EF44AD2680DB34D9189B70
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00255437,?,?,Bad directive syntax error,002ADCD0,00000000,00000010,?,?), ref: 0027A14B
                                • LoadStringW.USER32(00000000,?,00255437,?), ref: 0027A152
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0027A216
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: HandleLoadMessageModuleString_wcslen
                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                • API String ID: 858772685-4153970271
                                • Opcode ID: 78513e2f78822e8303d77addca3adcda35b40a35b72f21a3f9fb37982cfdff5a
                                • Instruction ID: a502eaf774316a463e90574eb73dc70bbf156ac410b5bd8092620ead84249872
                                • Opcode Fuzzy Hash: 78513e2f78822e8303d77addca3adcda35b40a35b72f21a3f9fb37982cfdff5a
                                • Instruction Fuzzy Hash: 7521823182021EBFCF02AF90DC0AEEE7779BF29304F444456F509650A2EA759A78DF11
                                APIs
                                • GetParent.USER32 ref: 0027293B
                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00272950
                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 002729DD
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClassMessageNameParentSend
                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                • API String ID: 1290815626-3381328864
                                • Opcode ID: 2d72fc4624065d374e03f5e15a839cd44dc1478b1a99f4f6f7a856e9cf2f78de
                                • Instruction ID: 68129a450d1405fcfaf3567cd1060ca2d3765903430ec809b70a6749b237dd0a
                                • Opcode Fuzzy Hash: 2d72fc4624065d374e03f5e15a839cd44dc1478b1a99f4f6f7a856e9cf2f78de
                                • Instruction Fuzzy Hash: 3911E3B66A430BFAFA002620EC0BDFA779CCF06724F344013FA09E41D1EAB1B8745954
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                • String ID:
                                • API String ID: 1282221369-0
                                • Opcode ID: 0409bbd43b5f3003dcd5052bdced854adf4b59321aa4ef30baaa9f3aa7577f96
                                • Instruction ID: deb0a94c0e52866eeed6c7526f966b9ca8569d6eae8338026e461dac0aa95f11
                                • Opcode Fuzzy Hash: 0409bbd43b5f3003dcd5052bdced854adf4b59321aa4ef30baaa9f3aa7577f96
                                • Instruction Fuzzy Hash: 48612971D20346EFDF2DAF74AC857697BE89F01710F0401ADFD04AB282D6B198648F91
                                APIs
                                • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 002528F1
                                • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 0025290A
                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0025291A
                                • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00252932
                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00252953
                                • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,002111F5,00000000,00000000,00000000,000000FF,00000000), ref: 00252962
                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0025297F
                                • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,002111F5,00000000,00000000,00000000,000000FF,00000000), ref: 0025298E
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Icon$DestroyExtractImageLoadMessageSend
                                • String ID:
                                • API String ID: 1268354404-0
                                • Opcode ID: 5760c0f0a22951e8f2f2d2a78d1caeaa4f77590835787de109ff934e8be74732
                                • Instruction ID: 672be7c378363f6a3cb6ca0e98e00f73b998bd4dacc059c3782cc545807bd5de
                                • Opcode Fuzzy Hash: 5760c0f0a22951e8f2f2d2a78d1caeaa4f77590835787de109ff934e8be74732
                                • Instruction Fuzzy Hash: 3D519D3062020AEFDB24CF25DC45BAA77F5EF59710F204518FA56972E0DB70E9A4DB50
                                APIs
                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0028CADF
                                • GetLastError.KERNEL32 ref: 0028CAF2
                                • SetEvent.KERNEL32(?), ref: 0028CB06
                                  • Part of subcall function 0028CBB0: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0028CBCF
                                  • Part of subcall function 0028CBB0: GetLastError.KERNEL32 ref: 0028CC7F
                                  • Part of subcall function 0028CBB0: SetEvent.KERNEL32(?), ref: 0028CC93
                                  • Part of subcall function 0028CBB0: InternetCloseHandle.WININET(00000000), ref: 0028CC9E
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                • String ID:
                                • API String ID: 337547030-0
                                • Opcode ID: 9728bdf75be00b39a43348889690483812b62b82861a715ba84fe83cb3291656
                                • Instruction ID: ecc065a787e4ce4a184b6de4d59b5faf4e664e45e945dfd67b7686724ab2af47
                                • Opcode Fuzzy Hash: 9728bdf75be00b39a43348889690483812b62b82861a715ba84fe83cb3291656
                                • Instruction Fuzzy Hash: 5031AE79212B05BFDB25AF60DD49A76BBF8FF49304B20441DF89682650DB30E824DB60
                                APIs
                                  • Part of subcall function 002742CC: GetWindowThreadProcessId.USER32(?,00000000), ref: 002742E6
                                  • Part of subcall function 002742CC: GetCurrentThreadId.KERNEL32 ref: 002742ED
                                  • Part of subcall function 002742CC: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00272E43), ref: 002742F4
                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00272E4D
                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00272E6B
                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00272E6F
                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00272E79
                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00272E91
                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00272E95
                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00272E9F
                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00272EB3
                                • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00272EB7
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                • String ID:
                                • API String ID: 2014098862-0
                                • Opcode ID: bf97a97cf3ad3b38a8b733b1da56e7f3d2a33b8e43ce3fde0bdd43344b1f18c5
                                • Instruction ID: f3b0c8de1a9ca95f37dbc3565fa7a141d95b8dab7bc859c9e5749d3647a2361a
                                • Opcode Fuzzy Hash: bf97a97cf3ad3b38a8b733b1da56e7f3d2a33b8e43ce3fde0bdd43344b1f18c5
                                • Instruction Fuzzy Hash: 0901D831390214BBFB106769AC8EF563F59DB4AB11F101001F31DAE1E1CDF12455CE69
                                APIs
                                  • Part of subcall function 0027DC9C: CreateToolhelp32Snapshot.KERNEL32 ref: 0027DCC1
                                  • Part of subcall function 0027DC9C: Process32FirstW.KERNEL32(00000000,?), ref: 0027DCCF
                                  • Part of subcall function 0027DC9C: CloseHandle.KERNEL32(00000000), ref: 0027DD9C
                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0029AACC
                                • GetLastError.KERNEL32 ref: 0029AADF
                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0029AB12
                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 0029ABC7
                                • GetLastError.KERNEL32(00000000), ref: 0029ABD2
                                • CloseHandle.KERNEL32(00000000), ref: 0029AC23
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                • String ID: SeDebugPrivilege
                                • API String ID: 2533919879-2896544425
                                • Opcode ID: d34c6e3c2f5ed60b536ecd5668797f187dd1719df226ae3e30b71260293117ef
                                • Instruction ID: b753a6b92dd05e9d463f66b58e63c315034910311b69ab161c74b4db70ec3949
                                • Opcode Fuzzy Hash: d34c6e3c2f5ed60b536ecd5668797f187dd1719df226ae3e30b71260293117ef
                                • Instruction Fuzzy Hash: 7A618C30214342AFDB20DF18C498F16BBE5AF54318F14849CE46A4BBA2CB75ED95CBD2
                                APIs
                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 002A4284
                                • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 002A4299
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 002A42B3
                                • _wcslen.LIBCMT ref: 002A42F8
                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 002A4325
                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 002A4353
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$Window_wcslen
                                • String ID: SysListView32
                                • API String ID: 2147712094-78025650
                                • Opcode ID: b6287c4d1fcf766b28930a90c14a674dbb4c77c26ae36ee7bb449b432fdb3e89
                                • Instruction ID: 37d555d90b6af0102b84e4a5e5562cd288bc5c1132cc6d7d40a6ff020c953d46
                                • Opcode Fuzzy Hash: b6287c4d1fcf766b28930a90c14a674dbb4c77c26ae36ee7bb449b432fdb3e89
                                • Instruction Fuzzy Hash: 3041CE71910309ABDB21EF64CC49FEA7BA9EF49350F100126F954E7291DBB0EDA4CB90
                                APIs
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0027C5D9
                                • IsMenu.USER32(00000000), ref: 0027C5F9
                                • CreatePopupMenu.USER32 ref: 0027C62F
                                • GetMenuItemCount.USER32(012B5CD8), ref: 0027C680
                                • InsertMenuItemW.USER32(012B5CD8,?,00000001,00000030), ref: 0027C6A8
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Menu$Item$CountCreateInfoInsertPopup
                                • String ID: 0$2
                                • API String ID: 93392585-3793063076
                                • Opcode ID: 5594c2f8f4fcbc80de2620d536e505970c2cfe0a24b060003b09e0233297eb70
                                • Instruction ID: cf99364d4abebb3ad466cf9d306e6dd249ebc7259ace7d77d0090dfcda4aed28
                                • Opcode Fuzzy Hash: 5594c2f8f4fcbc80de2620d536e505970c2cfe0a24b060003b09e0233297eb70
                                • Instruction Fuzzy Hash: 4251D370911306ABDF24DF78D8C8BAEBBF9AF85314F34911DE409A7291D7709960CB21
                                APIs
                                • LoadIconW.USER32(00000000,00007F03), ref: 0027D0D3
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: IconLoad
                                • String ID: blank$info$question$stop$warning
                                • API String ID: 2457776203-404129466
                                • Opcode ID: de62452370718eabad3af244b959f98309ba2f16499317b7eea0b94a962d6440
                                • Instruction ID: bf47004c314612e4a00ca4237cf1936c192c06e72d221d217083ec1eb35f7593
                                • Opcode Fuzzy Hash: de62452370718eabad3af244b959f98309ba2f16499317b7eea0b94a962d6440
                                • Instruction Fuzzy Hash: 26110D7127C30BBAF7106F249C82DEA67FC9F16320F60406BF90866281EBB5AD214564
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                • String ID: 0.0.0.0
                                • API String ID: 642191829-3771769585
                                • Opcode ID: 7adcb05a43a0ec6178cc4a49237982f9c81cefcabb205b9641bfd2c7f6b4f7de
                                • Instruction ID: 41c237e89e4d6ad0c85f8889ce78dff653923342a902f48ac4edff2cd10784b8
                                • Opcode Fuzzy Hash: 7adcb05a43a0ec6178cc4a49237982f9c81cefcabb205b9641bfd2c7f6b4f7de
                                • Instruction Fuzzy Hash: F3110671924215AFDF287B30AC4EEDEB7BCDF49710F1140A6F54A92091EF709AA19A60
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$LocalTime
                                • String ID:
                                • API String ID: 952045576-0
                                • Opcode ID: d0ba6a08bf792b9e56ebf1705b2330ff1def3f466101a49cb576651adbc3943d
                                • Instruction ID: 72a041ac93581fe1a2fc47e0e35acb1be09fec65d34820d4c81b5d03516bbd88
                                • Opcode Fuzzy Hash: d0ba6a08bf792b9e56ebf1705b2330ff1def3f466101a49cb576651adbc3943d
                                • Instruction Fuzzy Hash: F44188A5C2121475CB11EBF8984BECFB76CAF05310F508966E528E3131FA34D275CBA5
                                APIs
                                • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,002539BC,00000004,00000000,00000000), ref: 0022FC4F
                                • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,002539BC,00000004,00000000,00000000), ref: 0026FBB5
                                • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,002539BC,00000004,00000000,00000000), ref: 0026FC38
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ShowWindow
                                • String ID:
                                • API String ID: 1268545403-0
                                • Opcode ID: 92a1d44bc9f1f48a5921fcf52d6fb2916e3f20f906540952b7b678c53570abc9
                                • Instruction ID: 1e3f3d518d0f37eb71a5d302b05d688dab092d519a4908f35182f6354b37a900
                                • Opcode Fuzzy Hash: 92a1d44bc9f1f48a5921fcf52d6fb2916e3f20f906540952b7b678c53570abc9
                                • Instruction Fuzzy Hash: 0F412D30538699BACBB5CF68FBDC7267BB5AB8A300F14443EE84746960C67198A0C710
                                APIs
                                • DeleteObject.GDI32(00000000), ref: 002A367A
                                • GetDC.USER32(00000000), ref: 002A3682
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002A368D
                                • ReleaseDC.USER32(00000000,00000000), ref: 002A3699
                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 002A36D5
                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 002A36E6
                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,002A63C4,?,?,000000FF,00000000,?,000000FF,?), ref: 002A3721
                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 002A3740
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                • String ID:
                                • API String ID: 3864802216-0
                                • Opcode ID: 7f15292ccab9b67a0d7375e93418da4dd25ffb63f0483a2725af526116b07db1
                                • Instruction ID: 61c92f4f5788f803b594fb882ebb1510b98b0f9fb4d4f4b2a5819ac7413921bc
                                • Opcode Fuzzy Hash: 7f15292ccab9b67a0d7375e93418da4dd25ffb63f0483a2725af526116b07db1
                                • Instruction Fuzzy Hash: D531B1B2211214BFEB118F10DC89FEB7FADEF0A751F044055FE099A291CA759C51CBA4
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _memcmp
                                • String ID:
                                • API String ID: 2931989736-0
                                • Opcode ID: 20352c76c06209eaf76f481fadc2ae38f1aad59fd163b84f7d2bac37b1c0780c
                                • Instruction ID: 6019ba4b4f34112273f02b41261589bd1a41455861c300e9be0c3e509f8ece4e
                                • Opcode Fuzzy Hash: 20352c76c06209eaf76f481fadc2ae38f1aad59fd163b84f7d2bac37b1c0780c
                                • Instruction Fuzzy Hash: 4421DAB1630A267BD30959125D82FAFF39CAE123D8F188011FD0E9A541F7F0DE3285A2
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID: NULL Pointer assignment$Not an Object type
                                • API String ID: 0-572801152
                                • Opcode ID: 2ca5aa73ed945226bea1938147386bb967d1f424c44d6c3c6c3e3ac1e2a5ab89
                                • Instruction ID: 284c1c28ebc33005ce708d1febcf31333c40b9fe825039e4e4c07bf3f0f4e066
                                • Opcode Fuzzy Hash: 2ca5aa73ed945226bea1938147386bb967d1f424c44d6c3c6c3e3ac1e2a5ab89
                                • Instruction Fuzzy Hash: 25D1BF71B1071AAFDF11CFA8C890BAEB7B5BF48304F14816AE915AB280E770ED55CB50
                                APIs
                                • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00251B9B,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 0025196E
                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00251B9B,00000000,00000000,?,00000000,?,?,?,?), ref: 002519F1
                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00251B9B,?,00251B9B,00000000,00000000,?,00000000,?,?,?,?), ref: 00251A84
                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00251B9B,00000000,00000000,?,00000000,?,?,?,?), ref: 00251A9B
                                  • Part of subcall function 00243BB0: RtlAllocateHeap.NTDLL(00000000,?,?,?,00236A99,?,0000015D,?,?,?,?,002385D0,000000FF,00000000,?,?), ref: 00243BE2
                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00251B9B,00000000,00000000,?,00000000,?,?,?,?), ref: 00251B17
                                • __freea.LIBCMT ref: 00251B42
                                • __freea.LIBCMT ref: 00251B4E
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                • String ID:
                                • API String ID: 2829977744-0
                                • Opcode ID: 6151613c0f248d99df87c77c2df8f32f958573711ec332cdfef369667d177658
                                • Instruction ID: 71b34e34e54dc8b67b8f9226fa121e4ccd8e6b91b4c68a5a49fb4fd3f0f203fe
                                • Opcode Fuzzy Hash: 6151613c0f248d99df87c77c2df8f32f958573711ec332cdfef369667d177658
                                • Instruction Fuzzy Hash: C291D372E202179ADF248E64C891FEEBBB5AF09315F144159EC05E7240EB35DC78CB68
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Variant$ClearInit
                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                • API String ID: 2610073882-625585964
                                • Opcode ID: dcb9f60428dba7a5aeace081a5eaee829f00558d02b68f8476a476d6f76129fc
                                • Instruction ID: 08a3827bfd3586b6f5cae57b4516a161dae6cd390f26068f9bbac8aac2d367a4
                                • Opcode Fuzzy Hash: dcb9f60428dba7a5aeace081a5eaee829f00558d02b68f8476a476d6f76129fc
                                • Instruction Fuzzy Hash: 5491B571A2022AAFDF21CFA4CC44FAEBBB8EF45314F108159F505AB280D7709955CFA0
                                APIs
                                • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00281B30
                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00281B58
                                • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00281B7C
                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00281BAC
                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00281C33
                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00281C98
                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00281D04
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ArraySafe$Data$Access$UnaccessVartype
                                • String ID:
                                • API String ID: 2550207440-0
                                • Opcode ID: 775f3b40947f1151797063976d8949724a8a4a3333ebb3294ccd6fead8be0bdf
                                • Instruction ID: 79c2e3028bb7a3058ee36e90592078cae20f34cbea177ac5e9b3de51e7752bf7
                                • Opcode Fuzzy Hash: 775f3b40947f1151797063976d8949724a8a4a3333ebb3294ccd6fead8be0bdf
                                • Instruction Fuzzy Hash: E291D0B99212199FDB00AF98D884BBEB7B8FF05715F10401AE901A72D1E774A972CF91
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ObjectSelect$BeginCreatePath
                                • String ID:
                                • API String ID: 3225163088-0
                                • Opcode ID: cef54f5b04d8d86abcc2daed9499851b4d394d369596bc04e6603c8ff2690509
                                • Instruction ID: 5597e55b39632b9ab4f1b114d4fe15916fa19c6be775d9f3798497020a02fc4a
                                • Opcode Fuzzy Hash: cef54f5b04d8d86abcc2daed9499851b4d394d369596bc04e6603c8ff2690509
                                • Instruction Fuzzy Hash: AF912B71D1021AAFCB10CFA9DC88AEEBBB9FF49320F144155E911B7251D77499A1CFA0
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 002942C8
                                • CharUpperBuffW.USER32(?,?), ref: 002943D7
                                • _wcslen.LIBCMT ref: 002943E7
                                • VariantClear.OLEAUT32(?), ref: 0029457C
                                  • Part of subcall function 002815B3: VariantInit.OLEAUT32(00000000), ref: 002815F3
                                  • Part of subcall function 002815B3: VariantCopy.OLEAUT32(?,?), ref: 002815FC
                                  • Part of subcall function 002815B3: VariantClear.OLEAUT32(?), ref: 00281608
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                • API String ID: 4137639002-1221869570
                                • Opcode ID: f9f60db64da6dd261d23b71b4e9ee293bf7436ed012e8ac090e213436fa25bb1
                                • Instruction ID: 719fc5192fca45f5580be9e7dab38b4ca07fd663cac40ce81f3a4ee613efc992
                                • Opcode Fuzzy Hash: f9f60db64da6dd261d23b71b4e9ee293bf7436ed012e8ac090e213436fa25bb1
                                • Instruction Fuzzy Hash: BE9148746283019FCB04EF64C48196AB7E5BF88714F14896DF88A97351DB30ED56CF92
                                APIs
                                  • Part of subcall function 0027089E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,002707D1,80070057,?,?,?,00270BEE), ref: 002708BB
                                  • Part of subcall function 0027089E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002707D1,80070057,?,?), ref: 002708D6
                                  • Part of subcall function 0027089E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002707D1,80070057,?,?), ref: 002708E4
                                  • Part of subcall function 0027089E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002707D1,80070057,?), ref: 002708F4
                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 002955AE
                                • _wcslen.LIBCMT ref: 002956B6
                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0029572C
                                • CoTaskMemFree.OLE32(?), ref: 00295737
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                • String ID: NULL Pointer assignment
                                • API String ID: 614568839-2785691316
                                • Opcode ID: d438f25b48c26e063a885c585d86a7a2b94dd8ce3a6b11a8aa8f82ea246e4201
                                • Instruction ID: 73abb16ecc3e6b9f860441a14625339ee03ce14b494702c23a001d7e48763f52
                                • Opcode Fuzzy Hash: d438f25b48c26e063a885c585d86a7a2b94dd8ce3a6b11a8aa8f82ea246e4201
                                • Instruction Fuzzy Hash: 1E912771D1022DEFDF11DFA4DC80AEEB7B9AF08304F10416AE915A7251DB709A64CFA0
                                APIs
                                • GetMenu.USER32(?), ref: 002A2AE2
                                • GetMenuItemCount.USER32(00000000), ref: 002A2B14
                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 002A2B3C
                                • _wcslen.LIBCMT ref: 002A2B72
                                • GetMenuItemID.USER32(?,?), ref: 002A2BAC
                                • GetSubMenu.USER32(?,?), ref: 002A2BBA
                                  • Part of subcall function 002742CC: GetWindowThreadProcessId.USER32(?,00000000), ref: 002742E6
                                  • Part of subcall function 002742CC: GetCurrentThreadId.KERNEL32 ref: 002742ED
                                  • Part of subcall function 002742CC: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00272E43), ref: 002742F4
                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 002A2C42
                                  • Part of subcall function 0027F1A7: Sleep.KERNEL32 ref: 0027F21F
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                • String ID:
                                • API String ID: 4196846111-0
                                • Opcode ID: 53b621843511b894f02061026ab83cc13af0d9139e06cc1a574321cc1cd8c147
                                • Instruction ID: b4cfbf5b0bc7144a3d618ee3ced026a84c02561ae66b379f164e61b63f927b1e
                                • Opcode Fuzzy Hash: 53b621843511b894f02061026ab83cc13af0d9139e06cc1a574321cc1cd8c147
                                • Instruction Fuzzy Hash: FE71B275A10205EFCB10EF68C885AAEB7F5EF49320F118459E81AEB351DB74ED518FA0
                                APIs
                                • IsWindow.USER32(00000000), ref: 002A8896
                                • IsWindowEnabled.USER32(00000000), ref: 002A88A2
                                • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 002A897D
                                • SendMessageW.USER32(00000000,000000B0,?,?), ref: 002A89B0
                                • IsDlgButtonChecked.USER32(?,00000000), ref: 002A89E8
                                • GetWindowLongW.USER32(00000000,000000EC), ref: 002A8A0A
                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 002A8A22
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                • String ID:
                                • API String ID: 4072528602-0
                                • Opcode ID: 2fdca5d88c76ab9a5e6c10b7dc782a539c0893be3eab287f2a85e8668c2bf6bf
                                • Instruction ID: edc6276ba4626600b239d332cf68eb45ae3f946e35a13ee37673f1e819c54f69
                                • Opcode Fuzzy Hash: 2fdca5d88c76ab9a5e6c10b7dc782a539c0893be3eab287f2a85e8668c2bf6bf
                                • Instruction Fuzzy Hash: AA71CF34A1020AEFEF259F54C894FBABBB9EF0B300F144459E95657362CF31A964CB11
                                APIs
                                • GetParent.USER32(?), ref: 0027B7D5
                                • GetKeyboardState.USER32(?), ref: 0027B7EA
                                • SetKeyboardState.USER32(?), ref: 0027B84B
                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 0027B879
                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 0027B898
                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 0027B8D9
                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0027B8FC
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: 54c556a964c4cff1e39507573e369903f1eeee990a44ce52b3321157a7c429c3
                                • Instruction ID: 2ba8ee0d86f9ae358d8c89ef7fd453178981a704f6898b82ccf7d62c496a706a
                                • Opcode Fuzzy Hash: 54c556a964c4cff1e39507573e369903f1eeee990a44ce52b3321157a7c429c3
                                • Instruction Fuzzy Hash: F051B4A0A247D67DFB374A348C45BB6BE996F06304F08C489E2DD458D2C7B8ACA4DB51
                                APIs
                                • GetParent.USER32(00000000), ref: 0027B5F5
                                • GetKeyboardState.USER32(?), ref: 0027B60A
                                • SetKeyboardState.USER32(?), ref: 0027B66B
                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0027B697
                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0027B6B4
                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0027B6F3
                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0027B714
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: be6c52b0b4c50f1b6546fc4e45f05834b83b4c5816ca53f9596ea59132386e33
                                • Instruction ID: b3d7061cd1191a083663e21f4db29a0b6c44d2019c8fdec3c457f7c392c668dd
                                • Opcode Fuzzy Hash: be6c52b0b4c50f1b6546fc4e45f05834b83b4c5816ca53f9596ea59132386e33
                                • Instruction Fuzzy Hash: CB51E6A15246D63DFB374B348C45B7ABF986B46304F08C489E1DD4A8C2D7B4ACA8D750
                                APIs
                                • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,00245F33,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 00245800
                                • __fassign.LIBCMT ref: 0024587B
                                • __fassign.LIBCMT ref: 00245896
                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 002458BC
                                • WriteFile.KERNEL32(?,FF8BC35D,00000000,00245F33,00000000,?,?,?,?,?,?,?,?,?,00245F33,?), ref: 002458DB
                                • WriteFile.KERNEL32(?,?,00000001,00245F33,00000000,?,?,?,?,?,?,?,?,?,00245F33,?), ref: 00245914
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                • String ID:
                                • API String ID: 1324828854-0
                                • Opcode ID: 6bbabb00416c929934def1e017e9c10f01cfbca5751d5f958d89954d9739484b
                                • Instruction ID: 9bd9cf27297a431bce3d9ca747fe19c2521d97768feae3cdf0b82a84c3b39041
                                • Opcode Fuzzy Hash: 6bbabb00416c929934def1e017e9c10f01cfbca5751d5f958d89954d9739484b
                                • Instruction Fuzzy Hash: 21510871A1024ADFCB14CFA4D885BEEBBF8EF09310F14405AE595E7292D7319960CFA0
                                APIs
                                • _ValidateLocalCookies.LIBCMT ref: 002330DB
                                • ___except_validate_context_record.LIBVCRUNTIME ref: 002330E3
                                • _ValidateLocalCookies.LIBCMT ref: 00233171
                                • __IsNonwritableInCurrentImage.LIBCMT ref: 0023319C
                                • _ValidateLocalCookies.LIBCMT ref: 002331F1
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                • String ID: csm
                                • API String ID: 1170836740-1018135373
                                • Opcode ID: 27fbcec28205fbaf9dddc136e7d91c6f1b3100d73eb88505a0b74d305dbfe100
                                • Instruction ID: 0b42b8daad1da11b076a5b9c956e08c358ee2fb8e7396d332ea9daefacd7d7bc
                                • Opcode Fuzzy Hash: 27fbcec28205fbaf9dddc136e7d91c6f1b3100d73eb88505a0b74d305dbfe100
                                • Instruction Fuzzy Hash: 604117B0E20209ABCF10DF68CC44A9EBBB4AF44324F148155E858AB392D735DF25CF90
                                APIs
                                  • Part of subcall function 002939AB: inet_addr.WSOCK32(?), ref: 002939D7
                                  • Part of subcall function 002939AB: _wcslen.LIBCMT ref: 002939F8
                                • socket.WSOCK32(00000002,00000001,00000006), ref: 00291A6F
                                • WSAGetLastError.WSOCK32 ref: 00291A7E
                                • WSAGetLastError.WSOCK32 ref: 00291B26
                                • closesocket.WSOCK32(00000000), ref: 00291B56
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                • String ID:
                                • API String ID: 2675159561-0
                                • Opcode ID: 85c587a5892e9914ab38d3a620e6e9ad1d072a9a2c48ee195dd13ed052813ab2
                                • Instruction ID: 54f40b108ec44098dea9ffe27b0b1ab636b8f2da4f9772b1882ad787c0b6a206
                                • Opcode Fuzzy Hash: 85c587a5892e9914ab38d3a620e6e9ad1d072a9a2c48ee195dd13ed052813ab2
                                • Instruction Fuzzy Hash: 4341F631210105AFDF109F65C844BA9B7E9EF45324F148059FC169B291DB74EDA1CFE1
                                APIs
                                  • Part of subcall function 0027E60C: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0027D6E2,?), ref: 0027E629
                                  • Part of subcall function 0027E60C: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0027D6E2,?), ref: 0027E642
                                • lstrcmpiW.KERNEL32(?,?), ref: 0027D705
                                • MoveFileW.KERNEL32(?,?), ref: 0027D73F
                                • _wcslen.LIBCMT ref: 0027D7C5
                                • _wcslen.LIBCMT ref: 0027D7DB
                                • SHFileOperationW.SHELL32(?), ref: 0027D821
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                • String ID: \*.*
                                • API String ID: 3164238972-1173974218
                                • Opcode ID: 0f2bd921af05ce8f2ba587ac48d9a8441dd197a5e077876433053a6620e385bb
                                • Instruction ID: 26f403d98de4dbebc28542cca540d420297ef432834725f7a829b84eff862633
                                • Opcode Fuzzy Hash: 0f2bd921af05ce8f2ba587ac48d9a8441dd197a5e077876433053a6620e385bb
                                • Instruction Fuzzy Hash: E44183718152199FDF16EFA4D981FDEB3B8AF09380F0040E6A509EB141EA34AB98CF50
                                APIs
                                • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 002A377B
                                • GetWindowLongW.USER32(?,000000F0), ref: 002A37AE
                                • GetWindowLongW.USER32(?,000000F0), ref: 002A37E3
                                • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 002A3815
                                • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 002A383F
                                • GetWindowLongW.USER32(?,000000F0), ref: 002A3850
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002A386A
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: LongWindow$MessageSend
                                • String ID:
                                • API String ID: 2178440468-0
                                • Opcode ID: d15dc65d35c38d5d4fb376fd441c101fcc5d59c8c6e847ce5c7d8f21182c4e46
                                • Instruction ID: 1bd6cbcccc0ac7f8fae8f2aeda4cc732c2b2a985db9668fb2391ea6e145ae387
                                • Opcode Fuzzy Hash: d15dc65d35c38d5d4fb376fd441c101fcc5d59c8c6e847ce5c7d8f21182c4e46
                                • Instruction Fuzzy Hash: 8E3110B5654241EFEB25CF08EC88F6577E5EB8A710F241164F5168B2A2CF70A9508B40
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 002780D1
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 002780F7
                                • SysAllocString.OLEAUT32(00000000), ref: 002780FA
                                • SysAllocString.OLEAUT32 ref: 0027811B
                                • SysFreeString.OLEAUT32 ref: 00278124
                                • StringFromGUID2.OLE32(?,?,00000028), ref: 0027813E
                                • SysAllocString.OLEAUT32(?), ref: 0027814C
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                • String ID:
                                • API String ID: 3761583154-0
                                • Opcode ID: 7dd36c8b88682d6f27652bcd33d481b2c5d875a8743329433812e4f72bbb8eb6
                                • Instruction ID: a7b092b919fc9c936c3930b2d08b10bc385e9445016450d6dd2e720748d25b08
                                • Opcode Fuzzy Hash: 7dd36c8b88682d6f27652bcd33d481b2c5d875a8743329433812e4f72bbb8eb6
                                • Instruction Fuzzy Hash: 41218375650215AFDB109FA8DC8CDAA77ECEB49360750C125F90DCB2A0DE70EC56CB64
                                APIs
                                • GetStdHandle.KERNEL32(0000000C), ref: 00280DAE
                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00280DEA
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CreateHandlePipe
                                • String ID: nul
                                • API String ID: 1424370930-2873401336
                                • Opcode ID: 9888693686b869d9272806f51b88240b7c116ccd1d26751dc43e45463bf8f9b8
                                • Instruction ID: 7e79dd817267b507098616254c1d0bb029e61dda1f3616fed8aa892bbef7cbcf
                                • Opcode Fuzzy Hash: 9888693686b869d9272806f51b88240b7c116ccd1d26751dc43e45463bf8f9b8
                                • Instruction Fuzzy Hash: 18215E78511306AFDB60AF65D884A9ABBA4EF45720F204E19E9A1D72D0D7709864CB50
                                APIs
                                • GetStdHandle.KERNEL32(000000F6), ref: 00280E82
                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00280EBD
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CreateHandlePipe
                                • String ID: nul
                                • API String ID: 1424370930-2873401336
                                • Opcode ID: 24784d16e93b28496a5b5862a5916e2193e082754fb4bc2217d15f07657a1ee5
                                • Instruction ID: 2be51ec0eea63bfeec4beed3f1a9f6e58c5426da7fa5aab03702883e986aa9ce
                                • Opcode Fuzzy Hash: 24784d16e93b28496a5b5862a5916e2193e082754fb4bc2217d15f07657a1ee5
                                • Instruction Fuzzy Hash: CC2197795113069BDB70AF28DC84A9A77E4EF59724F204A19FDA1D32D0DB709864CB50
                                APIs
                                  • Part of subcall function 0021771B: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00217759
                                  • Part of subcall function 0021771B: GetStockObject.GDI32(00000011), ref: 0021776D
                                  • Part of subcall function 0021771B: SendMessageW.USER32(00000000,00000030,00000000), ref: 00217777
                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 002A4A71
                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 002A4A7E
                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 002A4A89
                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 002A4A98
                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 002A4AA4
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$CreateObjectStockWindow
                                • String ID: Msctls_Progress32
                                • API String ID: 1025951953-3636473452
                                • Opcode ID: 70b1edb46c199faf66cae3b7f8acb9de83145e84eb23b005ec4ce019f6594844
                                • Instruction ID: 9b5aa054844a85bab57d485d8af23274d11ad6b84cd42cf3faebf4e6b45c4739
                                • Opcode Fuzzy Hash: 70b1edb46c199faf66cae3b7f8acb9de83145e84eb23b005ec4ce019f6594844
                                • Instruction Fuzzy Hash: 2311B2B215021EBFEF119F64CC85EE77FADEF09758F008111BB18A6090CA72DC219BA4
                                APIs
                                  • Part of subcall function 0024DB43: _free.LIBCMT ref: 0024DB6C
                                • _free.LIBCMT ref: 0024DBCD
                                  • Part of subcall function 00242D58: RtlFreeHeap.NTDLL(00000000,00000000,?,0024DB71,002E1DC4,00000000,002E1DC4,00000000,?,0024DB98,002E1DC4,00000007,002E1DC4,?,0024DF95,002E1DC4), ref: 00242D6E
                                  • Part of subcall function 00242D58: GetLastError.KERNEL32(002E1DC4,?,0024DB71,002E1DC4,00000000,002E1DC4,00000000,?,0024DB98,002E1DC4,00000007,002E1DC4,?,0024DF95,002E1DC4,002E1DC4), ref: 00242D80
                                • _free.LIBCMT ref: 0024DBD8
                                • _free.LIBCMT ref: 0024DBE3
                                • _free.LIBCMT ref: 0024DC37
                                • _free.LIBCMT ref: 0024DC42
                                • _free.LIBCMT ref: 0024DC4D
                                • _free.LIBCMT ref: 0024DC58
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                • Instruction ID: 011c9fcdfffbb28754d841d640f2f16bc0c3355fe7143b555e7362462a8649b7
                                • Opcode Fuzzy Hash: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                • Instruction Fuzzy Hash: A6118471990744E6DE24FB70CC07FCBB7DC9F50700F450C25B299A6162D674B6A94E50
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0027E23D
                                • LoadStringW.USER32(00000000), ref: 0027E244
                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0027E25A
                                • LoadStringW.USER32(00000000), ref: 0027E261
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0027E2A5
                                Strings
                                • %s (%d) : ==> %s: %s %s, xrefs: 0027E282
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString$Message
                                • String ID: %s (%d) : ==> %s: %s %s
                                • API String ID: 4072794657-3128320259
                                • Opcode ID: 9f15db49e6e2b8d9c53eaf8b438810d12a4348a080a4bc8087153073221ab200
                                • Instruction ID: 847d72b51d246d8f3ccb5e739d72e3f5027d2355fd181204e65c203b56b9a824
                                • Opcode Fuzzy Hash: 9f15db49e6e2b8d9c53eaf8b438810d12a4348a080a4bc8087153073221ab200
                                • Instruction Fuzzy Hash: 6C0186F29102087FE7119B94ED8DEE7776CDB09700F414592BB4BE2041EA749E848B74
                                APIs
                                • InterlockedExchange.KERNEL32(?,?), ref: 00281237
                                • EnterCriticalSection.KERNEL32(00000000,?), ref: 00281249
                                • TerminateThread.KERNEL32(00000000,000001F6), ref: 00281257
                                • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00281265
                                • CloseHandle.KERNEL32(00000000), ref: 00281274
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00281284
                                • LeaveCriticalSection.KERNEL32(00000000), ref: 0028128B
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                • String ID:
                                • API String ID: 3495660284-0
                                • Opcode ID: 15d2a29be355e280c2458d53af1f2ec0ef07d741cfa62b6db0848b1a0acd0bac
                                • Instruction ID: b5a589ca56cb91848be42bf4843d27a1945f57ff92cea77f9a27d924e7ea4d20
                                • Opcode Fuzzy Hash: 15d2a29be355e280c2458d53af1f2ec0ef07d741cfa62b6db0848b1a0acd0bac
                                • Instruction Fuzzy Hash: BEF0F632042A12ABD7511F64EE4CBD6BB39FF02302F402025E50291CA4CB749876CF90
                                APIs
                                • __WSAFDIsSet.WSOCK32(00000000,?), ref: 0029271D
                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 0029273E
                                • WSAGetLastError.WSOCK32 ref: 0029274F
                                • htons.WSOCK32(?), ref: 00292838
                                • inet_ntoa.WSOCK32(?), ref: 002927E9
                                  • Part of subcall function 00274277: _strlen.LIBCMT ref: 00274281
                                  • Part of subcall function 00293B81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0028F569), ref: 00293B9D
                                • _strlen.LIBCMT ref: 00292892
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                • String ID:
                                • API String ID: 3203458085-0
                                • Opcode ID: c7183819e5fad31d9c51d46576822de7ac3b94643e1317df46579955cd99d9aa
                                • Instruction ID: 1b6d4e46a1a912615b55fb5b24dde9fe82d261421aa796b07ff7c61891215b2f
                                • Opcode Fuzzy Hash: c7183819e5fad31d9c51d46576822de7ac3b94643e1317df46579955cd99d9aa
                                • Instruction Fuzzy Hash: F7B11235210301EFD724DF24C885F6A77E9AF94318F54854CF49A4B2A2CB31ED9ACB91
                                APIs
                                • GetClientRect.USER32(?,?), ref: 0021743D
                                • GetWindowRect.USER32(?,?), ref: 0021747E
                                • ScreenToClient.USER32(?,?), ref: 002174A6
                                • GetClientRect.USER32(?,?), ref: 002175E4
                                • GetWindowRect.USER32(?,?), ref: 00217605
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Rect$Client$Window$Screen
                                • String ID:
                                • API String ID: 1296646539-0
                                • Opcode ID: dd6e0452e6f4c46ae4ba379a07f51a03c541361de5994a5a8c5f2d16172fac75
                                • Instruction ID: dccc7c4dcbf9080f143f1e28d48b4450a96f76270388d6a678c7b24dd4ddcb41
                                • Opcode Fuzzy Hash: dd6e0452e6f4c46ae4ba379a07f51a03c541361de5994a5a8c5f2d16172fac75
                                • Instruction Fuzzy Hash: 4CB17934A2464ADBDB10CFB9C4447EAB7F2FF94310F54851AECAAD3250DB30A9A4DB54
                                APIs
                                • __allrem.LIBCMT ref: 0024044A
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00240466
                                • __allrem.LIBCMT ref: 0024047D
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0024049B
                                • __allrem.LIBCMT ref: 002404B2
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 002404D0
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                • String ID:
                                • API String ID: 1992179935-0
                                • Opcode ID: 2c635347f6fb7bc080f97231395b1708db1b00bed18cf3e190c3431c6bc10d53
                                • Instruction ID: 7e6f0b61a495e7b85527d0aca208098ddc96a66e6035b2343f2e6aa3d919d6b9
                                • Opcode Fuzzy Hash: 2c635347f6fb7bc080f97231395b1708db1b00bed18cf3e190c3431c6bc10d53
                                • Instruction Fuzzy Hash: D581DA72A207069BD728AE79CCC1B6A77E8EF44324F24412EF711D7681E7B0D9A48F54
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00238669,00238669,?,?,?,002467DF,00000001,00000001,8BE85006), ref: 002465E8
                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,002467DF,00000001,00000001,8BE85006,?,?,?), ref: 0024666E
                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00246768
                                • __freea.LIBCMT ref: 00246775
                                  • Part of subcall function 00243BB0: RtlAllocateHeap.NTDLL(00000000,?,?,?,00236A99,?,0000015D,?,?,?,?,002385D0,000000FF,00000000,?,?), ref: 00243BE2
                                • __freea.LIBCMT ref: 0024677E
                                • __freea.LIBCMT ref: 002467A3
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                • String ID:
                                • API String ID: 1414292761-0
                                • Opcode ID: 4362793834f98d6ecd647feb96f0f326fc8806a20a94ca6b774f3e53095f07fc
                                • Instruction ID: b40aa2fc500473f54dbd3cf1eedff415a4cc6f103f4261c30acef7177613d360
                                • Opcode Fuzzy Hash: 4362793834f98d6ecd647feb96f0f326fc8806a20a94ca6b774f3e53095f07fc
                                • Instruction Fuzzy Hash: A2512672620617AFDB288F24CC89EBFB7A9EF42754F154229FC05D6140EB74EC60CA51
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                  • Part of subcall function 0029D2F7: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0029C00D,?,?), ref: 0029D314
                                  • Part of subcall function 0029D2F7: _wcslen.LIBCMT ref: 0029D350
                                  • Part of subcall function 0029D2F7: _wcslen.LIBCMT ref: 0029D3C7
                                  • Part of subcall function 0029D2F7: _wcslen.LIBCMT ref: 0029D3FD
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0029C629
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0029C684
                                • RegCloseKey.ADVAPI32(00000000), ref: 0029C6C9
                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0029C6F8
                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0029C752
                                • RegCloseKey.ADVAPI32(?), ref: 0029C75E
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                • String ID:
                                • API String ID: 1120388591-0
                                • Opcode ID: c697af703e136925bd5cc76f82ba5842187d139ee600ae2f1761f23f51f93bb1
                                • Instruction ID: b8c8f2933d8ee9eab4a45002050aeaecd835a232bac7f5c4bf2e30ade599a761
                                • Opcode Fuzzy Hash: c697af703e136925bd5cc76f82ba5842187d139ee600ae2f1761f23f51f93bb1
                                • Instruction Fuzzy Hash: 3A818E71128241AFDB14DF24C884E6ABBF9BF84308F14855CF4598B2A2DB31ED55CF92
                                APIs
                                • VariantInit.OLEAUT32(00000035), ref: 00270049
                                • SysAllocString.OLEAUT32(00000000), ref: 002700F0
                                • VariantCopy.OLEAUT32(002702F4,00000000), ref: 00270119
                                • VariantClear.OLEAUT32(002702F4), ref: 0027013D
                                • VariantCopy.OLEAUT32(002702F4,00000000), ref: 00270141
                                • VariantClear.OLEAUT32(?), ref: 0027014B
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Variant$ClearCopy$AllocInitString
                                • String ID:
                                • API String ID: 3859894641-0
                                • Opcode ID: ccb3b245491bde2f659bad9b09a00c2eeefb6ae34851a3b44a14c855ffc2afc1
                                • Instruction ID: 5aa21e4377c20138aa251949009b178c34c892b5328e0e0bf62b6b0e85b038d4
                                • Opcode Fuzzy Hash: ccb3b245491bde2f659bad9b09a00c2eeefb6ae34851a3b44a14c855ffc2afc1
                                • Instruction Fuzzy Hash: 7D51D435670310EBCF20AF64D8D9A29B3A4AF15310F24D046ED0ADF296DAB09C68CB91
                                APIs
                                  • Part of subcall function 00214154: _wcslen.LIBCMT ref: 00214159
                                  • Part of subcall function 002184B7: _wcslen.LIBCMT ref: 002184CA
                                • GetOpenFileNameW.COMDLG32(00000058), ref: 00289E3F
                                • _wcslen.LIBCMT ref: 00289E60
                                • _wcslen.LIBCMT ref: 00289E87
                                • GetSaveFileNameW.COMDLG32(00000058), ref: 00289EDF
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$FileName$OpenSave
                                • String ID: X
                                • API String ID: 83654149-3081909835
                                • Opcode ID: f98888dc3ba950375daecde51de7fcf88094ff97b84f0ff03007c9a087c3c2b1
                                • Instruction ID: c484328c249cd5f31e75b1e31d7c149525ef883367e553268b8009574e270eb5
                                • Opcode Fuzzy Hash: f98888dc3ba950375daecde51de7fcf88094ff97b84f0ff03007c9a087c3c2b1
                                • Instruction Fuzzy Hash: E6E1D3755243418FC724EF24C881BAAB7E5BF94304F08856DF8898B2A2DB31DD95CF92
                                APIs
                                  • Part of subcall function 00212441: GetWindowLongW.USER32(00000000,000000EB), ref: 00212452
                                • BeginPaint.USER32(?,?,?), ref: 00211AE1
                                • GetWindowRect.USER32(?,?), ref: 00211B45
                                • ScreenToClient.USER32(?,?), ref: 00211B62
                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00211B73
                                • EndPaint.USER32(?,?,?,?,?), ref: 00211BC1
                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0025324B
                                  • Part of subcall function 00211BD9: BeginPath.GDI32(00000000), ref: 00211BF7
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                • String ID:
                                • API String ID: 3050599898-0
                                • Opcode ID: efed7dcb87f2d6fc0b3a3049b4f03129e729761d6ed0f40b9e8a5ecbc26d73f2
                                • Instruction ID: 9a70957c3134da767e30f213fbf4cc9d8d0b93ed2f9b390cc686166036b1960d
                                • Opcode Fuzzy Hash: efed7dcb87f2d6fc0b3a3049b4f03129e729761d6ed0f40b9e8a5ecbc26d73f2
                                • Instruction Fuzzy Hash: BD41E2301143019FD710DF24EC88FB67BE8EB56324F100269FA66CA1A2D77199A9DB61
                                APIs
                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 002810C8
                                • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00281103
                                • EnterCriticalSection.KERNEL32(?), ref: 0028111F
                                • LeaveCriticalSection.KERNEL32(?), ref: 00281198
                                • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 002811AF
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 002811DD
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                • String ID:
                                • API String ID: 3368777196-0
                                • Opcode ID: 52d427b0db050ef1287db9a39fb1d7f7f99fa7cde12c59ebc048b35ed7297b45
                                • Instruction ID: e897dd262406e092d47a2b4d210b03359ba66804224ac8be12f5e4ca43a44990
                                • Opcode Fuzzy Hash: 52d427b0db050ef1287db9a39fb1d7f7f99fa7cde12c59ebc048b35ed7297b45
                                • Instruction Fuzzy Hash: F3414E75910205EBDF04AF54DCC9AAAB778FF44310F1480A5FE089A296DB70DE65DFA0
                                APIs
                                • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0026FB8F,00000000,?,?,00000000,?,002539BC,00000004,00000000,00000000), ref: 002A8BAB
                                • EnableWindow.USER32(?,00000000), ref: 002A8BD1
                                • ShowWindow.USER32(FFFFFFFF,00000000), ref: 002A8C30
                                • ShowWindow.USER32(?,00000004), ref: 002A8C44
                                • EnableWindow.USER32(?,00000001), ref: 002A8C6A
                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 002A8C8E
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$Show$Enable$MessageSend
                                • String ID:
                                • API String ID: 642888154-0
                                • Opcode ID: 3682e084232caa1032659631622c0102502d65c8b71398cca6b25fcefaead07b
                                • Instruction ID: a41bde51ec86eb15561d35150d651936fcff919fa522f5a2ab86a0d9cfc0d9ef
                                • Opcode Fuzzy Hash: 3682e084232caa1032659631622c0102502d65c8b71398cca6b25fcefaead07b
                                • Instruction Fuzzy Hash: E741C774611245FFDB19CF14E889BA17BE5FB07318F185169E6098F2A2CF31A865CF60
                                APIs
                                • GetForegroundWindow.USER32(?,?,00000000), ref: 00292C45
                                  • Part of subcall function 0028EE49: GetWindowRect.USER32(?,?), ref: 0028EE61
                                • GetDesktopWindow.USER32 ref: 00292C6F
                                • GetWindowRect.USER32(00000000), ref: 00292C76
                                • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00292CB2
                                • GetCursorPos.USER32(?), ref: 00292CDE
                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00292D3C
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                • String ID:
                                • API String ID: 2387181109-0
                                • Opcode ID: 179fe52e32c5cc0ee1705fa55e4cab6a6c8aa562c1b967427d34f35c10114222
                                • Instruction ID: 4672150d6e4d477b58ab04ec169ef58c0c327724b6fab82165175114b56b2623
                                • Opcode Fuzzy Hash: 179fe52e32c5cc0ee1705fa55e4cab6a6c8aa562c1b967427d34f35c10114222
                                • Instruction Fuzzy Hash: BC31F072515316ABDB20DF14D848B9EB7A9FF84314F00091AF489A7190CB30E918CBA2
                                APIs
                                • IsWindowVisible.USER32(?), ref: 00275524
                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00275541
                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00275579
                                • _wcslen.LIBCMT ref: 00275597
                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0027559F
                                • _wcsstr.LIBVCRUNTIME ref: 002755A9
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                • String ID:
                                • API String ID: 72514467-0
                                • Opcode ID: 4cbd9e5db800b8fe2f5001f17fe1a8619c06b36b552c5b98e31757ecd8708383
                                • Instruction ID: 296c9453c4e8a4a861a09bf9f86564bbbbaa538ff3b95c922e89daf30e23baff
                                • Opcode Fuzzy Hash: 4cbd9e5db800b8fe2f5001f17fe1a8619c06b36b552c5b98e31757ecd8708383
                                • Instruction Fuzzy Hash: A12129B22246117BEB155F29AC49E7BBBADDF45710F508029F80DC9091EFB4DC5097A0
                                APIs
                                  • Part of subcall function 0021557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00215558,?,?,00254B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 0021559E
                                • _wcslen.LIBCMT ref: 002861D5
                                • CoInitialize.OLE32(00000000), ref: 002862EF
                                • CoCreateInstance.OLE32(002B0CC4,00000000,00000001,002B0B34,?), ref: 00286308
                                • CoUninitialize.OLE32 ref: 00286326
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                • String ID: .lnk
                                • API String ID: 3172280962-24824748
                                • Opcode ID: f023eac0a92362926cf82c4a6b3d8cb575d3dafabe52405c61ec8a703c2e78c2
                                • Instruction ID: a271f4d02f822c822a99900b103c7ede0e445a228c609b43f4c83635219cfb37
                                • Opcode Fuzzy Hash: f023eac0a92362926cf82c4a6b3d8cb575d3dafabe52405c61ec8a703c2e78c2
                                • Instruction Fuzzy Hash: CBD164786142119FC714EF14C488A6ABBF2FF99714F148899F8869B3A1CB31EC55CF92
                                APIs
                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00271D8F
                                • OpenProcessToken.ADVAPI32(00000000), ref: 00271D96
                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00271DA5
                                • CloseHandle.KERNEL32(00000004), ref: 00271DB0
                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00271DDF
                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00271DF3
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                • String ID:
                                • API String ID: 1413079979-0
                                • Opcode ID: d9b7f2a0530f482328b36b239d213b8fe9bcce7fe9f31f62b7b6b136396c1ebb
                                • Instruction ID: 5cfd2a0e63d2e692e831b670fa76ede18ce7731c77521cbd1f5833fab26254e2
                                • Opcode Fuzzy Hash: d9b7f2a0530f482328b36b239d213b8fe9bcce7fe9f31f62b7b6b136396c1ebb
                                • Instruction Fuzzy Hash: 72113A7650020EABDF218FA8ED49FDE7BA9EF49344F048054FA09A2060D7758E65DB60
                                APIs
                                • GetLastError.KERNEL32(?,?,00233709,00233375), ref: 00233720
                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0023372E
                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00233747
                                • SetLastError.KERNEL32(00000000,?,00233709,00233375), ref: 00233799
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorLastValue___vcrt_
                                • String ID:
                                • API String ID: 3852720340-0
                                • Opcode ID: 8292dd4fabe329d0dc7126bd9dfe7925766cec0085041a79f3f488f674e47836
                                • Instruction ID: 7524317758e2df66076afda8372e9728fe510442dc161a59715b83b10ab009c4
                                • Opcode Fuzzy Hash: 8292dd4fabe329d0dc7126bd9dfe7925766cec0085041a79f3f488f674e47836
                                • Instruction Fuzzy Hash: CA0147F3A7A7126EAA24AB757CCD7366F94DB49772F20432AF410451F0EF214F229940
                                APIs
                                • GetLastError.KERNEL32(?,00000000,00234D73,00000000,?,?,00236902,?,?,00000000), ref: 00243108
                                • _free.LIBCMT ref: 0024313B
                                • _free.LIBCMT ref: 00243163
                                • SetLastError.KERNEL32(00000000,?,00000000), ref: 00243170
                                • SetLastError.KERNEL32(00000000,?,00000000), ref: 0024317C
                                • _abort.LIBCMT ref: 00243182
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorLast$_free$_abort
                                • String ID:
                                • API String ID: 3160817290-0
                                • Opcode ID: 960be922bdab79ef4384377cebf142f94fe2bc2363e50393e60c980e80d151d0
                                • Instruction ID: 32486a0e06b22a17cfb74c635bb27ad1374b7aac8e149897c108c015006423dc
                                • Opcode Fuzzy Hash: 960be922bdab79ef4384377cebf142f94fe2bc2363e50393e60c980e80d151d0
                                • Instruction Fuzzy Hash: 96F02832974902A7C71EB735BC0EE1E22699FC9770F650825F42DD21D1EF608E364921
                                APIs
                                  • Part of subcall function 00211ED9: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00211F33
                                  • Part of subcall function 00211ED9: SelectObject.GDI32(?,00000000), ref: 00211F42
                                  • Part of subcall function 00211ED9: BeginPath.GDI32(?), ref: 00211F59
                                  • Part of subcall function 00211ED9: SelectObject.GDI32(?,00000000), ref: 00211F82
                                • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 002A93AD
                                • LineTo.GDI32(?,00000003,00000000), ref: 002A93C1
                                • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 002A93CF
                                • LineTo.GDI32(?,00000000,00000003), ref: 002A93DF
                                • EndPath.GDI32(?), ref: 002A93EF
                                • StrokePath.GDI32(?), ref: 002A93FF
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                • String ID:
                                • API String ID: 43455801-0
                                • Opcode ID: 376595d5f236f91fdff2df9270a02bf3d01a1d5c6047db98e2f6a44bfb7c6794
                                • Instruction ID: 7565399976de35f9720c42416a7a3b5d1e679302e0831e0a6455e7907513c6bc
                                • Opcode Fuzzy Hash: 376595d5f236f91fdff2df9270a02bf3d01a1d5c6047db98e2f6a44bfb7c6794
                                • Instruction Fuzzy Hash: 91111B7200014DFFDF029F91EC8CE9A7FADEB09350F008011BA0A5A1A1DB71AD66DFA0
                                APIs
                                • GetDC.USER32(00000000), ref: 00275AA7
                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00275AB8
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00275ABF
                                • ReleaseDC.USER32(00000000,00000000), ref: 00275AC7
                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00275ADE
                                • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00275AF0
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CapsDevice$Release
                                • String ID:
                                • API String ID: 1035833867-0
                                • Opcode ID: dd2cef1218de709a86b5b753a4769fd61f86274af6d6adbb68f298dc5b5d339d
                                • Instruction ID: b80174ff5361a1a0a327b65c2cdfbdf763c4735a7d81a60a300770bcbcc731da
                                • Opcode Fuzzy Hash: dd2cef1218de709a86b5b753a4769fd61f86274af6d6adbb68f298dc5b5d339d
                                • Instruction Fuzzy Hash: AD014475E00715BBEB109FA5AC49B8EBF78EB49751F008065FA09A7280DA70D811CF50
                                APIs
                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00213236
                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 0021323E
                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00213249
                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00213254
                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 0021325C
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00213264
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Virtual
                                • String ID:
                                • API String ID: 4278518827-0
                                • Opcode ID: 93385147eb335cd39be762f1bb294200db67c22051d9a827790dfea468ed5d26
                                • Instruction ID: c7331787ce881060b6751ffb6d19da4878ab9fc84c5303090da5ad402f1f8070
                                • Opcode Fuzzy Hash: 93385147eb335cd39be762f1bb294200db67c22051d9a827790dfea468ed5d26
                                • Instruction Fuzzy Hash: 400167B0902B5ABDE3008F6A8C85B52FFA8FF19754F00411BA15C4BA42C7F5A864CBE5
                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0027F35C
                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0027F372
                                • GetWindowThreadProcessId.USER32(?,?), ref: 0027F381
                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0027F390
                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0027F39A
                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0027F3A1
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                • String ID:
                                • API String ID: 839392675-0
                                • Opcode ID: 055cd607589580296aa1fc3b5a3d52e5f3c3357794ba17eded5160af102e9721
                                • Instruction ID: cdc1a5870df4c8055e4447ea17062c22a2741a38723f7077dd9296ce31e5d608
                                • Opcode Fuzzy Hash: 055cd607589580296aa1fc3b5a3d52e5f3c3357794ba17eded5160af102e9721
                                • Instruction Fuzzy Hash: 59F03036241154BBE7215B62AC0DEEF7B7CDFC7B11F000058F60691090DBA05A01D6B5
                                APIs
                                • GetClientRect.USER32(?), ref: 002534B3
                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 002534CA
                                • GetWindowDC.USER32(?), ref: 002534D6
                                • GetPixel.GDI32(00000000,?,?), ref: 002534E5
                                • ReleaseDC.USER32(?,00000000), ref: 002534F7
                                • GetSysColor.USER32(00000005), ref: 00253511
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                • String ID:
                                • API String ID: 272304278-0
                                • Opcode ID: 394c678d59a68c2afc5bf46a8d8e17362d15ab77433111ef5005aea25fc926ee
                                • Instruction ID: f193e6cecea9c980f2a0f2a40bf4d7e456986136188b0eac92c3f7f3bcc00161
                                • Opcode Fuzzy Hash: 394c678d59a68c2afc5bf46a8d8e17362d15ab77433111ef5005aea25fc926ee
                                • Instruction Fuzzy Hash: 24015A71810209EFDB119F60EC48BEA7BB9FB09311F9111A4F916A21A1CF311E65AF11
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0027210F
                                • UnloadUserProfile.USERENV(?,?), ref: 0027211B
                                • CloseHandle.KERNEL32(?), ref: 00272124
                                • CloseHandle.KERNEL32(?), ref: 0027212C
                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00272135
                                • HeapFree.KERNEL32(00000000), ref: 0027213C
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                • String ID:
                                • API String ID: 146765662-0
                                • Opcode ID: cb3f265c071654fd6c52e8fea0f0cf6ad551e800d35bfe6ada1fa559798b0514
                                • Instruction ID: 23e0e25d50d5ab4b4a2e93f372af2fc6017ae65bf9cbbf0b881ca84f7a5a79b9
                                • Opcode Fuzzy Hash: cb3f265c071654fd6c52e8fea0f0cf6ad551e800d35bfe6ada1fa559798b0514
                                • Instruction Fuzzy Hash: 17E0757A104505FBDB011FA5FD0C94ABF79FF4A722B504625F22A82870DF329461DF51
                                APIs
                                  • Part of subcall function 00214154: _wcslen.LIBCMT ref: 00214159
                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0027CEAE
                                • _wcslen.LIBCMT ref: 0027CEF5
                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0027CF5C
                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0027CF8A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ItemMenu$Info_wcslen$Default
                                • String ID: 0
                                • API String ID: 1227352736-4108050209
                                • Opcode ID: fcf4a7501cd42bf4cb99afd3f667af9c5d24ce7c6b888c2c54b6a3c0f5a04d10
                                • Instruction ID: aed3c80acecda6a8f2b24f29b08e0f0e0cc2cc9cc9243f4b33e0215bb32ea249
                                • Opcode Fuzzy Hash: fcf4a7501cd42bf4cb99afd3f667af9c5d24ce7c6b888c2c54b6a3c0f5a04d10
                                • Instruction Fuzzy Hash: 535104716343029BD714DF38C884B6BB7E9AF99310F24892EF89DD6590DB70C9648B53
                                APIs
                                • ShellExecuteExW.SHELL32(0000003C), ref: 0029B802
                                  • Part of subcall function 00214154: _wcslen.LIBCMT ref: 00214159
                                • GetProcessId.KERNEL32(00000000), ref: 0029B897
                                • CloseHandle.KERNEL32(00000000), ref: 0029B8C6
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CloseExecuteHandleProcessShell_wcslen
                                • String ID: <$@
                                • API String ID: 146682121-1426351568
                                • Opcode ID: 72c5bc1accf31112767fcad85d4fec10e0966d81de6cb143bea7d766487df6c8
                                • Instruction ID: 66b656323ee09b60d63345af6b86fa0f87a0f0c96c690b8ae9705d49d79e3484
                                • Opcode Fuzzy Hash: 72c5bc1accf31112767fcad85d4fec10e0966d81de6cb143bea7d766487df6c8
                                • Instruction Fuzzy Hash: 54715675A10219DFCF11DF94D584A9EBBF5BF08310F048499E859AB362CB70AD95CF90
                                APIs
                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00277A95
                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00277ACB
                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00277ADC
                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00277B5E
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorMode$AddressCreateInstanceProc
                                • String ID: DllGetClassObject
                                • API String ID: 753597075-1075368562
                                • Opcode ID: 3daf01884889700e191ed00043866660dd1548d14a3e9a0b9f8b805a63695678
                                • Instruction ID: 709ded84a3623e73059b3f53f3af1dea311202408b9179544a83a2a21e246146
                                • Opcode Fuzzy Hash: 3daf01884889700e191ed00043866660dd1548d14a3e9a0b9f8b805a63695678
                                • Instruction Fuzzy Hash: FB419D71614208EFDB05CF64C884A9A7BB9EF49318F14D0AEAD09DF246D7B0DD64CBA0
                                APIs
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002A4794
                                • IsMenu.USER32(?), ref: 002A47A9
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 002A47F1
                                • DrawMenuBar.USER32 ref: 002A4804
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Menu$Item$DrawInfoInsert
                                • String ID: 0
                                • API String ID: 3076010158-4108050209
                                • Opcode ID: c8c644c46453fcc18cb86b14c0b266ab864967c3a2a933810f7955d4f98263d7
                                • Instruction ID: 7b74df7b44c3dd1e28f5a0d5c48b699b1945de8f7db3702d2040a718c42e5461
                                • Opcode Fuzzy Hash: c8c644c46453fcc18cb86b14c0b266ab864967c3a2a933810f7955d4f98263d7
                                • Instruction Fuzzy Hash: 15415D75A2124AEFDB20DF54EC84EAAB7B8FF86314F144129E90597250CBB4ED64CF50
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                  • Part of subcall function 00274536: GetClassNameW.USER32(?,?,000000FF), ref: 00274559
                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 002726F6
                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00272709
                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00272739
                                  • Part of subcall function 002184B7: _wcslen.LIBCMT ref: 002184CA
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$_wcslen$ClassName
                                • String ID: ComboBox$ListBox
                                • API String ID: 2081771294-1403004172
                                • Opcode ID: e7f902fd16b2de1d0e722a1b9df504f7a170521182f2521aafd66c31abe4c486
                                • Instruction ID: 6edeeea55b2bc30fc3ba4e8dc2ff5c6f8c8b1e75330c866aded0587d27149e7e
                                • Opcode Fuzzy Hash: e7f902fd16b2de1d0e722a1b9df504f7a170521182f2521aafd66c31abe4c486
                                • Instruction Fuzzy Hash: 7321F671920105BBDB18ABA0DD89CFEB7B8DF52754B14811AF425A31E1CF784D6A9A20
                                APIs
                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 002A38EC
                                • LoadLibraryW.KERNEL32(?), ref: 002A38F3
                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 002A3908
                                • DestroyWindow.USER32(?), ref: 002A3910
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$DestroyLibraryLoadWindow
                                • String ID: SysAnimate32
                                • API String ID: 3529120543-1011021900
                                • Opcode ID: d37f488515cbfd2bf9339cdd9342adb8b472fdc52e3bd75d41a6a7066d24c650
                                • Instruction ID: 9203482cd2b984565f3d26455f7cd6dcb7c570ec7d470b23998ba4324a08927b
                                • Opcode Fuzzy Hash: d37f488515cbfd2bf9339cdd9342adb8b472fdc52e3bd75d41a6a7066d24c650
                                • Instruction Fuzzy Hash: 9B21F37152020AAFEF108F64DC84EBB77ADEB56364F100218FA11A31A0DBB0DD619760
                                APIs
                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,002350AE,?,?,0023504E,?,002D98D8,0000000C,002351A5,?,00000002), ref: 0023511D
                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00235130
                                • FreeLibrary.KERNEL32(00000000,?,?,?,002350AE,?,?,0023504E,?,002D98D8,0000000C,002351A5,?,00000002,00000000), ref: 00235153
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: AddressFreeHandleLibraryModuleProc
                                • String ID: CorExitProcess$mscoree.dll
                                • API String ID: 4061214504-1276376045
                                • Opcode ID: b587965709b728be97900f406cd9c0a5b0a6bf404af9e0b5e278fbe8243d7442
                                • Instruction ID: d2be181510ab0f17878257c5854ebc99d4fc25240f4719415491eff9acda164b
                                • Opcode Fuzzy Hash: b587965709b728be97900f406cd9c0a5b0a6bf404af9e0b5e278fbe8243d7442
                                • Instruction Fuzzy Hash: 4AF0AF70A10218BFDB109F90EC4DBEDBBB8EF05752F0000A4F80EA2160CF308D60DA90
                                APIs
                                • LoadLibraryA.KERNEL32 ref: 0026E72B
                                • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0026E73D
                                • FreeLibrary.KERNEL32(00000000), ref: 0026E763
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Library$AddressFreeLoadProc
                                • String ID: GetSystemWow64DirectoryW$X64
                                • API String ID: 145871493-2590602151
                                • Opcode ID: d242a2fdda370ebb6c11fa9f41480e631722ec3d224980a0d65740f543330da5
                                • Instruction ID: 264e2d7d5e2b106c6da4ccc2a584b345e9791bae392f7ceecbc0c14327b68581
                                • Opcode Fuzzy Hash: d242a2fdda370ebb6c11fa9f41480e631722ec3d224980a0d65740f543330da5
                                • Instruction Fuzzy Hash: 7BF0E575C315619FDF731F209C4CAA9762CAF12700F160494F846A6460DF60CDB8C684
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,0021637F,?,?,002160AA,?,00000001,?,?,00000000), ref: 0021633E
                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00216350
                                • FreeLibrary.KERNEL32(00000000,?,?,0021637F,?,?,002160AA,?,00000001,?,?,00000000), ref: 00216362
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Library$AddressFreeLoadProc
                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                • API String ID: 145871493-3689287502
                                • Opcode ID: f3de99f19dd2839786b8e43b05677d2fa0fccecdeec757699fc95aed24575127
                                • Instruction ID: eb041d70d353ef0d91ad77983c4dc48676d170b16d051fc109c9cf4862051853
                                • Opcode Fuzzy Hash: f3de99f19dd2839786b8e43b05677d2fa0fccecdeec757699fc95aed24575127
                                • Instruction Fuzzy Hash: DCE0CD32611B231793112B157C0CBDE66599FA3F237060155F905D2210DF70CD52C0F0
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,002554C3,?,?,002160AA,?,00000001,?,?,00000000), ref: 00216304
                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00216316
                                • FreeLibrary.KERNEL32(00000000,?,?,002554C3,?,?,002160AA,?,00000001,?,?,00000000), ref: 00216329
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Library$AddressFreeLoadProc
                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                • API String ID: 145871493-1355242751
                                • Opcode ID: 5d5ab4b83f02d73c31b56b074112ee22a896f545c006255a9a0d84217343b5cb
                                • Instruction ID: ba2c1065c1bb3d56a6eff4128074a6cd2ae9da61a57fcd10b2ea146b2b7045f3
                                • Opcode Fuzzy Hash: 5d5ab4b83f02d73c31b56b074112ee22a896f545c006255a9a0d84217343b5cb
                                • Instruction Fuzzy Hash: CCD012356625625743222B25BC1C9CE7E55DE97F213850159F816A2528CF60CD6185A0
                                APIs
                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002834D9
                                • DeleteFileW.KERNEL32(?), ref: 0028355B
                                • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00283571
                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00283582
                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00283594
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: File$Delete$Copy
                                • String ID:
                                • API String ID: 3226157194-0
                                • Opcode ID: 74572a99c6338f932d52f0215c10d38d315b2d6d907190342a9074bd8499eda1
                                • Instruction ID: 1a6e5a0bd5f02733bf4b87aab3ef8c8cd81bebb520657d9f543a2318304a1859
                                • Opcode Fuzzy Hash: 74572a99c6338f932d52f0215c10d38d315b2d6d907190342a9074bd8499eda1
                                • Instruction Fuzzy Hash: CBB16CB2D11119ABDF11EFA4CC85EDEBBBDEF59714F0040A6F909A6181EA309B548F60
                                APIs
                                • GetCurrentProcessId.KERNEL32 ref: 0029AD86
                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0029AD94
                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0029ADC7
                                • CloseHandle.KERNEL32(?), ref: 0029AF9C
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Process$CloseCountersCurrentHandleOpen
                                • String ID:
                                • API String ID: 3488606520-0
                                • Opcode ID: e9b923ce004aa6e6f8e587d769a3214a1f71c3268d3196025e4f00b63a1d540f
                                • Instruction ID: 99fc62acac957538986fc8a460f542c8c7a7e2a2ad0e31f91d387af4b521d196
                                • Opcode Fuzzy Hash: e9b923ce004aa6e6f8e587d769a3214a1f71c3268d3196025e4f00b63a1d540f
                                • Instruction Fuzzy Hash: 93A1D0B1610301AFDB20DF28C886F2AB7E5AF54710F14885DF9999B692DB71EC50CF82
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                  • Part of subcall function 0029D2F7: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0029C00D,?,?), ref: 0029D314
                                  • Part of subcall function 0029D2F7: _wcslen.LIBCMT ref: 0029D350
                                  • Part of subcall function 0029D2F7: _wcslen.LIBCMT ref: 0029D3C7
                                  • Part of subcall function 0029D2F7: _wcslen.LIBCMT ref: 0029D3FD
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0029C404
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0029C45F
                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0029C4C2
                                • RegCloseKey.ADVAPI32(?,?), ref: 0029C505
                                • RegCloseKey.ADVAPI32(00000000), ref: 0029C512
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                • String ID:
                                • API String ID: 826366716-0
                                • Opcode ID: 055c2e0a79fbfbc9575bd9f69c4fe99f46c1277ffb055ebe5770de3cb0024a05
                                • Instruction ID: a92863a3137a1f1767b56a4b408e46fbea982e3602860120535fa55aa01c9187
                                • Opcode Fuzzy Hash: 055c2e0a79fbfbc9575bd9f69c4fe99f46c1277ffb055ebe5770de3cb0024a05
                                • Instruction Fuzzy Hash: 9C61A031228241AFD714DF24C494E6ABBE5FF84308F64849CF45A8B2A2CB31ED55CF92
                                APIs
                                  • Part of subcall function 0027E60C: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0027D6E2,?), ref: 0027E629
                                  • Part of subcall function 0027E60C: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0027D6E2,?), ref: 0027E642
                                  • Part of subcall function 0027E9C5: GetFileAttributesW.KERNEL32(?,0027D755), ref: 0027E9C6
                                • lstrcmpiW.KERNEL32(?,?), ref: 0027EC9F
                                • MoveFileW.KERNEL32(?,?), ref: 0027ECD8
                                • _wcslen.LIBCMT ref: 0027EE17
                                • _wcslen.LIBCMT ref: 0027EE2F
                                • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0027EE7C
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                • String ID:
                                • API String ID: 3183298772-0
                                • Opcode ID: 4434ea7a7b83535f221208c1644524c1fb1c69455f42cda17358dbf038bc0cff
                                • Instruction ID: 2376903158d3c61c7e6494d19488df1c5f9bff7ad93e34b6a538a35d8fc4b4e6
                                • Opcode Fuzzy Hash: 4434ea7a7b83535f221208c1644524c1fb1c69455f42cda17358dbf038bc0cff
                                • Instruction Fuzzy Hash: 7A5185B24183859BC735EF60D8819DBB3ECAF99310F00496EF589D3151EF70A698CB66
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 0027945C
                                • VariantClear.OLEAUT32 ref: 002794CD
                                • VariantClear.OLEAUT32 ref: 0027952C
                                • VariantClear.OLEAUT32(?), ref: 0027959F
                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 002795CA
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Variant$Clear$ChangeInitType
                                • String ID:
                                • API String ID: 4136290138-0
                                • Opcode ID: f906083e8c87f43c363fcf9c478a723a03d3a87f36dedaf936ead9ecaaec371c
                                • Instruction ID: beca0308b8d8a34078a4a64724d1e91fb84fab65e9a5c28c613f10bd9721be0f
                                • Opcode Fuzzy Hash: f906083e8c87f43c363fcf9c478a723a03d3a87f36dedaf936ead9ecaaec371c
                                • Instruction Fuzzy Hash: 445159B5A1061AEFDB10CF58C884AAAB7F9FF8D314B058559F90ADB310D730E961CB90
                                APIs
                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00289508
                                • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00289534
                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0028958C
                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 002895B1
                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 002895B9
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: PrivateProfile$SectionWrite$String
                                • String ID:
                                • API String ID: 2832842796-0
                                • Opcode ID: 130bcd14d2bdfe7776e6b5b22d9583d300367841dee4ae1098d48a655a9783ad
                                • Instruction ID: e17e2384c05fbbc0cac1ec08aaa6458659ed3a3e9d477bfabf720fe9d0fe2849
                                • Opcode Fuzzy Hash: 130bcd14d2bdfe7776e6b5b22d9583d300367841dee4ae1098d48a655a9783ad
                                • Instruction Fuzzy Hash: D4515E39A102159FDB11DF64C884AADBBF5FF49314F088058E9496B3A2CB35ED91CF90
                                APIs
                                • LoadLibraryW.KERNEL32(?,00000000,?), ref: 0029989F
                                • GetProcAddress.KERNEL32(00000000,?), ref: 0029992F
                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0029994B
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00299991
                                • FreeLibrary.KERNEL32(00000000), ref: 002999B1
                                  • Part of subcall function 0022F9E2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00281917,?,7529E610), ref: 0022F9FF
                                  • Part of subcall function 0022F9E2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,002702F4,00000000,00000000,?,?,00281917,?,7529E610,?,002702F4), ref: 0022FA26
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                • String ID:
                                • API String ID: 666041331-0
                                • Opcode ID: ffe4fd4c9eb92ef394833742d93aa7c42b44a55383ff049ca33bdb5b0cf34ea8
                                • Instruction ID: 530158ba0b84b1ae690878a8ea925726160ada23b378be4660ead97c8219da4f
                                • Opcode Fuzzy Hash: ffe4fd4c9eb92ef394833742d93aa7c42b44a55383ff049ca33bdb5b0cf34ea8
                                • Instruction Fuzzy Hash: FD514835A10205DFCB01EF68C4949A9BBF4FF19324B1480ADE81A9B762DB31ED95CF91
                                APIs
                                • SetWindowLongW.USER32(00000002,000000F0,?), ref: 002A7592
                                • SetWindowLongW.USER32(?,000000EC,?), ref: 002A75A9
                                • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 002A75D2
                                • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0028B4D6,00000000,00000000), ref: 002A75F7
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 002A7626
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$Long$MessageSendShow
                                • String ID:
                                • API String ID: 3688381893-0
                                • Opcode ID: 9f1ddbfd4a3ffb72397eefa136381be97e1ba617b453c55eef8a68e0bdaa03ad
                                • Instruction ID: 11e70baaa3ad1fbcb4ff691e3a0d166568b42dcc2b579a4d5551db15c1629a35
                                • Opcode Fuzzy Hash: 9f1ddbfd4a3ffb72397eefa136381be97e1ba617b453c55eef8a68e0bdaa03ad
                                • Instruction Fuzzy Hash: 5941C235E28145AFD729CF68DC48BA67BA5EB0B310F540224FD19A72E1CF70ED60DA54
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: b3564537a31dae37cf08f0df951a1dc71b28a7af7627c2361ef7e9f61fae5344
                                • Instruction ID: 6c010c1ea58d97ba94d830933328bf16ddd81d1ce39a9ce97780b0957e12ba23
                                • Opcode Fuzzy Hash: b3564537a31dae37cf08f0df951a1dc71b28a7af7627c2361ef7e9f61fae5344
                                • Instruction Fuzzy Hash: 3841FF72E20200DFCB28DF79C880A59B7E5EF88314F9541A9F915EB291DA70ED15CB80
                                APIs
                                • GetCursorPos.USER32(?), ref: 002119E1
                                • ScreenToClient.USER32(00000000,?), ref: 002119FE
                                • GetAsyncKeyState.USER32(00000001), ref: 00211A23
                                • GetAsyncKeyState.USER32(00000002), ref: 00211A3D
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: AsyncState$ClientCursorScreen
                                • String ID:
                                • API String ID: 4210589936-0
                                • Opcode ID: 79f2755b47f7638aed43d56dd0244f915104d443e424456be068acfd29349473
                                • Instruction ID: b164aea1a93b3dd4a64a74d843b2b89aaba2c2c15b2fa846866d85d341c2f157
                                • Opcode Fuzzy Hash: 79f2755b47f7638aed43d56dd0244f915104d443e424456be068acfd29349473
                                • Instruction Fuzzy Hash: 0F41727191451AFBDF05DF68D844BEEBBB4FF05320F108216E929A2290CB706AA4CF95
                                APIs
                                • GetInputState.USER32 ref: 00284225
                                • TranslateAcceleratorW.USER32(?,00000000,?), ref: 0028427C
                                • TranslateMessage.USER32(?), ref: 002842A5
                                • DispatchMessageW.USER32(?), ref: 002842AF
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002842C0
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                • String ID:
                                • API String ID: 2256411358-0
                                • Opcode ID: 8c22877fa6d976ee8ff3d2b8282fed06aeb3fcd29c11adeb9287f32a32315a9f
                                • Instruction ID: 9d5c74af68155c15cfa6c7b016b1fc909c047a6314d1c7a84206a9fc7ba06aff
                                • Opcode Fuzzy Hash: 8c22877fa6d976ee8ff3d2b8282fed06aeb3fcd29c11adeb9287f32a32315a9f
                                • Instruction Fuzzy Hash: D131D834965287DFEB34FF64AC4CBB677ACEB01305F1405ADE863861E0E7A49498CB21
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 002721A5
                                • PostMessageW.USER32(00000001,00000201,00000001), ref: 00272251
                                • Sleep.KERNEL32(00000000,?,?,?), ref: 00272259
                                • PostMessageW.USER32(00000001,00000202,00000000), ref: 0027226A
                                • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00272272
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessagePostSleep$RectWindow
                                • String ID:
                                • API String ID: 3382505437-0
                                • Opcode ID: 3db52aa82dd3e4db0d6a0e9172ba18dfd6cbefac27feecf6df985f62fc119b49
                                • Instruction ID: a5bb4db94af6fc6052faf303c7ae8ffc6e8b214d706cf4792a8725e3976d6a86
                                • Opcode Fuzzy Hash: 3db52aa82dd3e4db0d6a0e9172ba18dfd6cbefac27feecf6df985f62fc119b49
                                • Instruction Fuzzy Hash: E631CF7191021AEFDB04CFA8DD89ADE3BB5EB15314F108225FE29A72D1C770E954CB90
                                APIs
                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0028CB7B,00000000), ref: 0028D895
                                • InternetReadFile.WININET(?,00000000,?,?), ref: 0028D8CC
                                • GetLastError.KERNEL32(?,00000000,?,?,?,0028CB7B,00000000), ref: 0028D911
                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,0028CB7B,00000000), ref: 0028D925
                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,0028CB7B,00000000), ref: 0028D94F
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                • String ID:
                                • API String ID: 3191363074-0
                                • Opcode ID: 100956c4d58946f61458ebb24c1cd0c4d1926ab356c1f48f4552fdb6d5067a2a
                                • Instruction ID: 853bc00e3c94dde6d5cc4d5ce96a7511a850bcf045cf5cdf8abd225a151c9356
                                • Opcode Fuzzy Hash: 100956c4d58946f61458ebb24c1cd0c4d1926ab356c1f48f4552fdb6d5067a2a
                                • Instruction Fuzzy Hash: 61318E75921306EFDB20EFA5D888AAFB7F8EF05354B10442EE546D2580EB30EE55DB60
                                APIs
                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 002A60A4
                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 002A60FC
                                • _wcslen.LIBCMT ref: 002A610E
                                • _wcslen.LIBCMT ref: 002A6119
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 002A6175
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$_wcslen
                                • String ID:
                                • API String ID: 763830540-0
                                • Opcode ID: 573ceb0e17461c2e493df6cef4976ed2d5ade55811a66be999a9ed0d15f4b02e
                                • Instruction ID: b7fdd2f23583262bdbb8aa1cd8e57d2118012207e7faf12726ff05cc4636566e
                                • Opcode Fuzzy Hash: 573ceb0e17461c2e493df6cef4976ed2d5ade55811a66be999a9ed0d15f4b02e
                                • Instruction Fuzzy Hash: 7821A571920619ABDF109FA4DC88AEEBBB8FF06314F144217F925EA180DF709595CF50
                                APIs
                                • IsWindow.USER32(00000000), ref: 002912AE
                                • GetForegroundWindow.USER32 ref: 002912C5
                                • GetDC.USER32(00000000), ref: 00291301
                                • GetPixel.GDI32(00000000,?,00000003), ref: 0029130D
                                • ReleaseDC.USER32(00000000,00000003), ref: 00291345
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$ForegroundPixelRelease
                                • String ID:
                                • API String ID: 4156661090-0
                                • Opcode ID: f262a19c42802184f4a7034a6d93fd767c5bdcbe03c9651237e1a62f5f3b5bc3
                                • Instruction ID: f5774bd935a598de32fb1bb688097b4ed74bbcd2013a711196e09c58a5415189
                                • Opcode Fuzzy Hash: f262a19c42802184f4a7034a6d93fd767c5bdcbe03c9651237e1a62f5f3b5bc3
                                • Instruction Fuzzy Hash: 8B21C07AA10214AFDB04EF65EC88AAEB7F8FF49300B048468E94AD7751CA30EC54CF50
                                APIs
                                • GetEnvironmentStringsW.KERNEL32 ref: 0024D166
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0024D189
                                  • Part of subcall function 00243BB0: RtlAllocateHeap.NTDLL(00000000,?,?,?,00236A99,?,0000015D,?,?,?,?,002385D0,000000FF,00000000,?,?), ref: 00243BE2
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0024D1AF
                                • _free.LIBCMT ref: 0024D1C2
                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0024D1D1
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                • String ID:
                                • API String ID: 336800556-0
                                • Opcode ID: 0b5def124a03d9bb37392134dc8e068ebaebe750f180b8c018a2b2ee676cb669
                                • Instruction ID: 9721988185f4a1bdb8bdd843951660f940dc013ad3af59b31a61418d030bbcce
                                • Opcode Fuzzy Hash: 0b5def124a03d9bb37392134dc8e068ebaebe750f180b8c018a2b2ee676cb669
                                • Instruction Fuzzy Hash: 0201D6726216167F27256ABA6C8CD7F7A6DDEC7FA1314012AFD0DC7240DF618C1295B0
                                APIs
                                • GetLastError.KERNEL32(0000000A,?,?,0023F66E,0023547F,0000000A,?,00000000,00000000,?,00000000,?,?,?,0000000A,00000000), ref: 0024318D
                                • _free.LIBCMT ref: 002431C2
                                • _free.LIBCMT ref: 002431E9
                                • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 002431F6
                                • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 002431FF
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorLast$_free
                                • String ID:
                                • API String ID: 3170660625-0
                                • Opcode ID: 4697cf751ec5dd9808b05e75fa66be5d239ac5ba27410d851bba7cbb0c6a4ee2
                                • Instruction ID: c991700a04db6d43c9a4a686eefaf41be84bd5483543e0d994fc9f943ac12a05
                                • Opcode Fuzzy Hash: 4697cf751ec5dd9808b05e75fa66be5d239ac5ba27410d851bba7cbb0c6a4ee2
                                • Instruction Fuzzy Hash: DE01F972671902B7871AE7356C4AD2B266DDFC53707610425F41ED2191EEB0CD365920
                                APIs
                                • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,002707D1,80070057,?,?,?,00270BEE), ref: 002708BB
                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002707D1,80070057,?,?), ref: 002708D6
                                • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002707D1,80070057,?,?), ref: 002708E4
                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002707D1,80070057,?), ref: 002708F4
                                • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,002707D1,80070057,?,?), ref: 00270900
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                • String ID:
                                • API String ID: 3897988419-0
                                • Opcode ID: 9e1c05380945250b0931bfdfbdc1c42e104675c546f8621f36686d94b45d81cc
                                • Instruction ID: 5686829265fed10c99717af75443fcf5cd9e659af7ce8538cbd47474f30e0e6a
                                • Opcode Fuzzy Hash: 9e1c05380945250b0931bfdfbdc1c42e104675c546f8621f36686d94b45d81cc
                                • Instruction Fuzzy Hash: 9101A772610205FFEB104F64DC48F9A7AFDEF45751F108014F90AD2211DB74ED159BA0
                                APIs
                                • QueryPerformanceCounter.KERNEL32(?), ref: 0027F1C3
                                • QueryPerformanceFrequency.KERNEL32(?), ref: 0027F1D1
                                • Sleep.KERNEL32(00000000), ref: 0027F1D9
                                • QueryPerformanceCounter.KERNEL32(?), ref: 0027F1E3
                                • Sleep.KERNEL32 ref: 0027F21F
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                • String ID:
                                • API String ID: 2833360925-0
                                • Opcode ID: e99fe34d562ed5a1cc93f7058b2d5c64350a5a3ae3149b11f87e4038e325c68c
                                • Instruction ID: beca533d8e91ef83700c17cd59747ce5a2fb9e8c7599e61c137332e94034817c
                                • Opcode Fuzzy Hash: e99fe34d562ed5a1cc93f7058b2d5c64350a5a3ae3149b11f87e4038e325c68c
                                • Instruction Fuzzy Hash: 65016935C14619DBCF00AFA4EE4DAEEBB78FB09301F014065E90AB2151CF309564CB65
                                APIs
                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 002719A4
                                • GetLastError.KERNEL32(?,00000000,00000000,?,?,0027142B,?,?,?), ref: 002719B0
                                • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,0027142B,?,?,?), ref: 002719BF
                                • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,0027142B,?,?,?), ref: 002719C6
                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 002719DD
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 842720411-0
                                • Opcode ID: 27941c0f67ac5901010e7cc9008d57d10f190c8c990ccd944d883bd9c3ce74e4
                                • Instruction ID: fa1235b01a84ec3de5f42256530ffcac993fa9b095f28feeb1c45feb965e3535
                                • Opcode Fuzzy Hash: 27941c0f67ac5901010e7cc9008d57d10f190c8c990ccd944d883bd9c3ce74e4
                                • Instruction Fuzzy Hash: 340181B5200206FFDB114FA9EC4DE6A3B7EEF8A360B114455F94AC3260DE31DC508A60
                                APIs
                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0027185A
                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00271866
                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00271875
                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0027187C
                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00271892
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 44706859-0
                                • Opcode ID: b00b6c6ca11f6990cf9f6ac227898d71e2b7d53ce63a560dd69162fe4dd0627d
                                • Instruction ID: 39e44fcf143369dc1df2fc6ead60a1e7a2ca9d3cbdd576e8aacfcc348dd3c22f
                                • Opcode Fuzzy Hash: b00b6c6ca11f6990cf9f6ac227898d71e2b7d53ce63a560dd69162fe4dd0627d
                                • Instruction Fuzzy Hash: E8F06279240311BBDB110F68EC4DF563B6DEF8A761F104454F94AC7250DE71DC108A60
                                APIs
                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 002718BA
                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 002718C6
                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 002718D5
                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 002718DC
                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 002718F2
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 44706859-0
                                • Opcode ID: 42dd55e4f39fd214a96bdfcc25ee84696fb4efa4fc36ab9820031f5538310e14
                                • Instruction ID: b96e101c12070ec03176d366bd9f39e84cbb902a88f104cd786936d5a6ac8268
                                • Opcode Fuzzy Hash: 42dd55e4f39fd214a96bdfcc25ee84696fb4efa4fc36ab9820031f5538310e14
                                • Instruction Fuzzy Hash: 97F06279200312BBDB114F68EC4DF563B6DEF8A761F104414F94AC7250DE70D9508A60
                                APIs
                                • CloseHandle.KERNEL32(?,?,?,?,00280A39,?,00283C56,?,00000001,00253ACE,?), ref: 00280BE0
                                • CloseHandle.KERNEL32(?,?,?,?,00280A39,?,00283C56,?,00000001,00253ACE,?), ref: 00280BED
                                • CloseHandle.KERNEL32(?,?,?,?,00280A39,?,00283C56,?,00000001,00253ACE,?), ref: 00280BFA
                                • CloseHandle.KERNEL32(?,?,?,?,00280A39,?,00283C56,?,00000001,00253ACE,?), ref: 00280C07
                                • CloseHandle.KERNEL32(?,?,?,?,00280A39,?,00283C56,?,00000001,00253ACE,?), ref: 00280C14
                                • CloseHandle.KERNEL32(?,?,?,?,00280A39,?,00283C56,?,00000001,00253ACE,?), ref: 00280C21
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CloseHandle
                                • String ID:
                                • API String ID: 2962429428-0
                                • Opcode ID: d0ff862b9895f520eb8fd261f4ad1bb62875cb7d16c022c0a42366607c30533e
                                • Instruction ID: 484d5bba14831d22a8b760a8d577ead95612a32b2f9378d1f5efae01a3e1674f
                                • Opcode Fuzzy Hash: d0ff862b9895f520eb8fd261f4ad1bb62875cb7d16c022c0a42366607c30533e
                                • Instruction Fuzzy Hash: 5C01D075802B169FCB30AF66D8C0806FBF5AE502093008A3FD09242971C770A858CF80
                                APIs
                                • GetDlgItem.USER32(?,000003E9), ref: 002764E7
                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 002764FE
                                • MessageBeep.USER32(00000000), ref: 00276516
                                • KillTimer.USER32(?,0000040A), ref: 00276532
                                • EndDialog.USER32(?,00000001), ref: 0027654C
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                • String ID:
                                • API String ID: 3741023627-0
                                • Opcode ID: 2a5133b85e005eeccdef7c6cc1251591c051b7b42127b993951c2e453c3e6bcf
                                • Instruction ID: af281a71f2f32dfe9513f47b085f57bf35ac9399faa63bb1dd84dca75be0b9fd
                                • Opcode Fuzzy Hash: 2a5133b85e005eeccdef7c6cc1251591c051b7b42127b993951c2e453c3e6bcf
                                • Instruction Fuzzy Hash: 1401D130510B04ABEB245F20ED4EB9677BCBB10B05F404559B18BA24E1DFF0AAA8CB90
                                APIs
                                • _free.LIBCMT ref: 0024DAF2
                                  • Part of subcall function 00242D58: RtlFreeHeap.NTDLL(00000000,00000000,?,0024DB71,002E1DC4,00000000,002E1DC4,00000000,?,0024DB98,002E1DC4,00000007,002E1DC4,?,0024DF95,002E1DC4), ref: 00242D6E
                                  • Part of subcall function 00242D58: GetLastError.KERNEL32(002E1DC4,?,0024DB71,002E1DC4,00000000,002E1DC4,00000000,?,0024DB98,002E1DC4,00000007,002E1DC4,?,0024DF95,002E1DC4,002E1DC4), ref: 00242D80
                                • _free.LIBCMT ref: 0024DB04
                                • _free.LIBCMT ref: 0024DB16
                                • _free.LIBCMT ref: 0024DB28
                                • _free.LIBCMT ref: 0024DB3A
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: fe97bb6d67bf01404c9788ecc2f745ba1904a584d2d53edb57f1f578aa7d6a69
                                • Instruction ID: 18a1986c5a4a13325c88ee61d129cbeb61db72c71e9ff5967e8cbae1d2595c8f
                                • Opcode Fuzzy Hash: fe97bb6d67bf01404c9788ecc2f745ba1904a584d2d53edb57f1f578aa7d6a69
                                • Instruction Fuzzy Hash: E1F04F32E65649EB8729EF69F889D1A77DDEE043103D50C06F009D7551CA60FCD18A50
                                APIs
                                • _free.LIBCMT ref: 0024264E
                                  • Part of subcall function 00242D58: RtlFreeHeap.NTDLL(00000000,00000000,?,0024DB71,002E1DC4,00000000,002E1DC4,00000000,?,0024DB98,002E1DC4,00000007,002E1DC4,?,0024DF95,002E1DC4), ref: 00242D6E
                                  • Part of subcall function 00242D58: GetLastError.KERNEL32(002E1DC4,?,0024DB71,002E1DC4,00000000,002E1DC4,00000000,?,0024DB98,002E1DC4,00000007,002E1DC4,?,0024DF95,002E1DC4,002E1DC4), ref: 00242D80
                                • _free.LIBCMT ref: 00242660
                                • _free.LIBCMT ref: 00242673
                                • _free.LIBCMT ref: 00242684
                                • _free.LIBCMT ref: 00242695
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: df55120cf6dbbe4abd00346180a4d89a389cecde8229b78505db17ee18282d53
                                • Instruction ID: d42757d23ef07ebf888f29d1a79f0ed51f8b0d1aa2e1082e565263a10d1929c1
                                • Opcode Fuzzy Hash: df55120cf6dbbe4abd00346180a4d89a389cecde8229b78505db17ee18282d53
                                • Instruction Fuzzy Hash: EEF03070CA2690CB8B06AF65BC898483B6CBB147613410A27F519DA274C77109ABAFC4
                                APIs
                                • EndPath.GDI32(?), ref: 00211E74
                                • StrokeAndFillPath.GDI32(?,?,00253258,00000000,?,?,?), ref: 00211E90
                                • SelectObject.GDI32(?,00000000), ref: 00211EA3
                                • DeleteObject.GDI32 ref: 00211EB6
                                • StrokePath.GDI32(?), ref: 00211ED1
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                • String ID:
                                • API String ID: 2625713937-0
                                • Opcode ID: 040091876116bfee77cef5e239889960caace2a952889420b2e8982b3b98065f
                                • Instruction ID: c33bc4c18570ad9f61a9389202a7f1928b616996153528ade2793439ee570275
                                • Opcode Fuzzy Hash: 040091876116bfee77cef5e239889960caace2a952889420b2e8982b3b98065f
                                • Instruction Fuzzy Hash: F7F01430051289EBDB265F64FD4CBA53FE9BB51322F249214F96A584F1CB3588AADF10
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: __freea$_free
                                • String ID: a/p$am/pm
                                • API String ID: 3432400110-3206640213
                                • Opcode ID: 6b60b1b62b54c5498fdbc044a2f300cce6047a30187320970519934d181c68f1
                                • Instruction ID: ed5def33df5aadd5c878d286518b42859a8a59d496112c5bdb2493c4be5cd418
                                • Opcode Fuzzy Hash: 6b60b1b62b54c5498fdbc044a2f300cce6047a30187320970519934d181c68f1
                                • Instruction Fuzzy Hash: 7ED1E075A30206DADB2C9F68C8857FABBB5FF05310F290159E902AB251D3759DF0CBA1
                                APIs
                                  • Part of subcall function 002305D2: EnterCriticalSection.KERNEL32(002E170C,?,00000000,?,0021D1DA,002E3540,00000001,00000000,?,?,0028EF39,?,?,00000000,00000001,?), ref: 002305DD
                                  • Part of subcall function 002305D2: LeaveCriticalSection.KERNEL32(002E170C,?,0021D1DA,002E3540,00000001,00000000,?,?,0028EF39,?,?,00000000,00000001,?,00000001,002E2430), ref: 0023061A
                                  • Part of subcall function 00230433: __onexit.LIBCMT ref: 00230439
                                • __Init_thread_footer.LIBCMT ref: 00296B95
                                  • Part of subcall function 00230588: EnterCriticalSection.KERNEL32(002E170C,00000000,?,0021D208,002E3540,002527E9,00000001,00000000,?,?,0028EF39,?,?,00000000,00000001,?), ref: 00230592
                                  • Part of subcall function 00230588: LeaveCriticalSection.KERNEL32(002E170C,?,0021D208,002E3540,002527E9,00000001,00000000,?,?,0028EF39,?,?,00000000,00000001,?,00000001), ref: 002305C5
                                  • Part of subcall function 00283EF6: LoadStringW.USER32(00000066,?,00000FFF,002ADCEC), ref: 00283F3E
                                  • Part of subcall function 00283EF6: LoadStringW.USER32(?,?,00000FFF,?), ref: 00283F64
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                • String ID: x3.$x3.$x3.
                                • API String ID: 1072379062-3845791144
                                • Opcode ID: d38f1d1bc7d64e032dc39ba7f34de82e199ce35d2479387ec18665a0467626f6
                                • Instruction ID: 3e00e2d4893e993163fd01c3f0d03e8f4fd02e5da5a4213dd695411c4c27eefb
                                • Opcode Fuzzy Hash: d38f1d1bc7d64e032dc39ba7f34de82e199ce35d2479387ec18665a0467626f6
                                • Instruction Fuzzy Hash: 8CC19D75A1010AAFCF14DF98C895DBEB7F9EF58300F148069F955AB291DB70AD60CB90
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 0021D203
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Init_thread_footer
                                • String ID: D5.$D5.$D5.
                                • API String ID: 1385522511-149234557
                                • Opcode ID: 07eb9d769c7d3ecf461e9c71d33e0bd57d231f1cf394d1da326fbd96cac7c65f
                                • Instruction ID: aad718ad4cffd900be6a664f6624b3efd56277236910ea7f7be620635b4fbee2
                                • Opcode Fuzzy Hash: 07eb9d769c7d3ecf461e9c71d33e0bd57d231f1cf394d1da326fbd96cac7c65f
                                • Instruction Fuzzy Hash: 1C913B75A60206DFCB18CF59C4906AAB7F2FF68310F64416AD945AB340D771EEA2CF90
                                APIs
                                  • Part of subcall function 0027BCDF: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00272A60,?,?,00000034,00000800,?,00000034), ref: 0027BD09
                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00272FF0
                                  • Part of subcall function 0027BCAA: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00272A8F,?,?,00000800,?,00001073,00000000,?,?), ref: 0027BCD4
                                  • Part of subcall function 0027BC06: GetWindowThreadProcessId.USER32(?,?), ref: 0027BC31
                                  • Part of subcall function 0027BC06: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00272A24,00000034,?,?,00001004,00000000,00000000), ref: 0027BC41
                                  • Part of subcall function 0027BC06: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00272A24,00000034,?,?,00001004,00000000,00000000), ref: 0027BC57
                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0027305D
                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 002730AA
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                • String ID: @
                                • API String ID: 4150878124-2766056989
                                • Opcode ID: c6e8ccf26ebb525e33124e87d5ac54ecdaad5083f9286d6ae8c3479902184848
                                • Instruction ID: a4e82b039edc19a5d5b1bda996652d61fddfcb14a71149775116f1d0dda9e237
                                • Opcode Fuzzy Hash: c6e8ccf26ebb525e33124e87d5ac54ecdaad5083f9286d6ae8c3479902184848
                                • Instruction Fuzzy Hash: 02415C76A1021CAFDB11DFA4CC85BDEBBB8EB05300F008099FA49B7180DA716E95DF60
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,C:\ProgramData\wvtynvwe\AutoIt3.exe,00000104), ref: 00241AF9
                                • _free.LIBCMT ref: 00241BC4
                                • _free.LIBCMT ref: 00241BCE
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _free$FileModuleName
                                • String ID: C:\ProgramData\wvtynvwe\AutoIt3.exe
                                • API String ID: 2506810119-3538095461
                                • Opcode ID: b6772b3d89343b6753bbd3facd523d1cb7830f14cac0d9d084e217487d5bb302
                                • Instruction ID: 78b32e0100bdb0e0967e56d5b65f673269adf5ed3daa69f49b3cfc78959c6c1e
                                • Opcode Fuzzy Hash: b6772b3d89343b6753bbd3facd523d1cb7830f14cac0d9d084e217487d5bb302
                                • Instruction Fuzzy Hash: 6E31B571A50258EFDB29DF99DC85D9EBBFCEF84314B104066F80497210E7B04EA4CB90
                                APIs
                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0027CAC6
                                • DeleteMenu.USER32(?,00000007,00000000), ref: 0027CB0C
                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,002E2990,012B5CD8), ref: 0027CB55
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Menu$Delete$InfoItem
                                • String ID: 0
                                • API String ID: 135850232-4108050209
                                • Opcode ID: 982074194376980a3ac00ce824954150cb6bf8110d08b6d7de00bc95ab78a918
                                • Instruction ID: 9bb5b6ca6a2af817fb3dff023f824cde5bdb6f96dde65c66e5638e49960b3c8f
                                • Opcode Fuzzy Hash: 982074194376980a3ac00ce824954150cb6bf8110d08b6d7de00bc95ab78a918
                                • Instruction Fuzzy Hash: 174105701193429FD720DF34D846F5ABBE8EF94328F20851DF8A997291C730E914CBA2
                                APIs
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,002ADCD0,00000000,?,?,?,?), ref: 002A4E09
                                • GetWindowLongW.USER32 ref: 002A4E26
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002A4E36
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$Long
                                • String ID: SysTreeView32
                                • API String ID: 847901565-1698111956
                                • Opcode ID: 05acbc139244e834163e7ce5af6879c8217b7aac467749b5e479af090d2b05b6
                                • Instruction ID: 699abe0d77a453a6f40ec121ddc984abdaf8447045f92893c06d015e4fda5949
                                • Opcode Fuzzy Hash: 05acbc139244e834163e7ce5af6879c8217b7aac467749b5e479af090d2b05b6
                                • Instruction Fuzzy Hash: B8319E31120606AFDF219F38DC45BEA7BA9EB5A334F204715F975921D0DBB0E8608B50
                                APIs
                                  • Part of subcall function 00293CB8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,002939D4,?,?), ref: 00293CD5
                                • inet_addr.WSOCK32(?), ref: 002939D7
                                • _wcslen.LIBCMT ref: 002939F8
                                • htons.WSOCK32(00000000), ref: 00293A63
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                • String ID: 255.255.255.255
                                • API String ID: 946324512-2422070025
                                • Opcode ID: 6d68611468ae952228295ed9ef29a4c97c6c8d2a564f464ce2174044d682e021
                                • Instruction ID: b33c29b1b4efe5e695f56268c50a225f1d7f2a9e5032ef524bbae3721342bcf3
                                • Opcode Fuzzy Hash: 6d68611468ae952228295ed9ef29a4c97c6c8d2a564f464ce2174044d682e021
                                • Instruction Fuzzy Hash: 8D31C4396102029FCF10CF68C585EAA77F0EF15314F248159E8568B7A2D775EF55CB60
                                APIs
                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 002A489F
                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 002A48B3
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 002A48D7
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$Window
                                • String ID: SysMonthCal32
                                • API String ID: 2326795674-1439706946
                                • Opcode ID: f38c6de9e339535489d6095641cc2bbde7c9ab07292a9a18f0c141257e8135b8
                                • Instruction ID: 020d4a8b25ea5b0fa48f333fa1f50d93fcd03e2c65db0fd147ac40a59a7c8569
                                • Opcode Fuzzy Hash: f38c6de9e339535489d6095641cc2bbde7c9ab07292a9a18f0c141257e8135b8
                                • Instruction Fuzzy Hash: EF21D132620219AFDF159F90DC46FEA3BB9EF89714F100214FA156B1D0DAB5EC618BA0
                                APIs
                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 002A5064
                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 002A5072
                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 002A5079
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$DestroyWindow
                                • String ID: msctls_updown32
                                • API String ID: 4014797782-2298589950
                                • Opcode ID: 09fa3a539e47cbfae27443df038f129d1ec7bec69e2ac6b006f2e117ab44b2bf
                                • Instruction ID: 340a446805651881324976882976681c6b8ee6f1372a4e40d475b473ed4eb3c5
                                • Opcode Fuzzy Hash: 09fa3a539e47cbfae27443df038f129d1ec7bec69e2ac6b006f2e117ab44b2bf
                                • Instruction Fuzzy Hash: 78217AB5610619AFDB10DF24DC85DBB37ACEF9A3A4B100459F9019B2A1CB71EC658BA0
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen
                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                • API String ID: 176396367-2734436370
                                • Opcode ID: f7c796fe9cafc51a27d804ad765df9125e130a62044d10e3dfbbcee632d906fb
                                • Instruction ID: 1bb442d12a2da8fca12545a9ba300eb94f7858e9cf6aa50a5f112a6894235d95
                                • Opcode Fuzzy Hash: f7c796fe9cafc51a27d804ad765df9125e130a62044d10e3dfbbcee632d906fb
                                • Instruction Fuzzy Hash: 4D21D77217031267D320EA299C02FE773E99F56700F148427F98D96585EBB19DE1C791
                                APIs
                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 002A419F
                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 002A41AF
                                • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 002A41D5
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend$MoveWindow
                                • String ID: Listbox
                                • API String ID: 3315199576-2633736733
                                • Opcode ID: 1cd787d53dbf448fd20bc66bfd6395370a0e65f81c77ea864cd71a414dcd5523
                                • Instruction ID: 2d64a44fd5bf45c26b1f2f52bd09a81f009fd8ac72735cbb381d0b66cafda229
                                • Opcode Fuzzy Hash: 1cd787d53dbf448fd20bc66bfd6395370a0e65f81c77ea864cd71a414dcd5523
                                • Instruction Fuzzy Hash: 1B21C532620219BBDF119F54DC84FEB376EEFDA750F008114F9159B190CAB1DCA28BA0
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 00285362
                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 002853B6
                                • SetErrorMode.KERNEL32(00000000,?,?,002ADCD0), ref: 0028542A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorMode$InformationVolume
                                • String ID: %lu
                                • API String ID: 2507767853-685833217
                                • Opcode ID: f59542f8066a2e34323ee888cf64fa8eacf316b45b9af3a1136cae0a4f3fccb5
                                • Instruction ID: bc1bcec9055866f6a5fc6b6634a7fd8b505bbf823c944ead4596f15f0c21fb8b
                                • Opcode Fuzzy Hash: f59542f8066a2e34323ee888cf64fa8eacf316b45b9af3a1136cae0a4f3fccb5
                                • Instruction Fuzzy Hash: 1531B174A10219AFC710EF54C984EAA7BF8EF09304F1480A4F809DB262DB71ED41CF61
                                APIs
                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 002A4BAE
                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 002A4BC3
                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 002A4BD0
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: msctls_trackbar32
                                • API String ID: 3850602802-1010561917
                                • Opcode ID: b65a3e441d46ca478c3a080c83c1ef14f4a0a912d1554eb0a190265ce785c6af
                                • Instruction ID: dce15fdc327b51e537227aae9dc898f0e30cd44667ac121c2d6d0c518400219d
                                • Opcode Fuzzy Hash: b65a3e441d46ca478c3a080c83c1ef14f4a0a912d1554eb0a190265ce785c6af
                                • Instruction Fuzzy Hash: 0D11E331660208BFEF116E65CC46FAB77A8EFC6B18F110915FA55E60A0DAB1DC618B20
                                APIs
                                  • Part of subcall function 002184B7: _wcslen.LIBCMT ref: 002184CA
                                  • Part of subcall function 00273637: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00273655
                                  • Part of subcall function 00273637: GetWindowThreadProcessId.USER32(?,00000000), ref: 00273666
                                  • Part of subcall function 00273637: GetCurrentThreadId.KERNEL32 ref: 0027366D
                                  • Part of subcall function 00273637: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00273674
                                • GetFocus.USER32 ref: 00273807
                                  • Part of subcall function 0027367E: GetParent.USER32(00000000), ref: 00273689
                                • GetClassNameW.USER32(?,?,00000100), ref: 00273852
                                • EnumChildWindows.USER32(?,002738CA), ref: 0027387A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                • String ID: %s%d
                                • API String ID: 1272988791-1110647743
                                • Opcode ID: 0851aba446fd40f4805a8d83e49a25939aedbcf485ba0621a3f6d8f04ddf0b4f
                                • Instruction ID: f44660ea71b0d8d1a43d5048d58dc743ca5c5911a67c755733ed78ddcb7ed482
                                • Opcode Fuzzy Hash: 0851aba446fd40f4805a8d83e49a25939aedbcf485ba0621a3f6d8f04ddf0b4f
                                • Instruction Fuzzy Hash: C911D575210206ABCF11BFB09C85AED376AAF95304F048075BD0D9B292CE7559599F60
                                APIs
                                • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 002A6220
                                • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 002A624D
                                • DrawMenuBar.USER32(?), ref: 002A625C
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Menu$InfoItem$Draw
                                • String ID: 0
                                • API String ID: 3227129158-4108050209
                                • Opcode ID: 169f688c328a5af149a0a1d9512f1ec23a449daa128a4328f9beea46443f78c3
                                • Instruction ID: 244668ffc9d5049d1708898c5bb402af3a1265ae5185e6d1ef08505ce2d1a042
                                • Opcode Fuzzy Hash: 169f688c328a5af149a0a1d9512f1ec23a449daa128a4328f9beea46443f78c3
                                • Instruction Fuzzy Hash: FC018075920218AFDB109F51DC88BAA7BB4FF46351F188099F889D6150DF7089A4EF31
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d09917fe4e404c722fae7d045eb84ee4e248eff633c2c08a56a6c1fd7a84d356
                                • Instruction ID: 5e523044b75cd75f509b661d28678ec91bb18fdcc0073f06dcd80e97e2a34257
                                • Opcode Fuzzy Hash: d09917fe4e404c722fae7d045eb84ee4e248eff633c2c08a56a6c1fd7a84d356
                                • Instruction Fuzzy Hash: A9C19D75A1021AEFDB04CFA4C884EAEB7B5FF48704F208199E509EB251D731EE95CB90
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: __alldvrm$_strrchr
                                • String ID:
                                • API String ID: 1036877536-0
                                • Opcode ID: 173a905e0583d248f4586312a6838000a577cfe73f6efb9ac5c35750ff0a0cfb
                                • Instruction ID: 972fd0ec19f495a6c3e5fe35a0a14509f3069e10fb1001ff4bda4f6bfc4ec79d
                                • Opcode Fuzzy Hash: 173a905e0583d248f4586312a6838000a577cfe73f6efb9ac5c35750ff0a0cfb
                                • Instruction Fuzzy Hash: 15A1AE719207879FEB1AEF28C8417AEBFE4EF51310F2841ADE9859B281C3749D61CB50
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Variant$ClearInitInitializeUninitialize
                                • String ID:
                                • API String ID: 1998397398-0
                                • Opcode ID: 928ff8f362ae36e4c6d880d47f6b0fe99b88738617d2ac6f3d57dc4df5dff295
                                • Instruction ID: 642cf840d078a8814da9d6f36703fe397dfca6b5b79ccaa38dd1c0f1eedab6c2
                                • Opcode Fuzzy Hash: 928ff8f362ae36e4c6d880d47f6b0fe99b88738617d2ac6f3d57dc4df5dff295
                                • Instruction Fuzzy Hash: 8BA14C756246119FCB04EF24C485E6ABBE5FF88710F048459F98A9B362CB70ED51CF92
                                APIs
                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,002B0BD4,?), ref: 00270E80
                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,002B0BD4,?), ref: 00270E98
                                • CLSIDFromProgID.OLE32(?,?,00000000,002ADCE0,000000FF,?,00000000,00000800,00000000,?,002B0BD4,?), ref: 00270EBD
                                • _memcmp.LIBVCRUNTIME ref: 00270EDE
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FromProg$FreeTask_memcmp
                                • String ID:
                                • API String ID: 314563124-0
                                • Opcode ID: 0bde8ff8fb023a8bca6c4b7ac155c0a58f0aba49f252d7dd3c95a324f3d3aeb2
                                • Instruction ID: 0c7fd088cc0bd4715bbad0b33da9b10c744791a380ba23725f1fc8fe7e95e991
                                • Opcode Fuzzy Hash: 0bde8ff8fb023a8bca6c4b7ac155c0a58f0aba49f252d7dd3c95a324f3d3aeb2
                                • Instruction Fuzzy Hash: F0810D71A10109EFCB14DF94C984EEEB7B9FF89315F208558F506AB250DB71AE4ACB60
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: ee17b4e32e15c4bdfc9f697f23a8570435bada5cbea25664b8cbea41fdfaeb0b
                                • Instruction ID: 820f238ff4938448b4d57a796f6cba3c78813c693f1ab14183baabbab6b0d893
                                • Opcode Fuzzy Hash: ee17b4e32e15c4bdfc9f697f23a8570435bada5cbea25664b8cbea41fdfaeb0b
                                • Instruction Fuzzy Hash: BA416971A30111ABEB346FBD9C4AB6E7AA8EF05331F140225FC28D6291D7744C798EA5
                                APIs
                                • socket.WSOCK32(00000002,00000002,00000011), ref: 0029245A
                                • WSAGetLastError.WSOCK32 ref: 00292468
                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 002924E7
                                • WSAGetLastError.WSOCK32 ref: 002924F1
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorLast$socket
                                • String ID:
                                • API String ID: 1881357543-0
                                • Opcode ID: 50c818ebd7050878d5606aa50fdb23ea6c33c8c19a89e4535974a03d264b4021
                                • Instruction ID: 68396c0e267aee83019c84395989d984c1ca56cb5d1f20a33948c8ebc88c6b61
                                • Opcode Fuzzy Hash: 50c818ebd7050878d5606aa50fdb23ea6c33c8c19a89e4535974a03d264b4021
                                • Instruction Fuzzy Hash: D2410438610201BFEB20AF24D896F6A77E4AF14714F54C048F91A9F2D2C772ED91CB91
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 002A6C41
                                • ScreenToClient.USER32(?,?), ref: 002A6C74
                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 002A6CE1
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$ClientMoveRectScreen
                                • String ID:
                                • API String ID: 3880355969-0
                                • Opcode ID: a8ecfbcf2ae1ad14febc2e56519bfd82911e9104da27531f4f745ef3f87abfec
                                • Instruction ID: 7613185e5788cc18f6c3db465c2da0eb226dffb5a33b3f55d34ca6bd5c9da572
                                • Opcode Fuzzy Hash: a8ecfbcf2ae1ad14febc2e56519bfd82911e9104da27531f4f745ef3f87abfec
                                • Instruction Fuzzy Hash: AD517E74A10609EFCF14CF54D9889AE7BB6FF46360F248159F8659B2A0DB30ED91CB90
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d68236623220c9dc9387925dc3a9ab8f1a5c6a7e1c88f735aa60c00b2558b770
                                • Instruction ID: 1bcec1f93e59cc6bddbe89882e3d47d42280771c4ddf814e264ad7b34024883e
                                • Opcode Fuzzy Hash: d68236623220c9dc9387925dc3a9ab8f1a5c6a7e1c88f735aa60c00b2558b770
                                • Instruction Fuzzy Hash: FF411771A20704AFD729AF78CC41BAABBECEF88710F10452AF551DB291D771D9658F80
                                APIs
                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 002860DD
                                • GetLastError.KERNEL32(?,00000000), ref: 00286103
                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00286128
                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00286154
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CreateHardLink$DeleteErrorFileLast
                                • String ID:
                                • API String ID: 3321077145-0
                                • Opcode ID: 9d2066c3c6c6e46fa80b14fa14a849a183f8665b5223e7ea6113277401ba0476
                                • Instruction ID: 86a16aaacaccca859baf8fce5cc2bd466213e36652763b2898c45d5278529d0b
                                • Opcode Fuzzy Hash: 9d2066c3c6c6e46fa80b14fa14a849a183f8665b5223e7ea6113277401ba0476
                                • Instruction Fuzzy Hash: E6413D39610611DFCB11EF15C488A5EBBE2EF59710B198488ED4AAB362CB30FD51CF91
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00237101,00000000,00000000,00238669,?,00238669,?,00000001,00237101,8BE85006,00000001,00238669,00238669), ref: 0024DCB0
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0024DD39
                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0024DD4B
                                • __freea.LIBCMT ref: 0024DD54
                                  • Part of subcall function 00243BB0: RtlAllocateHeap.NTDLL(00000000,?,?,?,00236A99,?,0000015D,?,?,?,?,002385D0,000000FF,00000000,?,?), ref: 00243BE2
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                • String ID:
                                • API String ID: 2652629310-0
                                • Opcode ID: f426cfd3ad5922776f74d3cfc787be73e6f7cd56116dd2bdb062f30e6bf867ed
                                • Instruction ID: eaf16f6b0126b8099dbe8afeb48a2135e5b13ce0f28fec1eb229e7aafcf56903
                                • Opcode Fuzzy Hash: f426cfd3ad5922776f74d3cfc787be73e6f7cd56116dd2bdb062f30e6bf867ed
                                • Instruction Fuzzy Hash: A731DE72A2020AABDF299F64DC85EAE7BA5EF01710F144169FC05D7190EB35DD64CBA0
                                APIs
                                • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0027B388
                                • SetKeyboardState.USER32(00000080), ref: 0027B3A4
                                • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0027B412
                                • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0027B464
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: KeyboardState$InputMessagePostSend
                                • String ID:
                                • API String ID: 432972143-0
                                • Opcode ID: f4545529bf940f488f78f9962222c4eac564c0da09e1bc79075a02e3f441bc94
                                • Instruction ID: fba2bc4895bac6612eaa9c8f78443ca21d5b82fd36dc5a87821599ab4b37db18
                                • Opcode Fuzzy Hash: f4545529bf940f488f78f9962222c4eac564c0da09e1bc79075a02e3f441bc94
                                • Instruction Fuzzy Hash: 7C316B31A60209AFFF228F25CC297FE7BA5EB45310F04C25AF499921D1C3B489A5C7A1
                                APIs
                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 002A5CB1
                                • GetWindowLongW.USER32(?,000000F0), ref: 002A5CD4
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002A5CE1
                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 002A5D07
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: LongWindow$InvalidateMessageRectSend
                                • String ID:
                                • API String ID: 3340791633-0
                                • Opcode ID: da8126bef6ce8bf34cb30975405eaf9b37adc07906d82286252ad999cd936dd4
                                • Instruction ID: 2aa849d2c8095458d4804008adf4f9f04b544ac2fdd34d40e381c683798bd9bc
                                • Opcode Fuzzy Hash: da8126bef6ce8bf34cb30975405eaf9b37adc07906d82286252ad999cd936dd4
                                • Instruction Fuzzy Hash: 7931E634A71A2AFFEB249F14DC49BEA77A6EB06320F144103FA12561E1CFB569609B41
                                APIs
                                • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 0027B4CD
                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 0027B4E9
                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 0027B550
                                • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 0027B5A2
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: KeyboardState$InputMessagePostSend
                                • String ID:
                                • API String ID: 432972143-0
                                • Opcode ID: 93318404701450f192d41888a12f0182fa4f5ac427b0a2af7376b77e6d2bd466
                                • Instruction ID: 09bba7c3ed215c39fd6e6ac80fc4aeb550e3d60330425c7a2f7648c7c6f6c285
                                • Opcode Fuzzy Hash: 93318404701450f192d41888a12f0182fa4f5ac427b0a2af7376b77e6d2bd466
                                • Instruction Fuzzy Hash: D1312B70E60259AEFF368F24C8097FE7BB6AF85320F84C21AE489561D1C3748A65C751
                                APIs
                                • GetForegroundWindow.USER32 ref: 002A204A
                                  • Part of subcall function 002742CC: GetWindowThreadProcessId.USER32(?,00000000), ref: 002742E6
                                  • Part of subcall function 002742CC: GetCurrentThreadId.KERNEL32 ref: 002742ED
                                  • Part of subcall function 002742CC: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00272E43), ref: 002742F4
                                • GetCaretPos.USER32(?), ref: 002A205E
                                • ClientToScreen.USER32(00000000,?), ref: 002A20AB
                                • GetForegroundWindow.USER32 ref: 002A20B1
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                • String ID:
                                • API String ID: 2759813231-0
                                • Opcode ID: 269be63b173f4f1b882b2c576822248271a694045c48e0018786b8f3b5ca705f
                                • Instruction ID: 83867a570c106749c87f3ef4c465e74aa25d6095906dccaada4bb3fb679675e3
                                • Opcode Fuzzy Hash: 269be63b173f4f1b882b2c576822248271a694045c48e0018786b8f3b5ca705f
                                • Instruction Fuzzy Hash: AB313071E10109AFCB04EFA9C8858EEB7F8EF59304B5084AAE515E7211DB719E55CF90
                                APIs
                                  • Part of subcall function 00214154: _wcslen.LIBCMT ref: 00214159
                                • _wcslen.LIBCMT ref: 0027E7F7
                                • _wcslen.LIBCMT ref: 0027E80E
                                • _wcslen.LIBCMT ref: 0027E839
                                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0027E844
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$ExtentPoint32Text
                                • String ID:
                                • API String ID: 3763101759-0
                                • Opcode ID: 68b25aef8e95d9cdbbf3650b7e81d7f601f300c5c4773cf65da5c54fbb64daa5
                                • Instruction ID: cb60579b33f428f6ee7a9e7ab4af67e101115b0eef91e5291705e574612a0ee6
                                • Opcode Fuzzy Hash: 68b25aef8e95d9cdbbf3650b7e81d7f601f300c5c4773cf65da5c54fbb64daa5
                                • Instruction Fuzzy Hash: F321E7B1D10215AFCF10EFA8C981BAEB7F8EF56350F1541A5E808AB251D6709E51CBB1
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0027DCC1
                                • Process32FirstW.KERNEL32(00000000,?), ref: 0027DCCF
                                • Process32NextW.KERNEL32(00000000,?), ref: 0027DCEF
                                • CloseHandle.KERNEL32(00000000), ref: 0027DD9C
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                • String ID:
                                • API String ID: 420147892-0
                                • Opcode ID: 63e4b20b3554a1b76d36eaae271f3f3e9b2431d2d7b217b533e454961eb02819
                                • Instruction ID: 9d5cb100e7d155f2e63ecc57eb734e90da1742f9962bda0ddacf55ee34f506f6
                                • Opcode Fuzzy Hash: 63e4b20b3554a1b76d36eaae271f3f3e9b2431d2d7b217b533e454961eb02819
                                • Instruction Fuzzy Hash: FA318F72118301AFC311EF60D885AAFBBF8AF99350F04096DF585861A1EB719995CB92
                                APIs
                                  • Part of subcall function 00212441: GetWindowLongW.USER32(00000000,000000EB), ref: 00212452
                                • GetCursorPos.USER32(?), ref: 002A9960
                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 002A9975
                                • GetCursorPos.USER32(?), ref: 002A99BD
                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?), ref: 002A99F3
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                • String ID:
                                • API String ID: 2864067406-0
                                • Opcode ID: c20051722efb8414667375508e697474914177e3e58fc70bcea8498b31ccd8d3
                                • Instruction ID: 60f658d8d09e767a50872429beb8bb1c61439e49aef85debb65776753b1bc0d6
                                • Opcode Fuzzy Hash: c20051722efb8414667375508e697474914177e3e58fc70bcea8498b31ccd8d3
                                • Instruction Fuzzy Hash: 3C21B135520129FFCB158F59DC89EEB7BB9EB0A310F10405AF9064A161DB31ADA0DB60
                                APIs
                                • GetFileAttributesW.KERNEL32(?,002ADC30), ref: 0027DABB
                                • GetLastError.KERNEL32 ref: 0027DACA
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0027DAD9
                                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,002ADC30), ref: 0027DB36
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CreateDirectory$AttributesErrorFileLast
                                • String ID:
                                • API String ID: 2267087916-0
                                • Opcode ID: 73d58fef8066f247c4871eba31249ca46a3ac8ac408e7572408c8777d2f47bb9
                                • Instruction ID: 46e3a6796682884b7663ea0b5422a395b2faddfcfcac2a9704f90403f34eb308
                                • Opcode Fuzzy Hash: 73d58fef8066f247c4871eba31249ca46a3ac8ac408e7572408c8777d2f47bb9
                                • Instruction Fuzzy Hash: 902171305282019FC700DF28D9859AAB7F4EE66368F148A5DF49EC72A1DB30DD59CB52
                                APIs
                                  • Part of subcall function 002718A4: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 002718BA
                                  • Part of subcall function 002718A4: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 002718C6
                                  • Part of subcall function 002718A4: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 002718D5
                                  • Part of subcall function 002718A4: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 002718DC
                                  • Part of subcall function 002718A4: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 002718F2
                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00271E4E
                                • _memcmp.LIBVCRUNTIME ref: 00271E71
                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00271EA7
                                • HeapFree.KERNEL32(00000000), ref: 00271EAE
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                • String ID:
                                • API String ID: 1592001646-0
                                • Opcode ID: 6a8d69560a5b0adc5b52162c8918b5b1efa2de2602bb040ae98e3c46d146c40c
                                • Instruction ID: 75ebf0952af06f679635689ed7b2b80d50eccfa9d9b316193036d485796aba1d
                                • Opcode Fuzzy Hash: 6a8d69560a5b0adc5b52162c8918b5b1efa2de2602bb040ae98e3c46d146c40c
                                • Instruction Fuzzy Hash: 33217171E20109EFDB10DFA8C945BEEB7B9EF84344F158059E859A7291D730AA25CF50
                                APIs
                                • GetWindowLongW.USER32(?,000000EC), ref: 002A3169
                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 002A3183
                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 002A3191
                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 002A319F
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$Long$AttributesLayered
                                • String ID:
                                • API String ID: 2169480361-0
                                • Opcode ID: caf3167c4b5f48e7ee4ee46758beaa96e6d014fca8454d2d38b250948d7e984c
                                • Instruction ID: 3f38dc9276f6ffbddf3b7b69ccec6131f59f6ab048245398d5b2b49a6714fcf3
                                • Opcode Fuzzy Hash: caf3167c4b5f48e7ee4ee46758beaa96e6d014fca8454d2d38b250948d7e984c
                                • Instruction Fuzzy Hash: 6621C131628111AFE704DF14DC45FAABB99EF86324F148158F46A8B6D2CF71ED92CB90
                                APIs
                                  • Part of subcall function 0027960C: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00278199,?,000000FF,?,00278FE3,00000000,?,0000001C,?,?), ref: 0027961B
                                  • Part of subcall function 0027960C: lstrcpyW.KERNEL32(00000000,?,?,00278199,?,000000FF,?,00278FE3,00000000,?,0000001C,?,?,00000000), ref: 00279641
                                  • Part of subcall function 0027960C: lstrcmpiW.KERNEL32(00000000,?,00278199,?,000000FF,?,00278FE3,00000000,?,0000001C,?,?), ref: 00279672
                                • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00278FE3,00000000,?,0000001C,?,?,00000000), ref: 002781B2
                                • lstrcpyW.KERNEL32(00000000,?,?,00278FE3,00000000,?,0000001C,?,?,00000000), ref: 002781D8
                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00278FE3,00000000,?,0000001C,?,?,00000000), ref: 00278213
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: lstrcmpilstrcpylstrlen
                                • String ID: cdecl
                                • API String ID: 4031866154-3896280584
                                • Opcode ID: 0cd27c3f73bff83f9b4713c46c4a7c4d5b688de61440e1cd5d06c0baddf575f1
                                • Instruction ID: f78b9cac599ab3cde8c8a2911c717d7d9cc93bf7646cdffed32be4949fb1bf60
                                • Opcode Fuzzy Hash: 0cd27c3f73bff83f9b4713c46c4a7c4d5b688de61440e1cd5d06c0baddf575f1
                                • Instruction Fuzzy Hash: 0711087A210342ABCB145F38D859E7A77A9FF99350B50802AFD4ACB650EF719821C7A1
                                APIs
                                • GetWindowLongW.USER32(?,000000F0), ref: 002A866A
                                • SetWindowLongW.USER32(00000000,000000F0,?), ref: 002A8689
                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 002A86A1
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0028C10A,00000000), ref: 002A86CA
                                  • Part of subcall function 00212441: GetWindowLongW.USER32(00000000,000000EB), ref: 00212452
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$Long
                                • String ID:
                                • API String ID: 847901565-0
                                • Opcode ID: c17042c4eaf52f3c5e73601de3b422c5dc9aa26499d11c6997b2dca89b9f8538
                                • Instruction ID: 398a3a021b0eb2d1bff9c2273d089d98faa516eb18bf0f1b4bc0d2af937e4016
                                • Opcode Fuzzy Hash: c17042c4eaf52f3c5e73601de3b422c5dc9aa26499d11c6997b2dca89b9f8538
                                • Instruction Fuzzy Hash: 7911B7315206659FDB108F29DC48AA637A9FB46770F154724F936DB2F0DF309921CB50
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bafc0c58beb02425e411bea9dcbeaa41025dd823eee014b3d781539f8e2344b7
                                • Instruction ID: 58469b73752343df80b017748b301d8345b9dd7e1747d6998e15344c26d89727
                                • Opcode Fuzzy Hash: bafc0c58beb02425e411bea9dcbeaa41025dd823eee014b3d781539f8e2344b7
                                • Instruction Fuzzy Hash: DD012BB2625216FEF7252A797CC1F27674DDF52374B700325F529611D2DE708C644970
                                APIs
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 002722D7
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 002722E9
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 002722FF
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0027231A
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: d6589844c9328338d0dc2f8ffc6be3c388b713493d8cda10948c251cadf5958d
                                • Instruction ID: 89c4238a7c6a56ab7680291da95c8a53ecad21b76035e406d88fe3331f019085
                                • Opcode Fuzzy Hash: d6589844c9328338d0dc2f8ffc6be3c388b713493d8cda10948c251cadf5958d
                                • Instruction Fuzzy Hash: AA11097AD00219FFEB119BA5CD85F9EFBB8EB08750F204091EA05B7290D6716E10DB94
                                APIs
                                  • Part of subcall function 00212441: GetWindowLongW.USER32(00000000,000000EB), ref: 00212452
                                • GetClientRect.USER32(?,?), ref: 002AA890
                                • GetCursorPos.USER32(?), ref: 002AA89A
                                • ScreenToClient.USER32(?,?), ref: 002AA8A5
                                • DefDlgProcW.USER32(?,00000020,?,00000000,?), ref: 002AA8D9
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Client$CursorLongProcRectScreenWindow
                                • String ID:
                                • API String ID: 4127811313-0
                                • Opcode ID: 9719c145968d96c10661320f3c1b6697deccff35eb10a4f31814a027df7d8e91
                                • Instruction ID: 9d8b8cfceb930ababdb1101f7e122bb7ed670e1b74c947d8787f99e7549a3117
                                • Opcode Fuzzy Hash: 9719c145968d96c10661320f3c1b6697deccff35eb10a4f31814a027df7d8e91
                                • Instruction Fuzzy Hash: 3711367191111AEFDF14DF98E8899EE77B8EF06301F100455F912E2150DB78AAA2CBA2
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 0027EA29
                                • MessageBoxW.USER32(?,?,?,?), ref: 0027EA5C
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0027EA72
                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0027EA79
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                • String ID:
                                • API String ID: 2880819207-0
                                • Opcode ID: b4ab916ac42c5d2ab88c29c23054b9d96ef029e2fc07af809c3459ad525436c9
                                • Instruction ID: c3223c353d6001f3e90e56c5fa0f6d88b4a0bf117c4c759b25fb8ceaff71dc44
                                • Opcode Fuzzy Hash: b4ab916ac42c5d2ab88c29c23054b9d96ef029e2fc07af809c3459ad525436c9
                                • Instruction Fuzzy Hash: F7114275910259FFCB01DF68AC4D99F7F6DAB46310F018196F82AE3290D674CD148BB0
                                APIs
                                • CreateThread.KERNEL32(00000000,?,0023D389,00000000,00000004,00000000), ref: 0023D5A8
                                • GetLastError.KERNEL32 ref: 0023D5B4
                                • __dosmaperr.LIBCMT ref: 0023D5BB
                                • ResumeThread.KERNEL32(00000000), ref: 0023D5D9
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Thread$CreateErrorLastResume__dosmaperr
                                • String ID:
                                • API String ID: 173952441-0
                                • Opcode ID: fed05242fb2a540d34acf816eb4ff04777b3f94ae33cd1c78d9c868bf012cb61
                                • Instruction ID: 80b3526e2d70d1368ab892538e75b21fee00699999e7a986799d3e75420868b1
                                • Opcode Fuzzy Hash: fed05242fb2a540d34acf816eb4ff04777b3f94ae33cd1c78d9c868bf012cb61
                                • Instruction Fuzzy Hash: B501F9F2820205BBCB215FA5FC09F9A7B6CDF82335F500359F925821E0CF708824CAA1
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00217759
                                • GetStockObject.GDI32(00000011), ref: 0021776D
                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00217777
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CreateMessageObjectSendStockWindow
                                • String ID:
                                • API String ID: 3970641297-0
                                • Opcode ID: 1132fea449c97e945e460dabf506aef7290eea4f1eb4e1a01a2ba3ab245c2f40
                                • Instruction ID: aa0a11c986da9530ceeb9daeed8c8c7dd29cd9632cd275e0b665988dc3dd0eb8
                                • Opcode Fuzzy Hash: 1132fea449c97e945e460dabf506aef7290eea4f1eb4e1a01a2ba3ab245c2f40
                                • Instruction Fuzzy Hash: 5A11AD7251554ABFEF064F90EC88EEAFBB9EF59364F000115FA1552050DB319CA1EBA0
                                APIs
                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000364,00000000,00000000,?,002433AA,00000364,00000000,00000000,00000000,?,0024361B,00000006,FlsSetValue), ref: 00243435
                                • GetLastError.KERNEL32(?,002433AA,00000364,00000000,00000000,00000000,?,0024361B,00000006,FlsSetValue,002B3260,FlsSetValue,00000000,00000364,?,002431D6), ref: 00243441
                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,002433AA,00000364,00000000,00000000,00000000,?,0024361B,00000006,FlsSetValue,002B3260,FlsSetValue,00000000), ref: 0024344F
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: LibraryLoad$ErrorLast
                                • String ID:
                                • API String ID: 3177248105-0
                                • Opcode ID: cd45c1d57cd6b9f32afdaf26b91553d4cfbfc4012fbcd55b1e466962cd1cb32e
                                • Instruction ID: 3bcda7a9d74b2ef6e909b9820fa92387e799524876d14eba7976b204f613566b
                                • Opcode Fuzzy Hash: cd45c1d57cd6b9f32afdaf26b91553d4cfbfc4012fbcd55b1e466962cd1cb32e
                                • Instruction Fuzzy Hash: 6101AC32621623EBCB26CF79BC48AD67B58AF45BB17110720F90AD7150DB24D951C6E0
                                APIs
                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00277D0E
                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00277D26
                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00277D3B
                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00277D59
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Type$Register$FileLoadModuleNameUser
                                • String ID:
                                • API String ID: 1352324309-0
                                • Opcode ID: a979efabd3b274ab1865d8f1aade725228e670e51f9a840df07b0498efe9b1f5
                                • Instruction ID: 78a41bc881d5e30f526c466278562958ba333a78af985f3757aa4f2273c8fa9f
                                • Opcode Fuzzy Hash: a979efabd3b274ab1865d8f1aade725228e670e51f9a840df07b0498efe9b1f5
                                • Instruction Fuzzy Hash: 90116DB1229701ABE7309F24EC09BA27BFCEF04B00F108569A51AD6550D7B0E914DBA0
                                APIs
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0027B5AF,?,00008000), ref: 0027B9A0
                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0027B5AF,?,00008000), ref: 0027B9C5
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0027B5AF,?,00008000), ref: 0027B9CF
                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0027B5AF,?,00008000), ref: 0027BA02
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CounterPerformanceQuerySleep
                                • String ID:
                                • API String ID: 2875609808-0
                                • Opcode ID: 41391b4dff15886206fd9adadab8b7eaa05745412b1db5e48c95a44fc9def7b4
                                • Instruction ID: 51bd5fb09fb258bd3d8ecd9e5f6d326ce571351cfaeca823079010da4de787c2
                                • Opcode Fuzzy Hash: 41391b4dff15886206fd9adadab8b7eaa05745412b1db5e48c95a44fc9def7b4
                                • Instruction Fuzzy Hash: A8115E31C11629E7CF01AFE4E948BEDBB78FF09711F108095DA49B2140DB709661CB55
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 002A8792
                                • ScreenToClient.USER32(?,?), ref: 002A87AA
                                • ScreenToClient.USER32(?,?), ref: 002A87CE
                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 002A87E9
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClientRectScreen$InvalidateWindow
                                • String ID:
                                • API String ID: 357397906-0
                                • Opcode ID: fb0b0da7aa3a7ee46ef4be5a88212d008cce5054f69768cfdebb1de508690f0d
                                • Instruction ID: 93d27a5ca8682ceb7d5d9e123e637884f40ca3179e1554953c6bd470cddf1e31
                                • Opcode Fuzzy Hash: fb0b0da7aa3a7ee46ef4be5a88212d008cce5054f69768cfdebb1de508690f0d
                                • Instruction Fuzzy Hash: A81144B9D0020AEFDB41CF98D8849EEBBF9FB09310F104166E915E3610DB35AA54CF50
                                APIs
                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00273655
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00273666
                                • GetCurrentThreadId.KERNEL32 ref: 0027366D
                                • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00273674
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                • String ID:
                                • API String ID: 2710830443-0
                                • Opcode ID: 4efdbf59057b73e0d1f22c765dcf36d640fa36739729300a3d104bb7ce85f719
                                • Instruction ID: 2e9bed350990a61f807816cc350f76d4295b6f9efe28d80c819e6cd883765ccc
                                • Opcode Fuzzy Hash: 4efdbf59057b73e0d1f22c765dcf36d640fa36739729300a3d104bb7ce85f719
                                • Instruction Fuzzy Hash: F5E06D71111224BBDB205B66AC4DEEB7F6CDB53BA1F400019F10AD21909AA0C940D2B4
                                APIs
                                  • Part of subcall function 00211ED9: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00211F33
                                  • Part of subcall function 00211ED9: SelectObject.GDI32(?,00000000), ref: 00211F42
                                  • Part of subcall function 00211ED9: BeginPath.GDI32(?), ref: 00211F59
                                  • Part of subcall function 00211ED9: SelectObject.GDI32(?,00000000), ref: 00211F82
                                • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 002A91E6
                                • LineTo.GDI32(?,?,?), ref: 002A91F3
                                • EndPath.GDI32(?), ref: 002A9203
                                • StrokePath.GDI32(?), ref: 002A9211
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                • String ID:
                                • API String ID: 1539411459-0
                                • Opcode ID: c358d1c6ed68b6dd8753b7030ddee9513703a829376de5b24518f0b2772f25cf
                                • Instruction ID: 47b5cda45e818a99bbe1deaf1f88034de45d3dfa86598e011cdd0e322d8cfcfa
                                • Opcode Fuzzy Hash: c358d1c6ed68b6dd8753b7030ddee9513703a829376de5b24518f0b2772f25cf
                                • Instruction Fuzzy Hash: 16F03A31091299BBDB125F55AC0DFCA3A59AF16310F148100FA12250E28B755566CFA9
                                APIs
                                • GetSysColor.USER32(00000008), ref: 0021216C
                                • SetTextColor.GDI32(?,?), ref: 00212176
                                • SetBkMode.GDI32(?,00000001), ref: 00212189
                                • GetStockObject.GDI32(00000005), ref: 00212191
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Color$ModeObjectStockText
                                • String ID:
                                • API String ID: 4037423528-0
                                • Opcode ID: 18554da4c0b406096d30d0704961ccd616b7066588a2bd07888e0cd25b474c0d
                                • Instruction ID: 3122b2e944fda2cae7de2978ab24023b6416afe6803652bb434832b069b3b76f
                                • Opcode Fuzzy Hash: 18554da4c0b406096d30d0704961ccd616b7066588a2bd07888e0cd25b474c0d
                                • Instruction Fuzzy Hash: C2E06531640240AFDB215F74BC0D7D87B60AB13336F048219F7BF440E1C77146559B10
                                APIs
                                • GetCurrentThread.KERNEL32 ref: 00271EC4
                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,00271A69), ref: 00271ECB
                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00271A69), ref: 00271ED8
                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,00271A69), ref: 00271EDF
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CurrentOpenProcessThreadToken
                                • String ID:
                                • API String ID: 3974789173-0
                                • Opcode ID: b3aa172f14a3ecf77f820d437abaf064a4b4e390cd303122b4cbe71a7bdb487a
                                • Instruction ID: db3e1df4203402ce93b66e7035a3d3e1f9bf2902bb60bcc65accdc31b7085172
                                • Opcode Fuzzy Hash: b3aa172f14a3ecf77f820d437abaf064a4b4e390cd303122b4cbe71a7bdb487a
                                • Instruction Fuzzy Hash: 8CE086356012129BE7301FA4BD0DB973B7CAF42791F108848B686C9080DA348455CB50
                                APIs
                                • GetDesktopWindow.USER32 ref: 0026EBD6
                                • GetDC.USER32(00000000), ref: 0026EBE0
                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0026EC00
                                • ReleaseDC.USER32(?), ref: 0026EC21
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CapsDesktopDeviceReleaseWindow
                                • String ID:
                                • API String ID: 2889604237-0
                                • Opcode ID: f2033fe05564feee0ce1e70d17fb86ff892f1b9d1e8c7e2ea641b24ad8c3c09a
                                • Instruction ID: 975ca761881c72a5325fa873844f4bc758db6115aad981319804edbee54c65af
                                • Opcode Fuzzy Hash: f2033fe05564feee0ce1e70d17fb86ff892f1b9d1e8c7e2ea641b24ad8c3c09a
                                • Instruction Fuzzy Hash: 4AE01AB4810201EFCF50AFA0B80CA6DBBB9FB08710F118449E94BA7610CB785951EF00
                                APIs
                                • GetDesktopWindow.USER32 ref: 0026EBEA
                                • GetDC.USER32(00000000), ref: 0026EBF4
                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0026EC00
                                • ReleaseDC.USER32(?), ref: 0026EC21
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CapsDesktopDeviceReleaseWindow
                                • String ID:
                                • API String ID: 2889604237-0
                                • Opcode ID: f0c692a13050fd4dfb3775e9d010180dc124bd2d44895c4fd835bfa6dc62c7cb
                                • Instruction ID: 2f443743465fadbca5e3a46aae7a03235af60bfaccd05a3edce15aff0082e73d
                                • Opcode Fuzzy Hash: f0c692a13050fd4dfb3775e9d010180dc124bd2d44895c4fd835bfa6dc62c7cb
                                • Instruction Fuzzy Hash: 35E012B0C10200EFCF50AFA0B80CAADBBB9BB08710F118449E94AA3610CB389901EF00
                                APIs
                                  • Part of subcall function 00214154: _wcslen.LIBCMT ref: 00214159
                                • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 0028582E
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Connection_wcslen
                                • String ID: *$LPT
                                • API String ID: 1725874428-3443410124
                                • Opcode ID: 4f0709ad4d451895140a8d39d948f9d22829ea1b039fa0fa8437b8688b977434
                                • Instruction ID: ab0f3addf52b30a91f81bb5ba26fc6a5eb9548d414be846e4a36ffc407cb33ae
                                • Opcode Fuzzy Hash: 4f0709ad4d451895140a8d39d948f9d22829ea1b039fa0fa8437b8688b977434
                                • Instruction Fuzzy Hash: E491A078A11615DFCB14EF54C484EAABBF1AF48314F188099E8495F3A2C771EE95CF90
                                APIs
                                • OleSetContainedObject.OLE32(?,00000001), ref: 002757DA
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ContainedObject
                                • String ID: 0$.$Container
                                • API String ID: 3565006973-574371399
                                • Opcode ID: 0cf49e2ec9815343fb210d47017d520ca02a2b1b3bb5eab7b56d992f553c712c
                                • Instruction ID: cd1601e758324dc2edf618459360d7053594f3a1f5fedd5365828608fe51add1
                                • Opcode Fuzzy Hash: 0cf49e2ec9815343fb210d47017d520ca02a2b1b3bb5eab7b56d992f553c712c
                                • Instruction Fuzzy Hash: 76815870610611AFDB54CF64C884A6ABBF9FF48704F10856EF94ACB691DBB1E891CF50
                                APIs
                                • __startOneArgErrorHandling.LIBCMT ref: 0023E69D
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ErrorHandling__start
                                • String ID: pow
                                • API String ID: 3213639722-2276729525
                                • Opcode ID: 2424fb9435a2c98ec52cd9d4375da5858e11f1c4ea02011c4a98f464c7d28728
                                • Instruction ID: 9b44949dc2eec9df3f736348123fb5ae4cb1aa0fb46360d426db9d6f47bb7cf3
                                • Opcode Fuzzy Hash: 2424fb9435a2c98ec52cd9d4375da5858e11f1c4ea02011c4a98f464c7d28728
                                • Instruction Fuzzy Hash: 605190A1D3810396CF19BF14DD4637E67A8AB50B00F314A59F0DA422E9EF748CF99E46
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID: #
                                • API String ID: 0-1885708031
                                • Opcode ID: 449f19c0baebac1d44ca0942a3376eb742e86fc31bd0968186c2d5c8396fc941
                                • Instruction ID: dc109b4dece296c4d3cc4271880c66c8b67edf9c21ef1594b9d0fe6cdc0bc9a3
                                • Opcode Fuzzy Hash: 449f19c0baebac1d44ca0942a3376eb742e86fc31bd0968186c2d5c8396fc941
                                • Instruction Fuzzy Hash: 14514031524257EFCF25DF68E480AFA7BA1EF25310F684155E8919B290DE309DE2CB61
                                APIs
                                • Sleep.KERNEL32(00000000), ref: 0022F6E9
                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 0022F702
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: GlobalMemorySleepStatus
                                • String ID: @
                                • API String ID: 2783356886-2766056989
                                • Opcode ID: 960e1731b1e5ab6de372716edb2259eb52e645afdade93bd88858652f46392b3
                                • Instruction ID: a289211a02bc99aad15d3116ef1d9d984ac96785d74f05406b9d90320be625ac
                                • Opcode Fuzzy Hash: 960e1731b1e5ab6de372716edb2259eb52e645afdade93bd88858652f46392b3
                                • Instruction Fuzzy Hash: F15137715187449BD360AF10EC86BABBBE8FFA4310F81885DF299411A1DF708579CB66
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: BuffCharUpper_wcslen
                                • String ID: CALLARGARRAY
                                • API String ID: 157775604-1150593374
                                • Opcode ID: 0c178ddd1942497eec64d558d887dd684dfcabafdc1e313503ae452177a81d3f
                                • Instruction ID: 638f03c550f1a30a88453f15a927e346302d6316f510dc58ca4d0f244c75bf3d
                                • Opcode Fuzzy Hash: 0c178ddd1942497eec64d558d887dd684dfcabafdc1e313503ae452177a81d3f
                                • Instruction Fuzzy Hash: 7F418371A202199FCF04EFA8C8998EEBBF5EF59320F144069E50AA7352D7709DA1CF50
                                APIs
                                • _wcslen.LIBCMT ref: 0028DA8D
                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0028DA97
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CrackInternet_wcslen
                                • String ID: |
                                • API String ID: 596671847-2343686810
                                • Opcode ID: e49ffe0bf0df2a0f8b913b8c05c9787d4a4b328fed408972ae2ce641e7296393
                                • Instruction ID: 2d3e0a58dec61ed18ae5ece6b8e15f6e459d604ec766727aa823450c9ef0b70d
                                • Opcode Fuzzy Hash: e49ffe0bf0df2a0f8b913b8c05c9787d4a4b328fed408972ae2ce641e7296393
                                • Instruction Fuzzy Hash: 6B313E75811119ABCF05EFA5DC85EEEBFB9FF14304F100019F815A62A2DB319966CF54
                                APIs
                                • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 002A4F7E
                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 002A4F93
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: '
                                • API String ID: 3850602802-1997036262
                                • Opcode ID: 799b21943059123dba1653152f987ab54d9d26dc9bd90ac3b8ccdcdfb915675e
                                • Instruction ID: 305615d2e774d370821084277cc82290feaadef38bb5b87a273187f3cb19a86e
                                • Opcode Fuzzy Hash: 799b21943059123dba1653152f987ab54d9d26dc9bd90ac3b8ccdcdfb915675e
                                • Instruction Fuzzy Hash: 04314874A1020A9FDB04DFA9C880BDABBB5FB89300F10106AE905EB751DBB0E951CF90
                                APIs
                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 002A3BDB
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002A3BE6
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: Combobox
                                • API String ID: 3850602802-2096851135
                                • Opcode ID: f7b5015df44f54e9b3fa972f3e24dda4ea0062799c164e5440b599edb858b286
                                • Instruction ID: 1b26fb66edbfd91874c8492c27c6d03e3a6bae9ee46dff2b46ffa1a4d3ba8cb8
                                • Opcode Fuzzy Hash: f7b5015df44f54e9b3fa972f3e24dda4ea0062799c164e5440b599edb858b286
                                • Instruction Fuzzy Hash: D61193712201096FEF21DE18CC81EBB37ABEB863A8F104525F51497291DA71DD618BB0
                                APIs
                                  • Part of subcall function 0021771B: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00217759
                                  • Part of subcall function 0021771B: GetStockObject.GDI32(00000011), ref: 0021776D
                                  • Part of subcall function 0021771B: SendMessageW.USER32(00000000,00000030,00000000), ref: 00217777
                                • GetWindowRect.USER32(00000000,?), ref: 002A40D9
                                • GetSysColor.USER32(00000012), ref: 002A40F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                • String ID: static
                                • API String ID: 1983116058-2160076837
                                • Opcode ID: 306294f4701363dd7aa5706b817575c5add080576291836d38eb5941da97587a
                                • Instruction ID: bd6a6e6a64e7bdc31fd6ae0a5c79a9a22259259a351783f857f5eac451862519
                                • Opcode Fuzzy Hash: 306294f4701363dd7aa5706b817575c5add080576291836d38eb5941da97587a
                                • Instruction Fuzzy Hash: E1113A7262020AAFDB00EFB8CC45AFA7BF8FB49314F004915F956E3150EA74E861DB60
                                APIs
                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0028D6DA
                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0028D703
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Internet$OpenOption
                                • String ID: <local>
                                • API String ID: 942729171-4266983199
                                • Opcode ID: 0841dcf1e9f08fdbd4fdbc0d6d364d50fee7fdb7a5ef0a3605e760f56296a849
                                • Instruction ID: 23bf37a30a381e732a46a282f0e01b6d86cd373bd46b969a92d8679e099e6d6c
                                • Opcode Fuzzy Hash: 0841dcf1e9f08fdbd4fdbc0d6d364d50fee7fdb7a5ef0a3605e760f56296a849
                                • Instruction Fuzzy Hash: 40110A75126236BAD7285F66AC48EE7BF9CEB127A4F004216B10DC31C0E7A09C54C7F0
                                APIs
                                • GetWindowTextLengthW.USER32(00000000), ref: 002A3E0A
                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 002A3E19
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: LengthMessageSendTextWindow
                                • String ID: edit
                                • API String ID: 2978978980-2167791130
                                • Opcode ID: f585f79a5d28a584a2b33cf82d60d77847efd541d78ac6206725e545e1ceabe7
                                • Instruction ID: 575f06321fe500298e11895afcf54bdb8f6dfcb5c2b831407ab39f993f3edb8d
                                • Opcode Fuzzy Hash: f585f79a5d28a584a2b33cf82d60d77847efd541d78ac6206725e545e1ceabe7
                                • Instruction Fuzzy Hash: 76114C71520609EBEB109E64EC84AFB3BA9EF17368F504714F961971E0CB71EC619B60
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                • CharUpperBuffW.USER32(?,?,?), ref: 00277545
                                • _wcslen.LIBCMT ref: 00277551
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen$BuffCharUpper
                                • String ID: STOP
                                • API String ID: 1256254125-2411985666
                                • Opcode ID: 23ca1b8acac2e91d96cb40036b798c9232ef32d84fd458b5cb0fb1dd4c253b39
                                • Instruction ID: 024ab7a0b0c90dbea820590a137e0ed9399c4433a146bfdbf84c3dc54eb43d89
                                • Opcode Fuzzy Hash: 23ca1b8acac2e91d96cb40036b798c9232ef32d84fd458b5cb0fb1dd4c253b39
                                • Instruction Fuzzy Hash: B901C832A341274BCB10AFBDDC459BF77B5BB657507504524EC1596191FB30DD60CB50
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                  • Part of subcall function 00274536: GetClassNameW.USER32(?,?,000000FF), ref: 00274559
                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 002725DC
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClassMessageNameSend_wcslen
                                • String ID: ComboBox$ListBox
                                • API String ID: 624084870-1403004172
                                • Opcode ID: 14ce02f468b9ab0aa0a1aa9ca1b10fda519f0a00072c79bd9daab02d5f899543
                                • Instruction ID: 4db3f3c09a81bbfb899915bbad299cae9f1cfeb300cf6f56bb35e29fe5207ce3
                                • Opcode Fuzzy Hash: 14ce02f468b9ab0aa0a1aa9ca1b10fda519f0a00072c79bd9daab02d5f899543
                                • Instruction Fuzzy Hash: 7301F571A20115EBCB09FBA4CC65CFE77B4EF62310B44460AE866933D2EB30982C8A50
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                  • Part of subcall function 00274536: GetClassNameW.USER32(?,?,000000FF), ref: 00274559
                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 002724D6
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClassMessageNameSend_wcslen
                                • String ID: ComboBox$ListBox
                                • API String ID: 624084870-1403004172
                                • Opcode ID: 8577cb9ccb0e893f579381e1efa0fe82d285d22a7698f56c0079218be17801bf
                                • Instruction ID: 8ee43eb8b142cd4966c0dda9ea9b7eaa3a2de53ae92492150db13199261c1d15
                                • Opcode Fuzzy Hash: 8577cb9ccb0e893f579381e1efa0fe82d285d22a7698f56c0079218be17801bf
                                • Instruction Fuzzy Hash: CD01FC71A20105A7CB19FBA0CC25EFF77F89F21304F14401AA40663282DB709E2CCA71
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                  • Part of subcall function 00274536: GetClassNameW.USER32(?,?,000000FF), ref: 00274559
                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00272558
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClassMessageNameSend_wcslen
                                • String ID: ComboBox$ListBox
                                • API String ID: 624084870-1403004172
                                • Opcode ID: ea7e0fd17f8f188ef2692af60ed8fef50c3ca1fd472be9a7d281364ce865db9f
                                • Instruction ID: 8cd513efe32c3f0b4da25bfbdf49b5a07a204bb992ba9ee7a7980dc02cf97759
                                • Opcode Fuzzy Hash: ea7e0fd17f8f188ef2692af60ed8fef50c3ca1fd472be9a7d281364ce865db9f
                                • Instruction Fuzzy Hash: 7201F771A20105A7CB19FBA0C915EFE73F89B21700F544116B80673282EA709E2C8A71
                                APIs
                                  • Part of subcall function 0021B25F: _wcslen.LIBCMT ref: 0021B269
                                  • Part of subcall function 00274536: GetClassNameW.USER32(?,?,000000FF), ref: 00274559
                                • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00272663
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ClassMessageNameSend_wcslen
                                • String ID: ComboBox$ListBox
                                • API String ID: 624084870-1403004172
                                • Opcode ID: cacf20f29c19c2146f747ada9dd24ba8e55a08539e0afd404c9b956f625bf18a
                                • Instruction ID: d1b9555b22c17ff652928c9e860679c0c9541e6289a6c2505e50dedecfb51a4d
                                • Opcode Fuzzy Hash: cacf20f29c19c2146f747ada9dd24ba8e55a08539e0afd404c9b956f625bf18a
                                • Instruction Fuzzy Hash: C4F0A971A70115A7C715F7A49C55FFF77BCAF21714F040616F566632C2DB70582C8650
                                APIs
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,002E4018,002E405C), ref: 002A8B1E
                                • CloseHandle.KERNEL32 ref: 002A8B30
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CloseCreateHandleProcess
                                • String ID: \@.
                                • API String ID: 3712363035-3058191372
                                • Opcode ID: 18de5bc018971de270630f2376c06739bb164783154354b31e118b93b29509ea
                                • Instruction ID: 23df410bf840b565788d0eff88ec523b5bf95e72d9964049434a63c1e8d54543
                                • Opcode Fuzzy Hash: 18de5bc018971de270630f2376c06739bb164783154354b31e118b93b29509ea
                                • Instruction Fuzzy Hash: 87F05EF2990344BBE7207B62FC8AFB73A5CDB05750F400471BB08DA192DA754C649AB8
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID:
                                • String ID: O<$$j3+
                                • API String ID: 0-1511095827
                                • Opcode ID: 3cbdd5bf4fe050d8186c4e7828ccca536139a39f9615304acab049e74eb0df74
                                • Instruction ID: ffad6d723ee41c3f395edaf7918bd9d75400b95e03bcf535765b8b978a3a85f0
                                • Opcode Fuzzy Hash: 3cbdd5bf4fe050d8186c4e7828ccca536139a39f9615304acab049e74eb0df74
                                • Instruction Fuzzy Hash: D6F09025264169AADB18DF91D804AFA73A8DF04710F50446AFD8AC7180EA708FA0D365
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: _wcslen
                                • String ID: 3, 3, 16, 1
                                • API String ID: 176396367-3042988571
                                • Opcode ID: 77d5f58b8740d8b7b23292a81d3fba1022bcbbdfac6d2ead212f4ba20b013733
                                • Instruction ID: a2834e2949f8f574ab11d257c9752756c323524c53435d37da129d6b22def4e6
                                • Opcode Fuzzy Hash: 77d5f58b8740d8b7b23292a81d3fba1022bcbbdfac6d2ead212f4ba20b013733
                                • Instruction Fuzzy Hash: 4DE02B4133531121D63426799CC25BB5189DFCA790B102CABF9C5C2276EA809CB283A0
                                APIs
                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 002713B3
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Message
                                • String ID: AutoIt$Error allocating memory.
                                • API String ID: 2030045667-4017498283
                                • Opcode ID: 77446b1f22eb49bad2938d24cfd8d4f79a966e8c2d6cb0ea46e78a098ddb1f8f
                                • Instruction ID: 510733fe9883a27d5556721222519f964f8d428609b1045bb98cba187dbc856b
                                • Opcode Fuzzy Hash: 77446b1f22eb49bad2938d24cfd8d4f79a966e8c2d6cb0ea46e78a098ddb1f8f
                                • Instruction Fuzzy Hash: 74E0D87226831537D21027947C47FC976848F06F11F104417F68D549C28EE164B04BA9
                                APIs
                                  • Part of subcall function 0022FAE2: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00231102,?,?,?,0021100A), ref: 0022FAE7
                                • IsDebuggerPresent.KERNEL32(?,?,?,0021100A), ref: 00231106
                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0021100A), ref: 00231115
                                Strings
                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00231110
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                • API String ID: 55579361-631824599
                                • Opcode ID: 32ca628fd8d6f0463d9961c17a7238d12af39d4ab4f6bb084d34ecdb9bc7a2e9
                                • Instruction ID: 99ab4fa2fcbd516fde4705eeeef45e008e45f40e6e2cb9c7ea530f5315b1f5e9
                                • Opcode Fuzzy Hash: 32ca628fd8d6f0463d9961c17a7238d12af39d4ab4f6bb084d34ecdb9bc7a2e9
                                • Instruction Fuzzy Hash: 58E06DB06203108BD3209F24E9487C3BBF4AB08340F00896DE88AC2651EBB4E4A8CF91
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 0022F102
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Init_thread_footer
                                • String ID: 05.$85.
                                • API String ID: 1385522511-1686519407
                                • Opcode ID: ccaa1d7bdb66c156898a97e8deded04d29dff820943503000e1f5e2d60086ee7
                                • Instruction ID: 759fe621268d1c3b85196654657ff21cb52b406ebb1137c215d9356dcb132531
                                • Opcode Fuzzy Hash: ccaa1d7bdb66c156898a97e8deded04d29dff820943503000e1f5e2d60086ee7
                                • Instruction Fuzzy Hash: 13E0DF310B0AE0EBC604DB58F98C9983360EB0D322BD001B9E4029B296DB201B618A18
                                APIs
                                • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00283905
                                • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 0028391A
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: Temp$FileNamePath
                                • String ID: aut
                                • API String ID: 3285503233-3010740371
                                • Opcode ID: e18cf3f9f865a2dad9cdfdaf9b40a5ffdb2594417097dadff5f3faf82b5b35d5
                                • Instruction ID: 680e9067a1ffc6d2166d7513cdf3ea56d4b76c702f22c50f9cc32483700a600d
                                • Opcode Fuzzy Hash: e18cf3f9f865a2dad9cdfdaf9b40a5ffdb2594417097dadff5f3faf82b5b35d5
                                • Instruction Fuzzy Hash: C1D05BB150031467DA209754AC0DFCB7A6CDB45710F0001917E5691091DEB4E945C790
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 002A2CCB
                                • PostMessageW.USER32(00000000), ref: 002A2CD2
                                  • Part of subcall function 0027F1A7: Sleep.KERNEL32 ref: 0027F21F
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: 70bc7d03c3b9dc68aad390dea99fea6552943d950ad56665e21b5ec44a6d0d82
                                • Instruction ID: bb2fe53799e2f634068017efcc362721dbe188c6fc8a65a5b39fb642caf45d24
                                • Opcode Fuzzy Hash: 70bc7d03c3b9dc68aad390dea99fea6552943d950ad56665e21b5ec44a6d0d82
                                • Instruction Fuzzy Hash: 93D0C9357D53506BF668B770ED4FFC66A54AB56B10F800816B24AAA1D0CDA468108A98
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 002A2C8B
                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 002A2C9E
                                  • Part of subcall function 0027F1A7: Sleep.KERNEL32 ref: 0027F21F
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: 130d72ac396eae90f25e9307ef6b1b7f7724f9bb185762dd24799512602f08e9
                                • Instruction ID: 7f1cb5d92c94799cf82416fe1761a0b9f76960f46c2a45aa9454d59c4e8bfcd0
                                • Opcode Fuzzy Hash: 130d72ac396eae90f25e9307ef6b1b7f7724f9bb185762dd24799512602f08e9
                                • Instruction Fuzzy Hash: 55D0C9357E8350A7F668B770ED4FFD66A54AB51B10F400816B24AAA1D0CDA468108A98
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0024C233
                                • GetLastError.KERNEL32 ref: 0024C241
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0024C29C
                                Memory Dump Source
                                • Source File: 00000001.00000002.2111532049.0000000000211000.00000020.00000001.01000000.00000005.sdmp, Offset: 00210000, based on PE: true
                                • Associated: 00000001.00000002.2111508352.0000000000210000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002AD000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111598202.00000000002D3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111642997.00000000002DD000.00000004.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000001.00000002.2111666566.00000000002E5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_210000_AutoIt3.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$ErrorLast
                                • String ID:
                                • API String ID: 1717984340-0
                                • Opcode ID: c95561a0dd708fb06635df776a6cb20ad80158419f3ada8e338bf7b8a932b776
                                • Instruction ID: dfe79985d95096db5ac3cae92d0a4dd4c9baaec9a3d203b69b63061f141bde23
                                • Opcode Fuzzy Hash: c95561a0dd708fb06635df776a6cb20ad80158419f3ada8e338bf7b8a932b776
                                • Instruction Fuzzy Hash: 0741F931621207AFCB69CFEDD844AAA7BA5EF41320F344169FC5A67191DBF08D21DB50