Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AutoHotkey_2.0.12_setup.exe

Overview

General Information

Sample name:AutoHotkey_2.0.12_setup.exe
Analysis ID:1417389
MD5:2cdbe2b76a36b976e9980fb4733f1052
SHA1:64bbb4dbeed8639b272a73c2cad0f9155f42115d
SHA256:4e1e3123dd85d3ac65a0803b08dd89b9b12b5a00b9f566782855332d03e5fe26
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Contains functionality to detect sleep reduction / modifications
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs new ROOT certificates
Machine Learning detection for sample
Sample or dropped binary is a compiled AutoHotkey binary
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to detect sandboxes (foreground window change detection)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Register New IFiltre For Persistence
Stores files to the Windows start menu directory
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • AutoHotkey_2.0.12_setup.exe (PID: 6872 cmdline: "C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe" MD5: 2CDBE2B76A36B976E9980FB4733F1052)
    • AutoHotkey_2.0.12_setup.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe" /to "C:\Program Files\AutoHotkey" MD5: 2CDBE2B76A36B976E9980FB4733F1052)
      • AutoHotkeyUX.exe (PID: 6760 cmdline: "C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" "C:\Program Files\AutoHotkey\UX\reset-assoc.ahk" /check MD5: 825448610A8213A8408578DF2361D5EB)
  • AutoHotkeyUX.exe (PID: 2104 cmdline: "C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" UX\ui-dash.ahk MD5: 825448610A8213A8408578DF2361D5EB)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Registry Key setAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Details: {5e941d80-bf96-11cd-b579-08002b30bfeb}, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe, ProcessId: 6576, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ahk\PersistentHandler\(Default)
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exeVirustotal: Detection: 13%Perma Link
Source: C:\Program Files\AutoHotkey\v2\AutoHotkey32.exeVirustotal: Detection: 13%Perma Link
Source: AutoHotkey_2.0.12_setup.exeReversingLabs: Detection: 34%
Source: AutoHotkey_2.0.12_setup.exeVirustotal: Detection: 35%Perma Link
Source: AutoHotkey_2.0.12_setup.exeJoe Sandbox ML: detected
Source: AutoHotkey_2.0.12_setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkeyJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.stagingJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey64.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey.chmJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\WindowSpy.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\license.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\Install.cmdJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UXJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install-ahk2exe.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install-version.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\launcher.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\reload-v1.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\reset-assoc.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-dash.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-editor.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-launcherconfig.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-newscript.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-setup.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-uninstall.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\WindowSpy.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\incJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\bounce-v1.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\CommandLineToArgs.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\common.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\config.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\CreateAppShortcut.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\EnableUIAccess.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\GetGitHubReleaseAssetURL.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\HashFile.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\identify.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\identify_regex.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\launcher-common.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\README.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\ShellRun.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\spy.icoJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\ui-base.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\TemplatesJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\Templates\Minimal for v2.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2Jump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey32.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey64.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey.chmJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UXJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\install-ahk2exe.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\install-version.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\install.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\launcher.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\reload-v1.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\reset-assoc.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-dash.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-editor.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-launcherconfig.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-newscript.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-setup.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-uninstall.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\WindowSpy.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\incJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\bounce-v1.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\CommandLineToArgs.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\common.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\config.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\CreateAppShortcut.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\EnableUIAccess.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\GetGitHubReleaseAssetURL.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\HashFile.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\identify.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\identify_regex.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\launcher-common.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\README.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\ShellRun.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\spy.icoJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\ui-base.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\TemplatesJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\Templates\Minimal for v2.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\license.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey32_UIA.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\RCXC8B7.tmpJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey64_UIA.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\RCXC9D2.tmpJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\WindowSpy.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\installed-files.csvJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkeyJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\license.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\README.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\UX\inc\README.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\license.txtJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014009D920 FindFirstFileW,FindClose,FindFirstFileW,FindClose,2_2_000000014009D920
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140029230 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,FileTimeToSystemTime,2_2_0000000140029230
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014006C3C0 GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,GetTickCount,PeekMessageW,GetTickCount,MoveFileW,DeleteFileW,MoveFileW,CopyFileW,GetLastError,FindNextFileW,FindClose,2_2_000000014006C3C0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400295E0 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,2_2_00000001400295E0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140029780 GetFileAttributesW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,FindClose,2_2_0000000140029780
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014005C950 FindFirstFileW,FindNextFileW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,2_2_000000014005C950
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140028F30 FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,2_2_0000000140028F30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014005C950 FindFirstFileW,FindNextFileW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,3_2_000000014005C950
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014009D920 FindFirstFileW,FindClose,FindFirstFileW,FindClose,3_2_000000014009D920
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014006C3C0 GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,GetTickCount,PeekMessageW,GetTickCount,MoveFileW,DeleteFileW,MoveFileW,CopyFileW,GetLastError,FindNextFileW,FindClose,3_2_000000014006C3C0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140028F30 FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,3_2_0000000140028F30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140029230 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,FileTimeToSystemTime,3_2_0000000140029230
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400295E0 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,3_2_00000001400295E0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140029780 GetFileAttributesW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,FindClose,3_2_0000000140029780
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014006B130 InternetOpenW,InternetOpenUrlW,GetLastError,InternetCloseHandle,CreateFileW,GetLastError,InternetCloseHandle,InternetCloseHandle,InternetReadFile,GetTickCount,PeekMessageW,GetTickCount,WriteFile,InternetReadFile,GetLastError,InternetCloseHandle,InternetCloseHandle,CloseHandle,InternetReadFileExA,GetTickCount,PeekMessageW,GetTickCount,WriteFile,InternetReadFileExA,GetLastError,InternetCloseHandle,InternetCloseHandle,CloseHandle,DeleteFileW,3_2_000000014006B130
Source: AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1662851164.0000000004C6F000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1658658628.00000000032F2000.00000004.00000020.00020000.00000000.sdmp, install.ahk0.1.dr, install.ahk.1.drString found in binary or memory: http://msdn.com/library/bb756929
Source: AutoHotkey_2.0.12_setup.exe, AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1661477020.00000000032FE000.00000004.00000020.00020000.00000000.sdmp, GetGitHubReleaseAssetURL.ahk.1.dr, GetGitHubReleaseAssetURL.ahk0.1.drString found in binary or memory: https://api.github.com/repos/
Source: AutoHotkeyUX.exe, AutoHotkeyUX.exe, 00000003.00000000.1672423841.00000001400FB000.00000002.00000001.01000000.00000007.sdmp, RCXC9D2.tmp.1.dr, AutoHotkeyUX.exe.1.dr, install.ahk0.1.dr, install.ahk.1.dr, AutoHotkey32.exe.1.dr, AutoHotkey64.exe0.1.dr, RCXC8B7.tmp.1.dr, AutoHotkey32.exe0.1.dr, AutoHotkey64_UIA.exe.1.dr, AutoHotkey32_UIA.exe.1.dr, AutoHotkey64.exe.1.drString found in binary or memory: https://autohotkey.com
Source: AutoHotkey_2.0.12_setup.exe, AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1661601618.00000000032F8000.00000004.00000020.00020000.00000000.sdmp, HashFile.ahk0.1.dr, HashFile.ahk.1.drString found in binary or memory: https://autohotkey.com/board/topic/66139-ahk-l-calculating-md5sha-checksum-from-file/
Source: AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1675115571.0000000000EBB000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1674958594.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1676929026.0000000000EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://autohotkey.com6122658-3693405117-2476756634-1002
Source: AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000007AA000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000004CE000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1657426465.00000000032FB000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1667999256.0000000005ADE000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1666681857.0000000004CE0000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1658294710.00000000032F0000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000007AA000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000004CE000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1656985053.00000000033C1000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1662797233.0000000004C90000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1666211341.0000000005BAC000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1656610056.0000000004C90000.00000004.00000020.00020000.00000000.sdmp, AutoHotkeyUX.exe, 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmp, AutoHotkeyUX.exe, 00000003.00000000.1672423841.00000001400FB000.00000002.00000001.01000000.00000007.sdmp, RCXC9D2.tmp.1.dr, AutoHotkeyUX.exe.1.dr, AutoHotkey32.exe.1.dr, AutoHotkey64.exe0.1.dr, RCXC8B7.tmp.1.drString found in binary or memory: https://autohotkey.comCould
Source: AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1654219063.0000000004C50000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1675253556.0000000004C4E000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1669568690.0000000004C50000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1677686567.0000000004C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://autohotkey.comx
Source: AutoHotkeyUX.exe, 00000003.00000003.1673973935.0000000000170000.00000004.00000020.00020000.00000000.sdmp, AutoHotkeyUX.exe, 00000003.00000002.2844452266.0000000000CE0000.00000004.00000020.00020000.00000000.sdmp, ui-dash.ahk.1.dr, ui-dash.ahk0.1.drString found in binary or memory: https://www.autohotkey.com/docs/v1/
Source: ui-dash.ahk0.1.drString found in binary or memory: https://www.autohotkey.com/docs/v2/
Source: AutoHotkeyUX.exe, 00000003.00000003.1673973935.0000000000170000.00000004.00000020.00020000.00000000.sdmp, ui-editor.ahk.1.dr, ui-editor.ahk0.1.drString found in binary or memory: https://www.autohotkey.com/docs/v2/misc/Editors.htm
Source: install-version.ahk.1.dr, launcher.ahk.1.dr, launcher.ahk0.1.drString found in binary or memory: https://www.autohotkey.com/download/
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400078A0 GetTickCount,OpenClipboard,GetTickCount,OpenClipboard,2_2_00000001400078A0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400070F0 GlobalAlloc,GlobalLock,GlobalFree,EmptyClipboard,GlobalUnlock,CloseClipboard,GlobalUnlock,GlobalFree,GlobalUnlock,CloseClipboard,SetClipboardData,GlobalUnlock,CloseClipboard,2_2_00000001400070F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400A05B0 EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,GlobalFree,GlobalUnlock,CloseClipboard,GlobalUnlock,CloseClipboard,2_2_00000001400A05B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400A05B0 EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,GlobalFree,GlobalUnlock,CloseClipboard,GlobalUnlock,CloseClipboard,3_2_00000001400A05B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400070F0 GlobalAlloc,GlobalLock,GlobalFree,EmptyClipboard,GlobalUnlock,CloseClipboard,GlobalUnlock,GlobalFree,GlobalUnlock,CloseClipboard,SetClipboardData,GlobalUnlock,CloseClipboard,3_2_00000001400070F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140007780 GetClipboardFormatNameW,GetClipboardData,2_2_0000000140007780
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400309C0 GetSystemMetrics,GetSystemMetrics,GetDC,GetLastError,DestroyIcon,DeleteObject,GetIconInfo,DeleteObject,DeleteObject,GetDC,CreateCompatibleDC,GetIconInfo,GetObjectW,CreateCompatibleBitmap,SelectObject,CreateSolidBrush,FillRect,DeleteObject,DrawIconEx,SelectObject,DeleteObject,DeleteObject,DeleteDC,ReleaseDC,DestroyIcon,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GetLastError,ReleaseDC,DeleteObject,SelectObject,DeleteDC,DeleteObject,2_2_00000001400309C0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140068600 GetKeyState,GetKeyState,GetAsyncKeyState,2_2_0000000140068600
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014000172D SetTimer,GetTickCount,GetMessageW,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,GetFocus,GetClassNameW,GetTickCount,PeekMessageW,PeekMessageW,GetTickCount,PeekMessageW,Sleep,GetClassLongW,GetWindowLongPtrW,GetWindowLongW,GetParent,TranslateAcceleratorW,GetDlgCtrlID,GetParent,GetKeyState,GetWindowLongW,IsWindowEnabled,GetKeyState,GetKeyState,GetKeyState,GetDlgCtrlID,GetParent,IsDialogMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetTickCount,Sleep,GetTickCount,Sleep,PostMessageW,SendMessageW,SendMessageW,ShowWindow,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,IsDialogMessageW,KillTimer,2_2_000000014000172D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014000172D SetTimer,GetTickCount,GetMessageW,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,GetFocus,GetClassNameW,GetTickCount,PeekMessageW,PeekMessageW,GetTickCount,PeekMessageW,Sleep,GetClassLongW,GetWindowLongPtrW,GetWindowLongW,GetParent,TranslateAcceleratorW,GetDlgCtrlID,GetParent,GetKeyState,GetWindowLongW,IsWindowEnabled,GetKeyState,GetKeyState,GetKeyState,GetDlgCtrlID,GetParent,IsDialogMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetTickCount,Sleep,GetTickCount,Sleep,PostMessageW,SendMessageW,SendMessageW,ShowWindow,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,IsDialogMessageW,KillTimer,3_2_000000014000172D

System Summary

barindex
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeWindow found: window name: AutoHotkeyJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeWindow found: window name: AutoHotkeyJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeWindow found: window name: AutoHotkeyJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeWindow found: window name: AutoHotkeyJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140026B3C: GetDriveTypeW,CreateFileW,DeviceIoControl,CloseHandle,2_2_0000000140026B3C
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014005FA90 GetFileAttributesW,CreateProcessWithLogonW,GetLastError,CreateProcessW,CloseHandle,GetLastError,SetCurrentDirectoryW,GetFileAttributesW,SetCurrentDirectoryW,ShellExecuteExW,CloseHandle,GetLastError,FormatMessageW,2_2_000000014005FA90
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014006CB10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,3_2_000000014006CB10
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeCode function: 1_3_00E3964B1_3_00E3964B
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeCode function: 1_2_00E3964B1_2_00E3964B
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140047FE42_2_0000000140047FE4
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400462B02_2_00000001400462B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400722C02_2_00000001400722C0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400485B02_2_00000001400485B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014004C8F02_2_000000014004C8F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400059702_2_0000000140005970
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400510402_2_0000000140051040
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400370502_2_0000000140037050
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014002C0502_2_000000014002C050
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014000C0B42_2_000000014000C0B4
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400B80E02_2_00000001400B80E0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400352002_2_0000000140035200
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400302502_2_0000000140030250
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C925C2_2_00000001400C925C
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014001E28D2_2_000000014001E28D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400D13382_2_00000001400D1338
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C13542_2_00000001400C1354
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400394F02_2_00000001400394F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400555172_2_0000000140055517
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400105302_2_0000000140010530
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C15582_2_00000001400C1558
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400A05B02_2_00000001400A05B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C35AC2_2_00000001400C35AC
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014008A6102_2_000000014008A610
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014000260C2_2_000000014000260C
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400CB6A02_2_00000001400CB6A0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014001F7002_2_000000014001F700
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400347102_2_0000000140034710
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014000172D2_2_000000014000172D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C97682_2_00000001400C9768
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C17642_2_00000001400C1764
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400CF7802_2_00000001400CF780
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400027CE2_2_00000001400027CE
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014001B7E02_2_000000014001B7E0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400597F02_2_00000001400597F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400367F02_2_00000001400367F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400127F02_2_00000001400127F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400378202_2_0000000140037820
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014002F8202_2_000000014002F820
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400198202_2_0000000140019820
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C28982_2_00000001400C2898
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400279402_2_0000000140027940
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014003F9602_2_000000014003F960
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C19682_2_00000001400C1968
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C39B02_2_00000001400C39B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400D19B82_2_00000001400D19B8
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400309C02_2_00000001400309C0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400ADA902_2_00000001400ADA90
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014001DAF02_2_000000014001DAF0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014008BB102_2_000000014008BB10
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400A1B302_2_00000001400A1B30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014004DB602_2_000000014004DB60
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C1B742_2_00000001400C1B74
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014001FC202_2_000000014001FC20
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140041C402_2_0000000140041C40
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400D5C342_2_00000001400D5C34
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140015C852_2_0000000140015C85
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400D8CB02_2_00000001400D8CB0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014005DCF02_2_000000014005DCF0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014003DD102_2_000000014003DD10
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014000FD702_2_000000014000FD70
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400C1D782_2_00000001400C1D78
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014005CE302_2_000000014005CE30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140051E602_2_0000000140051E60
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014009BE802_2_000000014009BE80
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014000AE842_2_000000014000AE84
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400D0EA42_2_00000001400D0EA4
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014002DED02_2_000000014002DED0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140029EF02_2_0000000140029EF0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140021F102_2_0000000140021F10
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140048F272_2_0000000140048F27
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140087F302_2_0000000140087F30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400A7F502_2_00000001400A7F50
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140034F742_2_0000000140034F74
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140055FB02_2_0000000140055FB0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140047FF03_2_0000000140047FF0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400562503_2_0000000140056250
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400462B03_2_00000001400462B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400722C03_2_00000001400722C0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007E44A3_2_000000014007E44A
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007C4903_2_000000014007C490
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400485B03_2_00000001400485B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014004C8F03_2_000000014004C8F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400510403_2_0000000140051040
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400255403_2_0000000140025540
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400855703_2_0000000140085570
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014000172D3_2_000000014000172D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400758F03_2_00000001400758F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400059703_2_0000000140005970
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014008DA803_2_000000014008DA80
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014004DB603_2_000000014004DB60
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083C003_2_0000000140083C00
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140051E603_2_0000000140051E60
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140097E703_2_0000000140097E70
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140029EF03_2_0000000140029EF0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014002C0503_2_000000014002C050
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400160503_2_0000000140016050
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014000C0B43_2_000000014000C0B4
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400B80E03_2_00000001400B80E0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400740DE3_2_00000001400740DE
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400302503_2_0000000140030250
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014001E28D3_2_000000014001E28D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400804203_2_0000000140080420
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400105303_2_0000000140010530
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400A05B03_2_00000001400A05B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014008A6103_2_000000014008A610
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014000260C3_2_000000014000260C
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400347103_2_0000000140034710
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400267403_2_0000000140026740
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140080D903_2_0000000140080D90
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400027CE3_2_00000001400027CE
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400367F03_2_00000001400367F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400127F03_2_00000001400127F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C28983_2_00000001400C2898
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400309C03_2_00000001400309C0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140084AC03_2_0000000140084AC0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140082BFC3_2_0000000140082BFC
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140082C0B3_2_0000000140082C0B
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140082C163_2_0000000140082C16
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140062C193_2_0000000140062C19
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400D8CB03_2_00000001400D8CB0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140082CE53_2_0000000140082CE5
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140082CFE3_2_0000000140082CFE
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140082D063_2_0000000140082D06
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140082D1B3_2_0000000140082D1B
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140080D903_2_0000000140080D90
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014005CE303_2_000000014005CE30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014000AE843_2_000000014000AE84
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400D0EA43_2_00000001400D0EA4
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140048F273_2_0000000140048F27
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140034F743_2_0000000140034F74
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140016FD03_2_0000000140016FD0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400AB03B3_2_00000001400AB03B
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014008304B3_2_000000014008304B
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400370503_2_0000000140037050
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014006B1303_2_000000014006B130
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400352003_2_0000000140035200
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C925C3_2_00000001400C925C
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007F3363_2_000000014007F336
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400D13383_2_00000001400D1338
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C13543_2_00000001400C1354
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400394F03_2_00000001400394F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400555173_2_0000000140055517
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400715503_2_0000000140071550
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C15583_2_00000001400C1558
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C35AC3_2_00000001400C35AC
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400CB6A03_2_00000001400CB6A0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014001F7003_2_000000014001F700
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400AB70A3_2_00000001400AB70A
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C97683_2_00000001400C9768
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C17643_2_00000001400C1764
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400CF7803_2_00000001400CF780
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014001B7E03_2_000000014001B7E0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400597F03_2_00000001400597F0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400378203_2_0000000140037820
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014002F8203_2_000000014002F820
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400198203_2_0000000140019820
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400279403_2_0000000140027940
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014003F9603_2_000000014003F960
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C19683_2_00000001400C1968
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C39B03_2_00000001400C39B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400D19B83_2_00000001400D19B8
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400ADA903_2_00000001400ADA90
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014001DAF03_2_000000014001DAF0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014008BB103_2_000000014008BB10
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400A1B303_2_00000001400A1B30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C1B743_2_00000001400C1B74
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014001FC203_2_000000014001FC20
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140041C403_2_0000000140041C40
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400D5C343_2_00000001400D5C34
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140079C803_2_0000000140079C80
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140015C853_2_0000000140015C85
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014005DCF03_2_000000014005DCF0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014003DD103_2_000000014003DD10
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083D1A3_2_0000000140083D1A
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083D273_2_0000000140083D27
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083D593_2_0000000140083D59
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014000FD703_2_000000014000FD70
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400C1D783_2_00000001400C1D78
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083D953_2_0000000140083D95
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083E013_2_0000000140083E01
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083E6D3_2_0000000140083E6D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014009BE803_2_000000014009BE80
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083EA53_2_0000000140083EA5
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014002DED03_2_000000014002DED0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140021F103_2_0000000140021F10
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140087F303_2_0000000140087F30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400A7F503_2_00000001400A7F50
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 00000001400C5CA0 appears 36 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 000000014000F730 appears 50 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 00000001400BB8A8 appears 48 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 000000014000EDA0 appears 50 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 0000000140011B40 appears 39 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 0000000140006DF0 appears 44 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 000000014000F150 appears 36 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 0000000140010AC0 appears 135 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 00000001400D99E0 appears 38 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 00000001400C0410 appears 83 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 00000001400A3410 appears 62 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 000000014000D38C appears 54 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 0000000140011560 appears 33 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 000000014009C780 appears 74 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 00000001400C0224 appears 343 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 0000000140010880 appears 98 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 0000000140011210 appears 40 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 00000001400055E0 appears 32 times
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: String function: 000000014000F880 appears 46 times
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: mssign32.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: mssign32.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: wininet.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: wininet.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeSection loaded: wintypes.dllJump to behavior
Source: AutoHotkey_2.0.12_setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal76.evad.winEXE@6/78@0/0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014005FA90 GetFileAttributesW,CreateProcessWithLogonW,GetLastError,CreateProcessW,CloseHandle,GetLastError,SetCurrentDirectoryW,GetFileAttributesW,SetCurrentDirectoryW,ShellExecuteExW,CloseHandle,GetLastError,FormatMessageW,2_2_000000014005FA90
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014006CB10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,3_2_000000014006CB10
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014002716C GetDiskFreeSpaceW,GetLastError,2_2_000000014002716C
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014006CBC0 OpenProcess,GetProcessId,WaitForSingleObject,CloseHandle,GetLastError,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,CloseHandle,CloseHandle,2_2_000000014006CBC0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400342D0 CoCreateInstance,CoTaskMemFree,CoTaskMemFree,2_2_00000001400342D0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140047FE4 CharUpperW,CompareStringOrdinal,FindResourceW,LoadResource,LockResource,SizeofResource,GetCPInfo,FindResourceW,SetCurrentDirectoryW,2_2_0000000140047FE4
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkeyJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\f213bf5a8af890680781f9b7261613ea_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile read: C:\Program Files\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: AutoHotkey_2.0.12_setup.exeReversingLabs: Detection: 34%
Source: AutoHotkey_2.0.12_setup.exeVirustotal: Detection: 35%
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: ux.InstallCommand := Format('"{1}" "{2}\UX\install.ahk" /install "%1"' , interpreter, this.InstallDir)
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: CmdStr('UX\install.ahk', '/install "%1"')}, {ValueName: 'Version', Value: this.Version}, ])
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: /install
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: /installto
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: FileInstall("UX\ui-launcherconfig.ahk", "UX\ui-launcherconfig.ahk", 1)
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: '/install'
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: /install "%1"
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: '/installto'
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: this.AddVerb('Launch', 'UX\launcher.ahk', '/Launch "%1" %*', "Launch", aumid, {ValueName: 'ProgrammaticAccessOnly', Value: ""} )
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: "{1}" "{2}\UX\install.ahk" /install "%1"
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: /Launch "%1" %*
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: UX\ui-launcherconfig.ahk
Source: AutoHotkey_2.0.12_setup.exeString found in binary or memory: UX\UI-LAUNCHERCONFIG.AHK
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile read: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe "C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe"
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeProcess created: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe "C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe" /to "C:\Program Files\AutoHotkey"
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeProcess created: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe "C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" "C:\Program Files\AutoHotkey\UX\reset-assoc.ahk" /check
Source: unknownProcess created: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe "C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" UX\ui-dash.ahk
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeProcess created: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe "C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe" /to "C:\Program Files\AutoHotkey"Jump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeProcess created: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe "C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" "C:\Program Files\AutoHotkey\UX\reset-assoc.ahk" /checkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6D90F11-9C73-11D3-B32E-00C04F990BB4}\InProcServer32Jump to behavior
Source: AutoHotkey Dash.lnk.1.drLNK file: ..\..\..\..\..\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
Source: AutoHotkey Window Spy.lnk.1.drLNK file: ..\..\..\..\..\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkeyJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.stagingJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey64.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey.chmJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\WindowSpy.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\license.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\Install.cmdJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UXJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install-ahk2exe.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install-version.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\launcher.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\reload-v1.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\reset-assoc.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-dash.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-editor.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-launcherconfig.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-newscript.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-setup.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-uninstall.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\WindowSpy.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\incJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\bounce-v1.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\CommandLineToArgs.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\common.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\config.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\CreateAppShortcut.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\EnableUIAccess.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\GetGitHubReleaseAssetURL.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\HashFile.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\identify.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\identify_regex.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\launcher-common.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\README.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\ShellRun.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\spy.icoJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\ui-base.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\TemplatesJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\Templates\Minimal for v2.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2Jump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey32.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey64.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey.chmJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UXJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\install-ahk2exe.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\install-version.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\install.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\launcher.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\reload-v1.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\reset-assoc.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-dash.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-editor.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-launcherconfig.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-newscript.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-setup.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\ui-uninstall.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\WindowSpy.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\incJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\bounce-v1.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\CommandLineToArgs.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\common.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\config.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\CreateAppShortcut.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\EnableUIAccess.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\GetGitHubReleaseAssetURL.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\HashFile.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\identify.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\identify_regex.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\launcher-common.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\README.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\ShellRun.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\spy.icoJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\inc\ui-base.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\TemplatesJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\Templates\Minimal for v2.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\license.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey32_UIA.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\RCXC8B7.tmpJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey64_UIA.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\RCXC9D2.tmpJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\v2\AutoHotkey.exeJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\WindowSpy.ahkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDirectory created: C:\Program Files\AutoHotkey\UX\installed-files.csvJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkeyJump to behavior
Source: AutoHotkey_2.0.12_setup.exeStatic file information: File size 3000320 > 1048576
Source: AutoHotkey_2.0.12_setup.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x2d3200
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400252B0 GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,WideCharToMultiByte,GetProcAddress,GetProcAddress,WideCharToMultiByte,GetModuleHandleW,LoadLibraryW,GetProcAddress,GetProcAddress,2_2_00000001400252B0
Source: AutoHotkey64.exe.1.drStatic PE information: section name: _RDATA
Source: AutoHotkey64_UIA.exe.1.drStatic PE information: section name: _RDATA
Source: AutoHotkey64.exe0.1.drStatic PE information: section name: _RDATA
Source: AutoHotkeyUX.exe.1.drStatic PE information: section name: _RDATA
Source: RCXC9D2.tmp.1.drStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeCode function: 1_3_00E3C2C6 pushad ; ret 1_3_00E3C2E1
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeCode function: 1_3_00E681C8 push eax; ret 1_3_00E68511
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeCode function: 1_3_00E3CFCC push esi; iretd 1_3_00E3CFD5
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeCode function: 1_2_00E3C2C6 pushad ; ret 1_2_00E3C2E1
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeCode function: 1_2_00E681C8 push eax; ret 1_2_00E68511
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeCode function: 1_2_00E3CFCC push esi; iretd 1_2_00E3CFD5
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7 BlobJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7 BlobJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7 BlobJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7 BlobJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7 BlobJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7 BlobJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\v2\RCXC9D2.tmpJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\v2\AutoHotkey64_UIA.exeJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\v2\RCXC8B7.tmpJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exeJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\v2\AutoHotkey32_UIA.exeJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey64.exeJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\v2\AutoHotkey32.exeJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\v2\AutoHotkey64.exeJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\license.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\README.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\UX\inc\README.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\Program Files\AutoHotkey\license.txtJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoHotkey Dash.lnkJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoHotkey Window Spy.lnkJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\v2\AutoHotkey32.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\v2\AutoHotkey64.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\v2\AutoHotkey.chm:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\install-ahk2exe.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\install-version.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\install.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\launcher.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\reload-v1.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\reset-assoc.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\ui-dash.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\ui-editor.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\ui-launcherconfig.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\ui-newscript.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\ui-setup.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\ui-uninstall.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\WindowSpy.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\bounce-v1.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\CommandLineToArgs.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\common.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\config.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\CreateAppShortcut.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\EnableUIAccess.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\GetGitHubReleaseAssetURL.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\HashFile.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\identify.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\identify_regex.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\launcher-common.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\README.txt:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\ShellRun.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\spy.ico:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\inc\ui-base.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\UX\Templates\Minimal for v2.ahk:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile opened: C:\Program Files\AutoHotkey\license.txt:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140043590 IsZoomed,IsIconic,2_2_0000000140043590
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400A1B30 GetWindowThreadProcessId,GetForegroundWindow,IsIconic,ShowWindow,SetForegroundWindow,GetForegroundWindow,GetWindow,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,SetForegroundWindow,GetForegroundWindow,GetWindow,SetForegroundWindow,GetForegroundWindow,GetWindow,AttachThreadInput,AttachThreadInput,BringWindowToTop,2_2_00000001400A1B30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014009DF20 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,2_2_000000014009DF20
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140087F30 SendMessageW,GetWindowLongW,IsWindowVisible,IsIconic,GetFocus,GetDlgCtrlID,GetParent,GetWindowRect,GetPropW,ShowWindow,GetUpdateRect,SendMessageW,GetWindowLongW,ShowWindow,EnableWindow,GetWindowRect,PtInRect,PtInRect,SetFocus,SendMessageW,ShowWindow,SetFocus,InvalidateRect,MapWindowPoints,InvalidateRect,2_2_0000000140087F30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007C490 SendMessageW,MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,SelectObject,ReleaseDC,SetWindowTheme,SendMessageW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,GetClientRect,SetWindowLongW,SendMessageW,SetWindowLongW,SendMessageW,MoveWindow,GetWindowRect,SendMessageW,GetWindowRect,MapWindowPoints,InvalidateRect,SetWindowPos,SetWindowPos,MapWindowPoints,3_2_000000014007C490
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083C00 IsZoomed,IsIconic,ShowWindow,MulDiv,MulDiv,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,GetClientRect,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,SystemParametersInfoW,GetWindowRect,IsZoomed,ShowWindow,ScreenToClient,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,IsWindowVisible,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,UpdateWindow,SetFocus,3_2_0000000140083C00
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083C00 IsZoomed,IsIconic,ShowWindow,MulDiv,MulDiv,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,GetClientRect,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,SystemParametersInfoW,GetWindowRect,IsZoomed,ShowWindow,ScreenToClient,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,IsWindowVisible,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,UpdateWindow,SetFocus,3_2_0000000140083C00
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140080420 GetWindowLongW,GetWindowLongW,SetWindowPos,EnableWindow,IsWindow,SetParent,SetWindowLongPtrW,SetParent,IsWindowVisible,IsIconic,SetWindowLongW,SetWindowLongW,SetWindowPos,InvalidateRect,3_2_0000000140080420
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140068EA0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,CreateDCW,GetDC,GetPixel,DeleteDC,ReleaseDC,3_2_0000000140068EA0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140043590 IsZoomed,IsIconic,3_2_0000000140043590
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400A1B30 GetWindowThreadProcessId,GetForegroundWindow,IsIconic,ShowWindow,SetForegroundWindow,GetForegroundWindow,GetWindow,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,SetForegroundWindow,GetForegroundWindow,GetWindow,SetForegroundWindow,GetForegroundWindow,GetWindow,AttachThreadInput,AttachThreadInput,BringWindowToTop,3_2_00000001400A1B30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007DBB5 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,3_2_000000014007DBB5
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007DBBD GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,3_2_000000014007DBBD
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007DBC5 MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,3_2_000000014007DBC5
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007DBD3 MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,3_2_000000014007DBD3
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007DC17 MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,3_2_000000014007DC17
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007DC46 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,3_2_000000014007DC46
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014007DC55 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,3_2_000000014007DC55
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083D1A ShowWindow,MulDiv,MulDiv,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,ScreenToClient,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,IsWindowVisible,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,3_2_0000000140083D1A
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083D27 ShowWindow,MulDiv,MulDiv,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,ScreenToClient,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,IsWindowVisible,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,3_2_0000000140083D27
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083D59 ShowWindow,MulDiv,MulDiv,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,ScreenToClient,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,IsWindowVisible,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,3_2_0000000140083D59
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083D95 ShowWindow,MulDiv,MulDiv,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,ScreenToClient,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,IsWindowVisible,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,3_2_0000000140083D95
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083E01 ShowWindow,MulDiv,MulDiv,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,ScreenToClient,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,IsWindowVisible,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,3_2_0000000140083E01
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083E6D ShowWindow,MulDiv,MulDiv,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,ScreenToClient,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,IsWindowVisible,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,3_2_0000000140083E6D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140083EA5 MulDiv,MulDiv,ShowWindow,MulDiv,MulDiv,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,GetWindowRect,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,ScreenToClient,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,IsWindowVisible,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,3_2_0000000140083EA5
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014009DF20 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,3_2_000000014009DF20
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140087F30 SendMessageW,GetWindowLongW,IsWindowVisible,IsIconic,GetFocus,GetDlgCtrlID,GetParent,GetWindowRect,GetPropW,ShowWindow,GetUpdateRect,SendMessageW,GetWindowLongW,ShowWindow,EnableWindow,GetWindowRect,PtInRect,PtInRect,SetFocus,SendMessageW,ShowWindow,SetFocus,InvalidateRect,MapWindowPoints,InvalidateRect,3_2_0000000140087F30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140061FB0 SendMessageW,IsWindowVisible,ShowWindow,IsIconic,ShowWindow,GetForegroundWindow,SetForegroundWindow,SendMessageW,3_2_0000000140061FB0
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014000172D2_2_000000014000172D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014000172D3_2_000000014000172D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: SetTimer,GetTickCount,GetMessageW,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,GetFocus,GetClassNameW,GetTickCount,PeekMessageW,PeekMessageW,GetTickCount,PeekMessageW,Sleep,GetClassLongW,GetWindowLongPtrW,GetWindowLongW,GetParent,TranslateAcceleratorW,GetDlgCtrlID,GetParent,GetKeyState,GetWindowLongW,IsWindowEnabled,GetKeyState,GetKeyState,GetKeyState,GetDlgCtrlID,GetParent,IsDialogMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetTickCount,Sleep,GetTickCount,Sleep,PostMessageW,SendMessageW,SendMessageW,ShowWindow,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,IsDialogMessageW,KillTimer,2_2_000000014000172D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: SetTimer,GetTickCount,GetMessageW,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,GetFocus,GetClassNameW,GetTickCount,PeekMessageW,PeekMessageW,GetTickCount,PeekMessageW,Sleep,GetClassLongW,GetWindowLongPtrW,GetWindowLongW,GetParent,TranslateAcceleratorW,GetDlgCtrlID,GetParent,GetKeyState,GetWindowLongW,IsWindowEnabled,GetKeyState,GetKeyState,GetKeyState,GetDlgCtrlID,GetParent,IsDialogMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetTickCount,Sleep,GetTickCount,Sleep,PostMessageW,SendMessageW,SendMessageW,ShowWindow,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,IsDialogMessageW,KillTimer,3_2_000000014000172D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeWindow / User API: foregroundWindowGot 1079Jump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDropped PE file which has not been started: C:\Program Files\AutoHotkey\v2\RCXC9D2.tmpJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDropped PE file which has not been started: C:\Program Files\AutoHotkey\v2\AutoHotkey64_UIA.exeJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDropped PE file which has not been started: C:\Program Files\AutoHotkey\v2\RCXC8B7.tmpJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDropped PE file which has not been started: C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exeJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDropped PE file which has not been started: C:\Program Files\AutoHotkey\v2\AutoHotkey32_UIA.exeJump to dropped file
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeDropped PE file which has not been started: C:\Program Files\AutoHotkey\v2\AutoHotkey32.exeJump to dropped file
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeAPI coverage: 2.6 %
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeAPI coverage: 4.2 %
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014000172D3_2_000000014000172D
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140023080 GetKeyboardLayout followed by cmp: cmp dl, 00000019h and CTI: ja 000000014002328Ch country: Russian (ru)2_2_0000000140023080
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014001DAF0 GetKeyboardLayout followed by cmp: cmp ecx, 0ah and CTI: jl 000000014001DE60h country: Spanish (es)2_2_000000014001DAF0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140048D4A GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140048F34h country: Urdu (ur)2_2_0000000140048D4A
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140048D4A GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: jnbe 0000000140048F34h country: Inuktitut (iu)2_2_0000000140048D4A
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140048D4A GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140048F34h country: Urdu (ur)3_2_0000000140048D4A
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140048D4A GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: jnbe 0000000140048F34h country: Inuktitut (iu)3_2_0000000140048D4A
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140023080 GetKeyboardLayout followed by cmp: cmp dl, 00000019h and CTI: ja 000000014002328Ch country: Russian (ru)3_2_0000000140023080
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014001DAF0 GetKeyboardLayout followed by cmp: cmp ecx, 0ah and CTI: jl 000000014001DE60h country: Spanish (es)3_2_000000014001DAF0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140035200 GetLocalTime followed by cmp: cmp ax, 0009h and CTI: jne 00000001400355A5h2_2_0000000140035200
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140035200 GetLocalTime followed by cmp: cmp word ptr [rbx], di and CTI: je 0000000140035836h2_2_0000000140035200
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140035200 GetLocalTime followed by cmp: cmp dx, ax and CTI: je 0000000140035762h2_2_0000000140035200
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140035200 GetLocalTime followed by cmp: cmp ax, 0009h and CTI: jne 00000001400355A5h3_2_0000000140035200
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140035200 GetLocalTime followed by cmp: cmp word ptr [rbx], di and CTI: je 0000000140035836h3_2_0000000140035200
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140035200 GetLocalTime followed by cmp: cmp dx, ax and CTI: je 0000000140035762h3_2_0000000140035200
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014009D920 FindFirstFileW,FindClose,FindFirstFileW,FindClose,2_2_000000014009D920
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140029230 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,FileTimeToSystemTime,2_2_0000000140029230
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014006C3C0 GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,GetTickCount,PeekMessageW,GetTickCount,MoveFileW,DeleteFileW,MoveFileW,CopyFileW,GetLastError,FindNextFileW,FindClose,2_2_000000014006C3C0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400295E0 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,2_2_00000001400295E0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140029780 GetFileAttributesW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,FindClose,2_2_0000000140029780
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014005C950 FindFirstFileW,FindNextFileW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,2_2_000000014005C950
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140028F30 FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,2_2_0000000140028F30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014005C950 FindFirstFileW,FindNextFileW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,3_2_000000014005C950
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014009D920 FindFirstFileW,FindClose,FindFirstFileW,FindClose,3_2_000000014009D920
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_000000014006C3C0 GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,GetTickCount,PeekMessageW,GetTickCount,MoveFileW,DeleteFileW,MoveFileW,CopyFileW,GetLastError,FindNextFileW,FindClose,3_2_000000014006C3C0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140028F30 FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,3_2_0000000140028F30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140029230 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,FileTimeToSystemTime,3_2_0000000140029230
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400295E0 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,3_2_00000001400295E0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140029780 GetFileAttributesW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,FindClose,3_2_0000000140029780
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014001E241 GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,BlockInput,GetTickCount,2_2_000000014001E241
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400D00D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00000001400D00D8
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400252B0 GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,WideCharToMultiByte,GetProcAddress,GetProcAddress,WideCharToMultiByte,GetModuleHandleW,LoadLibraryW,GetProcAddress,GetProcAddress,2_2_00000001400252B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400D00D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00000001400D00D8
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400D9A30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00000001400D9A30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400D00D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00000001400D00D8
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400BA410 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00000001400BA410
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400BA5F4 SetUnhandledExceptionFilter,3_2_00000001400BA5F4
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_00000001400D9A30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00000001400D9A30
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014005FA90 GetFileAttributesW,CreateProcessWithLogonW,GetLastError,CreateProcessW,CloseHandle,GetLastError,SetCurrentDirectoryW,GetFileAttributesW,SetCurrentDirectoryW,ShellExecuteExW,CloseHandle,GetLastError,FormatMessageW,2_2_000000014005FA90
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014001FC20 GetCurrentThreadId,MapVirtualKeyW,GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,GetForegroundWindow,GetWindowThreadProcessId,GetGUIThreadInfo,GetWindowThreadProcessId,GetKeyboardLayout,keybd_event,keybd_event,2_2_000000014001FC20
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400210C0 GetCursorPos,GetCursorPos,GetSystemMetrics,GetSystemMetrics,GetCursorPos,mouse_event,mouse_event,2_2_00000001400210C0
Source: AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1657426465.00000000032FB000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000008C6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: msctls_statusbar321No StatusBar.Press OK to continue.IsHungAppWindowahk_idpidProgram ManagerError text not found (please report)Q\E{0,DEFINEUTF16)UCP)NO_START_OPT)CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument is compiled in 8 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: AutoHotkeyUX.exeBinary or memory string: Program Manager
Source: AutoHotkeyUX.exeBinary or memory string: Shell_TrayWnd
Source: AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000007AA000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000004CE000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000007AA000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: WMahk_groupTarget window not found.PosTarget control not found.%uCountSelectedFocusedind+-^HwndShell_TrayWndRtlGetVersionntdll.dll%u.%u.%u%s: %s...%s[%Iu of %Iu]: %-1.60s%sMinHide<object>AltTabShiftAltTabAltTabMenuAltTabAndMenuAltTabMenuDismissAbsACosASinATanCaretGetPosCeilChrComCallComObjActiveComObjConnectComObjFlagsComObjFromPtrComObjGetComObjQueryComObjTypeComObjValueCosDllCallExpFileOpenFloorFormatFormatTimeGetMethodHasBaseHasMethodHasPropInStrIsAlnumIsAlphaIsDigitIsFloatIsIntegerIsLowerIsNumberIsObjectIsSetRefIsSpaceIsTimeIsUpperIsXDigitLnLogLTrimModNumGetNumPutObjAddRefObjBindMethodObjFromPtrObjFromPtrAddRefObjGetBaseObjGetCapacityObjHasOwnPropObjOwnPropCountObjOwnPropsObjPtrObjPtrAddRefObjReleaseObjSetBaseObjSetCapacityOrdRegCreateKeyRegDeleteRegDeleteKeyRegExMatchRegExReplaceRegReadRegWriteRoundRTrimRunWaitSinSoundGetInterfaceSoundGetMuteSoundGetNameSoundGetVolumeSoundSetMuteSoundSetVolumeSplitPathSqrtStrCompareStrGetStrLenStrLowerStrPtrStrPutStrReplaceStrTitleStrUpperSubStrTanTrimTypeVarSetStrCapacityVerCompareWinActiveWinExistAhkPathAhkVersionAllowMainWindowAppDataAppDataCommonClipboardComputerNameControlDelayCoordModeCaretCoordModeMenuCoordModeMouseCoordModePixelCoordModeToolTipCursorDDDDDDDDDDefaultMouseSpeedDesktopDesktopCommonEndCharEventInfoHotkeyIntervalHotkeyModifierTimeoutHourIconFileIconHiddenIconNumberIconTipIndexInitialWorkingDirIs64bitOSIsAdminIsCompiledIsCriticalIsPausedIsSuspendedKeyDelayKeyDelayPlayKeyDurationKeyDurationPlayLanguageLastErrorLineFileLineNumberLoopFieldLoopFileAttribLoopFileDirLoopFileExtLoopFileFullPathLoopFileNameLoopFilePathLoopFileShortNameLoopFileShortPathLoopFileSizeLoopFileSizeKBLoopFileSizeMBLoopFileTimeAccessedLoopFileTimeCreatedLoopFileTimeModifiedLoopReadLineLoopRegKeyLoopRegNameLoopRegTimeModifiedLoopRegTypeMaxHotkeysPerIntervalMDayMenuMaskKeyMMMonMouseDelayMouseDelayPlayMyDocumentsNowNowUTCOSVersionPriorHotkeyPriorKeyProgramFilesProgramsProgramsCommonPtrSizeRegViewScreenDPIScreenHeightScreenWidthScriptDirScriptFullPathScriptHwndScriptNameSecStartMenuStartMenuCommonStartupStartupCommonStoreCapsLockModeThisFuncThisHotkeyTickCountTimeIdleTimeIdleKeyboardTimeIdleMouseTimeIdlePhysicalTimeSincePriorHotkeyTimeSinceThisHotkeyTitleMatchModeTitleMatchModeSpeedTrayMenuUserNameWinDelayWinDirWorkingDirYearYYYY.ahk - %sRegClassCreateWindowConsolasHICON:"%s"notepad.exeCould not open script./include "%s" /restart /script "%s"Script file not found.%s
Source: AutoHotkeyUX.exe, 00000002.00000002.1671065802.00000000007F9000.00000004.00000010.00020000.00000000.sdmp, AutoHotkeyUX.exe, 00000003.00000002.2844314606.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: ProgmanA
Source: AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1657426465.00000000032FB000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000008C6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ahk_groupTarget window not found.PosTarget control not found.%uCountSelectedFocusedind+-^HwndShell_TrayWndRtlGetVersionntdll.dll%u.%u.%u%s: %s...%s[%Iu of %Iu]: %-1.60s%sMinHide<object>AltTabShiftAltTabAltTabMenuAltTabAndMenuAltTabMenuDismissAbsACosASinATanCaretGetPosCeilChrComCallComObjActiveComObjConnectComObjFlagsComObjFromPtrComObjGetComObjQueryComObjTypeComObjValueCosDllCallExpFileOpenFloorFormatFormatTimeGetMethodHasBaseHasMethodHasPropInStrIsAlnumIsAlphaIsDigitIsFloatIsIntegerIsLowerIsNumberIsObjectIsSetRefIsSpaceIsTimeIsUpperIsXDigitLnLogLTrimModNumGetNumPutObjAddRefObjBindMethodObjFromPtrObjFromPtrAddRefObjGetBaseObjGetCapacityObjHasOwnPropObjOwnPropCountObjOwnPropsObjPtrObjPtrAddRefObjReleaseObjSetBaseObjSetCapacityOrdRegCreateKeyRegDeleteRegDeleteKeyRegExMatchRegExReplaceRegReadRegWriteRoundRTrimRunWaitSinSoundGetInterfaceSoundGetMuteSoundGetNameSoundGetVolumeSoundSetMuteSoundSetVolumeSplitPathSqrtStrCompareStrGetStrLenStrLowerStrPtrStrPutStrReplaceStrTitleStrUpperSubStrTanTrimTypeVarSetStrCapacityVerCompareWinActiveWinExistAhkPathAhkVersionAllowMainWindowAppDataAppDataCommonClipboardComputerNameControlDelayCoordModeCaretCoordModeMenuCoordModeMouseCoordModePixelCoordModeToolTipCursorDDDDDDDDDDefaultMouseSpeedDesktopDesktopCommonEndCharEventInfoHotkeyIntervalHotkeyModifierTimeoutHourIconFileIconHiddenIconNumberIconTipIndexInitialWorkingDirIs64bitOSIsAdminIsCompiledIsCriticalIsPausedIsSuspendedKeyDelayKeyDelayPlayKeyDurationKeyDurationPlayLanguageLastErrorLineFileLineNumberLoopFieldLoopFileAttribLoopFileDirLoopFileExtLoopFileFullPathLoopFileNameLoopFilePathLoopFileShortNameLoopFileShortPathLoopFileSizeLoopFileSizeKBLoopFileSizeMBLoopFileTimeAccessedLoopFileTimeCreatedLoopFileTimeModifiedLoopReadLineLoopRegKeyLoopRegNameLoopRegTimeModifiedLoopRegTypeMaxHotkeysPerIntervalMDayMenuMaskKeyMMMonMouseDelayMouseDelayPlayMyDocumentsNowNowUTCOSVersionPriorHotkeyPriorKeyProgramFilesProgramsProgramsCommonPtrSizeRegViewScreenDPIScreenHeightScreenWidthScriptDirScriptFullPathScriptHwndScriptNameSecStartMenuStartMenuCommonStartupStartupCommonStoreCapsLockModeThisFuncThisHotkeyTickCountTimeIdleTimeIdleKeyboardTimeIdleMouseTimeIdlePhysicalTimeSincePriorHotkeyTimeSinceThisHotkeyTitleMatchModeTitleMatchModeSpeedTrayMenuUserNameWinDelayWinDirWorkingDirYearYYYY.ahk - %sRegClassCreateWindowConsolasHICON:"%s"notepad.exeCould not open script./include "%s" /restart /script "%s"Script file not found.%s
Source: AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000007AA000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000004CE000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000007AA000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: (Mmsctls_statusbar321No StatusBar.Press OK to continue.IsHungAppWindowahk_idpidProgram ManagerError text not found (please report)Q\E{0,DEFINEUTF16)UCP)NO_START_OPT)CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument is compiled in 8 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeQueries volume information: C:\Program Files\AutoHotkey\v2\AutoHotkey32_UIA.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeQueries volume information: C:\Program Files\AutoHotkey\v2\AutoHotkey64_UIA.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140035200 GetLocalTime,GetLocalTime,GetTimeFormatW,GetTimeFormatW,IsCharAlphaNumericW,IsCharAlphaNumericW,GetDateFormatW,GetDateFormatW,2_2_0000000140035200
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_000000014003D3B0 GetComputerNameW,GetUserNameW,2_2_000000014003D3B0
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_00000001400011A0 GetModuleHandleW,GetProcAddress,GetVersionExW,2_2_00000001400011A0
Source: C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 2_2_0000000140045A80 UnhookWindowsHookEx,UnregisterHotKey,Shell_NotifyIconW,RemoveClipboardFormatListener,DestroyWindow,DeleteObject,DestroyIcon,DestroyIcon,RemoveMenu,DestroyMenu,DeleteObject,IsWindow,DestroyWindow,mciSendStringW,mciSendStringW,DeleteCriticalSection,OleUninitialize,2_2_0000000140045A80
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140066310 AddClipboardFormatListener,RemoveClipboardFormatListener,3_2_0000000140066310
Source: C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exeCode function: 3_2_0000000140045A80 UnhookWindowsHookEx,UnregisterHotKey,Shell_NotifyIconW,RemoveClipboardFormatListener,DestroyWindow,DeleteObject,DestroyIcon,DestroyIcon,RemoveMenu,DestroyMenu,DeleteObject,IsWindow,DestroyWindow,mciSendStringW,mciSendStringW,DeleteCriticalSection,OleUninitialize,3_2_0000000140045A80
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
11
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol1
Screen Capture
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Windows Service
1
Valid Accounts
21
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares21
Input Capture
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron1
Registry Run Keys / Startup Folder
11
Access Token Manipulation
1
Install Root Certificate
NTDS26
System Information Discovery
Distributed Component Object Model3
Clipboard Data
Protocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
Windows Service
1
Software Packing
LSA Secrets23
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
Process Injection
1
DLL Side-Loading
Cached Domain Credentials2
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
Registry Run Keys / Startup Folder
3
Masquerading
DCSync11
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Valid Accounts
Proc Filesystem1
System Owner/User Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
Access Token Manipulation
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
Process Injection
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
Hidden Files and Directories
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
AutoHotkey_2.0.12_setup.exe35%ReversingLabsWin32.Trojan.Generic
AutoHotkey_2.0.12_setup.exe35%VirustotalBrowse
AutoHotkey_2.0.12_setup.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exe13%ReversingLabs
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exe14%VirustotalBrowse
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey64.exe0%ReversingLabs
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey64.exe0%VirustotalBrowse
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe0%ReversingLabs
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe0%VirustotalBrowse
C:\Program Files\AutoHotkey\v2\AutoHotkey32.exe13%ReversingLabs
C:\Program Files\AutoHotkey\v2\AutoHotkey32.exe14%VirustotalBrowse
C:\Program Files\AutoHotkey\v2\AutoHotkey64.exe0%ReversingLabs
C:\Program Files\AutoHotkey\v2\AutoHotkey64.exe0%VirustotalBrowse
C:\Program Files\AutoHotkey\v2\RCXC8B7.tmp11%ReversingLabs
C:\Program Files\AutoHotkey\v2\RCXC8B7.tmp6%VirustotalBrowse
C:\Program Files\AutoHotkey\v2\RCXC9D2.tmp0%ReversingLabs
C:\Program Files\AutoHotkey\v2\RCXC9D2.tmp0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://autohotkey.comCould0%URL Reputationsafe
https://autohotkey.comx0%Avira URL Cloudsafe
https://autohotkey.com6122658-3693405117-2476756634-10020%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://autohotkey.com/board/topic/66139-ahk-l-calculating-md5sha-checksum-from-file/AutoHotkey_2.0.12_setup.exe, AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1661601618.00000000032F8000.00000004.00000020.00020000.00000000.sdmp, HashFile.ahk0.1.dr, HashFile.ahk.1.drfalse
    high
    https://autohotkey.comxAutoHotkey_2.0.12_setup.exe, 00000001.00000003.1654219063.0000000004C50000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1675253556.0000000004C4E000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1669568690.0000000004C50000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1677686567.0000000004C50000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://www.autohotkey.com/download/install-version.ahk.1.dr, launcher.ahk.1.dr, launcher.ahk0.1.drfalse
      high
      https://www.autohotkey.com/docs/v2/ui-dash.ahk0.1.drfalse
        high
        https://www.autohotkey.com/docs/v1/AutoHotkeyUX.exe, 00000003.00000003.1673973935.0000000000170000.00000004.00000020.00020000.00000000.sdmp, AutoHotkeyUX.exe, 00000003.00000002.2844452266.0000000000CE0000.00000004.00000020.00020000.00000000.sdmp, ui-dash.ahk.1.dr, ui-dash.ahk0.1.drfalse
          high
          http://msdn.com/library/bb756929AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1662851164.0000000004C6F000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1658658628.00000000032F2000.00000004.00000020.00020000.00000000.sdmp, install.ahk0.1.dr, install.ahk.1.drfalse
            high
            https://autohotkey.comAutoHotkeyUX.exe, AutoHotkeyUX.exe, 00000003.00000000.1672423841.00000001400FB000.00000002.00000001.01000000.00000007.sdmp, RCXC9D2.tmp.1.dr, AutoHotkeyUX.exe.1.dr, install.ahk0.1.dr, install.ahk.1.dr, AutoHotkey32.exe.1.dr, AutoHotkey64.exe0.1.dr, RCXC8B7.tmp.1.dr, AutoHotkey32.exe0.1.dr, AutoHotkey64_UIA.exe.1.dr, AutoHotkey32_UIA.exe.1.dr, AutoHotkey64.exe.1.drfalse
              high
              https://api.github.com/repos/AutoHotkey_2.0.12_setup.exe, AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1661477020.00000000032FE000.00000004.00000020.00020000.00000000.sdmp, GetGitHubReleaseAssetURL.ahk.1.dr, GetGitHubReleaseAssetURL.ahk0.1.drfalse
                high
                https://autohotkey.com6122658-3693405117-2476756634-1002AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1675115571.0000000000EBB000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1674958594.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1676929026.0000000000EBE000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://autohotkey.comCouldAutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000007AA000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000000.00000002.1650316409.00000000004CE000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1657426465.00000000032FB000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000008C6000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1667999256.0000000005ADE000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1666681857.0000000004CE0000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1658294710.00000000032F0000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000007AA000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000002.1675919729.00000000004CE000.00000040.00000001.01000000.00000003.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1656985053.00000000033C1000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1662797233.0000000004C90000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1666211341.0000000005BAC000.00000004.00000020.00020000.00000000.sdmp, AutoHotkey_2.0.12_setup.exe, 00000001.00000003.1656610056.0000000004C90000.00000004.00000020.00020000.00000000.sdmp, AutoHotkeyUX.exe, 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmp, AutoHotkeyUX.exe, 00000003.00000000.1672423841.00000001400FB000.00000002.00000001.01000000.00000007.sdmp, RCXC9D2.tmp.1.dr, AutoHotkeyUX.exe.1.dr, AutoHotkey32.exe.1.dr, AutoHotkey64.exe0.1.dr, RCXC8B7.tmp.1.drfalse
                • URL Reputation: safe
                unknown
                https://www.autohotkey.com/docs/v2/misc/Editors.htmAutoHotkeyUX.exe, 00000003.00000003.1673973935.0000000000170000.00000004.00000020.00020000.00000000.sdmp, ui-editor.ahk.1.dr, ui-editor.ahk0.1.drfalse
                  high
                  No contacted IP infos
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1417389
                  Start date and time:2024-03-29 07:48:31 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 27s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:10
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:AutoHotkey_2.0.12_setup.exe
                  Detection:MAL
                  Classification:mal76.evad.winEXE@6/78@0/0
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:
                  • Successful, ratio: 65%
                  • Number of executed functions: 48
                  • Number of non-executed functions: 203
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target AutoHotkey_2.0.12_setup.exe, PID 6576 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  07:49:14API Interceptor2x Sleep call for process: AutoHotkey_2.0.12_setup.exe modified
                  07:49:21API Interceptor2x Sleep call for process: AutoHotkeyUX.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:MS Windows HtmlHelp Data
                  Category:dropped
                  Size (bytes):2001344
                  Entropy (8bit):7.995473310759226
                  Encrypted:true
                  SSDEEP:49152:8gtJD4GrdWKYzvZ51ixTVdyFEI6VHMiYB0MG:8gtGOyjuXHlhMiNZ
                  MD5:E42714518B26BC65D26B813E182F90CD
                  SHA1:1D739F1071E4A087234A8B73C32786BAECF815E5
                  SHA-256:10FDFCE6830404381A0C9BE77F7C149760FD0ADE8DD65571FFFEB6C8C5008553
                  SHA-512:195E4277E006DC326F0BDA15EEC2B190440D6937120DD1AAC99C80CCCF85ADC8A4F2C21381EB65D5EF24CC0C6C438973D9D30E6DA6EA22B7AFCC7E46002CB980
                  Malicious:false
                  Reputation:low
                  Preview:ITSF....`.......&..........|.{.......".....|.{......."..`...............x.......T`.......`..............................ITSP....T...........................................j..].!......."..T...............PMGLQ................/..../#IDXHDR....O.../#ITBITS..../#STRINGS....y..../#SYSTEM....(./#TOPICS....O.../#URLSTR....3..F./#URLTBL...._.T./#WINDOWS....2.L./$FIftiMain....[..t./$OBJINST......?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property......./$WWKeywordLinks/..../$WWKeywordLinks/BTree....~..L./$WWKeywordLinks/Data....J.|./$WWKeywordLinks/Map....F.2./$WWKeywordLinks/Property....x ./docs/..../docs/AHKL_DBGPClients.htm......../docs/ChangeLog.htm...]..../docs/Compat.htm....:.E./docs/Concepts.htm..)..;./docs/FAQ.htm....4..../docs/Functions.htm...n..F./docs/HotkeyFeatures.htm....K.L./docs/Hotkeys.htm......"./docs/Hotstrings.htm...N..6./docs/howto/..../docs/howto/Install.htm..../.A./docs/howto/ManageWindows.htm....&.v./docs/howto/RunExamples.htm....].e./docs/howto/RunPrograms.htm....
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):979968
                  Entropy (8bit):6.478182737646768
                  Encrypted:false
                  SSDEEP:24576:UnbyRuLHeIj86TTuQbyB3+vETrGNW8NxqxYk:2yKgqEvGNW83qxY
                  MD5:8BC086A1CE0B394DE31CD415A3CD0E87
                  SHA1:620FBFC0FCE8067A9AF12C0E3267F8C17C658D6A
                  SHA-256:05FCAF6F09B9FE4B85887F75183310D34166A0B854CA0907B497808BE7B8F87D
                  SHA-512:0F989B2584FDBFDE2EA01DD0AC7FF7C51DA0063AB01C57053DDF15547BA7187F2795D5013BEFF558431FE0DB0A1A0AF991DBC4AF455CD86BA7D4676366104237
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 13%
                  • Antivirus: Virustotal, Detection: 14%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=aS.S2S.S2S.S2..P3].S2F.V3..S2F.W3F.S2F.P3J.S2..W3H.S2..V3..S2..U3R.S2..R3r.S2S.R2..S2ekP3R.S2ekZ3..S2ek.2R.S2ekQ3R.S2RichS.S2........PE..L......e...............%.h..........9.............@..........................P................@.............................l...T.......................................8...........................0...@............................................text....f.......h.................. ..`.rdata..4............l..............@..@.data...4.... ...b..................@....rsrc................n..............@..@........................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):1256448
                  Entropy (8bit):6.40012168761782
                  Encrypted:false
                  SSDEEP:24576:Ve1psX+O47m4ffJhxZ4rBcRyMlc/SsVNGgMxCRjU:Vek+bi4ffJhxZ4axcbHGPWj
                  MD5:825448610A8213A8408578DF2361D5EB
                  SHA1:F43875855E4F02010AD6C755067B813D0FCBE68A
                  SHA-256:37FF15A23A98F0A658298E21F1873CA896A05208810BF796F90CA212EE07C7B1
                  SHA-512:7556143128878B2E765309DB8B35CC8206D325C0C17C37B191600BD8F719A923B0F917F4C53F0946ED2D12136A9E42774246595EED78F1038779FDCBD3736EEE
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  • Antivirus: Virustotal, Detection: 0%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./...kl..kl..kl.. ...|l..~...El..~...xl..~...bl.. ...rl.. ....l.. ...jl.. ...Jl..kl...m..].il..].)l..].j.jl..].jl..Richkl..........PE..d......e..........#....%.......................@.......................................... ...@.................................................T....@..............................@...8...............................@............................................text...v........................... ..`.rdata..............................@..@.data...............................@....pdata..............."..............@..@_RDATA..\....0......................@..@.rsrc........@......................@..@........................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:DOS batch file, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):66
                  Entropy (8bit):4.768048195759553
                  Encrypted:false
                  SSDEEP:3:mKDDFRKn9+/Vo5WbvHAtIv74o:hGBF+v74o
                  MD5:4CFB569D3628B7E14E729DE9956CC24B
                  SHA1:D3A21DC771779E1785CF67867C7BC98AD4A7F001
                  SHA-256:DB2578B4EE5617F45ACFFB3AF21E1D3FC31CDCF035DD9227C8061A950AA015E7
                  SHA-512:7191C30B530C18BC2B30D96BC4D19164195EB6EF581366D836AFF85A05C57EE94870092209BBE43DA888D9946B0BB764BA18BEFB92B7560B494555A6239198AF
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:@echo off..start "" "%~dp0AutoHotkey32.exe" "%~dp0UX\ui-setup.ahk"
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):93
                  Entropy (8bit):4.865096009935425
                  Encrypted:false
                  SSDEEP:3:UZ3/M4yt79CgfyPa3AO2V5FTxyov:UZv5yuwyHbTxyov
                  MD5:CDC8756680C459BD511D2BD2895FE2B2
                  SHA1:A7EA57FD628CFE2F664F2647510C6A412C520DFB
                  SHA-256:7F618D3CA343A0739A52A4A3C4F5B963ED98DC077B60C65FDC77D70FB0EC12D3
                  SHA-512:101722EB5BBA352D557E7D70704E24A54A129276857E8CC13F40DA26DFA9267A67DE79E52A0F552FF676D1825D0FB2EB467837B397D2E6905FA90D6891BCCD45
                  Malicious:false
                  Preview:/*..[NewScriptTemplate]..Description = Just #Requires v2.0..*/..#Requires AutoHotkey v2.0....
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8170
                  Entropy (8bit):5.024273106737054
                  Encrypted:false
                  SSDEEP:192:/iD+QOFljN97L5joVGhwj6y2h2Vfb/xHFiyOdKZBlb0esEOSZ9o3Iu7:/m+QwhN97LFoVAwf2hEfdHFiyOqqeROf
                  MD5:E2067D978526B83A1DA967F16A69C125
                  SHA1:08000FB66E6F1B1FCD450F32E1757A39B3A7BA16
                  SHA-256:040404A4DEF02F17CDAFDA938F5B63FC2181940BA1290DA5742DB0862C07166E
                  SHA-512:A453669B15C18F24A989A57441F961861578C09C145A4364C982410E5E05AB09B05AD4A77929CCF4AB9E00E5E3D73029A13660156BF4EEF9011ACCFD59800EA0
                  Malicious:false
                  Preview:; ..; Window Spy for AHKv2..;....#Requires AutoHotkey v2.0....#NoTrayIcon..#SingleInstance Ignore..SetWorkingDir A_ScriptDir..CoordMode "Pixel", "Screen"....Global oGui....WinSpyGui()....WinSpyGui() {.. Global oGui.. .. try TraySetIcon "inc\spy.ico".. DllCall("shell32\SetCurrentProcessExplicitAppUserModelID", "wstr", "AutoHotkey.WindowSpy").. .. oGui := Gui("AlwaysOnTop Resize MinSize +DPIScale","Window Spy for AHKv2").. oGui.OnEvent("Close",WinSpyClose).. oGui.OnEvent("Size",WinSpySize).. .. oGui.SetFont('s9', "Segoe UI").. .. oGui.Add("Text",,"Window Title, Class and Process:").. oGui.Add("Checkbox","yp xp+200 w120 Right vCtrl_FollowMouse","Follow Mouse").Value := 1.. oGui.Add("Edit","xm w320 r5 ReadOnly -Wrap vCtrl_Title").. oGui.Add("Text",,"Mouse Position:").. oGui.Add("Edit","w320 r4 ReadOnly vCtrl_MousePos").. oGui.Add("Text","w320 vCtrl_CtrlLabel",(txtFocusCtrl := "Focused Control") ":").. oGui.Add("Edit","w320 r4 ReadOnly v
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):352
                  Entropy (8bit):4.914101368991569
                  Encrypted:false
                  SSDEEP:6:1FQp9ODHKATpQEJFn9p6gklJtW3gSsMNFi7N/WGBQqOOccE4gggDHpK/Lkvle:1wsKE54TvZX7N/tW/ODHGpSLk9e
                  MD5:E8D9A7E78D6A2A40BFB532B4812BDE59
                  SHA1:5674B63092A69C419A42BAB9E7462BDE3BDB3CAD
                  SHA-256:A6C51E2188E31E3510577263D7B96DB147B0DF3DFA24C96DF8FDD9D73DA859EE
                  SHA-512:DD7D78C7724DCA4684C732B0F3F8E73AF67610DE8945255B48B9301672AC0B4F405C802A8CD4C343D53266F492D2D0DCD2727B5EBDB9E90CFC9173876B9AB905
                  Malicious:false
                  Preview:..CommandLineToArgs(cmd) {.. argv := DllCall("shell32\CommandLineToArgvW", "wstr", cmd, 'int*', &narg:=0, "ptr").. try {.. args := [].. Loop args.Capacity := narg.. args.Push(StrGet(NumGet(argv, (A_Index-1)*A_PtrSize, "ptr"), "UTF-16")).. }.. finally.. DllCall("LocalFree", "ptr", argv).. return args..}..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1578
                  Entropy (8bit):5.176343578065276
                  Encrypted:false
                  SSDEEP:24:+RemXj4qm4Z6CNeSSeqDe2eTA0EBuddsu9ruLc+cnwYit8BedM44we8wLdstjoj7:uDpn0sqCJFEBqbpjwYTMdGvutN1QmIj
                  MD5:2FFBDE65B63790C5AA12996E9EF9068C
                  SHA1:A793986E4E72D5B5A866E927855EACC3A0399A7A
                  SHA-256:40A6F0CDA5FD1DFF324CAB288BB453AA60B41B09DACBFBC64F2D871423F33935
                  SHA-512:315B2803C8E803B238E87DE63A5737350E41D248F67C54662341CA889C3BD5FC6FC2F516CA20F1FF4D74FCA4AF247B64EC7795D4C4E8990FFFCE49BBF037A906
                  Malicious:false
                  Preview:CreateAppShortcut(linkFile, p) {.. ;target, args, description, aumid, uninst?.. lnk := ComObject('{00021401-0000-0000-C000-000000000046}' ; CLSID_ShellLink.. ,'{000214F9-0000-0000-C000-000000000046}') ; IID_IShellLink.. .. ComCall(20, lnk, 'wstr', p.target).. ComCall(11, lnk, 'wstr', p.HasProp('args') ? p.args : "").. ComCall(7, lnk, 'wstr', p.desc).. if p.HasProp('icon').. ComCall(17, lnk, 'wstr', p.icon, 'int', p.HasProp('iconIndex') ? p.iconIndex : 0).. .. ; Set the System.AppUserModel.ID property via IPropertyStore.. props := ComObjQuery(lnk, '{886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99}').. static PKEY_AppUserModel_ID := PKEY('{9F4C2855-9F79-4B39-A8D0-E1D42DE1D5F3}', 5).. static PKEY_AppUserModel_UninstallCommand := PKEY('{9F4C2855-9F79-4B39-A8D0-E1D42DE1D5F3}', 37).. setProp PKEY_AppUserModel_ID, p.aumid.. if p.HasProp('uninst').. setProp PKEY_AppUserModel_UninstallCommand, p.uninst.. .. ; S
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):10734
                  Entropy (8bit):5.231689303124814
                  Encrypted:false
                  SSDEEP:192:RA1uaqk4Ka6BYzrxPrtRdSE6hyj4rGp+HCOvFrBScc8W4:+uaqkpaPh1sFBfcU
                  MD5:65D05EC61CCA0547E218655E65E5EA7C
                  SHA1:1CF93558BB9F1AE5A055B3F9085BF4166B7F43DD
                  SHA-256:A9A824A763195E5810BF904854AF7ED41C025527B2B8FAA7532C6F24189D69B9
                  SHA-512:65172FA0F9148106E44FDE99E0BCAD173C4EEF405A19B1F54961F2A248F6E6B0A05568D728E83D6582113D0D12A5E87CE763C53271C4D52B9362B19E22EA7D23
                  Malicious:false
                  Preview:EnableUIAccess(ExePath) {.. static CertName := "AutoHotkey".. hStore := DllCall("Crypt32\CertOpenStore", "ptr", 10 ; STORE_PROV_SYSTEM_W.. , "uint", 0, "ptr", 0, "uint", 0x20000 ; SYSTEM_STORE_LOCAL_MACHINE.. , "wstr", "Root", "ptr").. if !hStore.. throw OSError().. store := CertStore(hStore).. ; Find or create certificate for signing... cert := CertContext().. while (cert.ptr := DllCall("Crypt32\CertFindCertificateInStore", "ptr", hStore.. , "uint", 0x10001 ; X509_ASN_ENCODING|PKCS_7_ASN_ENCODING.. , "uint", 0, "uint", 0x80007 ; FIND_SUBJECT_STR.. , "wstr", CertName, "ptr", cert.ptr, "ptr")).. && !(DllCall("Crypt32\CryptAcquireCertificatePrivateKey".. , "ptr", cert, "uint", 5 ; CRYPT_ACQUIRE_CACHE_FLAG|CRYPT_ACQUIRE_COMPARE_KEY_FLAG.. , "ptr", 0, "ptr*", 0, "uint*", &keySpec:=0, "ptr", 0).. && (keySpec & 2)) { ; AT_SIGNATURE.. ; Keep looking for a certificate with
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):844
                  Entropy (8bit):4.810009492650111
                  Encrypted:false
                  SSDEEP:24:ybRJL5QOLrG0ogFhcEfF6iiwADuzheOj9E:y1JNQOL60ogFrf4uDAwm
                  MD5:1A8AB9BB38FD0DA51D03DC48E3A0B2EA
                  SHA1:5C74DDD45C91A39B921139881C76C48C97E35825
                  SHA-256:48A3F822A720B8E9B41165A1D19D56411D1F58036338EBD07AB40F2A14CF0F1B
                  SHA-512:1B88603FB9EB28E717CB77623FF0159F5F45E677C34316DC0C5D5C2ED46C59F10D3AFB532B1F99920F91B8098E544873F944B1E0E575EFD694DD24BDCA22C14E
                  Malicious:false
                  Preview:GetGitHubReleaseAssetURL(repo, ext:='.zip', release:='latest') {.. req := ComObject('Msxml2.XMLHTTP').. req.open('GET', 'https://api.github.com/repos/' repo '/releases/' release, false).. req.send().. if req.status != 200.. throw Error(req.status ' - ' req.statusText, -1).. .. res := JSON_parse(req.responseText).. try.. assets := res.assets.. catch PropertyError.. throw Error(res.message, -1).. .. loop assets.length {.. asset := assets.%A_Index-1%.. if SubStr(asset.name, -StrLen(ext)) = ext {.. return asset.browser_download_url.. }.. }.. .. JSON_parse(str) {.. htmlfile := ComObject('htmlfile').. htmlfile.write('<meta http-equiv="X-UA-Compatible" content="IE=edge">').. return htmlfile.parentWindow.JSON.parse(str).. }..}
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2432
                  Entropy (8bit):5.429608282178578
                  Encrypted:false
                  SSDEEP:48:RCQeNhzam2kwyXXmkDEaVlKjdkOBJlYg9A1kWVIDi:RCQeNhwkoAQ7Q18O
                  MD5:727AE6F2EC77A5B56774DF9DA14636D2
                  SHA1:8216A2122C825127CA59B05B0BAE0D57E92F1110
                  SHA-256:84032ECAC8ED334CF8788A81BEA721B0AF5CD7CA7DCA57B60CDEC3556AE33914
                  SHA-512:F1058216B5D1B8D590EB4CAFD5139F71F8DF5F96A3FCC314A7635CB1B99DE8623D87C57C567868EBDAFB09925B8D13FDADCEE49FA89F1A239725A92B948272CC
                  Malicious:false
                  Preview:; HashFile by Deo..; https://autohotkey.com/board/topic/66139-ahk-l-calculating-md5sha-checksum-from-file/..; Modified for AutoHotkey v2 by lexikos.....#Requires AutoHotkey v2.0-beta..../*..HASH types:..1 - MD2..2 - MD5..3 - SHA..4 - SHA256..5 - SHA384..6 - SHA512..*/..HashFile(filePath, hashType:=2)..{...static PROV_RSA_AES := 24...static CRYPT_VERIFYCONTEXT := 0xF0000000...static BUFF_SIZE := 1024 * 1024 ; 1 MB...static HP_HASHVAL := 0x0002...static HP_HASHSIZE := 0x0004..... switch hashType {.. case 1: hash_alg := (CALG_MD2 := 32769).. case 2: hash_alg := (CALG_MD5 := 32771).. case 3: hash_alg := (CALG_SHA := 32772).. case 4: hash_alg := (CALG_SHA_256 := 32780).. case 5: hash_alg := (CALG_SHA_384 := 32781).. case 6: hash_alg := (CALG_SHA_512 := 32782).. default: throw ValueError('Invalid hashType', -1, hashType).. }......f := FileOpen(filePath, "r").. f.Pos := 0 ; Rewind in case of BOM... .. HCRYPTPROV() => {.. p
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):182
                  Entropy (8bit):4.286514883049412
                  Encrypted:false
                  SSDEEP:3:BUQPXtHVbx+Lgz5JcLHQtEcFHk9g/PM/eEFBpcOvsRyhKQvArXGtFDAE/URqnn:B3HVbvXIwtPHrQrByOkAhKQvACthAhRe
                  MD5:4B095AAE00456AA248024A184671E4D5
                  SHA1:84AE516FBC62CE0AA10FFEACD7BA865A35A0A375
                  SHA-256:D65C6E73417E6BBA7A619F2E68933B74E6AE6141277B65542AED9B6ACDFC83FF
                  SHA-512:77AABE92719D8FC7A28C76F3B76FA2E42A188DB14F004262D8E913620AA990CDE29119B82D919511FC0D828CA0A108EA79858BA158B6A8ED6A260B72B4EE229D
                  Malicious:false
                  Preview:Scripts in this directory may be copied and used freely, but..may be removed or modified without notice by any future release...Do not #include them directly; instead, create a copy.
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):420
                  Entropy (8bit):5.234753324124194
                  Encrypted:false
                  SSDEEP:12:9YEvTDHflQK7AqMVQ31Uk5q66BODjNAhQ3JA:+EvTjtzAqh6k5jrO
                  MD5:9E53FCA8C7F6A9EE179F0FC0A7890EA3
                  SHA1:DC2A1BF437EEA36B3F5BA9318F3B391B405D5CB2
                  SHA-256:EA67340C555FDC1ABF8E324AC550AC37D2BA5F96A8EDEF120E72FB340F8F95C0
                  SHA-512:CAD5C07F952FB93413B4A3990C522BA4B446AE41F11C8DD323BDCDE1B30FBFD76515606D5DC4BCB8768BD382CDB82553801539A192B002696D253341F3C0DBC5
                  Malicious:false
                  Preview:; For documentation about the parameters, refer to:..; https://learn.microsoft.com/en-us/windows/win32/shell/shell-shellexecute..ShellRun(filePath, arguments?, directory?, operation?, show?) {.. static VT_UI4 := 0x13, SWC_DESKTOP := ComValue(VT_UI4, 0x8).. ComObject("Shell.Application").Windows.Item(SWC_DESKTOP).Document.Application.. .ShellExecute(filePath, arguments?, directory?, operation?, show?)..}
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):142
                  Entropy (8bit):4.4755179547678345
                  Encrypted:false
                  SSDEEP:3:a/GeA+gCFWVVIQGJXbtBXD7r9FV1oUqERA1MtAEKLENOn:a/5A+QVMJXBpXRFVOjERAGtUENOn
                  MD5:165B8FC572F943E3665994F87F1772B7
                  SHA1:265CA3D2A66A7E1807962EB7E8A444CEFB61BC0C
                  SHA-256:9B75C7F804D1D55807459E6F06DB2BEE8E1FB60CE9C9340D44A7B491CE53B982
                  SHA-512:E675453EEF9A10560CB9EA95E993D8068C8DFCA3664A140B6BA33361D0736632B8CE3A37770411583F558476173294BCC12B83BF33190D89EB009BFB9BB5F0AF
                  Malicious:false
                  Preview:; v1: includes the file from the script's directory...; v2: does nothing because the path is relative to this file...#include *i reload-v1.ahk
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):688
                  Entropy (8bit):5.235085398227736
                  Encrypted:false
                  SSDEEP:12:/ESUoz6Ls/umIRuccWJZw/EWZ5h/ELcMWZOezx+3O/RYo3hj/ZA8Q/L59O/aBen:/Evo2L4QeWuZ/3jYo3/0Ln+Oe
                  MD5:DAC79AD5A978F0497DE70A005B6A6084
                  SHA1:DB100CE15998772FE322679468F46B0F25239EB4
                  SHA-256:DBC1420C9368E954176CD1BC38C0BF5498D721CB7DEE50B5ABEF51611A33C658
                  SHA-512:9F2A2C0E01724EF82860CFB97FBE6196D29B3B41080F04B3F51653F2F535849428B0A245BC954AA57569AA660D5A5A20D2D1E0DBB9081D718BF2DEDDB051F47C
                  Malicious:false
                  Preview:A_AllowMainWindow := true..if A_AhkPath != A_ScriptDir '\AutoHotkeyUX.exe' {.. ; Standalone, compiled or test mode: locate InstallDir via registry.. DirExist(ROOT_DIR := RegRead('HKCU\SOFTWARE\AutoHotkey', 'InstallDir', "")).. || (ROOT_DIR := RegRead('HKLM\SOFTWARE\AutoHotkey', 'InstallDir', ""))..}..if (ROOT_DIR ?? "") = "" || !DirExist(ROOT_DIR).. Loop Files A_ScriptDir '\..', 'D'.. ROOT_DIR := A_LoopFileFullPath....if !trace.Enabled := RegRead('HKCU\Software\AutoHotkey', 'Trace', false).. trace.DefineProp 'call', {call: (*) => ''}....#include config.ahk....trace(s) {.. try.. FileAppend s "`n", "*".. catch.. OutputDebug s "`n"..}..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):429
                  Entropy (8bit):5.26163110122379
                  Encrypted:false
                  SSDEEP:12:oqQS/VkUZQjNySLmIK5aymKYeJUmJbSQ4JDta1y:dNkVNy2K5eeJvJbv4JJcy
                  MD5:248B58535F55EB55D9BAEC04A384B5E6
                  SHA1:76D067318B67DA9A3DA71A232A887C8935C7068F
                  SHA-256:4D1F241A0C973E30F1BF19E71CADB386B872A14BF0C29D32D4781A56CAFD998A
                  SHA-512:0186EB49DA706C6CC6F48ECD94A4996C258ECEA10BED26B9C79BDDF0F7ECA32DF1449166309237859CA2508427BF79D447A2202EAEBA211228DA9822646CF23A
                  Malicious:false
                  Preview:..; CONFIG_FILE_PATH := A_MyDocuments "\AutoHotkey\AutoHotkey.ini"..CONFIG_KEY := 'HKCU\Software\AutoHotkey'....ConfigRead(section, key, default) {.. ; return IniRead(CONFIG_FILE_PATH, section, key, default).. return RegRead(CONFIG_KEY '\' section, key, default)..}....ConfigWrite(value, section, key) {.. ; IniWrite(value, CONFIG_FILE_PATH, section, key).. RegWrite(value, 'REG_SZ', CONFIG_KEY '\' section, key)..}..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1065
                  Entropy (8bit):4.577078861855727
                  Encrypted:false
                  SSDEEP:24:R6bKtOSlRV2+O2WF3Q7DolfoV9OlCLUD47/HSoKVLbJlsLJc:obF42C9OlCoDz1lMc
                  MD5:3E5C97E6C3A76686329C81FBA864B26B
                  SHA1:EC111D01A5299DE2CA93C5441E92BB49D9D5E710
                  SHA-256:F5B97911887C303B6859DE44EFF73780309E31E931DCBA86A66AAAFBE932AF72
                  SHA-512:C70BA459ABB2C35EDFD62DFBE6EFB9C54D5341802A72AC7D6B3B63877F28A97A974B96B6DE747E29909550D6BA2C5D14DA40BEF6D91841C5C8C5A903697307C7
                  Malicious:false
                  Preview:#include identify_regex.ahk....IdentifyBySyntax(code) {.. static identify_regex := get_identify_regex().. p := 1, count_1 := count_2 := 0, version := marks := ''.. try while (p := RegExMatch(code, identify_regex, &m, p)) {.. p += m.Len().. if SubStr(m.mark,1,1) = 'v' {.. switch SubStr(m.mark,2,1) { .. case '1': count_1++.. case '2': count_2++.. }.. if !InStr(marks, m.mark).. marks .= m.mark ' '.. }.. }.. catch as e.. return {v: 0, r: "error", err: e, pos: p}.. if !(count_1 || count_2).. return {v: 0, r: "no tell-tale matches"}.. ; Use a simple, cautious approach for now: select a version only if there were.. ; matches for exactly one version... if count_1 && count_2.. return {v: 0, r: Format(.. count_1 > count_2 ? "v1 {1}:{2} - {3}" : count_2 > count_1 ? "v2 {2}:{1} - {3}" : "? {1}:{2} - {3}",.. count_1, count_2, Trim(marks).
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with very long lines (3982), with CRLF line terminators
                  Category:dropped
                  Size (bytes):4018
                  Entropy (8bit):5.309111673003908
                  Encrypted:false
                  SSDEEP:96:6Z2eX4Mjt29rVduPDOym1m35CA2OLiZk8+1bi039:6Rtjg9YOaLiZk8+R
                  MD5:F27F09D324016BD49D2DA38901E79A61
                  SHA1:F2AF4EA1CA36DC4ED53BA3A5817B83D457C9029C
                  SHA-256:C2563AB626DF892398083404ACECC5229300BA7DC6077B120844C65FACFAD854
                  SHA-512:1DD5A6DDF87A3026F5B2D468197173AF0C4E6C2EEAB64113BCD2BBD56BE46089E546F694FEA2416AADC9C2669070B29EF26EC689DFBE73DEF8AF6FD0DE310D04
                  Malicious:false
                  Preview:get_identify_regex() => '..(..(?(DEFINE)(?<line_comment>(?<![^ `t`r`n]);.*)(?<block_comment>(?m:^[ `t]*/\*(?:.*\R?)+?(?:[ `t]*\*/|.*\Z)))(?<eol>(?=[ `t]*+(?&line_comment)?(?m:$)))(?<tosol>(?:(?&eol).*\R|(?&block_comment))++)(?<toeol>(?:[^ `t`r`n]++|[ `t]*+(?!(?&eol)))*+)(?<contsec>[ `t]*+\((?i:Join[^ `t`r`n]*+|(?&line_comment)|[^ `t`r`n()]++|[ `t]++)*+\R(?:[ `t]*+(?!\)).*\R)*+[ `t]*+\))(?<solcont>[ `t]*+(?:,(?!::| +& )|[<>=/|^,?:\.+\-*&!~](?![^"'`r`n]*?(?:".*?::(?!.*?")|'.*?::(?!.*?')|::))|(?i:AND|OR)(?=[ `t])))(?<eolcont>(?&eol)(?:(?<ec_bad>(?<=:=)|(?<=[:,]))|(?<=[<>=/|^,?:\.+\-*&!~](?<!\+\+|--))|(?<=(?<![\w[:^ascii:]\.])(?i:OR|IS|AS|IN))|(?<=(?<![\w[:^ascii:]\.])(?i:AND|NOT))|(?<=(?<![\w[:^ascii:]\.])(?i:CONTAINS)))(?&tosol)(?:(?&contsec)|(?(ec_bad)|(*:v2-cle))))(?<v1_cont>(?&tosol)(?:(?&solcont)(?&subexp)|[ `t]*+,[ `t]*+(?=%)(?&pct)|(?&contsec)(?&ambig)))(?<v1_fin>(?:.*+(?&v1_cont))*.*+)(?<ambig>(?:(?&exp)|(?&v1_cont)|.*+)++(*:~))(?<pct>(?=%[ `t])(?:(?&subexp)(?&exp)|(?&v1_fin)(*:v1
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2613
                  Entropy (8bit):4.984139073207136
                  Encrypted:false
                  SSDEEP:48:k8u94OWLJitj8Zk2L6eY4Y5u60P8w9XMwSv0s5P5UNctPyfFOi79C:k8u94OWLJgoeeY4R6m86GDRUNctP6wi4
                  MD5:696750C1861231D07FF4548AD4360DC8
                  SHA1:EB4B90B17AADF7B1CCDC484840B5500494C4A787
                  SHA-256:F7D5AC8D1CFC77685CDCDBE89ABB8AC0A89F5B6EEC1AC1385069B72A05D05315
                  SHA-512:5745B58987555C797F90EFD65BB9E02E3A9139B934E27B287816BE79A988F04EEF6DD8B8AF43C30F5F4BC5360CA7A3E42A21734915277CF3A18A91EA39AC3636
                  Malicious:false
                  Preview:..#include common.ahk....GetExeInfo(exe) {.. if !(verSize := DllCall("version\GetFileVersionInfoSize", "str", exe, "uint*", 0, "uint")).. || !DllCall("version\GetFileVersionInfo", "str", exe, "uint", 0, "uint", verSize, "ptr", verInfo := Buffer(verSize)).. throw OSError().. prop := {Path: exe}.. static Properties := {.. Version: 'FileVersion',.. Description: 'FileDescription',.. ProductName: 'ProductName'.. }.. for propName, infoName in Properties.OwnProps().. if DllCall("version\VerQueryValue", "ptr", verInfo, "str", "\StringFileInfo\040904b0\" infoName, "ptr*", &p:=0, "uint*", &len:=0).. prop.%propName% := StrGet(p, len).. else throw OSError().. if InStr(exe, '_UIA').. prop.Description .= ' UIA'.. prop.Version := RegExReplace(prop.Version, 'i)[a-z]{2,}\K(?=\d)|, ', '.') ; Hack-fix for erroneous version numbers (AutoHotkey_H v2.0-beta3-H...).. return prop..}....IsUsableAutoHotkey(exeinfo) {..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:MS Windows icon resource - 4 icons, 32x32 with PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 48x48 with PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
                  Category:dropped
                  Size (bytes):4310
                  Entropy (8bit):7.802879341444645
                  Encrypted:false
                  SSDEEP:96:E+lfU3JuOE/08BQLDmMZUMxsjnzEBgTOhmvS:xkLE/B2LuzEBga3
                  MD5:EEECD8AF162D3F318496E0E60D6D8C57
                  SHA1:31A99C80E4F1033914CE9344E95B84571F76AD2D
                  SHA-256:968473DF8EAC7264D9E84E6AE91A4D706CDA9F89F345D182617B161EF4FE1A7B
                  SHA-512:6F55968ADF7F2F02E128945016ED0C4D003C9640E4CBFC7B22B82374647E6EBDB07C02E99240DA369789F4107D2C130E54D4ACB1324455FD26668C4D1D009884
                  Malicious:false
                  Preview:...... .... .....F...00.... .........@@.... .W............. .....2....PNG........IHDR... ... .....szz.....tIME....... ?H.....tEXtSoftware.GLDPNG ver 3.4q.......tpNGGLD3....J.).....gAMA......a....DIDATx..WM(la.....d.....2.w..+..aa!.F.P3n\+.$......)).[).'Sj.....,hPd.\.[g.w~..{.^...|..<.y.w..=gT...?.vv....R.......................177...C...cqq.CCC...V........|.1.....\ ==.......Acc#L&....... k.p..n...R.WWW.b....SWW.^........N.....ALL.....g`llL....k...;33...GGG0..".s......-((.*.....)...=...............=...2....g......."......\9....CUU.jkk.....&9.........,9...<5.6000 ...^................j5222......w9A......)--....xxxx.~ww...s.Z%noo.a....Gjj.h.D....aDEE.966.....Z.......4.&.ckkK...C,9.j4.....V.L...j...[.K..............z.;e..P.\#F....H.....BJJ....z.EEE.....\xww.;;;r.9....K2.z....2..S................c........"..f..X.$&$$...@.&''e.o@o........\jp....`...f!..Y..pYYY27;;....c.eff....gP..A'...'.***....mmm......f.....'s..\j.\..~j)=}}}...Cj...........#.._..fZ.6.>..{||.
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):5004
                  Entropy (8bit):4.913133828159579
                  Encrypted:false
                  SSDEEP:96:ctpyLQ5w84XwtzeZIPHGI4tLSSZMUR6l5w8OtXQyceRX35FZsFFNA3me:cDi9wJeKPHGI4J9SUtruNw35FZs1mD
                  MD5:F4251E653DBBBDD8CF4640BD9855C207
                  SHA1:D08B6E5796150AA1436FD3DA39BFC5FDBAAEE297
                  SHA-256:DEFFD87D99FF125ECCAC2331A8BA4E3A0044E150E80316E9469DD57F322BEDA1
                  SHA-512:86896CCB0ACBD27EEEFE6E02747958CAFCCA31541638435DFE9F08D89B763144F6B5FB521DF11DCE4C3F46B186DE4905F56EBCC7C57D4C29EF2A0731A6492698
                  Malicious:false
                  Preview:class AutoHotkeyUxGui extends Gui {.. __new(title, opt:='') {.. super.__new(opt, title, this).. this.SetFont('s9', "Segoe UI").. this.OnEvent('Escape', 'Destroy').. this.OnEvent('Close', 'Destroy').. }.. .. AddListMenu(options:='', columns:=unset) {.. IsSet(columns) || columns := [].. c := this.AddListView(UxListMenu.DefaultOptions ' ' options, columns).. if !InStr(options, 'Theme').. DllCall("uxtheme\SetWindowTheme", "ptr", c.hwnd, "wstr", "Explorer", "ptr", 0).. static LVTVIM_TILESIZE := 1, LVTVIM_COLUMNS := 2, LVTVIM_LABELMARGIN := 4.. static LVTVIF_AUTOSIZE := 0, LVTVIF_EXTENDED := 4, LVTVIF_FIXEDHEIGHT := 2.. , LVTVIF_FIXEDSIZE := 3, LVTVIF_FIXEDWIDTH := 1.. static LVM_SETTILEVIEWINFO := 0x10A2.. tileviewinfo := Buffer(40, 0).. ControlGetPos(,, &w,, c).. pad := 2 * A_ScreenDPI // 96.. NumPut(.. 'uint', 40, ; cbSize.. 'uint', LVTV
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1697
                  Entropy (8bit):4.988385975818948
                  Encrypted:false
                  SSDEEP:48:R+KUvhhYz6gXd/1BvbGpk0b/oC+Putym6P:QKUvh6fFkk0rsP4kP
                  MD5:C90BED0679B789B74E4865AE6F2709A3
                  SHA1:B0DBEE6A237BA93DAEC76A0553CD3254821D60A1
                  SHA-256:C242EBB51241ACAB13152D95CDB05BE5382FFB97F3DCA2DA3A4E5A084C2E3FF4
                  SHA-512:F8DFE5C558B427E05905B2A3D8A09632347EDF945D47ED4FC82EC38A9045F5837A798EF669F0FDAE6504D9EEE6762C49C8E6C32ADAC0F6A3E6C2EED6D48E64B2
                  Malicious:false
                  Preview:; Run this script to launch or download and install Ahk2Exe into A_ScriptDir '\..\Compiler'...#requires AutoHotkey v2.0....#include install.ahk..#include inc\GetGitHubReleaseAssetURL.ahk....#SingleInstance Force..InstallAhk2Exe....InstallAhk2Exe() {.. inst := Installation().. inst.ResolveInstallDir() ; This sets inst.InstallDir and inst.UserInstall.. .. finalPath := inst.InstallDir '\Compiler\Ahk2Exe.exe'.. if FileExist(finalPath) {.. ShellRun finalPath.. ExitApp.. }.. .. if !A_Args.Length {.. (inst.UserInstall) || SetTimer(() => (.. WinExist('ahk_class #32770 ahk_pid ' ProcessExist()) &&.. SendMessage(0x160C,, true, 'Button1') ; BCM_SETSHIELD := 0x160C.. ), -25).. if MsgBox("Ahk2Exe is not installed, but we can download and install it for you.", "AutoHotkey", 'OkCancel') = 'Cancel'.. ExitApp.. if !A_IsAdmin && !inst.UserInstall {.. Run Format('*RunAs "{1}" /restart /script "{
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4162
                  Entropy (8bit):4.805177330644294
                  Encrypted:false
                  SSDEEP:96:m4C3dyA4vkDU1tYur5Ql5rk08NpJ31rsDoY0Jk0AVIn:Q3dyA4L/fdQl5w08LrsMHJk02G
                  MD5:30B87FBFADC592C38BE9D82EDF597FA3
                  SHA1:1FF5D720858A38BDD2E21A5A492938C07B2811A5
                  SHA-256:1E59921BCDDB3C41651EB01605CDEFCDEE3C6ADEC5DB6B7CAFB7AB801EAD5E1E
                  SHA-512:79A407CAD251F45D13C0505CDF7E27A281455E3EEFE1F7FC5AEDD658297351AC7DBBCE21065A29ED9D86C6B908A175CD83201E0D60E972865E6258C2F8C145A7
                  Malicious:false
                  Preview:; Run this script to download and install an additional AutoHotkey version...; Specify the version as a single command line parameter. If omitted or..; incomplete like "1.1" or "2.0", the latest version will be downloaded...#requires AutoHotkey v2.0....#include install.ahk....A_ScriptName := "AutoHotkey"....InstallAutoHotkey A_Args.Length ? A_Args[1] : '1.1'....InstallAutoHotkey(version) {.. abort(message, extra?) {.. if IsSet(extra).. message .= "`n`nSpecifically: " SubStr(extra, 1, 100).. MsgBox message,, "Iconx".. ExitApp.. }.. .. ; Determine base version, for download directory.. baseVersion := RegExReplace(version, '^\d+(?:\.\d+)?\b\K.*').. if IsInteger(baseVersion).. baseVersion .= baseVersion = '1' ? '.1' : '.0'.. else if !IsNumber(baseVersion).. abort "Invalid version.", version.... ; If version number is not exact, try to determine the latest compatible version.. if IsNumber(version) {.. url := Fo
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):39948
                  Entropy (8bit):4.584438080699804
                  Encrypted:false
                  SSDEEP:768:Mehhuh3o8p7Nl/EjTADVwFvgxatHkMrvDN3v:J837ppleA/atEUvJf
                  MD5:817E7747DCFF942D2F1E65CEC536CBF5
                  SHA1:1D1C54D79138B0266D349518FA15B9BEB323621B
                  SHA-256:25E530F9CADF91F63EEB04C99993355BBF79074A7559DCE817A515E177F32328
                  SHA-512:A77BE0D30E848D5364A7DDCBCFF563649C06FAC546C27471A0FA35BF60286F2D3520033DF87E97F6D4EFD2090E84DED0FC0CA0AA1A87CB41D7F361AD833C406E
                  Malicious:false
                  Preview:; This script contains AutoHotkey (un)installation routines...; See the AutoHotkey v2 documentation for usage...#include inc\bounce-v1.ahk../* v1 stops here */..#requires AutoHotkey v2.0....#SingleInstance Off ; Needed for elevation with *runas.....#include inc\launcher-common.ahk..#include inc\HashFile.ahk..#include inc\CreateAppShortcut.ahk..#include inc\EnableUIAccess.ahk..#include inc\ShellRun.ahk....if A_LineFile = A_ScriptFullPath.. Install_Main....Install_Main() {.. try {.. Installation.Instance := inst := Installation().. method := 'InstallFull'.. params := [].. while A_Index <= A_Args.Length {.. switch A_Args[A_Index], 'off' {.. case '/install':.. method := 'InstallExtraVersion'.. inst.SourceDir := A_Args[++A_Index].. case '/uninstall':.. method := 'Uninstall'.. if A_Index < A_Args.Length && SubStr(A_Args[A_Index+1],1,1) != '/'.. par
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):18109
                  Entropy (8bit):4.894561088112024
                  Encrypted:false
                  SSDEEP:192:HBHZGn4adB4K2maaPGBSE72hxuWYDlmxrCOKen2RXXtiqOeGKlLFemIpyeOYMYyT:hH2B/uWSKXn2NCQE0X40GG7QE
                  MD5:596B69069BBBCC9A22AC26BBA6EFE546
                  SHA1:694CEC54200FF1EC70DC56320C577B652884B53D
                  SHA-256:830DB4BE4C8320F23FF32316DAC933D4E72D9056EA5A819CC12C38614DA6E06F
                  SHA-512:1C18ACF4403915C6A2562F5E26C0ED7C4FC00E9D67D19622D1DB8BB9338FF6D6E8BF9ABE7317F1B529EF1C24901B45C3B13DC3B734D97582C91B206BEE9AA8F8
                  Malicious:false
                  Preview:; This script is intended for indirect use via commands registered by install.ahk...; It can also be compiled as a replacement for AutoHotkey.exe, so tools which run..; scripts by executing AutoHotkey.exe can benefit from automatic version selection...#requires AutoHotkey v2.0....;@Ahk2Exe-SetDescription AutoHotkey Launcher..#SingleInstance Off..#NoTrayIcon....#include inc\identify.ahk..#include inc\launcher-common.ahk..#include inc\ui-base.ahk....if A_ScriptFullPath == A_LineFile || A_LineFile == '*#1' {.. SetWorkingDir A_InitialWorkingDir.. Main..}....Main() {.. switches := [].. while A_Args.length {.. arg := A_Args.RemoveAt(1).. if SubStr(arg,1,1) != '/' {.. ScriptPath := arg.. break.. }.. nextArgValue() {.. if !A_Args.Length {.. MsgBox "Invalid command line switches; missing value for " arg ".", "AutoHotkey Launcher", "icon!".. ExitApp 1.. }.. return A_Args.R
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):556
                  Entropy (8bit):4.997919572416062
                  Encrypted:false
                  SSDEEP:12:SsFVctCPDVDHn3f8q9mCC41dDVxqy40nyZ3AxL24SHD/TW+37rz3kVP:SyctQVNxZx20c382FHz3kVP
                  MD5:35F4753A58432446B99BF89A9E930BF5
                  SHA1:BABC3341D9D95865A36EA9A20549A61146093006
                  SHA-256:E4659306A755B583E9CEF5FDBA3B3EB102D8939FB028AFD91AAD4496E758FAD5
                  SHA-512:AC3483A17EAD5173CE40A6AF55C3C2361652FEFD94C0BD82E004DF8186FFC31EAB194534A25FE995D677F2F71363095D177C01AFB6AE50F2B63BA156855EF5E5
                  Malicious:false
                  Preview:; This file is part of a trick for allowing a v2 script to relaunch itself with..; v2 when the user attempts to execute it with v1. See inc\bounce-v1.ahk.....#NoTrayIcon....if (A_ScriptFullPath = A_LineFile)..{.. MsgBox 16,, This script is not meant to be executed... ExitApp 2..}....if (!A_Args.Length())..{.. Loop Files, %A_ScriptDir%\..\AutoHotkey32.exe, FR.. {.. Run "%A_LoopFileLongPath%" /force "%A_ScriptFullPath%".. ExitApp.. }..}....MsgBox 16,, This script requires AutoHotkey v2, but was launched with v1...ExitApp 2
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2180
                  Entropy (8bit):5.132520164605258
                  Encrypted:false
                  SSDEEP:48:SiAhFZOZAn5ABXEXEQX+gd4fEi1HIEL+xuFSXjwWURpwSgBTn:kZFjugWfEi1HEx+nnRFUj
                  MD5:0299132478B49E3EB706C214BF32E62F
                  SHA1:9705C410B9F515269C512C64129CED8E0B1B23D2
                  SHA-256:D26CAEF44190E0B612C3E4309FF6689DC2953C72CB3DE1C94D002250B089F16B
                  SHA-512:2A9CE8EE71AB207DBF4C4FCC2634D49233304DA858C7880813A2127C2A063DC58703D4B2129498DB630D081E1D72F899D348C01DBBCC359D92AB720B89CCDC44
                  Malicious:false
                  Preview:; This script clears any file type assocation made via the "open with" dialog,..; so that the standard registration under HKCR\.ahk can take effect...#include inc\bounce-v1.ahk../* v1 stops here */..#requires AutoHotkey v2.0....keyname := "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ahk\UserChoice"..initial_progid := RegRead(keyname, "ProgId", "")..legacy_key := "HKCU\Software\Classes\.ahk"..legacy_assoc := RegRead(legacy_key,, "AutoHotkeyScript")..if A_Args.Length && A_Args[1] = '/check' {.. if (initial_progid = "" || initial_progid = "AutoHotkeyScript") && legacy_assoc = "AutoHotkeyScript".. || MsgBox("It looks like you've used an unsupported method to set the default program for .ahk files. ".. . "This will prevent the standard context menu and launcher (version auto-detect) functionality ".. . "from working. Would you like this setting to be reset for you?", "AutoHotkey", "Icon! y/n") != "yes".. ExitApp..}..r
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, Unicode text, UTF-8 text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):6968
                  Entropy (8bit):4.859435822860328
                  Encrypted:false
                  SSDEEP:96:sHqX7z3hetnbfigrsSUfQDEF2mgPp3eDThh6PTw5/cjG7:Aqr9eBb5rsCs2mgxOyPTw5/17
                  MD5:669BD791C5AAFB60EE0885EF064D3622
                  SHA1:ACEFB3C3997E2EADD32413814E71AAAAD5A8B6D4
                  SHA-256:E8C0B4E149AD58C57E77AAC12041F1FA8BC9F25C6D642D12837EFC5FD97B8D21
                  SHA-512:EB0345B3562523C58894752276938C7E5EE63B7C3A660317C9A4C1A93B6E530B12015DD380A8A230324B94A9F042380C1A1D24B49D21C3805A4711CB185A33DB
                  Malicious:false
                  Preview:; Dash: AutoHotkey's "main menu"...; Run the script to show the GUI...#include inc\bounce-v1.ahk../* v1 stops here */..#requires AutoHotkey v2.0....#NoTrayIcon..#SingleInstance Force....#include inc\ui-base.ahk..#include ui-launcherconfig.ahk..#include ui-editor.ahk..#include ui-newscript.ahk....DashRegKey := 'HKCU\Software\AutoHotkey\Dash'....class AutoHotkeyDashGui extends AutoHotkeyUxGui {.. __new() {.. super.__new("AutoHotkey Dash").. .. lv := this.AddListMenu('vLV LV0x40 w250', ["Name", "Desc"]).. lv.OnEvent("Click", "ItemClicked").. lv.OnEvent("ItemFocus", "ItemFocused").. lv.OnNotify(-155, "KeyPressed").. .. this.AddButton("xp yp wp yp Hidden Default").OnEvent("Click", "EnterPressed").. .. il := IL_Create(,, true).. lv.SetImageList(il, 0).. il2 := IL_Create(,, false).. lv.SetImageList(il2, 1).. addIcon(p*) =>(IL_Add(il, p*), IL_Add(il2, p*)).. .. lv.Add("Icon" addIc
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8585
                  Entropy (8bit):4.875277208906012
                  Encrypted:false
                  SSDEEP:192:th4hvlbHoc4v3g/ucyCs5fyrpsp/vm1kEoQH1lY0qibz:th4h+cyCifyrp85QVldz
                  MD5:82EB574294FF4E2E7461B95F5BAD0A87
                  SHA1:A981373EF3BD61CE5A2F0AD9BEDAA1CF4ACFD591
                  SHA-256:7263286EB3A42ECCF5EDC39B43C74A8BF7C82F2671204D1AE654236C1DE3F05D
                  SHA-512:1C54E110B384D55CA0243AD343E69D1F0FA9B2A863AF8DA75A5C992D19F9E055182BBA09BE227882F82D0EBF4EC94094723E2DB06CDF7EE2ED574348A8D72C74
                  Malicious:false
                  Preview:; This script shows a GUI for setting the default .ahk editor...#requires AutoHotkey v2.0....#NoTrayIcon..#SingleInstance Off....#include launcher.ahk..#include inc\CommandLineToArgs.ahk....class EditorSelectionGui extends AutoHotkeyUxGui {.. __new(cmdLine) {.. super.__new("Select an editor").. .. lv := this.AddListMenu('vEds LV0x40 w300', ["Editor"]).. this.IconList := il := IL_Create(,, true).. lv.SetImageList(il, 0).. for app in this.Apps := GetEditorApps() {.. try.. icon := IL_Add(il, app.exe).. catch.. icon := -1.. lv.Add('Icon' icon, app.name).. }.. this.SelectEditorByCmd(cmdLine).. lv.AutoSize(8).. lv.GetPos(&x, &y, &w, &h).. x += w.. y += h.. .. this.AddText('xm w' w ' y' y, "Command line").. this.AddEdit('xm wp r2 -WantReturn vCmd', cmdLine).OnEvent('Change', 'CmdChanged').. .. this.AddText('xm
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8289
                  Entropy (8bit):5.012543704125114
                  Encrypted:false
                  SSDEEP:192:18ZheYP0oxU2r23K7D+lTt3cs8FN7bDanWPKtscP/81Tn/dUT0:1fYs125DIB3csspb2qcx/81TnlUT0
                  MD5:852BF007A6DDD80A2E5C9D82D874CF45
                  SHA1:6F293EC5B59645F795E4FEB3F02C026B62ED428E
                  SHA-256:C91E18A25069E7B501D2D0E1C8FC23B78CB962D93469CD0B2EA7E24CDF181DC1
                  SHA-512:95F2E6BBEB9138125AB337D6BA047B824FFA527A5F2403C12BBC4EE4A4E73B516D963E09C81D453BCAFB01BD396D991DA8D36D8A91707E557ECC61C1BA9EA91D
                  Malicious:false
                  Preview:; This script shows a GUI for configuring the launcher...#requires AutoHotkey v2.0....#NoTrayIcon....#include inc\launcher-common.ahk..#include inc\ui-base.ahk....GetVersions() {.. vmap := Map(1, Map(), 2, Map()).. for ,f in GetUsableAutoHotkeyExes() {.. try.. vmap[GetMajor(f.Version)][f.Version] := true.. catch as e.. trace "-[Launcher] " type(e) " checking file " A_LoopFileName ": " e.message.. }.. vmap[1] := [vmap[1]*].. vmap[2] := [vmap[2]*].. return vmap..}....class LauncherConfigGui extends AutoHotkeyUxGui {.. __new() {.. super.__new("AutoHotkey Launch Config").. .. cmd := RegRead('HKCR\AutoHotkeyScript\shell\open\command',, '').. usingLauncher := InStr(cmd, 'UX\launcher.ahk') != 0.. currentExe := !usingLauncher && RegExMatch(cmd, '^"(.*?)"(?= )', &m) ? m.1 : "".. try.. if currentExe && GetExeInfo(currentExe).Description = "AutoHotkey Launcher" ; Support compiled launcher
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):10365
                  Entropy (8bit):4.864764389032537
                  Encrypted:false
                  SSDEEP:192:WWsmA5tqnaPKHGs8SCVV7f5JfzH+zoe04+v1AlLUzhAGnk0Vps61CRjqsz:WW6TAF8SCVRf+W9AyzhAGO08
                  MD5:1B88198B4BD36EB25E23DC412321A555
                  SHA1:D3B5670D1BC7343AE40AD087BC22309DC17E118A
                  SHA-256:31249EF15CCE83D150A9A5DE11168A5052FF2C55DBD574B8DF1C054510B61843
                  SHA-512:409FB90D7EA768C9D9A2574C09B8A69C93E8AFD76234C24E3E0F71AA3F564A4F1AA46FF18EA328B1AFCCAB54604BB239D37249D5811E3A84F0AB692B032A732B
                  Malicious:false
                  Preview:#requires AutoHotkey v2.0....#NoTrayIcon..#SingleInstance Off....#include inc\common.ahk..#include inc\ui-base.ahk....class NewScriptGui extends AutoHotkeyUxGui {.. __new(path:="") {.. super.__new("New Script").. .. SplitPath path,, &dir,, &name.. if this.ExplorerHwnd := WinActive("ahk_class CabinetWClass") {.. this.Opt '+Owner' this.ExplorerHwnd.. if dir = "".. dir := GetPathForExplorerWindow(this.ExplorerHwnd).. }.. if dir = "".. dir := ConfigRead('New', 'DefaultDir', A_MyDocuments "\AutoHotkey").. .. name := this.AddEdit('vName w272', name != "New AutoHotkey Script" ? name : "").. static EM_SETCUEBANNER := 0x1501.. SendMessage(EM_SETCUEBANNER, true, StrPtr("Untitled"), name).. .. static IconSize := SysGet(49) ; SM_CXSMICON.. .. static BrowseIcon := LoadPicture("imageres.dll", 'Icon-1025 w' IconSize, &imgtype).. this.AddIconButton
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):7325
                  Entropy (8bit):4.877995973608334
                  Encrypted:false
                  SSDEEP:192:SdHQj/CKeF1DXPTYjTBS7EmK3QyOcjRn5WYHu4pCW7rvQ:SejoFpPTYjTB6EmQOcjRTHpC/
                  MD5:DD3F9C2F9115689F4350896752F15926
                  SHA1:FA19F1632B865B2BC098611A8BE66E9F10DC692B
                  SHA-256:68B114A2EA4AF9DF54709A78EC5991A1F271097B29CB93757403FDB158746BC7
                  SHA-512:12F34D5EC7A7D5452EEF97E4C87093240050756C564140874D316D0B9D194C961DEBE139BADC943B024B680B68961EF6CBE71FC1A567C6622797F90ED51FA549
                  Malicious:false
                  Preview:; This script shows the initial setup GUI...; It is not intended for use after installation...#requires AutoHotkey v2.0....#NoTrayIcon..#SingleInstance Force....#include inc\ui-base.ahk....A_ScriptName := "AutoHotkey Setup"..SetRegView 64..InstallGui.Show()....class InstallGui extends AutoHotkeyUxGui {.. __new() {.. super.__new(A_ScriptName, '-MinimizeBox -MaximizeBox').. .. DllCall('uxtheme\SetWindowThemeAttribute', 'ptr', this.hwnd, 'int', 1 ; WTA_NONCLIENT.. , 'int64*', 3 | (3<<32), 'int', 8) ; WTNCA_NODRAWCAPTION=1, WTNCA_NODRAWICON=2.. .. static TitleBack := 'BackgroundWhite'.. static TitleFore := 'c3F627F'.. static TotalWidth := 350.. this.AddText('x0 y0 w' TotalWidth ' h84 ' TitleBack).. this.AddPicture('x32 y16 w32 h32 ' TitleBack, A_AhkPath).. this.SetFont('s12', 'Segoe UI').. this.AddText('x+20 yp+4 ' TitleFore ' ' TitleBack, "AutoHotkey v" A_AhkVersion).. this.SetFont('s9')..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2311
                  Entropy (8bit):4.84199510475754
                  Encrypted:false
                  SSDEEP:48:SThy/+G2L1JubYQIBCbBaBX6XNoqb0BiWdM+T:V+G2ybdIBCdmX6doqbfWW+T
                  MD5:0FE4932669E99A498A7BC76975919000
                  SHA1:E0D6A7B484D3A6C0D7427F611C575F93E4F87BA4
                  SHA-256:1E09FC4AF5DC3E673D4FACFE4FA849C6BDD0B29C67B0EFD7F96AAF387FCEF698
                  SHA-512:DD3B99739106953608AC2EB2ECC4E3D316B5122B1B305BD7CFAB82FCC7EC0D92B5944F4724D37CBC01CA5C6B5381B57FAD9256586B5DFD0026453F9C11A32394
                  Malicious:false
                  Preview:; This script shows a GUI for uninstalling AutoHotkey or specific versions...#include inc\bounce-v1.ahk../* v1 stops here */..#requires AutoHotkey v2.0....#include inc\ui-base.ahk..#include install.ahk....#NoTrayIcon..#SingleInstance Force....A_ScriptName := "AutoHotkey Setup"..SetRegView 64..ModifySetupGui.Show()....class ModifySetupGui extends AutoHotkeyUxGui {.. __new() {.. super.__new(A_ScriptName, '-MinimizeBox -MaximizeBox').. .. this.inst := Installation().. this.inst.ResolveInstallDir().. versions := this.inst.GetComponents().... this.AddText(, "Remove which versions?").. iv := this.AddListView('vComponents Checked -Hdr R10 w248', ["Version"]).. iv.OnEvent('ItemCheck', 'Checked').. for v, files in versions.. iv.Add(files.HasProp('superseded') ? 'Check' : '', v).. .. anyChecked := iv.GetNext(0, 'C').. this.AddButton('vRemoveAll w120 ' (anyChecked ? '' : 'Default'), "Remove &all")..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):57
                  Entropy (8bit):5.0148340407771865
                  Encrypted:false
                  SSDEEP:3:FU72V5FTx+oeQWaKO:FUmbTx+VQWaKO
                  MD5:1B081984B7C90528E03E67096F001E5F
                  SHA1:A2385C9CDEC13094E12DA3CADC780BFCD7EC9875
                  SHA-256:83E60BA7D330D4FAA32576C0AB223A2440EF92972D3D32DEE46D117E8A446CE9
                  SHA-512:3A44A3CCBC86B9044670A72AE770E475C5469CABC54F1E8A76208E290BAB2FC96155B671BB52DCA3E2D834B2D6036CAB28C9F96D4C59EBDB3E98869C137FFAC5
                  Malicious:false
                  Preview:#Requires AutoHotkey v2.0-beta..#Include UX\WindowSpy.ahk
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):18120
                  Entropy (8bit):4.833349138619991
                  Encrypted:false
                  SSDEEP:384:gq2PmwE3b6k/iAVX/dUY2ZpEGMOZ77oPyBrsS/S9B:gzuh1iYWrTXoPAs9B
                  MD5:E3F2AD7733F3166FE770E4DC00AF6C45
                  SHA1:3D436FFDD69F7187B85E0CF8F075BD6154123623
                  SHA-256:B27C1A7C92686E47F8740850AD24877A50BE23FD3DBD44EDEE50AC1223135E38
                  SHA-512:ED97318D7C5BEB425CB70B3557A16729B316180492F6F2177B68F512BA029D5C762AD1085DD56FABE022B5008F33E9BA564D72F8381D05B2E7F0FA5EC1AECDF3
                  Malicious:false
                  Preview: GNU GENERAL PUBLIC LICENSE.. Version 2, June 1991.... Copyright (C) 1989, 1991 Free Software Foundation, Inc... 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.. Everyone is permitted to copy and distribute verbatim copies.. of this license document, but changing it is not allowed..... Preamble.... The licenses for most software are designed to take away your..freedom to share and change it. By contrast, the GNU General Public..License is intended to guarantee your freedom to share and change free..software--to make sure the software is free for all its users. This..General Public License applies to most of the Free Software..Foundation's software and to any other program whose authors commit to..using it. (Some other Free Software Foundation software is covered by..the GNU Library General Public License instead.) You can apply it to..your programs, too..... When we speak of free so
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):1256448
                  Entropy (8bit):6.40012168761782
                  Encrypted:false
                  SSDEEP:24576:Ve1psX+O47m4ffJhxZ4rBcRyMlc/SsVNGgMxCRjU:Vek+bi4ffJhxZ4axcbHGPWj
                  MD5:825448610A8213A8408578DF2361D5EB
                  SHA1:F43875855E4F02010AD6C755067B813D0FCBE68A
                  SHA-256:37FF15A23A98F0A658298E21F1873CA896A05208810BF796F90CA212EE07C7B1
                  SHA-512:7556143128878B2E765309DB8B35CC8206D325C0C17C37B191600BD8F719A923B0F917F4C53F0946ED2D12136A9E42774246595EED78F1038779FDCBD3736EEE
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  • Antivirus: Virustotal, Detection: 0%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./...kl..kl..kl.. ...|l..~...El..~...xl..~...bl.. ...rl.. ....l.. ...jl.. ...Jl..kl...m..].il..].)l..].j.jl..].jl..Richkl..........PE..d......e..........#....%.......................@.......................................... ...@.................................................T....@..............................@...8...............................@............................................text...v........................... ..`.rdata..............................@..@.data...............................@....pdata..............."..............@..@_RDATA..\....0......................@..@.rsrc........@......................@..@........................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):93
                  Entropy (8bit):4.865096009935425
                  Encrypted:false
                  SSDEEP:3:UZ3/M4yt79CgfyPa3AO2V5FTxyov:UZv5yuwyHbTxyov
                  MD5:CDC8756680C459BD511D2BD2895FE2B2
                  SHA1:A7EA57FD628CFE2F664F2647510C6A412C520DFB
                  SHA-256:7F618D3CA343A0739A52A4A3C4F5B963ED98DC077B60C65FDC77D70FB0EC12D3
                  SHA-512:101722EB5BBA352D557E7D70704E24A54A129276857E8CC13F40DA26DFA9267A67DE79E52A0F552FF676D1825D0FB2EB467837B397D2E6905FA90D6891BCCD45
                  Malicious:true
                  Preview:/*..[NewScriptTemplate]..Description = Just #Requires v2.0..*/..#Requires AutoHotkey v2.0....
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8170
                  Entropy (8bit):5.024273106737054
                  Encrypted:false
                  SSDEEP:192:/iD+QOFljN97L5joVGhwj6y2h2Vfb/xHFiyOdKZBlb0esEOSZ9o3Iu7:/m+QwhN97LFoVAwf2hEfdHFiyOqqeROf
                  MD5:E2067D978526B83A1DA967F16A69C125
                  SHA1:08000FB66E6F1B1FCD450F32E1757A39B3A7BA16
                  SHA-256:040404A4DEF02F17CDAFDA938F5B63FC2181940BA1290DA5742DB0862C07166E
                  SHA-512:A453669B15C18F24A989A57441F961861578C09C145A4364C982410E5E05AB09B05AD4A77929CCF4AB9E00E5E3D73029A13660156BF4EEF9011ACCFD59800EA0
                  Malicious:true
                  Preview:; ..; Window Spy for AHKv2..;....#Requires AutoHotkey v2.0....#NoTrayIcon..#SingleInstance Ignore..SetWorkingDir A_ScriptDir..CoordMode "Pixel", "Screen"....Global oGui....WinSpyGui()....WinSpyGui() {.. Global oGui.. .. try TraySetIcon "inc\spy.ico".. DllCall("shell32\SetCurrentProcessExplicitAppUserModelID", "wstr", "AutoHotkey.WindowSpy").. .. oGui := Gui("AlwaysOnTop Resize MinSize +DPIScale","Window Spy for AHKv2").. oGui.OnEvent("Close",WinSpyClose).. oGui.OnEvent("Size",WinSpySize).. .. oGui.SetFont('s9', "Segoe UI").. .. oGui.Add("Text",,"Window Title, Class and Process:").. oGui.Add("Checkbox","yp xp+200 w120 Right vCtrl_FollowMouse","Follow Mouse").Value := 1.. oGui.Add("Edit","xm w320 r5 ReadOnly -Wrap vCtrl_Title").. oGui.Add("Text",,"Mouse Position:").. oGui.Add("Edit","w320 r4 ReadOnly vCtrl_MousePos").. oGui.Add("Text","w320 vCtrl_CtrlLabel",(txtFocusCtrl := "Focused Control") ":").. oGui.Add("Edit","w320 r4 ReadOnly v
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):352
                  Entropy (8bit):4.914101368991569
                  Encrypted:false
                  SSDEEP:6:1FQp9ODHKATpQEJFn9p6gklJtW3gSsMNFi7N/WGBQqOOccE4gggDHpK/Lkvle:1wsKE54TvZX7N/tW/ODHGpSLk9e
                  MD5:E8D9A7E78D6A2A40BFB532B4812BDE59
                  SHA1:5674B63092A69C419A42BAB9E7462BDE3BDB3CAD
                  SHA-256:A6C51E2188E31E3510577263D7B96DB147B0DF3DFA24C96DF8FDD9D73DA859EE
                  SHA-512:DD7D78C7724DCA4684C732B0F3F8E73AF67610DE8945255B48B9301672AC0B4F405C802A8CD4C343D53266F492D2D0DCD2727B5EBDB9E90CFC9173876B9AB905
                  Malicious:true
                  Preview:..CommandLineToArgs(cmd) {.. argv := DllCall("shell32\CommandLineToArgvW", "wstr", cmd, 'int*', &narg:=0, "ptr").. try {.. args := [].. Loop args.Capacity := narg.. args.Push(StrGet(NumGet(argv, (A_Index-1)*A_PtrSize, "ptr"), "UTF-16")).. }.. finally.. DllCall("LocalFree", "ptr", argv).. return args..}..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1578
                  Entropy (8bit):5.176343578065276
                  Encrypted:false
                  SSDEEP:24:+RemXj4qm4Z6CNeSSeqDe2eTA0EBuddsu9ruLc+cnwYit8BedM44we8wLdstjoj7:uDpn0sqCJFEBqbpjwYTMdGvutN1QmIj
                  MD5:2FFBDE65B63790C5AA12996E9EF9068C
                  SHA1:A793986E4E72D5B5A866E927855EACC3A0399A7A
                  SHA-256:40A6F0CDA5FD1DFF324CAB288BB453AA60B41B09DACBFBC64F2D871423F33935
                  SHA-512:315B2803C8E803B238E87DE63A5737350E41D248F67C54662341CA889C3BD5FC6FC2F516CA20F1FF4D74FCA4AF247B64EC7795D4C4E8990FFFCE49BBF037A906
                  Malicious:true
                  Preview:CreateAppShortcut(linkFile, p) {.. ;target, args, description, aumid, uninst?.. lnk := ComObject('{00021401-0000-0000-C000-000000000046}' ; CLSID_ShellLink.. ,'{000214F9-0000-0000-C000-000000000046}') ; IID_IShellLink.. .. ComCall(20, lnk, 'wstr', p.target).. ComCall(11, lnk, 'wstr', p.HasProp('args') ? p.args : "").. ComCall(7, lnk, 'wstr', p.desc).. if p.HasProp('icon').. ComCall(17, lnk, 'wstr', p.icon, 'int', p.HasProp('iconIndex') ? p.iconIndex : 0).. .. ; Set the System.AppUserModel.ID property via IPropertyStore.. props := ComObjQuery(lnk, '{886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99}').. static PKEY_AppUserModel_ID := PKEY('{9F4C2855-9F79-4B39-A8D0-E1D42DE1D5F3}', 5).. static PKEY_AppUserModel_UninstallCommand := PKEY('{9F4C2855-9F79-4B39-A8D0-E1D42DE1D5F3}', 37).. setProp PKEY_AppUserModel_ID, p.aumid.. if p.HasProp('uninst').. setProp PKEY_AppUserModel_UninstallCommand, p.uninst.. .. ; S
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):10734
                  Entropy (8bit):5.231689303124814
                  Encrypted:false
                  SSDEEP:192:RA1uaqk4Ka6BYzrxPrtRdSE6hyj4rGp+HCOvFrBScc8W4:+uaqkpaPh1sFBfcU
                  MD5:65D05EC61CCA0547E218655E65E5EA7C
                  SHA1:1CF93558BB9F1AE5A055B3F9085BF4166B7F43DD
                  SHA-256:A9A824A763195E5810BF904854AF7ED41C025527B2B8FAA7532C6F24189D69B9
                  SHA-512:65172FA0F9148106E44FDE99E0BCAD173C4EEF405A19B1F54961F2A248F6E6B0A05568D728E83D6582113D0D12A5E87CE763C53271C4D52B9362B19E22EA7D23
                  Malicious:true
                  Preview:EnableUIAccess(ExePath) {.. static CertName := "AutoHotkey".. hStore := DllCall("Crypt32\CertOpenStore", "ptr", 10 ; STORE_PROV_SYSTEM_W.. , "uint", 0, "ptr", 0, "uint", 0x20000 ; SYSTEM_STORE_LOCAL_MACHINE.. , "wstr", "Root", "ptr").. if !hStore.. throw OSError().. store := CertStore(hStore).. ; Find or create certificate for signing... cert := CertContext().. while (cert.ptr := DllCall("Crypt32\CertFindCertificateInStore", "ptr", hStore.. , "uint", 0x10001 ; X509_ASN_ENCODING|PKCS_7_ASN_ENCODING.. , "uint", 0, "uint", 0x80007 ; FIND_SUBJECT_STR.. , "wstr", CertName, "ptr", cert.ptr, "ptr")).. && !(DllCall("Crypt32\CryptAcquireCertificatePrivateKey".. , "ptr", cert, "uint", 5 ; CRYPT_ACQUIRE_CACHE_FLAG|CRYPT_ACQUIRE_COMPARE_KEY_FLAG.. , "ptr", 0, "ptr*", 0, "uint*", &keySpec:=0, "ptr", 0).. && (keySpec & 2)) { ; AT_SIGNATURE.. ; Keep looking for a certificate with
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):844
                  Entropy (8bit):4.810009492650111
                  Encrypted:false
                  SSDEEP:24:ybRJL5QOLrG0ogFhcEfF6iiwADuzheOj9E:y1JNQOL60ogFrf4uDAwm
                  MD5:1A8AB9BB38FD0DA51D03DC48E3A0B2EA
                  SHA1:5C74DDD45C91A39B921139881C76C48C97E35825
                  SHA-256:48A3F822A720B8E9B41165A1D19D56411D1F58036338EBD07AB40F2A14CF0F1B
                  SHA-512:1B88603FB9EB28E717CB77623FF0159F5F45E677C34316DC0C5D5C2ED46C59F10D3AFB532B1F99920F91B8098E544873F944B1E0E575EFD694DD24BDCA22C14E
                  Malicious:true
                  Preview:GetGitHubReleaseAssetURL(repo, ext:='.zip', release:='latest') {.. req := ComObject('Msxml2.XMLHTTP').. req.open('GET', 'https://api.github.com/repos/' repo '/releases/' release, false).. req.send().. if req.status != 200.. throw Error(req.status ' - ' req.statusText, -1).. .. res := JSON_parse(req.responseText).. try.. assets := res.assets.. catch PropertyError.. throw Error(res.message, -1).. .. loop assets.length {.. asset := assets.%A_Index-1%.. if SubStr(asset.name, -StrLen(ext)) = ext {.. return asset.browser_download_url.. }.. }.. .. JSON_parse(str) {.. htmlfile := ComObject('htmlfile').. htmlfile.write('<meta http-equiv="X-UA-Compatible" content="IE=edge">').. return htmlfile.parentWindow.JSON.parse(str).. }..}
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2432
                  Entropy (8bit):5.429608282178578
                  Encrypted:false
                  SSDEEP:48:RCQeNhzam2kwyXXmkDEaVlKjdkOBJlYg9A1kWVIDi:RCQeNhwkoAQ7Q18O
                  MD5:727AE6F2EC77A5B56774DF9DA14636D2
                  SHA1:8216A2122C825127CA59B05B0BAE0D57E92F1110
                  SHA-256:84032ECAC8ED334CF8788A81BEA721B0AF5CD7CA7DCA57B60CDEC3556AE33914
                  SHA-512:F1058216B5D1B8D590EB4CAFD5139F71F8DF5F96A3FCC314A7635CB1B99DE8623D87C57C567868EBDAFB09925B8D13FDADCEE49FA89F1A239725A92B948272CC
                  Malicious:true
                  Preview:; HashFile by Deo..; https://autohotkey.com/board/topic/66139-ahk-l-calculating-md5sha-checksum-from-file/..; Modified for AutoHotkey v2 by lexikos.....#Requires AutoHotkey v2.0-beta..../*..HASH types:..1 - MD2..2 - MD5..3 - SHA..4 - SHA256..5 - SHA384..6 - SHA512..*/..HashFile(filePath, hashType:=2)..{...static PROV_RSA_AES := 24...static CRYPT_VERIFYCONTEXT := 0xF0000000...static BUFF_SIZE := 1024 * 1024 ; 1 MB...static HP_HASHVAL := 0x0002...static HP_HASHSIZE := 0x0004..... switch hashType {.. case 1: hash_alg := (CALG_MD2 := 32769).. case 2: hash_alg := (CALG_MD5 := 32771).. case 3: hash_alg := (CALG_SHA := 32772).. case 4: hash_alg := (CALG_SHA_256 := 32780).. case 5: hash_alg := (CALG_SHA_384 := 32781).. case 6: hash_alg := (CALG_SHA_512 := 32782).. default: throw ValueError('Invalid hashType', -1, hashType).. }......f := FileOpen(filePath, "r").. f.Pos := 0 ; Rewind in case of BOM... .. HCRYPTPROV() => {.. p
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):182
                  Entropy (8bit):4.286514883049412
                  Encrypted:false
                  SSDEEP:3:BUQPXtHVbx+Lgz5JcLHQtEcFHk9g/PM/eEFBpcOvsRyhKQvArXGtFDAE/URqnn:B3HVbvXIwtPHrQrByOkAhKQvACthAhRe
                  MD5:4B095AAE00456AA248024A184671E4D5
                  SHA1:84AE516FBC62CE0AA10FFEACD7BA865A35A0A375
                  SHA-256:D65C6E73417E6BBA7A619F2E68933B74E6AE6141277B65542AED9B6ACDFC83FF
                  SHA-512:77AABE92719D8FC7A28C76F3B76FA2E42A188DB14F004262D8E913620AA990CDE29119B82D919511FC0D828CA0A108EA79858BA158B6A8ED6A260B72B4EE229D
                  Malicious:true
                  Preview:Scripts in this directory may be copied and used freely, but..may be removed or modified without notice by any future release...Do not #include them directly; instead, create a copy.
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):420
                  Entropy (8bit):5.234753324124194
                  Encrypted:false
                  SSDEEP:12:9YEvTDHflQK7AqMVQ31Uk5q66BODjNAhQ3JA:+EvTjtzAqh6k5jrO
                  MD5:9E53FCA8C7F6A9EE179F0FC0A7890EA3
                  SHA1:DC2A1BF437EEA36B3F5BA9318F3B391B405D5CB2
                  SHA-256:EA67340C555FDC1ABF8E324AC550AC37D2BA5F96A8EDEF120E72FB340F8F95C0
                  SHA-512:CAD5C07F952FB93413B4A3990C522BA4B446AE41F11C8DD323BDCDE1B30FBFD76515606D5DC4BCB8768BD382CDB82553801539A192B002696D253341F3C0DBC5
                  Malicious:true
                  Preview:; For documentation about the parameters, refer to:..; https://learn.microsoft.com/en-us/windows/win32/shell/shell-shellexecute..ShellRun(filePath, arguments?, directory?, operation?, show?) {.. static VT_UI4 := 0x13, SWC_DESKTOP := ComValue(VT_UI4, 0x8).. ComObject("Shell.Application").Windows.Item(SWC_DESKTOP).Document.Application.. .ShellExecute(filePath, arguments?, directory?, operation?, show?)..}
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):142
                  Entropy (8bit):4.4755179547678345
                  Encrypted:false
                  SSDEEP:3:a/GeA+gCFWVVIQGJXbtBXD7r9FV1oUqERA1MtAEKLENOn:a/5A+QVMJXBpXRFVOjERAGtUENOn
                  MD5:165B8FC572F943E3665994F87F1772B7
                  SHA1:265CA3D2A66A7E1807962EB7E8A444CEFB61BC0C
                  SHA-256:9B75C7F804D1D55807459E6F06DB2BEE8E1FB60CE9C9340D44A7B491CE53B982
                  SHA-512:E675453EEF9A10560CB9EA95E993D8068C8DFCA3664A140B6BA33361D0736632B8CE3A37770411583F558476173294BCC12B83BF33190D89EB009BFB9BB5F0AF
                  Malicious:true
                  Preview:; v1: includes the file from the script's directory...; v2: does nothing because the path is relative to this file...#include *i reload-v1.ahk
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):688
                  Entropy (8bit):5.235085398227736
                  Encrypted:false
                  SSDEEP:12:/ESUoz6Ls/umIRuccWJZw/EWZ5h/ELcMWZOezx+3O/RYo3hj/ZA8Q/L59O/aBen:/Evo2L4QeWuZ/3jYo3/0Ln+Oe
                  MD5:DAC79AD5A978F0497DE70A005B6A6084
                  SHA1:DB100CE15998772FE322679468F46B0F25239EB4
                  SHA-256:DBC1420C9368E954176CD1BC38C0BF5498D721CB7DEE50B5ABEF51611A33C658
                  SHA-512:9F2A2C0E01724EF82860CFB97FBE6196D29B3B41080F04B3F51653F2F535849428B0A245BC954AA57569AA660D5A5A20D2D1E0DBB9081D718BF2DEDDB051F47C
                  Malicious:true
                  Preview:A_AllowMainWindow := true..if A_AhkPath != A_ScriptDir '\AutoHotkeyUX.exe' {.. ; Standalone, compiled or test mode: locate InstallDir via registry.. DirExist(ROOT_DIR := RegRead('HKCU\SOFTWARE\AutoHotkey', 'InstallDir', "")).. || (ROOT_DIR := RegRead('HKLM\SOFTWARE\AutoHotkey', 'InstallDir', ""))..}..if (ROOT_DIR ?? "") = "" || !DirExist(ROOT_DIR).. Loop Files A_ScriptDir '\..', 'D'.. ROOT_DIR := A_LoopFileFullPath....if !trace.Enabled := RegRead('HKCU\Software\AutoHotkey', 'Trace', false).. trace.DefineProp 'call', {call: (*) => ''}....#include config.ahk....trace(s) {.. try.. FileAppend s "`n", "*".. catch.. OutputDebug s "`n"..}..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):429
                  Entropy (8bit):5.26163110122379
                  Encrypted:false
                  SSDEEP:12:oqQS/VkUZQjNySLmIK5aymKYeJUmJbSQ4JDta1y:dNkVNy2K5eeJvJbv4JJcy
                  MD5:248B58535F55EB55D9BAEC04A384B5E6
                  SHA1:76D067318B67DA9A3DA71A232A887C8935C7068F
                  SHA-256:4D1F241A0C973E30F1BF19E71CADB386B872A14BF0C29D32D4781A56CAFD998A
                  SHA-512:0186EB49DA706C6CC6F48ECD94A4996C258ECEA10BED26B9C79BDDF0F7ECA32DF1449166309237859CA2508427BF79D447A2202EAEBA211228DA9822646CF23A
                  Malicious:true
                  Preview:..; CONFIG_FILE_PATH := A_MyDocuments "\AutoHotkey\AutoHotkey.ini"..CONFIG_KEY := 'HKCU\Software\AutoHotkey'....ConfigRead(section, key, default) {.. ; return IniRead(CONFIG_FILE_PATH, section, key, default).. return RegRead(CONFIG_KEY '\' section, key, default)..}....ConfigWrite(value, section, key) {.. ; IniWrite(value, CONFIG_FILE_PATH, section, key).. RegWrite(value, 'REG_SZ', CONFIG_KEY '\' section, key)..}..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1065
                  Entropy (8bit):4.577078861855727
                  Encrypted:false
                  SSDEEP:24:R6bKtOSlRV2+O2WF3Q7DolfoV9OlCLUD47/HSoKVLbJlsLJc:obF42C9OlCoDz1lMc
                  MD5:3E5C97E6C3A76686329C81FBA864B26B
                  SHA1:EC111D01A5299DE2CA93C5441E92BB49D9D5E710
                  SHA-256:F5B97911887C303B6859DE44EFF73780309E31E931DCBA86A66AAAFBE932AF72
                  SHA-512:C70BA459ABB2C35EDFD62DFBE6EFB9C54D5341802A72AC7D6B3B63877F28A97A974B96B6DE747E29909550D6BA2C5D14DA40BEF6D91841C5C8C5A903697307C7
                  Malicious:true
                  Preview:#include identify_regex.ahk....IdentifyBySyntax(code) {.. static identify_regex := get_identify_regex().. p := 1, count_1 := count_2 := 0, version := marks := ''.. try while (p := RegExMatch(code, identify_regex, &m, p)) {.. p += m.Len().. if SubStr(m.mark,1,1) = 'v' {.. switch SubStr(m.mark,2,1) { .. case '1': count_1++.. case '2': count_2++.. }.. if !InStr(marks, m.mark).. marks .= m.mark ' '.. }.. }.. catch as e.. return {v: 0, r: "error", err: e, pos: p}.. if !(count_1 || count_2).. return {v: 0, r: "no tell-tale matches"}.. ; Use a simple, cautious approach for now: select a version only if there were.. ; matches for exactly one version... if count_1 && count_2.. return {v: 0, r: Format(.. count_1 > count_2 ? "v1 {1}:{2} - {3}" : count_2 > count_1 ? "v2 {2}:{1} - {3}" : "? {1}:{2} - {3}",.. count_1, count_2, Trim(marks).
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with very long lines (3982), with CRLF line terminators
                  Category:dropped
                  Size (bytes):4018
                  Entropy (8bit):5.309111673003908
                  Encrypted:false
                  SSDEEP:96:6Z2eX4Mjt29rVduPDOym1m35CA2OLiZk8+1bi039:6Rtjg9YOaLiZk8+R
                  MD5:F27F09D324016BD49D2DA38901E79A61
                  SHA1:F2AF4EA1CA36DC4ED53BA3A5817B83D457C9029C
                  SHA-256:C2563AB626DF892398083404ACECC5229300BA7DC6077B120844C65FACFAD854
                  SHA-512:1DD5A6DDF87A3026F5B2D468197173AF0C4E6C2EEAB64113BCD2BBD56BE46089E546F694FEA2416AADC9C2669070B29EF26EC689DFBE73DEF8AF6FD0DE310D04
                  Malicious:true
                  Preview:get_identify_regex() => '..(..(?(DEFINE)(?<line_comment>(?<![^ `t`r`n]);.*)(?<block_comment>(?m:^[ `t]*/\*(?:.*\R?)+?(?:[ `t]*\*/|.*\Z)))(?<eol>(?=[ `t]*+(?&line_comment)?(?m:$)))(?<tosol>(?:(?&eol).*\R|(?&block_comment))++)(?<toeol>(?:[^ `t`r`n]++|[ `t]*+(?!(?&eol)))*+)(?<contsec>[ `t]*+\((?i:Join[^ `t`r`n]*+|(?&line_comment)|[^ `t`r`n()]++|[ `t]++)*+\R(?:[ `t]*+(?!\)).*\R)*+[ `t]*+\))(?<solcont>[ `t]*+(?:,(?!::| +& )|[<>=/|^,?:\.+\-*&!~](?![^"'`r`n]*?(?:".*?::(?!.*?")|'.*?::(?!.*?')|::))|(?i:AND|OR)(?=[ `t])))(?<eolcont>(?&eol)(?:(?<ec_bad>(?<=:=)|(?<=[:,]))|(?<=[<>=/|^,?:\.+\-*&!~](?<!\+\+|--))|(?<=(?<![\w[:^ascii:]\.])(?i:OR|IS|AS|IN))|(?<=(?<![\w[:^ascii:]\.])(?i:AND|NOT))|(?<=(?<![\w[:^ascii:]\.])(?i:CONTAINS)))(?&tosol)(?:(?&contsec)|(?(ec_bad)|(*:v2-cle))))(?<v1_cont>(?&tosol)(?:(?&solcont)(?&subexp)|[ `t]*+,[ `t]*+(?=%)(?&pct)|(?&contsec)(?&ambig)))(?<v1_fin>(?:.*+(?&v1_cont))*.*+)(?<ambig>(?:(?&exp)|(?&v1_cont)|.*+)++(*:~))(?<pct>(?=%[ `t])(?:(?&subexp)(?&exp)|(?&v1_fin)(*:v1
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2613
                  Entropy (8bit):4.984139073207136
                  Encrypted:false
                  SSDEEP:48:k8u94OWLJitj8Zk2L6eY4Y5u60P8w9XMwSv0s5P5UNctPyfFOi79C:k8u94OWLJgoeeY4R6m86GDRUNctP6wi4
                  MD5:696750C1861231D07FF4548AD4360DC8
                  SHA1:EB4B90B17AADF7B1CCDC484840B5500494C4A787
                  SHA-256:F7D5AC8D1CFC77685CDCDBE89ABB8AC0A89F5B6EEC1AC1385069B72A05D05315
                  SHA-512:5745B58987555C797F90EFD65BB9E02E3A9139B934E27B287816BE79A988F04EEF6DD8B8AF43C30F5F4BC5360CA7A3E42A21734915277CF3A18A91EA39AC3636
                  Malicious:true
                  Preview:..#include common.ahk....GetExeInfo(exe) {.. if !(verSize := DllCall("version\GetFileVersionInfoSize", "str", exe, "uint*", 0, "uint")).. || !DllCall("version\GetFileVersionInfo", "str", exe, "uint", 0, "uint", verSize, "ptr", verInfo := Buffer(verSize)).. throw OSError().. prop := {Path: exe}.. static Properties := {.. Version: 'FileVersion',.. Description: 'FileDescription',.. ProductName: 'ProductName'.. }.. for propName, infoName in Properties.OwnProps().. if DllCall("version\VerQueryValue", "ptr", verInfo, "str", "\StringFileInfo\040904b0\" infoName, "ptr*", &p:=0, "uint*", &len:=0).. prop.%propName% := StrGet(p, len).. else throw OSError().. if InStr(exe, '_UIA').. prop.Description .= ' UIA'.. prop.Version := RegExReplace(prop.Version, 'i)[a-z]{2,}\K(?=\d)|, ', '.') ; Hack-fix for erroneous version numbers (AutoHotkey_H v2.0-beta3-H...).. return prop..}....IsUsableAutoHotkey(exeinfo) {..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:MS Windows icon resource - 4 icons, 32x32 with PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 48x48 with PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
                  Category:dropped
                  Size (bytes):4310
                  Entropy (8bit):7.802879341444645
                  Encrypted:false
                  SSDEEP:96:E+lfU3JuOE/08BQLDmMZUMxsjnzEBgTOhmvS:xkLE/B2LuzEBga3
                  MD5:EEECD8AF162D3F318496E0E60D6D8C57
                  SHA1:31A99C80E4F1033914CE9344E95B84571F76AD2D
                  SHA-256:968473DF8EAC7264D9E84E6AE91A4D706CDA9F89F345D182617B161EF4FE1A7B
                  SHA-512:6F55968ADF7F2F02E128945016ED0C4D003C9640E4CBFC7B22B82374647E6EBDB07C02E99240DA369789F4107D2C130E54D4ACB1324455FD26668C4D1D009884
                  Malicious:true
                  Preview:...... .... .....F...00.... .........@@.... .W............. .....2....PNG........IHDR... ... .....szz.....tIME....... ?H.....tEXtSoftware.GLDPNG ver 3.4q.......tpNGGLD3....J.).....gAMA......a....DIDATx..WM(la.....d.....2.w..+..aa!.F.P3n\+.$......)).[).'Sj.....,hPd.\.[g.w~..{.^...|..<.y.w..=gT...?.vv....R.......................177...C...cqq.CCC...V........|.1.....\ ==.......Acc#L&....... k.p..n...R.WWW.b....SWW.^........N.....ALL.....g`llL....k...;33...GGG0..".s......-((.*.....)...=...............=...2....g......."......\9....CUU.jkk.....&9.........,9...<5.6000 ...^................j5222......w9A......)--....xxxx.~ww...s.Z%noo.a....Gjj.h.D....aDEE.966.....Z.......4.&.ckkK...C,9.j4.....V.L...j...[.K..............z.;e..P.\#F....H.....BJJ....z.EEE.....\xww.;;;r.9....K2.z....2..S................c........"..f..X.$&$$...@.&''e.o@o........\jp....`...f!..Y..pYYY27;;....c.eff....gP..A'...'.***....mmm......f.....'s..\j.\..~j)=}}}...Cj...........#.._..fZ.6.>..{||.
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):5004
                  Entropy (8bit):4.913133828159579
                  Encrypted:false
                  SSDEEP:96:ctpyLQ5w84XwtzeZIPHGI4tLSSZMUR6l5w8OtXQyceRX35FZsFFNA3me:cDi9wJeKPHGI4J9SUtruNw35FZs1mD
                  MD5:F4251E653DBBBDD8CF4640BD9855C207
                  SHA1:D08B6E5796150AA1436FD3DA39BFC5FDBAAEE297
                  SHA-256:DEFFD87D99FF125ECCAC2331A8BA4E3A0044E150E80316E9469DD57F322BEDA1
                  SHA-512:86896CCB0ACBD27EEEFE6E02747958CAFCCA31541638435DFE9F08D89B763144F6B5FB521DF11DCE4C3F46B186DE4905F56EBCC7C57D4C29EF2A0731A6492698
                  Malicious:true
                  Preview:class AutoHotkeyUxGui extends Gui {.. __new(title, opt:='') {.. super.__new(opt, title, this).. this.SetFont('s9', "Segoe UI").. this.OnEvent('Escape', 'Destroy').. this.OnEvent('Close', 'Destroy').. }.. .. AddListMenu(options:='', columns:=unset) {.. IsSet(columns) || columns := [].. c := this.AddListView(UxListMenu.DefaultOptions ' ' options, columns).. if !InStr(options, 'Theme').. DllCall("uxtheme\SetWindowTheme", "ptr", c.hwnd, "wstr", "Explorer", "ptr", 0).. static LVTVIM_TILESIZE := 1, LVTVIM_COLUMNS := 2, LVTVIM_LABELMARGIN := 4.. static LVTVIF_AUTOSIZE := 0, LVTVIF_EXTENDED := 4, LVTVIF_FIXEDHEIGHT := 2.. , LVTVIF_FIXEDSIZE := 3, LVTVIF_FIXEDWIDTH := 1.. static LVM_SETTILEVIEWINFO := 0x10A2.. tileviewinfo := Buffer(40, 0).. ControlGetPos(,, &w,, c).. pad := 2 * A_ScreenDPI // 96.. NumPut(.. 'uint', 40, ; cbSize.. 'uint', LVTV
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1697
                  Entropy (8bit):4.988385975818948
                  Encrypted:false
                  SSDEEP:48:R+KUvhhYz6gXd/1BvbGpk0b/oC+Putym6P:QKUvh6fFkk0rsP4kP
                  MD5:C90BED0679B789B74E4865AE6F2709A3
                  SHA1:B0DBEE6A237BA93DAEC76A0553CD3254821D60A1
                  SHA-256:C242EBB51241ACAB13152D95CDB05BE5382FFB97F3DCA2DA3A4E5A084C2E3FF4
                  SHA-512:F8DFE5C558B427E05905B2A3D8A09632347EDF945D47ED4FC82EC38A9045F5837A798EF669F0FDAE6504D9EEE6762C49C8E6C32ADAC0F6A3E6C2EED6D48E64B2
                  Malicious:true
                  Preview:; Run this script to launch or download and install Ahk2Exe into A_ScriptDir '\..\Compiler'...#requires AutoHotkey v2.0....#include install.ahk..#include inc\GetGitHubReleaseAssetURL.ahk....#SingleInstance Force..InstallAhk2Exe....InstallAhk2Exe() {.. inst := Installation().. inst.ResolveInstallDir() ; This sets inst.InstallDir and inst.UserInstall.. .. finalPath := inst.InstallDir '\Compiler\Ahk2Exe.exe'.. if FileExist(finalPath) {.. ShellRun finalPath.. ExitApp.. }.. .. if !A_Args.Length {.. (inst.UserInstall) || SetTimer(() => (.. WinExist('ahk_class #32770 ahk_pid ' ProcessExist()) &&.. SendMessage(0x160C,, true, 'Button1') ; BCM_SETSHIELD := 0x160C.. ), -25).. if MsgBox("Ahk2Exe is not installed, but we can download and install it for you.", "AutoHotkey", 'OkCancel') = 'Cancel'.. ExitApp.. if !A_IsAdmin && !inst.UserInstall {.. Run Format('*RunAs "{1}" /restart /script "{
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4162
                  Entropy (8bit):4.805177330644294
                  Encrypted:false
                  SSDEEP:96:m4C3dyA4vkDU1tYur5Ql5rk08NpJ31rsDoY0Jk0AVIn:Q3dyA4L/fdQl5w08LrsMHJk02G
                  MD5:30B87FBFADC592C38BE9D82EDF597FA3
                  SHA1:1FF5D720858A38BDD2E21A5A492938C07B2811A5
                  SHA-256:1E59921BCDDB3C41651EB01605CDEFCDEE3C6ADEC5DB6B7CAFB7AB801EAD5E1E
                  SHA-512:79A407CAD251F45D13C0505CDF7E27A281455E3EEFE1F7FC5AEDD658297351AC7DBBCE21065A29ED9D86C6B908A175CD83201E0D60E972865E6258C2F8C145A7
                  Malicious:true
                  Preview:; Run this script to download and install an additional AutoHotkey version...; Specify the version as a single command line parameter. If omitted or..; incomplete like "1.1" or "2.0", the latest version will be downloaded...#requires AutoHotkey v2.0....#include install.ahk....A_ScriptName := "AutoHotkey"....InstallAutoHotkey A_Args.Length ? A_Args[1] : '1.1'....InstallAutoHotkey(version) {.. abort(message, extra?) {.. if IsSet(extra).. message .= "`n`nSpecifically: " SubStr(extra, 1, 100).. MsgBox message,, "Iconx".. ExitApp.. }.. .. ; Determine base version, for download directory.. baseVersion := RegExReplace(version, '^\d+(?:\.\d+)?\b\K.*').. if IsInteger(baseVersion).. baseVersion .= baseVersion = '1' ? '.1' : '.0'.. else if !IsNumber(baseVersion).. abort "Invalid version.", version.... ; If version number is not exact, try to determine the latest compatible version.. if IsNumber(version) {.. url := Fo
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):39948
                  Entropy (8bit):4.584438080699804
                  Encrypted:false
                  SSDEEP:768:Mehhuh3o8p7Nl/EjTADVwFvgxatHkMrvDN3v:J837ppleA/atEUvJf
                  MD5:817E7747DCFF942D2F1E65CEC536CBF5
                  SHA1:1D1C54D79138B0266D349518FA15B9BEB323621B
                  SHA-256:25E530F9CADF91F63EEB04C99993355BBF79074A7559DCE817A515E177F32328
                  SHA-512:A77BE0D30E848D5364A7DDCBCFF563649C06FAC546C27471A0FA35BF60286F2D3520033DF87E97F6D4EFD2090E84DED0FC0CA0AA1A87CB41D7F361AD833C406E
                  Malicious:true
                  Preview:; This script contains AutoHotkey (un)installation routines...; See the AutoHotkey v2 documentation for usage...#include inc\bounce-v1.ahk../* v1 stops here */..#requires AutoHotkey v2.0....#SingleInstance Off ; Needed for elevation with *runas.....#include inc\launcher-common.ahk..#include inc\HashFile.ahk..#include inc\CreateAppShortcut.ahk..#include inc\EnableUIAccess.ahk..#include inc\ShellRun.ahk....if A_LineFile = A_ScriptFullPath.. Install_Main....Install_Main() {.. try {.. Installation.Instance := inst := Installation().. method := 'InstallFull'.. params := [].. while A_Index <= A_Args.Length {.. switch A_Args[A_Index], 'off' {.. case '/install':.. method := 'InstallExtraVersion'.. inst.SourceDir := A_Args[++A_Index].. case '/uninstall':.. method := 'Uninstall'.. if A_Index < A_Args.Length && SubStr(A_Args[A_Index+1],1,1) != '/'.. par
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:CSV text
                  Category:dropped
                  Size (bytes):2839
                  Entropy (8bit):5.2377686420992315
                  Encrypted:false
                  SSDEEP:48:gZh3hDcU4mG7IuWU81js9vMuUcEJi28uGQLC6GJ2ExE9+HoEjVR2XMSZFuoGV:gXRwUK0vW1UQ2ME9Hu72fcoGV
                  MD5:3D895C4F6276BCF3EF0CD5A6D60114B1
                  SHA1:AB51957004DC1E3ECF75BFB24C5132CE6689D03F
                  SHA-256:6B0E6BEE9FF3B2CF5EA4229E1330F729E5B470B20C22917858622BA4E2E3ABB6
                  SHA-512:42CABC6E9A34A46E90587342E3A55447283DFA24298B35D4005B65B8993988C90B1A290B1BC66F233CCA2D813D42460EE90AC7C2A92837953E57CD18CBBD5F8D
                  Malicious:false
                  Preview:Hash,Version,Path,Description..53d9c0ff0f0184ea309047bd3acf03af,2.0.12,"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoHotkey Dash.lnk",""..0ff93efe693fba7ff2043b9d4395dd87,2.0.12,"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoHotkey Window Spy.lnk",""..e3f2ad7733f3166fe770e4dc00af6c45,2.0.12,"license.txt",""..825448610a8213a8408578df2361d5eb,2.0.12,"UX\AutoHotkeyUX.exe","AutoHotkey 64-bit"..165b8fc572f943e3665994f87f1772b7,2.0.12,"UX\inc\bounce-v1.ahk",""..e8d9a7e78d6a2a40bfb532b4812bde59,2.0.12,"UX\inc\CommandLineToArgs.ahk",""..dac79ad5a978f0497de70a005b6a6084,2.0.12,"UX\inc\common.ahk",""..248b58535f55eb55d9baec04a384b5e6,2.0.12,"UX\inc\config.ahk",""..2ffbde65b63790c5aa12996e9ef9068c,2.0.12,"UX\inc\CreateAppShortcut.ahk",""..65d05ec61cca0547e218655e65e5ea7c,2.0.12,"UX\inc\EnableUIAccess.ahk",""..1a8ab9bb38fd0da51d03dc48e3a0b2ea,2.0.12,"UX\inc\GetGitHubReleaseAssetURL.ahk",""..727ae6f2ec77a5b56774df9da14636d2,2.0.12,"UX\inc\HashFile.ahk",""..3e5c97e6c3a76686329
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):18109
                  Entropy (8bit):4.894561088112024
                  Encrypted:false
                  SSDEEP:192:HBHZGn4adB4K2maaPGBSE72hxuWYDlmxrCOKen2RXXtiqOeGKlLFemIpyeOYMYyT:hH2B/uWSKXn2NCQE0X40GG7QE
                  MD5:596B69069BBBCC9A22AC26BBA6EFE546
                  SHA1:694CEC54200FF1EC70DC56320C577B652884B53D
                  SHA-256:830DB4BE4C8320F23FF32316DAC933D4E72D9056EA5A819CC12C38614DA6E06F
                  SHA-512:1C18ACF4403915C6A2562F5E26C0ED7C4FC00E9D67D19622D1DB8BB9338FF6D6E8BF9ABE7317F1B529EF1C24901B45C3B13DC3B734D97582C91B206BEE9AA8F8
                  Malicious:true
                  Preview:; This script is intended for indirect use via commands registered by install.ahk...; It can also be compiled as a replacement for AutoHotkey.exe, so tools which run..; scripts by executing AutoHotkey.exe can benefit from automatic version selection...#requires AutoHotkey v2.0....;@Ahk2Exe-SetDescription AutoHotkey Launcher..#SingleInstance Off..#NoTrayIcon....#include inc\identify.ahk..#include inc\launcher-common.ahk..#include inc\ui-base.ahk....if A_ScriptFullPath == A_LineFile || A_LineFile == '*#1' {.. SetWorkingDir A_InitialWorkingDir.. Main..}....Main() {.. switches := [].. while A_Args.length {.. arg := A_Args.RemoveAt(1).. if SubStr(arg,1,1) != '/' {.. ScriptPath := arg.. break.. }.. nextArgValue() {.. if !A_Args.Length {.. MsgBox "Invalid command line switches; missing value for " arg ".", "AutoHotkey Launcher", "icon!".. ExitApp 1.. }.. return A_Args.R
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):556
                  Entropy (8bit):4.997919572416062
                  Encrypted:false
                  SSDEEP:12:SsFVctCPDVDHn3f8q9mCC41dDVxqy40nyZ3AxL24SHD/TW+37rz3kVP:SyctQVNxZx20c382FHz3kVP
                  MD5:35F4753A58432446B99BF89A9E930BF5
                  SHA1:BABC3341D9D95865A36EA9A20549A61146093006
                  SHA-256:E4659306A755B583E9CEF5FDBA3B3EB102D8939FB028AFD91AAD4496E758FAD5
                  SHA-512:AC3483A17EAD5173CE40A6AF55C3C2361652FEFD94C0BD82E004DF8186FFC31EAB194534A25FE995D677F2F71363095D177C01AFB6AE50F2B63BA156855EF5E5
                  Malicious:true
                  Preview:; This file is part of a trick for allowing a v2 script to relaunch itself with..; v2 when the user attempts to execute it with v1. See inc\bounce-v1.ahk.....#NoTrayIcon....if (A_ScriptFullPath = A_LineFile)..{.. MsgBox 16,, This script is not meant to be executed... ExitApp 2..}....if (!A_Args.Length())..{.. Loop Files, %A_ScriptDir%\..\AutoHotkey32.exe, FR.. {.. Run "%A_LoopFileLongPath%" /force "%A_ScriptFullPath%".. ExitApp.. }..}....MsgBox 16,, This script requires AutoHotkey v2, but was launched with v1...ExitApp 2
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2180
                  Entropy (8bit):5.132520164605258
                  Encrypted:false
                  SSDEEP:48:SiAhFZOZAn5ABXEXEQX+gd4fEi1HIEL+xuFSXjwWURpwSgBTn:kZFjugWfEi1HEx+nnRFUj
                  MD5:0299132478B49E3EB706C214BF32E62F
                  SHA1:9705C410B9F515269C512C64129CED8E0B1B23D2
                  SHA-256:D26CAEF44190E0B612C3E4309FF6689DC2953C72CB3DE1C94D002250B089F16B
                  SHA-512:2A9CE8EE71AB207DBF4C4FCC2634D49233304DA858C7880813A2127C2A063DC58703D4B2129498DB630D081E1D72F899D348C01DBBCC359D92AB720B89CCDC44
                  Malicious:true
                  Preview:; This script clears any file type assocation made via the "open with" dialog,..; so that the standard registration under HKCR\.ahk can take effect...#include inc\bounce-v1.ahk../* v1 stops here */..#requires AutoHotkey v2.0....keyname := "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ahk\UserChoice"..initial_progid := RegRead(keyname, "ProgId", "")..legacy_key := "HKCU\Software\Classes\.ahk"..legacy_assoc := RegRead(legacy_key,, "AutoHotkeyScript")..if A_Args.Length && A_Args[1] = '/check' {.. if (initial_progid = "" || initial_progid = "AutoHotkeyScript") && legacy_assoc = "AutoHotkeyScript".. || MsgBox("It looks like you've used an unsupported method to set the default program for .ahk files. ".. . "This will prevent the standard context menu and launcher (version auto-detect) functionality ".. . "from working. Would you like this setting to be reset for you?", "AutoHotkey", "Icon! y/n") != "yes".. ExitApp..}..r
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, Unicode text, UTF-8 text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):6968
                  Entropy (8bit):4.859435822860328
                  Encrypted:false
                  SSDEEP:96:sHqX7z3hetnbfigrsSUfQDEF2mgPp3eDThh6PTw5/cjG7:Aqr9eBb5rsCs2mgxOyPTw5/17
                  MD5:669BD791C5AAFB60EE0885EF064D3622
                  SHA1:ACEFB3C3997E2EADD32413814E71AAAAD5A8B6D4
                  SHA-256:E8C0B4E149AD58C57E77AAC12041F1FA8BC9F25C6D642D12837EFC5FD97B8D21
                  SHA-512:EB0345B3562523C58894752276938C7E5EE63B7C3A660317C9A4C1A93B6E530B12015DD380A8A230324B94A9F042380C1A1D24B49D21C3805A4711CB185A33DB
                  Malicious:true
                  Preview:; Dash: AutoHotkey's "main menu"...; Run the script to show the GUI...#include inc\bounce-v1.ahk../* v1 stops here */..#requires AutoHotkey v2.0....#NoTrayIcon..#SingleInstance Force....#include inc\ui-base.ahk..#include ui-launcherconfig.ahk..#include ui-editor.ahk..#include ui-newscript.ahk....DashRegKey := 'HKCU\Software\AutoHotkey\Dash'....class AutoHotkeyDashGui extends AutoHotkeyUxGui {.. __new() {.. super.__new("AutoHotkey Dash").. .. lv := this.AddListMenu('vLV LV0x40 w250', ["Name", "Desc"]).. lv.OnEvent("Click", "ItemClicked").. lv.OnEvent("ItemFocus", "ItemFocused").. lv.OnNotify(-155, "KeyPressed").. .. this.AddButton("xp yp wp yp Hidden Default").OnEvent("Click", "EnterPressed").. .. il := IL_Create(,, true).. lv.SetImageList(il, 0).. il2 := IL_Create(,, false).. lv.SetImageList(il2, 1).. addIcon(p*) =>(IL_Add(il, p*), IL_Add(il2, p*)).. .. lv.Add("Icon" addIc
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8585
                  Entropy (8bit):4.875277208906012
                  Encrypted:false
                  SSDEEP:192:th4hvlbHoc4v3g/ucyCs5fyrpsp/vm1kEoQH1lY0qibz:th4h+cyCifyrp85QVldz
                  MD5:82EB574294FF4E2E7461B95F5BAD0A87
                  SHA1:A981373EF3BD61CE5A2F0AD9BEDAA1CF4ACFD591
                  SHA-256:7263286EB3A42ECCF5EDC39B43C74A8BF7C82F2671204D1AE654236C1DE3F05D
                  SHA-512:1C54E110B384D55CA0243AD343E69D1F0FA9B2A863AF8DA75A5C992D19F9E055182BBA09BE227882F82D0EBF4EC94094723E2DB06CDF7EE2ED574348A8D72C74
                  Malicious:true
                  Preview:; This script shows a GUI for setting the default .ahk editor...#requires AutoHotkey v2.0....#NoTrayIcon..#SingleInstance Off....#include launcher.ahk..#include inc\CommandLineToArgs.ahk....class EditorSelectionGui extends AutoHotkeyUxGui {.. __new(cmdLine) {.. super.__new("Select an editor").. .. lv := this.AddListMenu('vEds LV0x40 w300', ["Editor"]).. this.IconList := il := IL_Create(,, true).. lv.SetImageList(il, 0).. for app in this.Apps := GetEditorApps() {.. try.. icon := IL_Add(il, app.exe).. catch.. icon := -1.. lv.Add('Icon' icon, app.name).. }.. this.SelectEditorByCmd(cmdLine).. lv.AutoSize(8).. lv.GetPos(&x, &y, &w, &h).. x += w.. y += h.. .. this.AddText('xm w' w ' y' y, "Command line").. this.AddEdit('xm wp r2 -WantReturn vCmd', cmdLine).OnEvent('Change', 'CmdChanged').. .. this.AddText('xm
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8289
                  Entropy (8bit):5.012543704125114
                  Encrypted:false
                  SSDEEP:192:18ZheYP0oxU2r23K7D+lTt3cs8FN7bDanWPKtscP/81Tn/dUT0:1fYs125DIB3csspb2qcx/81TnlUT0
                  MD5:852BF007A6DDD80A2E5C9D82D874CF45
                  SHA1:6F293EC5B59645F795E4FEB3F02C026B62ED428E
                  SHA-256:C91E18A25069E7B501D2D0E1C8FC23B78CB962D93469CD0B2EA7E24CDF181DC1
                  SHA-512:95F2E6BBEB9138125AB337D6BA047B824FFA527A5F2403C12BBC4EE4A4E73B516D963E09C81D453BCAFB01BD396D991DA8D36D8A91707E557ECC61C1BA9EA91D
                  Malicious:true
                  Preview:; This script shows a GUI for configuring the launcher...#requires AutoHotkey v2.0....#NoTrayIcon....#include inc\launcher-common.ahk..#include inc\ui-base.ahk....GetVersions() {.. vmap := Map(1, Map(), 2, Map()).. for ,f in GetUsableAutoHotkeyExes() {.. try.. vmap[GetMajor(f.Version)][f.Version] := true.. catch as e.. trace "-[Launcher] " type(e) " checking file " A_LoopFileName ": " e.message.. }.. vmap[1] := [vmap[1]*].. vmap[2] := [vmap[2]*].. return vmap..}....class LauncherConfigGui extends AutoHotkeyUxGui {.. __new() {.. super.__new("AutoHotkey Launch Config").. .. cmd := RegRead('HKCR\AutoHotkeyScript\shell\open\command',, '').. usingLauncher := InStr(cmd, 'UX\launcher.ahk') != 0.. currentExe := !usingLauncher && RegExMatch(cmd, '^"(.*?)"(?= )', &m) ? m.1 : "".. try.. if currentExe && GetExeInfo(currentExe).Description = "AutoHotkey Launcher" ; Support compiled launcher
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):10365
                  Entropy (8bit):4.864764389032537
                  Encrypted:false
                  SSDEEP:192:WWsmA5tqnaPKHGs8SCVV7f5JfzH+zoe04+v1AlLUzhAGnk0Vps61CRjqsz:WW6TAF8SCVRf+W9AyzhAGO08
                  MD5:1B88198B4BD36EB25E23DC412321A555
                  SHA1:D3B5670D1BC7343AE40AD087BC22309DC17E118A
                  SHA-256:31249EF15CCE83D150A9A5DE11168A5052FF2C55DBD574B8DF1C054510B61843
                  SHA-512:409FB90D7EA768C9D9A2574C09B8A69C93E8AFD76234C24E3E0F71AA3F564A4F1AA46FF18EA328B1AFCCAB54604BB239D37249D5811E3A84F0AB692B032A732B
                  Malicious:true
                  Preview:#requires AutoHotkey v2.0....#NoTrayIcon..#SingleInstance Off....#include inc\common.ahk..#include inc\ui-base.ahk....class NewScriptGui extends AutoHotkeyUxGui {.. __new(path:="") {.. super.__new("New Script").. .. SplitPath path,, &dir,, &name.. if this.ExplorerHwnd := WinActive("ahk_class CabinetWClass") {.. this.Opt '+Owner' this.ExplorerHwnd.. if dir = "".. dir := GetPathForExplorerWindow(this.ExplorerHwnd).. }.. if dir = "".. dir := ConfigRead('New', 'DefaultDir', A_MyDocuments "\AutoHotkey").. .. name := this.AddEdit('vName w272', name != "New AutoHotkey Script" ? name : "").. static EM_SETCUEBANNER := 0x1501.. SendMessage(EM_SETCUEBANNER, true, StrPtr("Untitled"), name).. .. static IconSize := SysGet(49) ; SM_CXSMICON.. .. static BrowseIcon := LoadPicture("imageres.dll", 'Icon-1025 w' IconSize, &imgtype).. this.AddIconButton
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):7325
                  Entropy (8bit):4.877995973608334
                  Encrypted:false
                  SSDEEP:192:SdHQj/CKeF1DXPTYjTBS7EmK3QyOcjRn5WYHu4pCW7rvQ:SejoFpPTYjTB6EmQOcjRTHpC/
                  MD5:DD3F9C2F9115689F4350896752F15926
                  SHA1:FA19F1632B865B2BC098611A8BE66E9F10DC692B
                  SHA-256:68B114A2EA4AF9DF54709A78EC5991A1F271097B29CB93757403FDB158746BC7
                  SHA-512:12F34D5EC7A7D5452EEF97E4C87093240050756C564140874D316D0B9D194C961DEBE139BADC943B024B680B68961EF6CBE71FC1A567C6622797F90ED51FA549
                  Malicious:true
                  Preview:; This script shows the initial setup GUI...; It is not intended for use after installation...#requires AutoHotkey v2.0....#NoTrayIcon..#SingleInstance Force....#include inc\ui-base.ahk....A_ScriptName := "AutoHotkey Setup"..SetRegView 64..InstallGui.Show()....class InstallGui extends AutoHotkeyUxGui {.. __new() {.. super.__new(A_ScriptName, '-MinimizeBox -MaximizeBox').. .. DllCall('uxtheme\SetWindowThemeAttribute', 'ptr', this.hwnd, 'int', 1 ; WTA_NONCLIENT.. , 'int64*', 3 | (3<<32), 'int', 8) ; WTNCA_NODRAWCAPTION=1, WTNCA_NODRAWICON=2.. .. static TitleBack := 'BackgroundWhite'.. static TitleFore := 'c3F627F'.. static TotalWidth := 350.. this.AddText('x0 y0 w' TotalWidth ' h84 ' TitleBack).. this.AddPicture('x32 y16 w32 h32 ' TitleBack, A_AhkPath).. this.SetFont('s12', 'Segoe UI').. this.AddText('x+20 yp+4 ' TitleFore ' ' TitleBack, "AutoHotkey v" A_AhkVersion).. this.SetFont('s9')..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2311
                  Entropy (8bit):4.84199510475754
                  Encrypted:false
                  SSDEEP:48:SThy/+G2L1JubYQIBCbBaBX6XNoqb0BiWdM+T:V+G2ybdIBCdmX6doqbfWW+T
                  MD5:0FE4932669E99A498A7BC76975919000
                  SHA1:E0D6A7B484D3A6C0D7427F611C575F93E4F87BA4
                  SHA-256:1E09FC4AF5DC3E673D4FACFE4FA849C6BDD0B29C67B0EFD7F96AAF387FCEF698
                  SHA-512:DD3B99739106953608AC2EB2ECC4E3D316B5122B1B305BD7CFAB82FCC7EC0D92B5944F4724D37CBC01CA5C6B5381B57FAD9256586B5DFD0026453F9C11A32394
                  Malicious:true
                  Preview:; This script shows a GUI for uninstalling AutoHotkey or specific versions...#include inc\bounce-v1.ahk../* v1 stops here */..#requires AutoHotkey v2.0....#include inc\ui-base.ahk..#include install.ahk....#NoTrayIcon..#SingleInstance Force....A_ScriptName := "AutoHotkey Setup"..SetRegView 64..ModifySetupGui.Show()....class ModifySetupGui extends AutoHotkeyUxGui {.. __new() {.. super.__new(A_ScriptName, '-MinimizeBox -MaximizeBox').. .. this.inst := Installation().. this.inst.ResolveInstallDir().. versions := this.inst.GetComponents().... this.AddText(, "Remove which versions?").. iv := this.AddListView('vComponents Checked -Hdr R10 w248', ["Version"]).. iv.OnEvent('ItemCheck', 'Checked').. for v, files in versions.. iv.Add(files.HasProp('superseded') ? 'Check' : '', v).. .. anyChecked := iv.GetNext(0, 'C').. this.AddButton('vRemoveAll w120 ' (anyChecked ? '' : 'Default'), "Remove &all")..
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:C source, ASCII text
                  Category:dropped
                  Size (bytes):159
                  Entropy (8bit):5.216079851830843
                  Encrypted:false
                  SSDEEP:3:XBAKUMyJUA2VtzcvK6vAxpl2V5FTxmkeMeB7s/5fKoxFgdMSNuWUAIaKO:RAKUIA2zYvK6vzbTxml+/ooxBAIPO
                  MD5:E5918A52B52CA3CE2E99788A26477984
                  SHA1:87C2B54B65663E1E29E866224FAEED7E8BAC759B
                  SHA-256:C1908CFC4B224B3BC8D1A5C67CFE4ACDB4E738D8ACF98560905AFC412981C18B
                  SHA-512:4F320CBEA5ADFED4B07012E04281E8713689271932B26D3886E3519389B15E2ADADB87217C5BF09B080D3DB976C77ACCF555493B7EAB5CEB45BC59131772F8E6
                  Malicious:false
                  Preview:#include UX.#include inc\bounce-v1.ahk./**/.#requires AutoHotkey v2.0.try Run('"' A_MyDocuments '\AutoHotkey\WindowSpy.ahk"'), ExitApp().#include WindowSpy.ahk
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):18120
                  Entropy (8bit):4.833349138619991
                  Encrypted:false
                  SSDEEP:384:gq2PmwE3b6k/iAVX/dUY2ZpEGMOZ77oPyBrsS/S9B:gzuh1iYWrTXoPAs9B
                  MD5:E3F2AD7733F3166FE770E4DC00AF6C45
                  SHA1:3D436FFDD69F7187B85E0CF8F075BD6154123623
                  SHA-256:B27C1A7C92686E47F8740850AD24877A50BE23FD3DBD44EDEE50AC1223135E38
                  SHA-512:ED97318D7C5BEB425CB70B3557A16729B316180492F6F2177B68F512BA029D5C762AD1085DD56FABE022B5008F33E9BA564D72F8381D05B2E7F0FA5EC1AECDF3
                  Malicious:true
                  Preview: GNU GENERAL PUBLIC LICENSE.. Version 2, June 1991.... Copyright (C) 1989, 1991 Free Software Foundation, Inc... 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.. Everyone is permitted to copy and distribute verbatim copies.. of this license document, but changing it is not allowed..... Preamble.... The licenses for most software are designed to take away your..freedom to share and change it. By contrast, the GNU General Public..License is intended to guarantee your freedom to share and change free..software--to make sure the software is free for all its users. This..General Public License applies to most of the Free Software..Foundation's software and to any other program whose authors commit to..using it. (Some other Free Software Foundation software is covered by..the GNU Library General Public License instead.) You can apply it to..your programs, too..... When we speak of free so
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:MS Windows HtmlHelp Data
                  Category:dropped
                  Size (bytes):2001344
                  Entropy (8bit):7.995473310759226
                  Encrypted:true
                  SSDEEP:49152:8gtJD4GrdWKYzvZ51ixTVdyFEI6VHMiYB0MG:8gtGOyjuXHlhMiNZ
                  MD5:E42714518B26BC65D26B813E182F90CD
                  SHA1:1D739F1071E4A087234A8B73C32786BAECF815E5
                  SHA-256:10FDFCE6830404381A0C9BE77F7C149760FD0ADE8DD65571FFFEB6C8C5008553
                  SHA-512:195E4277E006DC326F0BDA15EEC2B190440D6937120DD1AAC99C80CCCF85ADC8A4F2C21381EB65D5EF24CC0C6C438973D9D30E6DA6EA22B7AFCC7E46002CB980
                  Malicious:true
                  Preview:ITSF....`.......&..........|.{.......".....|.{......."..`...............x.......T`.......`..............................ITSP....T...........................................j..].!......."..T...............PMGLQ................/..../#IDXHDR....O.../#ITBITS..../#STRINGS....y..../#SYSTEM....(./#TOPICS....O.../#URLSTR....3..F./#URLTBL...._.T./#WINDOWS....2.L./$FIftiMain....[..t./$OBJINST......?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property......./$WWKeywordLinks/..../$WWKeywordLinks/BTree....~..L./$WWKeywordLinks/Data....J.|./$WWKeywordLinks/Map....F.2./$WWKeywordLinks/Property....x ./docs/..../docs/AHKL_DBGPClients.htm......../docs/ChangeLog.htm...]..../docs/Compat.htm....:.E./docs/Concepts.htm..)..;./docs/FAQ.htm....4..../docs/Functions.htm...n..F./docs/HotkeyFeatures.htm....K.L./docs/Hotkeys.htm......"./docs/Hotstrings.htm...N..6./docs/howto/..../docs/howto/Install.htm..../.A./docs/howto/ManageWindows.htm....&.v./docs/howto/RunExamples.htm....].e./docs/howto/RunPrograms.htm....
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):979968
                  Entropy (8bit):6.478182737646768
                  Encrypted:false
                  SSDEEP:24576:UnbyRuLHeIj86TTuQbyB3+vETrGNW8NxqxYk:2yKgqEvGNW83qxY
                  MD5:8BC086A1CE0B394DE31CD415A3CD0E87
                  SHA1:620FBFC0FCE8067A9AF12C0E3267F8C17C658D6A
                  SHA-256:05FCAF6F09B9FE4B85887F75183310D34166A0B854CA0907B497808BE7B8F87D
                  SHA-512:0F989B2584FDBFDE2EA01DD0AC7FF7C51DA0063AB01C57053DDF15547BA7187F2795D5013BEFF558431FE0DB0A1A0AF991DBC4AF455CD86BA7D4676366104237
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 13%
                  • Antivirus: Virustotal, Detection: 14%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=aS.S2S.S2S.S2..P3].S2F.V3..S2F.W3F.S2F.P3J.S2..W3H.S2..V3..S2..U3R.S2..R3r.S2S.R2..S2ekP3R.S2ekZ3..S2ek.2R.S2ekQ3R.S2RichS.S2........PE..L......e...............%.h..........9.............@..........................P................@.............................l...T.......................................8...........................0...@............................................text....f.......h.................. ..`.rdata..4............l..............@..@.data...4.... ...b..................@....rsrc................n..............@..@........................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):980928
                  Entropy (8bit):6.481711676279919
                  Encrypted:false
                  SSDEEP:24576:enbyRuLHeIj86TTuQbyB3+vETrGNW8NxqxYkbv:IyKgqEvGNW83qxYkj
                  MD5:CD4CCFDB6FC234DC22D8F4ED4A0AC711
                  SHA1:126A959B2BD451A4F3C257463F8D6F6910A63743
                  SHA-256:9DF87A25A94C9BE7278EDFA850283BC44DAE0CBDADB23F056EEC8E0F59B130CD
                  SHA-512:CF1693F0CE5B853B736E8A0B1AF2CEB583D63059657DFAF29340036AFDD63CC63C680C6A349C17384DB710DAE17CD3630E8E757395DB8E9EE128A517A42A230E
                  Malicious:true
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=aS.S2S.S2S.S2..P3].S2F.V3..S2F.W3F.S2F.P3J.S2..W3H.S2..V3..S2..U3R.S2..R3r.S2S.R2..S2ekP3R.S2ekZ3..S2ek.2R.S2ekQ3R.S2RichS.S2........PE..L......e...............%.h..........9.............@..........................P......3.........@.............................l...T.......l...............................8...........................0...@............................................text....f.......h.................. ..`.rdata..4............l..............@..@.data...4.... ...b..................@....rsrc...l............n..............@..@........................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):1256448
                  Entropy (8bit):6.40012168761782
                  Encrypted:false
                  SSDEEP:24576:Ve1psX+O47m4ffJhxZ4rBcRyMlc/SsVNGgMxCRjU:Vek+bi4ffJhxZ4axcbHGPWj
                  MD5:825448610A8213A8408578DF2361D5EB
                  SHA1:F43875855E4F02010AD6C755067B813D0FCBE68A
                  SHA-256:37FF15A23A98F0A658298E21F1873CA896A05208810BF796F90CA212EE07C7B1
                  SHA-512:7556143128878B2E765309DB8B35CC8206D325C0C17C37B191600BD8F719A923B0F917F4C53F0946ED2D12136A9E42774246595EED78F1038779FDCBD3736EEE
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  • Antivirus: Virustotal, Detection: 0%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./...kl..kl..kl.. ...|l..~...El..~...xl..~...bl.. ...rl.. ....l.. ...jl.. ...Jl..kl...m..].il..].)l..].j.jl..].jl..Richkl..........PE..d......e..........#....%.......................@.......................................... ...@.................................................T....@..............................@...8...............................@............................................text...v........................... ..`.rdata..............................@..@.data...............................@....pdata..............."..............@..@_RDATA..\....0......................@..@.rsrc........@......................@..@........................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):1257408
                  Entropy (8bit):6.402954876354794
                  Encrypted:false
                  SSDEEP:24576:he1psX+O47m4ffJhxZ4rBcRyMlc/SsVNGgMxCRjq7:hek+bi4ffJhxZ4axcbHGPWjQ
                  MD5:E5E06A7E23DC87111BDC2FDEF2DE4D2B
                  SHA1:C39651ABB44058E1A38FC1BC00E48BA6F0725C39
                  SHA-256:E00A8DB09692D68703D6AD8BD8166ACE00299C9B9963AC4ACC84DA43BD0FE031
                  SHA-512:E1DC4F1EA74BB80B4E577B0BD44F346D012810C662EB40A9DA435B7FD3B81DE462007464DBF0602899DF9B91C5B39613304F9A6AC6C2E747E81D8A2B65F4C606
                  Malicious:true
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./...kl..kl..kl.. ...|l..~...El..~...xl..~...bl.. ...rl.. ....l.. ...jl.. ...Jl..kl...m..].il..].)l..].j.jl..].jl..Richkl..........PE..d......e..........#....%.....T.................@.....................................J.... ...@.................................................T....@..l............,..............@...8...............................@............................................text...v........................... ..`.rdata..............................@..@.data...............................@....pdata..............."..............@..@_RDATA..\....0......................@..@.rsrc...l....@......................@..@........................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):979968
                  Entropy (8bit):6.479796362686995
                  Encrypted:false
                  SSDEEP:24576:EnbyRuLHeIj86TTuQbyB3+vETrGNW8NxqxYkbw:myKgqEvGNW83qxYkc
                  MD5:79377BC20C7E9C096D4B777D719A75A6
                  SHA1:78160D8A501FD2022D8D381FE5FB71FA2AD4E0CC
                  SHA-256:3BCC5BF5AB6B5C461A4F299F668DDD9870809C292613657C0972147FFD86CA2F
                  SHA-512:007CC7EE25FD6E0EB44DDC2174BFF94DA29172621DBA782069B90272572EF343830376F15920B3E866452D5D71640649E43EBB053994A644A6B24829F2DCD958
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 11%
                  • Antivirus: Virustotal, Detection: 6%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=aS.S2S.S2S.S2..P3].S2F.V3..S2F.W3F.S2F.P3J.S2..W3H.S2..V3..S2..U3R.S2..R3r.S2S.R2..S2ekP3R.S2ekZ3..S2ek.2R.S2ekQ3R.S2RichS.S2........PE..L......e...............%.h..........9.............@..........................P................@.............................l...T.......l...............................8...........................0...@............................................text....f.......h.................. ..`.rdata..4............l..............@..@.data...4.... ...b..................@....rsrc...l............n..............@..@........................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):1256448
                  Entropy (8bit):6.401460579017051
                  Encrypted:false
                  SSDEEP:24576:Xe1psX+O47m4ffJhxZ4rBcRyMlc/SsVNGgMxCRjqw:Xek+bi4ffJhxZ4axcbHGPWj/
                  MD5:D076D3618CC8722414C207822B4A9AD2
                  SHA1:3B31C4BA63C4A631F1851CCCD4C760E1A2F217FC
                  SHA-256:6F31115338D91FCEE584313B81405A7B9560A866B52934C9A5F67F6B6E294C0A
                  SHA-512:41E838B97A2AFEE080FB1F9E99A82A3AE344833F62FFAFD96D015AAA2CA0BEFA2194802E449FB2B85228FCDBDDB79E0E3A9D22824509565BCB6E9E44B85A8E8A
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  • Antivirus: Virustotal, Detection: 0%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./...kl..kl..kl.. ...|l..~...El..~...xl..~...bl.. ...rl.. ....l.. ...jl.. ...Jl..kl...m..].il..].)l..].j.jl..].jl..Richkl..........PE..d......e..........#....%.....T.................@.......................................... ...@.................................................T....@..l...........................@...8...............................@............................................text...v........................... ..`.rdata..............................@..@.data...............................@....pdata..............."..............@..@_RDATA..\....0......................@..@.rsrc...l....@......................@..@........................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Archive, ctime=Fri Mar 29 05:49:19 2024, mtime=Fri Mar 29 05:49:19 2024, atime=Fri Mar 29 05:49:19 2024, length=1256448, window=hide
                  Category:dropped
                  Size (bytes):1352
                  Entropy (8bit):4.419952565562458
                  Encrypted:false
                  SSDEEP:24:8BZ5edXBqUdcKK6IAEkzdGx65dGyqzn2gdGx6jMqdGQHa9m:8FedXBPcuvEIdj5dWhdjjMqdh8
                  MD5:53D9C0FF0F0184EA309047BD3ACF03AF
                  SHA1:5E0DB8742F6C00AA67E4C1ACED7E8F47B7CE07F1
                  SHA-256:26D1746DEFE4A4FE019B7768754104B29937668F6C4F08306E2A33DC43012BFF
                  SHA-512:41091E87C94B19D62049E6282A195C431034DFD18C0D5432F29F37B0D3488DD2E18979EEB9015B513E7E12ED945A26EE51A2036DF10A1538135F58263E9A3246
                  Malicious:false
                  Preview:L..................F.... ......9.......9....dR`9.....,...........................P.O. .:i.....+00.../C:\.....................1.....}X*6..PROGRA~1..t......O.I}X*6....B...............J.....?.n.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....^.1.....}X*6..AUTOHO~1..F......}X*6}X*6............................ .A.u.t.o.H.o.t.k.e.y.....H.1.....}X+6..UX..6......}X*6}X+6.....:.....................s..U.X.....n.2..,..}X*6 .AUTOHO~1.EXE..R......}X*6}X*6.....:......................j.A.u.t.o.H.o.t.k.e.y.U.X...e.x.e.......^...............-.......]...........+.......C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe....A.u.t.o.H.o.t.k.e.y. .D.a.s.h.;.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.A.u.t.o.H.o.t.k.e.y.\.U.X.\.A.u.t.o.H.o.t.k.e.y.U.X...e.x.e.,.".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.A.u.t.o.H.o.t.k.e.y.\.U.X.\.u.i.-.d.a.s.h...a.h.k.".`.......X.......648351...........hT..CrF.f4... ..T..b...,.......hT..CrF.f4... ..T..b...,......w.......2...1SPSU(L.y.9K...
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Fri Mar 29 05:49:19 2024, mtime=Fri Mar 29 05:49:20 2024, atime=Fri Mar 29 05:49:19 2024, length=1256448, window=hide
                  Category:dropped
                  Size (bytes):2242
                  Entropy (8bit):3.4564238366552735
                  Encrypted:false
                  SSDEEP:24:8B35edIB9U/cKK6IAul+QmdGx67dGXYdGulJTfdGtzn2gdGx6jMqdGQRqam:8LedIBQcuvpdj7dJd/bd2hdjjMqdhT
                  MD5:0FF93EFE693FBA7FF2043B9D4395DD87
                  SHA1:C1547E3C51DC305CBBEBBFF1C40958A6D53682F9
                  SHA-256:28EAEF08F47C2C30A72D5012899687DF78D046F636C0554EE88800B8D13DE9CD
                  SHA-512:0213953898235C716BBAD9004C09C69D69C770C87C9DC62E9385032C717982DA5BD5AE20CE9EFC4917A812886143BBEA002C75493E72DCDDFFEFC1F6BBB0882D
                  Malicious:false
                  Preview:L..................F.@.. ......9......]:....dR`9.....,...........................P.O. .:i.....+00.../C:\.....................1.....}X*6..PROGRA~1..t......O.I}X*6....B...............J.....?.n.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....^.1.....}X+6..AUTOHO~1..F......}X*6}X+6..........................-...A.u.t.o.H.o.t.k.e.y.....H.1.....}X+6..UX..6......}X*6}X+6.....:....................-...U.X.....n.2..,..}X*6 .AUTOHO~1.EXE..R......}X*6}X*6.....:......................j.A.u.t.o.H.o.t.k.e.y.U.X...e.x.e.......^...............-.......]...........+.......C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe....A.u.t.o.H.o.t.k.e.y. .W.i.n.d.o.w. .S.p.y.;.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.A.u.t.o.H.o.t.k.e.y.\.U.X.\.A.u.t.o.H.o.t.k.e.y.U.X...e.x.e...".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.A.u.t.o.H.o.t.k.e.y.\.U.X.\.W.i.n.d.o.w.S.p.y...a.h.k.".*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.A.u.t.o.H.o.t.k.e.y.\.U.X.\.i.n.c.\.s.p.y...i.c.o.........%SystemDrive%
                  Process:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1455
                  Entropy (8bit):7.3535713107261635
                  Encrypted:false
                  SSDEEP:24:EYtM+4csoUsIBW/Z4wi/HK/+L0mdiEIzDnGIuBbJh8Mz5c0PHXzvi1d:DtMXoUE/jR+LFdiEYAf8M57vzviL
                  MD5:520A526E7032579C26E3A593ADFE9253
                  SHA1:7A2C59B611FDAA4AE33CF7FD53E97FB47F1F7B75
                  SHA-256:F4DCFC1A2F4EA507BC4E9E955F2E645FBF82826FBAE9CB595098B0334908E4AA
                  SHA-512:620CB0BAAFD0E5E68158BFA3A35EF4A85E23226A8F3A1D1D8024E9F7E632C58EC6EF3A786729B5CF389F3036E9F08CA90BEFB25023DB0840F7895D249123CF2C
                  Malicious:false
                  Preview:........................................AutoHotkey.....................RSA1................Y...=.h.L.8...V... ..0H.T.:..T)X...6.}dK........&K46..GE..8.!...h.0q............G.5YN.*.Tr.(..9.'.%M.a.gu.s...3..........................z..O....../..X..E@...I.......,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... ......I....+..\..n.Dc.0.<..WL.|n.G............ ....V$...f.s....`]G.Q:.vR<...Q.....f...."....'...e.....Z.....$`*..\....q...3[H.l...j('._.^7.q..B6.8...V.w}...m5.....9..$.!....l.ys(..G........]....o....1.D...#h...=...O...N.A.|...Z..3....W.r?.Z.b...s.....9.[..t..7...n.........7...Xt....3.R.`....~....{..y..".%..w%...../>=.<...$K.$.'....s.;|..J..O..z...}%..../........*e.0RRv.f~.......&..|.8.*..<M.. #..6..`k@..mm..Q..[:........3...f.is.1...V....&...XV.7....w......v".U..|_..K....\rq...D.....l}.O...!...'...=...v.e..o].........8Wk..Xiyq..|..0ZA.p.f..e._s.......F._....\.q=.Z8.... N..S....9.]..+...._].....X.Y_.K...<....Hw1{.P.(...q...
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                  Entropy (8bit):7.997747867212412
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.66%
                  • UPX compressed Win32 Executable (30571/9) 0.30%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:AutoHotkey_2.0.12_setup.exe
                  File size:3'000'320 bytes
                  MD5:2cdbe2b76a36b976e9980fb4733f1052
                  SHA1:64bbb4dbeed8639b272a73c2cad0f9155f42115d
                  SHA256:4e1e3123dd85d3ac65a0803b08dd89b9b12b5a00b9f566782855332d03e5fe26
                  SHA512:cec27f241f62d49c639cffdd7be4e56c49de3bdeabbdb7337b24a054361ae3412e72e48e182a7c18b76b611f605365cc02e4b0d1cdca201cb356e38b6fd78330
                  SSDEEP:49152:B9AaYh1cvoIPqovmRIsOuFEGTUFu1G1Vn/2SGR4mq08hc9pdgWaU6SjwryAA+iI3:f/YmoI5F/VG02pLq0JgHUyryAXiI5A5w
                  TLSH:82D533E0C3D8A607CAA8607D8E7C5F0E65155CEB0DA51AAB3C5E640F27A3AD40D93D37
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........=aS.S2S.S2S.S2..P3].S2F.V3..S2F.W3F.S2F.P3J.S2..W3H.S2..V3..S2..U3R.S2..R3r.S2S.R2..S2ekP3R.S2ekZ3..S2ek.2R.S2ekQ3R.S2RichS.S
                  Icon Hash:4bccccc4cccc4c31
                  Entrypoint:0x938540
                  Entrypoint Section:UPX1
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:
                  Time Stamp:0x65FE1D9E [Sat Mar 23 00:09:02 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:19b08bc2a65da9d884b37c9dc279aaca
                  Instruction
                  pushad
                  mov esi, 00666000h
                  lea edi, dword ptr [esi-00265000h]
                  push edi
                  mov ebp, esp
                  lea ebx, dword ptr [esp-00003E80h]
                  xor eax, eax
                  push eax
                  cmp esp, ebx
                  jne 00007F00318C23EDh
                  inc esi
                  inc esi
                  push ebx
                  push 00536F33h
                  push edi
                  add ebx, 04h
                  push ebx
                  push 002D2535h
                  push esi
                  add ebx, 04h
                  push ebx
                  push eax
                  mov dword ptr [ebx], 00020003h
                  push ebp
                  push edi
                  push esi
                  push ebx
                  sub esp, 7Ch
                  mov edx, dword ptr [esp+00000090h]
                  mov dword ptr [esp+74h], 00000000h
                  mov byte ptr [esp+73h], 00000000h
                  mov ebp, dword ptr [esp+0000009Ch]
                  lea eax, dword ptr [edx+04h]
                  mov dword ptr [esp+78h], eax
                  mov eax, 00000001h
                  movzx ecx, byte ptr [edx+02h]
                  mov ebx, eax
                  shl ebx, cl
                  mov ecx, ebx
                  dec ecx
                  mov dword ptr [esp+6Ch], ecx
                  movzx ecx, byte ptr [edx+01h]
                  shl eax, cl
                  dec eax
                  mov dword ptr [esp+68h], eax
                  mov eax, dword ptr [esp+000000A8h]
                  movzx esi, byte ptr [edx]
                  mov dword ptr [ebp+00h], 00000000h
                  mov dword ptr [esp+60h], 00000000h
                  mov dword ptr [eax], 00000000h
                  mov eax, 00000300h
                  mov dword ptr [esp+64h], esi
                  mov dword ptr [esp+5Ch], 00000001h
                  mov dword ptr [esp+58h], 00000001h
                  mov dword ptr [esp+54h], 00000001h
                  mov dword ptr [esp+50h], 00000001h
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x542cd80x3a0.rsrc
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x53a0000x8cd8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5390e40xc0UPX1
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  UPX00x10000x2650000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  UPX10x2660000x2d40000x2d3200ebe8dc4e178259bd4212f753c709ae11unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x53a0000xa0000x920062d44d45fec671a1850096a9980ab238False0.4153735017123288data6.160837595208632IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0x53b4340x244PNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0189655172413794
                  RT_ICON0x53b67c0x197PNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0221130221130221
                  RT_ICON0x53b8180x1d1PNG image data, 20 x 20, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0236559139784946
                  RT_ICON0x53b9f00x229PNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0198915009041591
                  RT_ICON0x53bc200x26fPNG image data, 28 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0176565008025682
                  RT_ICON0x53be940x322PNG image data, 40 x 40, 8-bit/color RGBA, non-interlacedEnglishUnited States1.013715710723192
                  RT_ICON0x53c1bc0x3abPNG image data, 48 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0117145899893503
                  RT_ICON0x53c56c0x413PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0105465004793863
                  RT_ICON0x53c9840x26bPNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0177705977382876
                  RT_ICON0x53cbf40x19bPNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0170316301703164
                  RT_ICON0x53cd940x1d8PNG image data, 20 x 20, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0233050847457628
                  RT_ICON0x53cf700x22aPNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.01985559566787
                  RT_ICON0x53d1a00x252PNG image data, 28 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0185185185185186
                  RT_ICON0x53d3f80x16ePNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.005464480874317
                  RT_ICON0x53d56c0x1b0PNG image data, 20 x 20, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0208333333333333
                  RT_ICON0x53d7200x1edPNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0223123732251522
                  RT_ICON0x53d9140x22aPNG image data, 28 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.01985559566787
                  RT_ICON0x53db440x203PNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.021359223300971
                  RT_ICON0x53dd4c0x163PNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.008450704225352
                  RT_ICON0x53deb40x19fPNG image data, 20 x 20, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0192771084337349
                  RT_ICON0x53e0580x1d6PNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.023404255319149
                  RT_ICON0x53e2340x20fPNG image data, 28 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0208728652751422
                  RT_ICON0x53e4480x1f0PNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0181451612903225
                  RT_ICON0x53e63c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.22396810506566603
                  RT_ICON0x53f6e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.15228215767634853
                  RT_ICON0x541c940x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.40425531914893614
                  RT_ICON0x5421000x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.43548387096774194
                  RT_MENU0xf437c0x2c8emptyEnglishUnited States0
                  RT_DIALOG0xf46440xe0emptyEnglishUnited States0
                  RT_DIALOG0xf47240x18eemptyEnglishUnited States0
                  RT_ACCELERATOR0xf48b40x48emptyEnglishUnited States0
                  RT_RCDATA0xf48fc0x1e89c0emptyEnglishUnited States0
                  RT_RCDATA0x2dd2bc0xef400dataEnglishUnited States1.000312255094044
                  RT_RCDATA0x3cc6bc0x132c00dataEnglishUnited States1.0003108978271484
                  RT_RCDATA0x4ff2bc0x42dataEnglishUnited States1.1666666666666667
                  RT_RCDATA0x4ff3000x46c8dataEnglishUnited States1.0008830022075055
                  RT_RCDATA0x5039c80x8edataEnglishUnited States1.0774647887323943
                  RT_RCDATA0x503a580x160dataEnglishUnited States1.03125
                  RT_RCDATA0x503bb80x2b0dataEnglishUnited States1.0159883720930232
                  RT_RCDATA0x503e680x1addataEnglishUnited States1.0256410256410255
                  RT_RCDATA0x5040180x62adataEnglishUnited States1.0069708491761724
                  RT_RCDATA0x5046440x29eedataEnglishUnited States1.0010247810694988
                  RT_RCDATA0x5070340x34cdataEnglishUnited States1.0130331753554502
                  RT_RCDATA0x5073800x980dataEnglishUnited States1.0045230263157894
                  RT_RCDATA0x507d000x429OpenPGP Public KeyEnglishUnited States1.0103286384976526
                  RT_RCDATA0x50812c0xfb2dataEnglishUnited States1.0027376804380288
                  RT_RCDATA0x5090e00xa35dataEnglishUnited States1.004209720627631
                  RT_RCDATA0x509b180xb6dataEnglishUnited States1.0604395604395604
                  RT_RCDATA0x509bd00x1a4dataEnglishUnited States1.026190476190476
                  RT_RCDATA0x509d740x10d6dataEnglishUnited States1.0025522041763342
                  RT_RCDATA0x50ae4c0x138cdataEnglishUnited States1.0021982414068744
                  RT_RCDATA0x50c1d80x6a1dataEnglishUnited States1.0064820271066588
                  RT_RCDATA0x50c87c0x1042dataEnglishUnited States1.0026429601153293
                  RT_RCDATA0x50d8c00x9c0cdataEnglishUnited States1.0005256833884049
                  RT_RCDATA0x5174cc0x46bddataEnglishUnited States1.0008835385719808
                  RT_RCDATA0x51bb8c0x22cdataEnglishUnited States1.0197841726618706
                  RT_RCDATA0x51bdb80x884dataEnglishUnited States1.005045871559633
                  RT_RCDATA0x51c63c0x5ddataEnglishUnited States1.118279569892473
                  RT_RCDATA0x51c69c0x1b38dataEnglishUnited States1.0015786452353617
                  RT_RCDATA0x51e1d40x2189dataEnglishUnited States1.0012813046010482
                  RT_RCDATA0x5203600x2061dataEnglishUnited States1.0013270599589819
                  RT_RCDATA0x5223c40x287ddataEnglishUnited States1.0010612638687892
                  RT_RCDATA0x524c440x1c9ddataEnglishUnited States1.0015017064846417
                  RT_RCDATA0x5268e40x907dataEnglishUnited States1.00475984422328
                  RT_RCDATA0x5271ec0x1feadataEnglishUnited States1.001346389228886
                  RT_RCDATA0x5291d80x39dataEnglishUnited States1.1929824561403508
                  RT_RCDATA0x5292140xc09cdataEnglishUnited States1.0005272978015738
                  RT_GROUP_ICON0x5423ec0x76dataEnglishUnited States0.7372881355932204
                  RT_GROUP_ICON0x5424680x3edataEnglishUnited States0.8870967741935484
                  RT_GROUP_ICON0x5424ac0x4cdataEnglishUnited States0.8157894736842105
                  RT_GROUP_ICON0x5424fc0x4cdataEnglishUnited States0.7763157894736842
                  RT_GROUP_ICON0x54254c0x4cdataEnglishUnited States0.8026315789473685
                  RT_VERSION0x54259c0x21cdataEnglishUnited States0.4981481481481482
                  RT_MANIFEST0x5427bc0x519ASCII text, with very long lines (1305), with no line terminatorsEnglishUnited States0.47662835249042146
                  DLLImport
                  ADVAPI32.dllRegCloseKey
                  COMCTL32.dllImageList_Create
                  dwmapi.dllDwmGetWindowAttribute
                  GDI32.dllBitBlt
                  KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                  ole32.dllCoGetObject
                  OLEAUT32.dllSafeArrayGetUBound
                  PSAPI.DLLGetProcessImageFileNameW
                  SHELL32.dllDragFinish
                  SHLWAPI.dllStrCmpLogicalW
                  USER32.dllGetDC
                  UxTheme.dllIsAppThemed
                  VERSION.dllVerQueryValueW
                  WININET.dllInternetOpenW
                  WINMM.dlljoyGetPosEx
                  WSOCK32.dllWSAStartup
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:07:49:14
                  Start date:29/03/2024
                  Path:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe"
                  Imagebase:0x400000
                  File size:3'000'320 bytes
                  MD5 hash:2CDBE2B76A36B976E9980FB4733F1052
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:07:49:18
                  Start date:29/03/2024
                  Path:C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe" /to "C:\Program Files\AutoHotkey"
                  Imagebase:0x400000
                  File size:3'000'320 bytes
                  MD5 hash:2CDBE2B76A36B976E9980FB4733F1052
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:2
                  Start time:07:49:21
                  Start date:29/03/2024
                  Path:C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" "C:\Program Files\AutoHotkey\UX\reset-assoc.ahk" /check
                  Imagebase:0x140000000
                  File size:1'256'448 bytes
                  MD5 hash:825448610A8213A8408578DF2361D5EB
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 0%, ReversingLabs
                  • Detection: 0%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Target ID:3
                  Start time:07:49:21
                  Start date:29/03/2024
                  Path:C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" UX\ui-dash.ahk
                  Imagebase:0x140000000
                  File size:1'256'448 bytes
                  MD5 hash:825448610A8213A8408578DF2361D5EB
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:false

                  Reset < >
                    Memory Dump Source
                    • Source File: 00000001.00000003.1674958594.0000000000E35000.00000004.00000020.00020000.00000000.sdmp, Offset: 00E35000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_3_e35000_AutoHotkey_2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e6508d5d8938dfecc63779bd108fd68c184e321fb6e63e073397d980790b23ec
                    • Instruction ID: b4fca4e1d5739aa9eddfdbbcd211369fdb09fbb1a5fbd71d10a5b442b5a0ed5e
                    • Opcode Fuzzy Hash: e6508d5d8938dfecc63779bd108fd68c184e321fb6e63e073397d980790b23ec
                    • Instruction Fuzzy Hash: 5822979284E3C15FC7038B704D7A5947F706E63214B0E86DFC8C69F4A3E68A590AD762
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:2%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:5.8%
                    Total number of Nodes:1214
                    Total number of Limit Nodes:26
                    execution_graph 87910 14005a1e5 87911 14005a1fe 87910->87911 87912 14005a1ee 87910->87912 87960 140067080 55 API calls 87911->87960 87912->87911 87914 14005a1f7 87912->87914 87959 140067120 55 API calls 87914->87959 87915 14005a1fc 87917 14005a212 87915->87917 87918 14005a2ae 87915->87918 87919 14005a249 87917->87919 87920 14005a21b 87917->87920 87921 14005a2c6 87918->87921 87922 14005a2f9 87918->87922 87932 14005a076 87918->87932 87923 14005a010 129 API calls 87919->87923 87920->87932 87947 14005a010 87920->87947 87926 14005a010 129 API calls 87921->87926 87921->87932 87925 14005a010 129 API calls 87922->87925 87923->87932 87925->87932 87926->87921 87927 14005a087 GetTickCount 87928 14005a0a4 PeekMessageW 87927->87928 87927->87932 87930 14005a0c2 87928->87930 87931 14005a0cf GetTickCount 87928->87931 87929 14005a1d0 87930->87931 87931->87932 87932->87927 87932->87929 87933 14005a136 GetTickCount 87932->87933 87937 1400764f0 87932->87937 87958 140008964 ioctlsocket 87932->87958 87933->87932 87934 14005a169 87933->87934 87934->87932 87945 14007651f 87937->87945 87938 140076932 GetTickCount 87941 140076948 87938->87941 87942 140076951 SetTimer 87938->87942 87939 140076556 87939->87932 87941->87939 87941->87942 87942->87939 87943 1400767e2 88005 1400122d0 118 API calls 87943->88005 87945->87939 87945->87943 87946 1400767d6 memcpy_s 87945->87946 87961 1400722c0 87945->87961 87946->87938 87946->87939 87954 14005a1d0 87947->87954 87956 14005a06c 87947->87956 87948 14005a087 GetTickCount 87949 14005a0a4 PeekMessageW 87948->87949 87948->87956 87950 14005a0c2 87949->87950 87951 14005a0cf GetTickCount 87949->87951 87950->87951 87951->87956 87952 14005a136 GetTickCount 87953 14005a169 87952->87953 87952->87956 87953->87956 87954->87920 87956->87948 87956->87952 87956->87954 87957 1400764f0 124 API calls 87956->87957 88079 140008964 ioctlsocket 87956->88079 87957->87956 87958->87932 87959->87915 87960->87915 88002 140072350 memcpy_s 87961->88002 87962 140074693 87964 140074e04 87962->87964 87965 140074e2a 87962->87965 88000 140074637 memcpy_s 87962->88000 87963 140074605 87963->87962 87969 140074903 87963->87969 87970 14007462c 87963->87970 87963->88000 88045 14000f730 71 API calls 87964->88045 88046 140010880 DialogBoxParamW 87965->88046 87968 1400672c0 55 API calls 87968->88002 87969->87962 87976 140074910 87969->87976 88037 14009f9a0 109 API calls 87970->88037 87971 1400c5974 52 API calls 87971->88002 87975 140073c85 87975->88000 88040 140011560 109 API calls 87975->88040 87979 140074924 87976->87979 87982 1400749b0 87976->87982 87980 140074972 87979->87980 87992 14007492a 87979->87992 88042 140067080 55 API calls 87980->88042 87983 140074a03 87982->87983 87984 140074d6d 87982->87984 87982->88000 87983->87975 87987 140074d53 87983->87987 88044 1400c5974 52 API calls 87984->88044 87985 14007465f 87985->87962 87993 140054320 118 API calls 87985->87993 87986 140074784 88039 140011280 109 API calls 87986->88039 88043 14009f4e0 54 API calls 87987->88043 87989 140074712 88038 1400122d0 118 API calls 87989->88038 87992->88000 88041 140067120 55 API calls 87992->88041 87993->87962 87997 14002bda0 55 API calls 87997->88002 87998 1400609a0 55 API calls 87998->88002 87999 14009cfe0 55 API calls 87999->88002 88000->87945 88001 14009c780 54 API calls 88001->88002 88002->87962 88002->87963 88002->87968 88002->87971 88002->87975 88002->87985 88002->87986 88002->87989 88002->87997 88002->87998 88002->87999 88002->88000 88002->88001 88003 1400a12d0 56 API calls 88002->88003 88006 140010d10 117 API calls 88002->88006 88007 140054320 88002->88007 88034 1400a1720 58 API calls 88002->88034 88035 140075250 109 API calls 88002->88035 88036 14009f9a0 109 API calls 88002->88036 88003->88002 88005->87946 88006->88002 88008 140054357 88007->88008 88024 140054454 88007->88024 88012 14005459f 88008->88012 88013 1400543b4 88008->88013 88008->88024 88009 1400c0224 58 API calls 88009->88012 88010 1400545ee 88010->88024 88025 140054591 88010->88025 88065 140053a10 78 API calls 88010->88065 88012->88009 88012->88010 88017 1400543fb 88013->88017 88047 1400c0224 88013->88047 88014 1400c0224 58 API calls 88014->88017 88016 140054624 88018 140054630 88016->88018 88016->88025 88017->88014 88020 140054463 88017->88020 88017->88024 88066 140054ba0 118 API calls memcpy_s 88018->88066 88023 14005450f 88020->88023 88020->88024 88020->88025 88064 140054770 118 API calls 88020->88064 88021 140054654 88021->88024 88067 1400a0ef0 88021->88067 88022 1400c0224 58 API calls 88022->88025 88023->88024 88028 140054558 88023->88028 88029 14005452c 88023->88029 88024->88002 88025->88022 88025->88024 88030 140054728 88025->88030 88028->88025 88032 140054320 118 API calls 88028->88032 88031 140054320 118 API calls 88029->88031 88030->88024 88072 140054e50 58 API calls memcpy_s 88030->88072 88031->88024 88032->88025 88034->88002 88035->88002 88036->88002 88037->88000 88038->88000 88039->88000 88040->88000 88041->88000 88042->88000 88043->88000 88044->88000 88045->88000 88046->88000 88048 1400c0255 88047->88048 88049 1400c0231 88047->88049 88051 1400c028f 88048->88051 88054 1400c02ae 88048->88054 88049->88048 88050 1400c0236 88049->88050 88073 1400d058c 11 API calls memcpy_s 88050->88073 88075 1400d058c 11 API calls memcpy_s 88051->88075 88077 1400c0148 52 API calls swprintf 88054->88077 88055 1400c023b 88074 1400d03a4 52 API calls _invalid_parameter_noinfo 88055->88074 88057 1400c0294 88076 1400d03a4 52 API calls _invalid_parameter_noinfo 88057->88076 88059 1400c0246 88059->88013 88061 1400c029f 88061->88013 88062 1400d040c 58 API calls 88063 1400c02bb 88062->88063 88063->88061 88063->88062 88064->88023 88065->88016 88066->88021 88068 1400a0f06 88067->88068 88070 1400a0f4a 88068->88070 88078 14009fc60 117 API calls 88068->88078 88070->88024 88071 1400a0f32 88071->88024 88072->88024 88073->88055 88074->88059 88075->88057 88076->88061 88077->88063 88078->88071 88079->87956 88080 1400478f2 GetFileAttributesW 88081 140047904 88080->88081 88082 14004798d 88080->88082 88083 14004790d 88081->88083 88084 14004794b 88081->88084 88091 14009c780 54 API calls sprintf 88083->88091 88093 140010ac0 117 API calls 88084->88093 88086 14004792f 88092 1400a3410 30 API calls 88086->88092 88089 140047973 88090 140047949 88090->88089 88091->88086 88092->88090 88093->88089 88094 140061281 88095 1400612b8 88094->88095 88096 140061293 88094->88096 88098 140061909 DefWindowProcW 88095->88098 88100 1400612cf PostMessageW 88095->88100 88101 140061120 88095->88101 88096->88095 88097 140061299 88096->88097 88097->88098 88099 1400612a3 88097->88099 88098->88101 88104 14008bb10 132 API calls 88099->88104 88100->88098 88100->88101 88103 1400612b1 88103->88101 88104->88103 88105 140047fe4 88106 140047ff0 88105->88106 88107 140048054 88106->88107 88109 14004806c 88106->88109 88151 140048067 88106->88151 88168 140010ac0 117 API calls 88107->88168 88110 1400480a1 88109->88110 88112 1400480bc 88109->88112 88169 140010ac0 117 API calls 88110->88169 88114 140048119 CharUpperW 88112->88114 88120 1400480ee 88112->88120 88113 1400482ce 88115 1400b9b84 2 API calls 88113->88115 88117 140048148 88114->88117 88118 1400482d8 88115->88118 88116 1400481de FindResourceW 88116->88113 88119 1400481f6 LoadResource 88116->88119 88117->88120 88123 140048160 CompareStringOrdinal 88117->88123 88173 140007d04 GetCPInfo 88118->88173 88122 14004820a LockResource 88119->88122 88133 140048291 88119->88133 88120->88113 88120->88116 88124 140048221 SizeofResource 88122->88124 88122->88133 88123->88117 88123->88151 88170 1400b9b84 88124->88170 88125 14004849a 88125->88151 88187 14009c780 54 API calls sprintf 88125->88187 88130 140048310 88130->88125 88136 140048318 88130->88136 88132 1400484db 88188 140010ac0 117 API calls 88132->88188 88133->88125 88154 140099700 88133->88154 88135 1400483aa FindResourceW 88137 1400483be 88135->88137 88138 1400483d3 88135->88138 88136->88136 88146 140048363 memcpy_s 88136->88146 88174 140098fd0 88136->88174 88180 140048520 88137->88180 88140 1400483f5 88138->88140 88145 140048520 154 API calls 88138->88145 88138->88151 88140->88151 88161 1400634b0 88140->88161 88144 140048413 88148 140048472 SetCurrentDirectoryW 88144->88148 88144->88151 88145->88140 88146->88135 88146->88144 88147 140048510 88189 1400111d0 88147->88189 88150 14004847f 88148->88150 88148->88151 88150->88151 88186 140063520 GetCurrentDirectoryW EnterCriticalSection LeaveCriticalSection 88150->88186 88155 14009972a 88154->88155 88156 14009972e 88155->88156 88157 14009974c GetCPInfo 88155->88157 88159 14009975f 88155->88159 88156->88130 88157->88159 88158 140099858 GetCPInfo 88160 140099866 88158->88160 88159->88158 88159->88160 88160->88130 88162 1400634e8 SetCurrentDirectoryW 88161->88162 88163 1400634c1 88161->88163 88164 1400634f5 88162->88164 88165 140063500 88162->88165 88163->88162 88164->88151 88166 140063511 88165->88166 88192 140063520 GetCurrentDirectoryW EnterCriticalSection LeaveCriticalSection 88165->88192 88166->88151 88168->88151 88169->88151 88171 1400b9b8f 88170->88171 88193 1400cef30 EnterCriticalSection LeaveCriticalSection memcpy_s 88171->88193 88173->88133 88175 140098fdf 88174->88175 88177 140048357 88174->88177 88178 140098fee 88175->88178 88194 140099070 88175->88194 88177->88146 88177->88147 88178->88177 88179 140099070 2 API calls 88178->88179 88179->88177 88181 14004855c 88180->88181 88184 140048576 88181->88184 88197 1400485b0 88181->88197 88183 14004858a 88183->88138 88184->88183 88402 140007dd0 88184->88402 88186->88151 88187->88132 88188->88151 88752 140010ef0 72 API calls 88189->88752 88192->88166 88193->88171 88195 1400b9b84 2 API calls 88194->88195 88196 140099080 88195->88196 88196->88178 88203 1400485dd 88197->88203 88198 14004abb2 88199 14004acb2 88198->88199 88200 14004abd1 88198->88200 88201 14004acbf 88199->88201 88207 140049f2d 88199->88207 88202 14004ac1c 88200->88202 88237 1400495c3 88200->88237 88652 14000f730 71 API calls 88201->88652 88204 1400b9b84 2 API calls 88202->88204 88203->88198 88399 140048696 memcpy_s 88203->88399 88206 14004a167 88204->88206 88649 14000eda0 109 API calls 88206->88649 88653 140010880 DialogBoxParamW 88207->88653 88211 14004ab2e 88216 14004ab37 88211->88216 88217 14004ab44 88211->88217 88213 140049ecb 88650 14000f2f0 79 API calls 88213->88650 88214 14004a98b 88214->88211 88215 14004a9b7 88214->88215 88218 14004a9ae 88214->88218 88221 140049e1a 88215->88221 88224 14004aa14 88215->88224 88225 14004a9f4 88215->88225 88647 140010e20 72 API calls 88216->88647 88217->88221 88223 14004a176 88217->88223 88228 14004ab6a 88217->88228 88218->88215 88222 14004aa38 88218->88222 88221->88184 88222->88223 88231 14004aa5e 88222->88231 88223->88207 88230 14004a183 88223->88230 88644 140010880 DialogBoxParamW 88224->88644 88643 14000f730 71 API calls 88225->88643 88227 14004ac94 88651 1400a3410 30 API calls 88227->88651 88233 14004ab8e 88228->88233 88228->88237 88628 14000f730 71 API calls 88230->88628 88235 14004aa94 88231->88235 88231->88237 88234 1400b9b84 2 API calls 88233->88234 88234->88221 88238 1400b9b84 2 API calls 88235->88238 88236 14004acb0 88236->88221 88648 140010880 DialogBoxParamW 88237->88648 88240 14004aa9e 88238->88240 88645 14000eda0 109 API calls 88240->88645 88242 14004aabd 88244 14004aac9 88242->88244 88395 140049edb 88242->88395 88243 1400c0410 58 API calls 88243->88399 88646 14000f2f0 79 API calls 88244->88646 88247 14004a8b8 88248 14004a93e 88247->88248 88251 14004a8cf 88247->88251 88248->88207 88253 14004a94b 88248->88253 88254 14004a918 88251->88254 88259 14004a8ef 88251->88259 88252 14004afd0 120 API calls 88252->88399 88642 14000f730 71 API calls 88253->88642 88641 14000f150 109 API calls 88254->88641 88256 14004a27c 88258 14004a30a 88256->88258 88261 14004a298 88256->88261 88258->88207 88263 14004a31e 88258->88263 88640 140010880 DialogBoxParamW 88259->88640 88260 1400c0224 58 API calls 88260->88399 88264 14004a2e6 88261->88264 88270 14004a2bf 88261->88270 88625 14000f730 71 API calls 88263->88625 88624 14000f150 109 API calls 88264->88624 88266 14004a35a 88266->88223 88271 14004a371 88266->88271 88269 14004a504 88272 14004a58c 88269->88272 88277 14004a520 88269->88277 88623 140010880 DialogBoxParamW 88270->88623 88276 14004a3b8 88271->88276 88285 14004a391 88271->88285 88272->88207 88283 14004a5a0 88272->88283 88274 140047cb0 61 API calls 88274->88399 88275 14004a41b 88275->88223 88288 14004a43a 88275->88288 88627 14000f150 109 API calls 88276->88627 88280 14004a568 88277->88280 88293 14004a541 88277->88293 88278 14004a5dc 88278->88223 88298 14004a600 88278->88298 88279 14004a19e 88284 14004a22c 88279->88284 88291 14004a1ba 88279->88291 88632 14000f150 109 API calls 88280->88632 88282 140051e60 119 API calls 88282->88399 88633 14000f730 71 API calls 88283->88633 88284->88207 88297 14004a240 88284->88297 88626 140010880 DialogBoxParamW 88285->88626 88288->88237 88290 14004a46a 88288->88290 88294 1400b9b84 2 API calls 88290->88294 88295 14004a208 88291->88295 88310 14004a1e1 88291->88310 88292 140051040 119 API calls 88292->88399 88631 140010880 DialogBoxParamW 88293->88631 88301 14004a474 88294->88301 88621 14000f150 109 API calls 88295->88621 88622 14000f730 71 API calls 88297->88622 88298->88237 88299 14004a636 88298->88299 88304 1400b9b84 2 API calls 88299->88304 88300 1400c4f60 55 API calls 88300->88399 88629 14000eda0 109 API calls 88301->88629 88311 14004a640 88304->88311 88305 140048f34 GetKeyboardLayout 88601 1400233a0 60 API calls 88305->88601 88307 1400496ed 88307->88223 88317 14004971a 88307->88317 88308 140048d58 GetKeyboardLayout 88308->88399 88620 140010880 DialogBoxParamW 88310->88620 88634 14000eda0 109 API calls 88311->88634 88314 14004a493 88318 14004a49f 88314->88318 88314->88395 88317->88237 88320 14004a15d 88317->88320 88630 14000f2f0 79 API calls 88318->88630 88319 14004a65f 88324 14004a66b 88319->88324 88319->88395 88325 1400b9b84 2 API calls 88320->88325 88323 140049578 88326 14004a116 88323->88326 88330 140049597 88323->88330 88635 14000f2f0 79 API calls 88324->88635 88325->88206 88326->88207 88331 14004a123 88326->88331 88327 14004a7c4 88327->88223 88332 14004a7e8 88327->88332 88329 140049f3f 88329->88207 88339 140049f6b 88329->88339 88330->88237 88333 14004a0b5 88330->88333 88619 14000f730 71 API calls 88331->88619 88332->88237 88336 14004a81e 88332->88336 88334 1400b9b84 2 API calls 88333->88334 88340 14004a0bf 88334->88340 88341 1400b9b84 2 API calls 88336->88341 88337 140049fa7 88343 14004a05e 88337->88343 88349 140049fcb 88337->88349 88613 14000f730 71 API calls 88339->88613 88617 14000eda0 109 API calls 88340->88617 88347 14004a828 88341->88347 88343->88207 88351 14004a079 88343->88351 88344 140049624 88344->88399 88603 14009c780 54 API calls sprintf 88344->88603 88604 1400a3410 30 API calls 88344->88604 88638 14000eda0 109 API calls 88347->88638 88349->88237 88355 14004a001 88349->88355 88616 14000f730 71 API calls 88351->88616 88352 14004a0e2 88359 14004a0ee 88352->88359 88352->88395 88357 1400b9b84 2 API calls 88355->88357 88361 14004a00b 88357->88361 88618 14000f2f0 79 API calls 88359->88618 88360 14004a847 88363 14004a853 88360->88363 88360->88395 88614 14000eda0 109 API calls 88361->88614 88639 14000f2f0 79 API calls 88363->88639 88365 14004a6d0 88365->88223 88369 14004a6f4 88365->88369 88367 14004a02a 88368 14004a036 88367->88368 88367->88395 88615 14000f2f0 79 API calls 88368->88615 88369->88237 88372 14004a72a 88369->88372 88370 140048fd0 IsCharUpperW 88370->88399 88374 1400b9b84 2 API calls 88372->88374 88373 140048eab MapVirtualKeyW 88373->88399 88376 14004a734 88374->88376 88636 14000eda0 109 API calls 88376->88636 88378 14004a753 88379 14004a75f 88378->88379 88378->88395 88637 14000f2f0 79 API calls 88379->88637 88381 140049e2d 88382 140049ef0 88381->88382 88383 140049e4c 88381->88383 88382->88207 88385 140049efd 88382->88385 88384 140049e96 88383->88384 88388 140049e6b 88383->88388 88386 1400b9b84 2 API calls 88384->88386 88612 14000f730 71 API calls 88385->88612 88389 140049ea0 88386->88389 88610 140010880 DialogBoxParamW 88388->88610 88611 14000eda0 109 API calls 88389->88611 88392 140049ec3 88392->88213 88392->88395 88393 14001a090 72 API calls 88393->88399 88394 140019580 121 API calls 88394->88399 88395->88221 88395->88227 88396 140006df0 54 API calls 88396->88399 88397 1400623b0 119 API calls 88397->88399 88398 14001a950 58 API calls 88398->88399 88399->88214 88399->88221 88399->88243 88399->88247 88399->88252 88399->88256 88399->88260 88399->88266 88399->88269 88399->88274 88399->88275 88399->88278 88399->88279 88399->88282 88399->88292 88399->88300 88399->88305 88399->88307 88399->88308 88399->88323 88399->88327 88399->88329 88399->88337 88399->88344 88399->88365 88399->88370 88399->88373 88399->88381 88399->88393 88399->88394 88399->88396 88399->88397 88399->88398 88400 14004db60 119 API calls 88399->88400 88401 14004f920 119 API calls 88399->88401 88405 14004bb80 88399->88405 88413 14004c8f0 88399->88413 88593 14001a1c0 63 API calls 88399->88593 88594 1400055e0 88399->88594 88598 140023500 VkKeyScanExW 88399->88598 88599 1400c6c88 52 API calls swprintf 88399->88599 88600 1400232b0 58 API calls 88399->88600 88602 14009c780 54 API calls sprintf 88399->88602 88605 14001b5a0 61 API calls 88399->88605 88606 14004d9b0 117 API calls memcpy_s 88399->88606 88607 140052c30 119 API calls 88399->88607 88608 140052d80 119 API calls 88399->88608 88609 1400527f0 119 API calls 88399->88609 88400->88399 88401->88399 88739 140007d6c 88402->88739 88404 140007de4 88404->88183 88409 14004bbf0 __crtLCMapStringW memcpy_s 88405->88409 88410 14004c4fa 88409->88410 88411 1400c0410 58 API calls 88409->88411 88412 14004c4f0 88409->88412 88654 14004c550 88409->88654 88658 1400c4f60 88409->88658 88667 140010ac0 117 API calls 88410->88667 88411->88409 88412->88399 88414 14004c931 88413->88414 88415 1400c0224 58 API calls 88414->88415 88526 14004c994 88414->88526 88416 14004c9fa 88415->88416 88417 14004d68c 88416->88417 88419 1400c0224 58 API calls 88416->88419 88418 14004d691 88417->88418 88423 14004d6a8 88417->88423 88727 140010ac0 117 API calls 88418->88727 88421 14004ca11 88419->88421 88421->88417 88422 14004ca1f 88421->88422 88425 1400c0224 58 API calls 88422->88425 88424 14004d6e0 88423->88424 88433 14004d6fb 88423->88433 88728 140010ac0 117 API calls 88424->88728 88426 14004ca2e 88425->88426 88428 14004ca36 88426->88428 88429 14004cba1 88426->88429 88431 14004ca3b SetDllDirectoryW 88428->88431 88445 14004ca66 88428->88445 88432 1400c0224 58 API calls 88429->88432 88430 14004d7fe 88675 14005e530 88430->88675 88435 14004ca4b 88431->88435 88431->88526 88436 14004cbb0 88432->88436 88433->88430 88441 14004d76f 88433->88441 88686 140010ac0 117 API calls 88435->88686 88440 1400c0224 58 API calls 88436->88440 88436->88526 88439 14004d818 GetFileAttributesW 88442 14004d848 88439->88442 88443 14004d82d 88439->88443 88447 14004cbd4 88440->88447 88448 140063570 62 API calls 88441->88448 88679 140063570 88442->88679 88443->88442 88444 14004d831 88443->88444 88449 1400634b0 4 API calls 88444->88449 88450 14005e530 118 API calls 88445->88450 88452 14004cc81 88447->88452 88453 14004cbdc 88447->88453 88454 14004d77f 88448->88454 88449->88526 88455 14004caf1 88450->88455 88451 14004d84d 88456 140048520 146 API calls 88451->88456 88457 1400c0224 58 API calls 88452->88457 88461 1400c0224 58 API calls 88453->88461 88453->88526 88729 140053740 154 API calls memcpy_s 88454->88729 88459 14004caf9 GetFileAttributesW 88455->88459 88455->88526 88460 14004d863 88456->88460 88462 14004cc90 88457->88462 88466 14004cb48 LoadLibraryW 88459->88466 88467 14004cb0e 88459->88467 88468 14004d86f SetCurrentDirectoryW 88460->88468 88460->88526 88469 14004cbf4 88461->88469 88470 14004cd06 88462->88470 88471 14004cc94 88462->88471 88463 14004d7a9 88464 14004d7ae SetCurrentDirectoryW 88463->88464 88465 14004d7bf 88463->88465 88464->88465 88487 14004cb43 88465->88487 88465->88526 88730 140010ac0 117 API calls 88465->88730 88473 14004cb81 88466->88473 88474 14004cb62 GetModuleHandleExW 88466->88474 88467->88466 88472 14004cb12 SetDllDirectoryW 88467->88472 88468->88526 88476 1400c0224 58 API calls 88469->88476 88469->88526 88475 1400c0224 58 API calls 88470->88475 88483 1400c0224 58 API calls 88471->88483 88471->88526 88477 14004cb25 88472->88477 88473->88487 88688 140010ac0 117 API calls 88473->88688 88474->88473 88474->88487 88478 14004cd15 88475->88478 88482 14004cc07 88476->88482 88477->88526 88687 140010ac0 117 API calls 88477->88687 88479 14004cd1d 88478->88479 88480 14004cf3b 88478->88480 88485 14004cf20 88479->88485 88503 14004cd3f 88479->88503 88488 1400c0224 58 API calls 88480->88488 88489 1400c0224 58 API calls 88482->88489 88482->88526 88486 14004ccad 88483->88486 88696 140010ac0 117 API calls 88485->88696 88497 1400c0224 58 API calls 88486->88497 88486->88526 88487->88526 88491 14004cf4a 88488->88491 88493 14004cc2f 88489->88493 88494 14004cf4e 88491->88494 88495 14004cf6f 88491->88495 88499 1400c0224 58 API calls 88493->88499 88493->88526 88494->88526 88697 14009cfe0 55 API calls 88494->88697 88496 1400c0224 58 API calls 88495->88496 88498 14004cf7e 88496->88498 88552 14004cccc 88497->88552 88501 14004d0f8 88498->88501 88515 14004cf86 88498->88515 88502 14004cc56 88499->88502 88505 1400c0224 58 API calls 88501->88505 88502->88526 88721 140010ac0 117 API calls 88502->88721 88503->88526 88689 1400623b0 119 API calls memcpy_s 88503->88689 88509 14004d107 88505->88509 88506 14004cdad 88690 140018e40 125 API calls 88506->88690 88511 14004d144 88509->88511 88512 14004d10b 88509->88512 88514 1400c0224 58 API calls 88511->88514 88512->88526 88715 14009cfe0 55 API calls 88512->88715 88513 14004cdb6 88516 14004cdbb 88513->88516 88527 14004cdfd 88513->88527 88518 14004d153 88514->88518 88515->88526 88698 1400c0410 88515->88698 88516->88526 88691 140010ac0 117 API calls 88516->88691 88520 14004d157 88518->88520 88521 14004d1c9 88518->88521 88520->88526 88531 1400c0224 58 API calls 88520->88531 88522 1400c0224 58 API calls 88521->88522 88524 14004d1d8 88522->88524 88528 14004d215 88524->88528 88529 14004d1dc 88524->88529 88526->88399 88532 140098fd0 2 API calls 88527->88532 88538 14004ce39 memcpy_s 88527->88538 88536 1400c0224 58 API calls 88528->88536 88529->88526 88716 14009cfe0 55 API calls 88529->88716 88530 14004ce8c 88534 14004cec4 88530->88534 88693 14004db60 119 API calls memcpy_s 88530->88693 88535 14004d170 88531->88535 88533 14004ce2d 88532->88533 88537 14004d8a4 88533->88537 88533->88538 88534->88526 88695 140010ac0 117 API calls 88534->88695 88535->88526 88548 1400c0224 58 API calls 88535->88548 88542 14004d224 88536->88542 88545 1400111d0 72 API calls 88537->88545 88692 14004f920 119 API calls memcpy_s 88538->88692 88543 14004d228 88542->88543 88544 14004d29a 88542->88544 88543->88526 88555 1400c0224 58 API calls 88543->88555 88549 1400c0224 58 API calls 88544->88549 88547 14004d8a9 88545->88547 88546 14004cea6 88546->88534 88694 14004f920 119 API calls memcpy_s 88546->88694 88548->88552 88550 14004d2a9 88549->88550 88553 14004d2ad 88550->88553 88554 14004d2ce 88550->88554 88552->88526 88719 140010ac0 117 API calls 88552->88719 88553->88526 88717 14009cfe0 55 API calls 88553->88717 88557 1400c0224 58 API calls 88554->88557 88556 14004d241 88555->88556 88556->88526 88560 1400c0224 58 API calls 88556->88560 88559 14004d2dd 88557->88559 88559->88526 88561 1400c0224 58 API calls 88559->88561 88560->88502 88562 14004d301 88561->88562 88563 14004d36e 88562->88563 88567 14004d305 88562->88567 88564 1400c0224 58 API calls 88563->88564 88566 14004d37d 88564->88566 88568 14004d381 88566->88568 88569 14004d3b2 88566->88569 88718 14000eca0 62 API calls 88567->88718 88568->88526 88720 14009cfe0 55 API calls 88568->88720 88570 1400c0224 58 API calls 88569->88570 88571 14004d3c1 88570->88571 88573 14004d515 88571->88573 88574 14004d3c9 88571->88574 88575 1400c0224 58 API calls 88573->88575 88574->88502 88582 1400c0224 58 API calls 88574->88582 88587 14004d489 88574->88587 88576 14004d524 88575->88576 88576->88526 88577 14004d531 88576->88577 88578 14004d54c 88576->88578 88723 140010ac0 117 API calls 88577->88723 88580 1400c0410 58 API calls 88578->88580 88590 14004d561 88580->88590 88581 14004d630 88725 14009c780 54 API calls sprintf 88581->88725 88582->88574 88583 1400c0224 58 API calls 88583->88587 88585 14004d66a 88726 140010ac0 117 API calls 88585->88726 88587->88526 88587->88583 88588 14004d4bf 88587->88588 88722 140010ac0 117 API calls 88588->88722 88590->88526 88590->88581 88591 1400c0224 58 API calls 88590->88591 88724 14009f740 52 API calls 88590->88724 88591->88590 88593->88399 88595 140005662 88594->88595 88596 140005624 88594->88596 88595->88399 88596->88595 88597 1400c0224 58 API calls 88596->88597 88597->88596 88598->88399 88599->88399 88600->88399 88601->88399 88602->88399 88603->88344 88604->88344 88605->88399 88606->88399 88607->88399 88608->88399 88609->88399 88610->88221 88611->88392 88612->88221 88613->88221 88614->88367 88615->88221 88616->88221 88617->88352 88618->88221 88619->88221 88620->88221 88621->88221 88622->88221 88623->88221 88624->88221 88625->88221 88626->88221 88627->88221 88628->88221 88629->88314 88630->88221 88631->88221 88632->88221 88633->88221 88634->88319 88635->88221 88636->88378 88637->88221 88638->88360 88639->88221 88640->88221 88641->88221 88642->88221 88643->88221 88644->88221 88645->88242 88646->88221 88647->88221 88648->88221 88649->88392 88650->88221 88651->88236 88652->88221 88653->88221 88656 14004c590 88654->88656 88657 14004c609 memcpy_s 88656->88657 88668 1400998f0 88656->88668 88657->88409 88657->88657 88659 1400c4f9c 88658->88659 88663 1400c4f79 88658->88663 88672 1400d0924 52 API calls 3 library calls 88659->88672 88661 1400c4fa1 88673 1400d0c84 52 API calls swprintf 88661->88673 88663->88409 88664 1400c4fba 88664->88663 88674 1400d2410 55 API calls swprintf 88664->88674 88666 1400c4ff3 88666->88409 88667->88412 88669 14009991b memcpy_s 88668->88669 88670 140099c7f 88669->88670 88671 140099abf MultiByteToWideChar 88669->88671 88670->88656 88671->88669 88672->88661 88673->88664 88674->88666 88678 14005e574 memcpy_s 88675->88678 88676 14004d810 88676->88439 88676->88526 88677 140054320 118 API calls 88677->88678 88678->88676 88678->88677 88731 1400d99e0 88679->88731 88682 1400635a3 88682->88451 88683 140063591 88733 1400cc130 61 API calls 2 library calls 88683->88733 88685 14006359b 88685->88451 88686->88526 88687->88487 88688->88487 88689->88506 88690->88513 88691->88526 88692->88530 88693->88546 88694->88534 88695->88526 88696->88526 88697->88526 88699 1400c041d 88698->88699 88700 1400c0441 88698->88700 88699->88700 88701 1400c0422 88699->88701 88702 1400c0483 88700->88702 88705 1400c04a2 88700->88705 88734 1400d058c 11 API calls memcpy_s 88701->88734 88736 1400d058c 11 API calls memcpy_s 88702->88736 88713 1400c0493 __crtLCMapStringW 88705->88713 88738 1400c0148 52 API calls swprintf 88705->88738 88706 1400c0427 88735 1400d03a4 52 API calls _invalid_parameter_noinfo 88706->88735 88707 1400c0488 88737 1400d03a4 52 API calls _invalid_parameter_noinfo 88707->88737 88711 1400c0432 88711->88526 88712 1400d040c 58 API calls 88714 1400c04bb 88712->88714 88713->88526 88714->88712 88714->88713 88715->88526 88716->88526 88717->88526 88718->88552 88719->88526 88720->88502 88721->88526 88722->88526 88723->88526 88724->88590 88725->88585 88726->88526 88727->88526 88728->88526 88729->88463 88730->88487 88732 14006357a GetCurrentDirectoryW 88731->88732 88732->88682 88732->88683 88733->88685 88734->88706 88735->88711 88736->88707 88737->88713 88738->88714 88740 140007d8e 88739->88740 88741 140007da0 88739->88741 88740->88741 88743 140007d94 88740->88743 88747 14009a310 88741->88747 88751 14009a380 WriteFile 88743->88751 88744 140007dac 88744->88404 88746 140007d9d 88746->88741 88748 14009a338 88747->88748 88749 14009a323 88747->88749 88748->88744 88749->88748 88750 14009a332 FindCloseChangeNotification 88749->88750 88750->88748 88751->88746 88753 14005b34d 88754 14005b3ad 88753->88754 88757 14005b357 88753->88757 88756 1400764f0 124 API calls 88754->88756 88755 14005b39a 88773 14009f9a0 109 API calls 88755->88773 88766 14005a076 88756->88766 88757->88755 88760 14005b384 88757->88760 88759 14005a1d0 88772 1400122d0 118 API calls 88760->88772 88762 14005a087 GetTickCount 88763 14005a0a4 PeekMessageW 88762->88763 88762->88766 88764 14005a0c2 88763->88764 88765 14005a0cf GetTickCount 88763->88765 88764->88765 88765->88766 88766->88759 88766->88762 88767 14005a136 GetTickCount 88766->88767 88770 1400764f0 124 API calls 88766->88770 88771 140008964 ioctlsocket 88766->88771 88767->88766 88768 14005a169 88767->88768 88768->88766 88770->88766 88771->88766 88772->88766 88773->88766 88774 1400552d0 88775 140055397 88774->88775 88776 1400552fb 88774->88776 88776->88775 88778 1400551e0 88776->88778 88779 140055253 88778->88779 88781 140055207 88778->88781 88779->88776 88781->88779 88782 140055d00 118 API calls 88781->88782 88782->88781 88783 140045a80 88784 140045aa9 88783->88784 88785 140045ab5 UnhookWindowsHookEx 88784->88785 88789 140045abb 88784->88789 88785->88789 88786 140045b57 88787 140045b72 88786->88787 88788 140045b60 Shell_NotifyIconW 88786->88788 88790 140045b98 DestroyWindow 88787->88790 88792 140045b84 RemoveClipboardFormatListener 88787->88792 88788->88787 88789->88786 88791 140045af6 UnregisterHotKey 88789->88791 88793 140045bb8 88790->88793 88794 140045bcc 88790->88794 88791->88789 88792->88790 88793->88794 88812 14007b840 17 API calls 88793->88812 88795 140045c07 88794->88795 88798 140045bf1 DeleteObject 88794->88798 88797 140045c13 DestroyIcon DestroyIcon 88795->88797 88805 140045c26 88795->88805 88797->88805 88798->88794 88799 140045c8e 88800 140045ca8 IsWindow 88799->88800 88804 140045cc5 88799->88804 88800->88799 88803 140045cb2 DestroyWindow 88800->88803 88801 140045c60 DestroyMenu 88801->88805 88803->88799 88808 140045d06 DeleteCriticalSection OleUninitialize 88804->88808 88809 140045cce mciSendStringW 88804->88809 88805->88799 88805->88801 88806 140045c47 RemoveMenu 88805->88806 88807 140045c7f DeleteObject 88805->88807 88813 14008acc0 7 API calls 88805->88813 88806->88805 88807->88805 88811 140045d33 88808->88811 88809->88808 88810 140045cf1 mciSendStringW 88809->88810 88810->88808 88812->88793 88813->88805 88814 140004b30 88816 140004b3f 88814->88816 88819 140004b72 memcpy_s 88814->88819 88817 140098fd0 2 API calls 88816->88817 88816->88819 88818 140004b66 88817->88818 88818->88819 88820 140004e34 88818->88820 88855 140094730 88819->88855 88821 1400111d0 72 API calls 88820->88821 88822 140004e39 FindResourceW 88821->88822 88845 140004e65 88822->88845 88824 140004d0e 88826 140004d1d FindWindowW 88824->88826 88827 140004dbf 88824->88827 88825 140004c65 88825->88824 88825->88826 88828 140004cae FindWindowW 88825->88828 88847 140004e16 88825->88847 88826->88827 88836 140004cfe 88826->88836 88935 1400462b0 88827->88935 88828->88824 88831 140004cca 88828->88831 88830 140004d42 PostMessageW Sleep IsWindow 88833 140004db4 Sleep 88830->88833 88848 140004d6f 88830->88848 88834 140004cd9 88831->88834 88831->88847 88832 140054320 118 API calls 88835 140005128 88832->88835 88833->88827 88834->88836 89008 1400a3410 30 API calls 88834->89008 88838 1400051bc 88835->88838 88846 140005176 88835->88846 89010 140054ba0 118 API calls memcpy_s 88835->89010 88836->88830 88836->88847 88839 140004d9a Sleep IsWindow 88839->88833 88839->88848 88840 1400c0224 58 API calls 88840->88845 88842 140004dcb memcpy_s 88842->88847 88964 1400051e0 88842->88964 88845->88840 88851 1400050db 88845->88851 88846->88838 88977 14008eb80 88846->88977 88848->88839 88848->88847 89009 1400a3410 30 API calls 88848->89009 88851->88832 88852 1400a0ef0 117 API calls 88853 1400051ad 88852->88853 88981 140045df0 88853->88981 88856 1400b9b84 2 API calls 88855->88856 88857 140094761 88856->88857 89011 140092bb0 88857->89011 88861 1400947e1 88862 1400b9b84 2 API calls 88861->88862 88863 140094817 88862->88863 88864 140092bb0 58 API calls 88863->88864 88865 14009486b 88864->88865 88867 140094886 88865->88867 89119 140093150 61 API calls memcpy_s 88865->89119 88868 1400b9b84 2 API calls 88867->88868 88869 1400948c5 88868->88869 88870 140092bb0 58 API calls 88869->88870 88871 140094919 88870->88871 88874 140094934 88871->88874 89120 140093150 61 API calls memcpy_s 88871->89120 88873 140053970 118 API calls 88873->88874 88874->88873 88875 140090460 61 API calls 88874->88875 88876 140094a97 88874->88876 88875->88874 88877 140092bb0 58 API calls 88876->88877 88878 140094ab4 88877->88878 88881 140094ad2 88878->88881 89121 140093150 61 API calls memcpy_s 88878->89121 88880 140094ada 88882 140054320 118 API calls 88880->88882 88881->88880 88883 1400b9b84 2 API calls 88881->88883 88885 140094b50 88882->88885 88883->88880 88884 140054320 118 API calls 88887 140094bfc 88884->88887 88889 140094baa 88885->88889 89122 1400da444 RtlPcToFileHeader RaiseException RtlPcToFileHeader FindMITargetTypeInstance 88885->89122 88888 140094c56 88887->88888 89123 1400da444 RtlPcToFileHeader RaiseException RtlPcToFileHeader FindMITargetTypeInstance 88887->89123 88890 140094ca5 88888->88890 88891 140099070 2 API calls 88888->88891 88896 140094cfd 88888->88896 88889->88884 88892 140094cc8 88890->88892 88895 140099070 2 API calls 88890->88895 88897 140095d92 88890->88897 88891->88890 88892->88896 88892->88897 88895->88892 89015 140090460 88896->89015 88898 1400111d0 72 API calls 88897->88898 88900 140095d97 88898->88900 88903 14008f0c0 79 API calls 88904 140094dd1 88903->88904 88905 1400b9b84 2 API calls 88904->88905 88906 140094de2 88905->88906 88907 140092bb0 58 API calls 88906->88907 88908 140094e36 88907->88908 88910 140094e51 88908->88910 89124 140093150 61 API calls memcpy_s 88908->89124 89040 14008f620 88910->89040 88913 14008f620 119 API calls 88914 140094f03 88913->88914 88915 1400055e0 58 API calls 88914->88915 88916 140094f19 88915->88916 89065 1400945f0 88916->89065 88919 1400945f0 119 API calls 88920 140095c95 88919->88920 89073 1400783f0 88920->89073 88923 14008f0c0 79 API calls 88924 140095cb6 88923->88924 88925 14008f0c0 79 API calls 88924->88925 88926 140095cd2 88925->88926 89098 140006a60 88926->89098 88930 140095d01 88931 140006a60 79 API calls 88930->88931 88932 140095d1d 88931->88932 88933 14008f620 119 API calls 88932->88933 88934 140095d5b 88933->88934 88934->88825 88936 1400462da 88935->88936 88963 1400466e5 88935->88963 88936->88963 89201 14009e980 88936->89201 88939 14009e980 13 API calls 88940 140046360 LoadCursorW RegisterClassExW 88939->88940 88941 1400463b7 88940->88941 88942 1400463c3 GetForegroundWindow 88940->88942 88943 140046702 88941->88943 88944 1400463fd SystemParametersInfoW CreateWindowExW 88942->88944 88945 1400463ce GetClassNameW 88942->88945 89233 1400a3410 30 API calls 88943->89233 88944->88943 88950 1400464b0 88944->88950 88945->88944 88947 1400463e9 88945->88947 88949 1400c0224 58 API calls 88947->88949 88949->88944 88951 1400b9b84 2 API calls 88950->88951 88952 1400464ba 88951->88952 89221 14008b710 88952->89221 88955 140046565 CreateWindowExW 88955->88943 88958 1400465c3 9 API calls 88955->88958 88956 1400464e8 GetMenu EnableMenuItem 88956->88955 88957 140046515 EnableMenuItem EnableMenuItem EnableMenuItem EnableMenuItem 88956->88957 88957->88955 88959 1400466c3 LoadAcceleratorsW 88958->88959 88960 14004669d ShowWindow SetWindowLongW 88958->88960 88961 1400466f3 88959->88961 88959->88963 88960->88959 89229 140046740 88961->89229 88963->88842 88965 140005242 88964->88965 88966 1400051f5 88964->88966 89236 1400180f0 88965->89236 88966->88965 88969 140005212 88966->88969 89253 14000ca44 82 API calls 88969->89253 88972 14000524d 89255 140047090 IsWindowVisible IsWindowVisible 88972->89255 88973 14000522b 88973->88965 89254 140008b94 69 API calls memcpy_s 88973->89254 88976 14000525b 88976->88847 88978 14008ebb6 88977->88978 89256 140091a40 88978->89256 88980 14000519d 88980->88838 88980->88852 88982 1400d99e0 88981->88982 88983 140045e17 GetModuleFileNameW 88982->88983 88984 140045e55 88983->88984 88986 140045f29 memcpy_s 88983->88986 89007 1400460c2 memcpy_s 88984->89007 89259 14009db60 88984->89259 88987 140046082 GetFullPathNameW 88986->88987 88988 140045fe7 88986->88988 88994 140046257 88986->88994 88986->89007 88989 1400460ac 88987->88989 88987->89007 88993 140098fd0 2 API calls 88988->88993 88997 140046047 memcpy_s 88988->88997 88990 14009db60 4 API calls 88989->88990 88990->88988 88991 140045e72 88991->88991 88992 140098fd0 2 API calls 88991->88992 88998 140045ea7 memcpy_s 88991->88998 88992->88998 88993->88997 88995 1400111d0 72 API calls 88994->88995 88994->89007 88996 1400462a7 88995->88996 88997->88994 88997->88997 88999 140098fd0 2 API calls 88997->88999 89004 140046128 memcpy_s 88997->89004 88998->88986 88998->88994 88998->88998 89000 140098fd0 2 API calls 88998->89000 88999->89004 89000->88986 89001 140098fd0 2 API calls 89003 14004616b memcpy_s 89001->89003 89003->88994 89005 140046195 89003->89005 89263 14009c820 54 API calls sprintf 89003->89263 89004->88994 89004->89001 89004->89003 89005->89005 89006 140098fd0 2 API calls 89005->89006 89005->89007 89006->88994 89007->88838 89008->88836 89009->88848 89010->88846 89012 140092c3e 89011->89012 89014 140092bf5 89011->89014 89012->88861 89118 140093150 61 API calls memcpy_s 89012->89118 89013 1400c0224 58 API calls 89013->89014 89014->89012 89014->89013 89016 1400904e5 89015->89016 89019 14009049c 89015->89019 89125 140093150 61 API calls memcpy_s 89016->89125 89018 1400c0224 58 API calls 89018->89019 89019->89016 89019->89018 89021 1400904f3 89019->89021 89020 14009051a 89023 14008f0c0 89020->89023 89021->89020 89022 1400b9b84 2 API calls 89021->89022 89022->89020 89024 14008f0ed 89023->89024 89126 140006df0 89024->89126 89026 14008f5d6 89026->88903 89027 140099070 EnterCriticalSection LeaveCriticalSection 89039 14008f105 memcpy_s 89027->89039 89028 14008f5fa 89029 1400111d0 72 API calls 89028->89029 89030 14008f5ff 89029->89030 89031 1400111d0 72 API calls 89030->89031 89032 14008f605 89031->89032 89034 1400111d0 72 API calls 89032->89034 89033 140090460 61 API calls 89033->89039 89035 14008f60b 89034->89035 89036 1400111d0 72 API calls 89035->89036 89037 14008f611 89036->89037 89038 140098fd0 EnterCriticalSection LeaveCriticalSection 89038->89039 89039->89026 89039->89027 89039->89028 89039->89030 89039->89032 89039->89033 89039->89035 89039->89038 89170 14008ef30 89040->89170 89043 140006df0 54 API calls 89045 14008f698 89043->89045 89044 14008f8a7 89046 1400a0ef0 117 API calls 89044->89046 89047 14008f6a6 89045->89047 89049 140099070 2 API calls 89045->89049 89048 14008f8b5 89046->89048 89052 140099070 2 API calls 89047->89052 89053 14008f8dc 89047->89053 89056 14008f6c9 89047->89056 89048->88913 89049->89047 89050 140054320 118 API calls 89051 14008f862 89050->89051 89051->89044 89175 140054ba0 118 API calls memcpy_s 89051->89175 89052->89056 89054 1400111d0 72 API calls 89053->89054 89055 14008f8e2 89054->89055 89056->89053 89056->89056 89058 140098fd0 2 API calls 89056->89058 89062 14008f73a memcpy_s 89056->89062 89059 14008f72e 89058->89059 89061 14008f8d7 89059->89061 89059->89062 89060 140090460 61 API calls 89064 14008f7af 89060->89064 89063 1400111d0 72 API calls 89061->89063 89062->89060 89063->89053 89064->89044 89064->89050 89066 140094612 89065->89066 89072 140094710 89065->89072 89067 14008efe0 61 API calls 89066->89067 89068 14008f620 119 API calls 89066->89068 89069 14008f0c0 79 API calls 89066->89069 89070 140006a60 79 API calls 89066->89070 89071 1400945f0 119 API calls 89066->89071 89066->89072 89067->89066 89068->89066 89069->89066 89070->89066 89071->89066 89072->88919 89074 140054320 118 API calls 89073->89074 89075 14007842c 89074->89075 89076 14008efe0 61 API calls 89075->89076 89077 140078451 89076->89077 89078 140006a60 79 API calls 89077->89078 89079 14007846d 89078->89079 89080 14008efe0 61 API calls 89079->89080 89081 140078483 89080->89081 89082 140006a60 79 API calls 89081->89082 89083 14007849f 89082->89083 89084 14008ef30 61 API calls 89083->89084 89085 1400784b2 89084->89085 89086 14008ef30 61 API calls 89085->89086 89087 1400784c1 89086->89087 89183 140095da0 89087->89183 89089 140078522 89090 140095da0 79 API calls 89089->89090 89096 140078534 89090->89096 89091 14007868f 89091->88923 89093 14008efe0 61 API calls 89093->89096 89094 140006a60 79 API calls 89094->89096 89095 14008ef30 61 API calls 89095->89096 89096->89091 89096->89093 89096->89094 89096->89095 89097 140095da0 79 API calls 89096->89097 89199 140044fd0 54 API calls sprintf 89096->89199 89097->89096 89099 140006a8d 89098->89099 89100 140006df0 54 API calls 89099->89100 89106 140006aa5 memcpy_s 89100->89106 89101 140006d3a 89111 14008efe0 89101->89111 89102 140099070 EnterCriticalSection LeaveCriticalSection 89102->89106 89103 140006d5e 89104 1400111d0 72 API calls 89103->89104 89105 140006d63 89104->89105 89107 1400111d0 72 API calls 89105->89107 89106->89101 89106->89102 89106->89103 89106->89105 89108 140098fd0 2 API calls 89106->89108 89110 140090460 61 API calls 89106->89110 89109 140006d69 89107->89109 89108->89106 89110->89106 89112 1400b9b84 2 API calls 89111->89112 89113 14008efff 89112->89113 89114 140092bb0 58 API calls 89113->89114 89115 14008f056 89114->89115 89117 14008f06f 89115->89117 89200 140093150 61 API calls memcpy_s 89115->89200 89117->88930 89118->88861 89119->88867 89120->88874 89121->88881 89122->88889 89123->88888 89124->88910 89125->89021 89127 140006e16 sprintf 89126->89127 89130 1400c4cfc 89127->89130 89131 1400c4d56 89130->89131 89132 1400c4d7b 89131->89132 89134 1400c4db7 89131->89134 89161 1400d02d8 52 API calls 2 library calls 89132->89161 89162 1400c2f9c 54 API calls swprintf 89134->89162 89136 1400c4da5 89137 1400c4f19 89136->89137 89166 1400c2710 52 API calls swprintf 89136->89166 89139 1400c4f2f 89137->89139 89167 1400c2710 52 API calls swprintf 89137->89167 89152 1400d9850 89139->89152 89140 1400c4e98 89165 1400d0d8c 11 API calls 2 library calls 89140->89165 89144 1400c4e52 89144->89140 89146 1400c4ebe 89144->89146 89149 1400c4e64 89144->89149 89151 1400c4e6d 89144->89151 89146->89140 89147 1400c4ec8 89146->89147 89164 1400d0d8c 11 API calls 2 library calls 89147->89164 89149->89140 89149->89151 89163 1400d0d8c 11 API calls 2 library calls 89151->89163 89153 1400d9859 89152->89153 89154 140006e3c 89153->89154 89155 1400d9a64 IsProcessorFeaturePresent 89153->89155 89154->89039 89156 1400d9a7c 89155->89156 89168 1400d9b38 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 89156->89168 89158 1400d9a8f 89169 1400d9a30 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 89158->89169 89161->89136 89162->89144 89163->89136 89164->89136 89165->89136 89166->89137 89167->89139 89168->89158 89171 1400b9b84 2 API calls 89170->89171 89172 14008ef4c 89171->89172 89176 1400450b0 89172->89176 89174 14008efc2 89174->89043 89174->89064 89175->89044 89177 140045145 89176->89177 89181 1400450f5 89176->89181 89182 140093150 61 API calls memcpy_s 89177->89182 89179 1400c0224 58 API calls 89179->89181 89180 140045153 89180->89174 89181->89177 89181->89179 89181->89180 89182->89180 89184 140090460 61 API calls 89183->89184 89185 140095dbd 89184->89185 89186 140098fd0 2 API calls 89185->89186 89190 140095dca 89186->89190 89187 140095ee6 89188 1400111d0 72 API calls 89187->89188 89198 140095f17 89187->89198 89189 140095f91 89188->89189 89189->89089 89190->89187 89191 140095df5 89190->89191 89192 140099070 2 API calls 89190->89192 89191->89187 89193 140099070 2 API calls 89191->89193 89194 140095e18 89191->89194 89192->89191 89193->89194 89194->89187 89195 140095ec3 89194->89195 89196 140099070 2 API calls 89194->89196 89195->89187 89197 140099070 2 API calls 89195->89197 89196->89195 89197->89187 89198->89089 89199->89096 89200->89117 89202 14009e9b1 LoadLibraryExW 89201->89202 89203 14009e9c2 89201->89203 89202->89203 89204 14009eba3 89203->89204 89205 14009e9f2 EnumResourceNamesW 89203->89205 89206 14009e9e6 89203->89206 89207 14009ebbb ExtractIconW 89204->89207 89210 140046339 GetSystemMetrics 89204->89210 89205->89206 89208 14009eb6b 89206->89208 89209 14009ea33 FindResourceW 89206->89209 89207->89210 89208->89204 89208->89210 89213 14009eb9a FreeLibrary 89208->89213 89209->89208 89211 14009ea4b LoadResource 89209->89211 89210->88939 89211->89208 89212 14009ea60 LockResource 89211->89212 89212->89208 89214 14009ea75 89212->89214 89213->89204 89215 14009ea81 GetSystemMetrics 89214->89215 89216 14009ea8c 89214->89216 89215->89216 89216->89208 89217 14009eafc FindResourceW 89216->89217 89217->89208 89218 14009eb17 LoadResource 89217->89218 89218->89208 89219 14009eb28 LockResource 89218->89219 89219->89208 89220 14009eb39 SizeofResource CreateIconFromResourceEx 89219->89220 89220->89208 89223 14008b772 89221->89223 89224 1400464df 89223->89224 89225 14008b7d7 89223->89225 89234 14008a610 130 API calls 89223->89234 89224->88955 89224->88956 89226 14008b810 89225->89226 89228 14008b804 SetMenuDefaultItem 89225->89228 89226->89224 89235 14007c400 GetMenu IsWindowVisible SetWindowPos RedrawWindow 89226->89235 89228->89226 89230 140046779 memcpy_s 89229->89230 89231 1400467f0 Shell_NotifyIconW 89230->89231 89232 14004680c 89231->89232 89232->88963 89233->88963 89234->89223 89235->89224 89238 14001812c memcpy_s 89236->89238 89237 1400181bc UnregisterHotKey 89237->89238 89238->89237 89242 140018205 89238->89242 89239 14001856e 89241 140005247 89239->89241 89243 1400185f2 SetTimer 89239->89243 89240 140018506 UnregisterHotKey 89240->89242 89245 140046e40 89241->89245 89242->89239 89242->89240 89244 1400184d7 RegisterHotKey 89242->89244 89243->89241 89244->89242 89246 140046e5c 89245->89246 89247 140046e70 SetTimer 89246->89247 89248 140046e6b 89246->89248 89249 140046f4a GetTickCount GetTickCount 89247->89249 89252 140046f42 89247->89252 89248->88972 89251 140046f8f 89249->89251 89250 14005a010 129 API calls 89250->89252 89251->89250 89252->88972 89253->88973 89254->88965 89255->88976 89257 1400b9b84 2 API calls 89256->89257 89258 140091a63 89257->89258 89258->88980 89260 14009db70 89259->89260 89264 14009d920 89260->89264 89262 14009db86 memcpy_s 89262->88991 89263->89005 89270 14009daf0 memcpy_s 89264->89270 89271 14009d959 __crtLCMapStringW memcpy_s 89264->89271 89265 14009dac1 89266 14009dacf FindFirstFileW 89265->89266 89265->89270 89268 14009dae2 FindClose 89266->89268 89266->89270 89267 14009da30 FindFirstFileW 89269 14009da4f FindClose 89267->89269 89267->89270 89268->89270 89269->89271 89270->89262 89271->89265 89271->89267 89271->89270 89272 14004785c 89273 14004787a 89272->89273 89277 14000cf2c 89273->89277 89276 1400478a3 89278 14000cf6e PostQuitMessage 89277->89278 89279 14000cf3f 89277->89279 89278->89276 89283 14000c8e0 63 API calls sprintf 89279->89283 89281 14000cf66 89284 14000cea8 shutdown closesocket WSACleanup 89281->89284 89283->89281 89284->89278 89285 140005970 89286 140005a05 89285->89286 89291 1400059b5 89285->89291 89287 140005a0b 89286->89287 89297 140005a25 89286->89297 89328 140010f40 109 API calls 89287->89328 89289 1400059eb 89327 140010f40 109 API calls 89289->89327 89291->89286 89291->89289 89292 140006269 89316 1400b9ae9 89292->89316 89293 140005bbf 89295 1400055e0 58 API calls 89293->89295 89298 140005bcf 89295->89298 89296 14000628b 89312 1400062c1 89296->89312 89337 140011af0 109 API calls 89296->89337 89297->89293 89307 140005b41 89297->89307 89329 140011560 109 API calls 89298->89329 89301 14000622d 89336 140011b40 109 API calls 89301->89336 89304 1400059fe 89307->89292 89307->89296 89307->89301 89330 1400da444 RtlPcToFileHeader RaiseException RtlPcToFileHeader FindMITargetTypeInstance 89307->89330 89331 14009c780 54 API calls sprintf 89307->89331 89332 1400c5974 52 API calls 89307->89332 89333 140067120 55 API calls 89307->89333 89334 140067080 55 API calls 89307->89334 89335 140067760 55 API calls 89307->89335 89312->89304 89314 1400a0ef0 117 API calls 89312->89314 89315 1400a12d0 56 API calls 89312->89315 89338 1400da444 RtlPcToFileHeader RaiseException RtlPcToFileHeader FindMITargetTypeInstance 89312->89338 89339 14009f9a0 109 API calls 89312->89339 89314->89312 89315->89312 89340 140047638 89316->89340 89345 14004765c 89316->89345 89350 140047480 89316->89350 89358 14004764a 89316->89358 89363 14004761d 89316->89363 89368 14004762f 89316->89368 89373 140047641 89316->89373 89378 140047653 89316->89378 89383 140047626 89316->89383 89317 1400b9b3d 89317->89296 89327->89304 89328->89304 89329->89304 89330->89307 89331->89307 89332->89307 89333->89307 89334->89307 89335->89307 89336->89304 89337->89312 89338->89312 89339->89312 89342 14004766c 89340->89342 89341 140047714 89342->89341 89388 140004840 10 API calls 89342->89388 89344 1400476f2 89344->89317 89346 14004766c 89345->89346 89347 140047714 89346->89347 89389 140004840 10 API calls 89346->89389 89349 1400476f2 89349->89317 89352 140047485 89350->89352 89351 140047714 89352->89351 89353 140047519 89352->89353 89390 140046830 8 API calls 89353->89390 89355 140047599 89355->89351 89391 140004840 10 API calls 89355->89391 89357 1400476f2 89357->89317 89359 14004766c 89358->89359 89360 140047714 89359->89360 89392 140004840 10 API calls 89359->89392 89362 1400476f2 89362->89317 89364 14004766c 89363->89364 89365 140047714 89364->89365 89393 140004840 10 API calls 89364->89393 89367 1400476f2 89367->89317 89370 14004766c 89368->89370 89369 140047714 89370->89369 89394 140004840 10 API calls 89370->89394 89372 1400476f2 89372->89317 89374 14004766c 89373->89374 89375 140047714 89374->89375 89395 140004840 10 API calls 89374->89395 89377 1400476f2 89377->89317 89379 14004766c 89378->89379 89380 140047714 89379->89380 89396 140004840 10 API calls 89379->89396 89382 1400476f2 89382->89317 89384 14004766c 89383->89384 89385 140047714 89384->89385 89397 140004840 10 API calls 89384->89397 89387 1400476f2 89387->89317 89388->89344 89389->89349 89390->89355 89391->89357 89392->89362 89393->89367 89394->89372 89395->89377 89396->89382 89397->89387 89398 140001180 89403 140045840 89398->89403 89400 140001189 89406 1400b9de8 89400->89406 89402 1400b9e2d 89404 140045a2b memcpy_s 89403->89404 89405 140045a59 InitializeCriticalSection OleInitializeWOW 89404->89405 89405->89400 89407 1400b9e02 89406->89407 89409 1400b9dfb 89406->89409 89410 1400cfacc 89407->89410 89409->89402 89413 1400cf708 89410->89413 89420 1400d2d9c EnterCriticalSection 89413->89420 89415 1400cf724 89416 1400cf780 55 API calls 89415->89416 89417 1400cf72d 89416->89417 89418 1400d2df0 memcpy_s LeaveCriticalSection 89417->89418 89419 1400cf736 89418->89419 89419->89409
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Directory$AttributesFileHandleLibraryLoadModule_invalid_parameter_noinfo
                    • String ID: $#ClipboardTimeout$#DllLoad$#ErrorStdOut$#HotIf$#HotIfTimeout$#Hotstring$#Include$#IncludeAgain$#InputLevel$#MaxThreads$#MaxThreadsBuffer$#MaxThreadsPerHotkey$#NoTrayIcon$#Requires$#SingleInstance$#SuspendExempt$#UseHook$#Warn$#WinActivateForce$-()[]{}:;'"/\,.?! $2.0.12$64-bit$An internal function call failed.$AutoHotkey$EndChars$Failed to load DLL.$False$Force$Ignore$Invalid usage.$NoMouse$Off$Out of memory.$Parameter #1 invalid.$Parameter #1 required$Parameter #2 invalid.$Prompt$Script library not found.$This script requires %s.Current interpreter: %s v%s %s%s$True
                    • API String ID: 929950356-295339018
                    • Opcode ID: bcacad47c493cd0898b87b46b3b26d4b111d29f6581e7cc20806e376e54685db
                    • Instruction ID: 1991b585c3875c1518d9f1be416728aa9f7507a387a0b9e0f1809bd83cc56d09
                    • Opcode Fuzzy Hash: bcacad47c493cd0898b87b46b3b26d4b111d29f6581e7cc20806e376e54685db
                    • Instruction Fuzzy Hash: 2C92CE75200641A1FB67AB17A9503FA33A1AB4DBC4F868036FF4A476F5EB38C945D309
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID:
                    • String ID: <>=/|^,?:*&~!()[]{}%+-."'$ & $!#^+$!GetKeyState("%s")&&$#HotIf$%s up$%s%s%s$%s(-1),$%s(-1),Send("{Blind}{%s Up}")$AltTab$AltTabAndMenu$AltTabMenu$AltTabMenuDismiss$Class$Default$Duplicate hotkey.$Functions cannot contain classes.$Get$Hotkey or hotstring is missing its opening brace.$Hotkeys/hotstrings are not allowed inside functions or classes.$Missing "{"$Missing "}"$Not a valid method, class or property definition.$Not a valid property getter/setter.$Note: The hotkey %s will not be active because it does not exist in the current keyboard layout.$Out of memory.$Out of memory. The current thread will exit.$Pause$Prototype$Send("{Blind%s}%s%s{%s DownR}")$Set$SetKeyDelay$SetMouseDelay$ShiftAltTab$Static$This hotstring is missing its abbreviation.$This line does not contain a recognized action.$Unexpected "{"${LCtrl up}${RCtrl up}
                    • API String ID: 0-3398015377
                    • Opcode ID: 35241ffc1939e852beca7e42608ad04908f9a60bcc7ffa52e8df467c16ede667
                    • Instruction ID: c80eb8b76e53a665eae6f8af3fa5cf49b7cf587dbe334096f640d2a71abe110b
                    • Opcode Fuzzy Hash: 35241ffc1939e852beca7e42608ad04908f9a60bcc7ffa52e8df467c16ede667
                    • Instruction Fuzzy Hash: 2133AA7260468485FB62DB67A5407EA27A1FB4DBC8F464036FF8907AF9DB78C945C308
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                      • Part of subcall function 000000014009E980: LoadLibraryExW.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009E9B7
                      • Part of subcall function 000000014009E980: FindResourceW.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EA3C
                      • Part of subcall function 000000014009E980: LoadResource.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EA51
                      • Part of subcall function 000000014009E980: LockResource.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EA63
                      • Part of subcall function 000000014009E980: GetSystemMetrics.USER32 ref: 000000014009EA84
                      • Part of subcall function 000000014009E980: FindResourceW.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EB09
                      • Part of subcall function 000000014009E980: LoadResource.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EB1D
                    • GetSystemMetrics.USER32 ref: 0000000140046343
                      • Part of subcall function 000000014009E980: EnumResourceNamesW.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EA1F
                      • Part of subcall function 000000014009E980: LockResource.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EB2B
                      • Part of subcall function 000000014009E980: SizeofResource.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EB3F
                      • Part of subcall function 000000014009E980: CreateIconFromResourceEx.USER32 ref: 000000014009EB62
                    • LoadCursorW.USER32 ref: 0000000140046385
                    • RegisterClassExW.USER32 ref: 00000001400463AC
                    • GetForegroundWindow.USER32 ref: 00000001400463C3
                    • GetClassNameW.USER32 ref: 00000001400463DF
                    • SystemParametersInfoW.USER32 ref: 0000000140046416
                    • CreateWindowExW.USER32 ref: 000000014004649A
                    • GetMenu.USER32 ref: 00000001400464EF
                    • EnableMenuItem.USER32 ref: 0000000140046506
                    • EnableMenuItem.USER32 ref: 0000000140046523
                    • EnableMenuItem.USER32 ref: 0000000140046537
                    • EnableMenuItem.USER32 ref: 000000014004654B
                    • EnableMenuItem.USER32 ref: 000000014004655F
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Resource$Menu$EnableItem$Load$System$ClassCreateFindLockMetricsWindow$CursorEnumForegroundFromIconInfoLibraryNameNamesParametersRegisterSizeof
                    • String ID: AutoHotkey$Consolas$CreateWindow$Edit$RegClass$Shell_TrayWnd
                    • API String ID: 733243997-3694373331
                    • Opcode ID: 60c5484ce5775ca2fbf19e0d0dbc98147a3a6a563503ef9be8756f857963125e
                    • Instruction ID: 6475c53defba19de3d7059dc77b75882bffed2b9c63eb8790c744d3e07964ad7
                    • Opcode Fuzzy Hash: 60c5484ce5775ca2fbf19e0d0dbc98147a3a6a563503ef9be8756f857963125e
                    • Instruction Fuzzy Hash: E4C16F72604B8086E762DF26F8547AA77A2FB8CB90F544129EB8A47B74DF39C445CB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1410 140045a80-140045ab3 call 140016fd0 1413 140045ab5 UnhookWindowsHookEx 1410->1413 1414 140045abb-140045ac9 1410->1414 1413->1414 1415 140045b57-140045b5e 1414->1415 1416 140045acf-140045ad9 1414->1416 1417 140045b72-140045b79 1415->1417 1418 140045b60-140045b6c Shell_NotifyIconW 1415->1418 1419 140045ae0-140045aee 1416->1419 1422 140045b98-140045bb6 DestroyWindow 1417->1422 1423 140045b7b-140045b82 1417->1423 1418->1417 1420 140045b46-140045b55 1419->1420 1421 140045af0-140045af4 1419->1421 1420->1415 1420->1419 1424 140045af6-140045b16 UnregisterHotKey 1421->1424 1425 140045b1d-140045b20 1421->1425 1427 140045bb8-140045bca call 14007b840 1422->1427 1428 140045bcc-140045bd7 1422->1428 1423->1422 1426 140045b84-140045b91 RemoveClipboardFormatListener 1423->1426 1424->1425 1425->1420 1431 140045b22-140045b25 1425->1431 1426->1422 1427->1428 1429 140045c07-140045c11 1428->1429 1430 140045bd9-140045bdc 1428->1430 1435 140045c26-140045c30 1429->1435 1436 140045c13-140045c20 DestroyIcon * 2 1429->1436 1433 140045be0-140045bef 1430->1433 1431->1420 1434 140045b27-140045b3f 1431->1434 1438 140045bf1-140045bf7 DeleteObject 1433->1438 1439 140045bfd-140045c05 1433->1439 1434->1420 1440 140045c32-140045c36 1435->1440 1441 140045c8e-140045c9a 1435->1441 1436->1435 1438->1439 1439->1429 1439->1433 1443 140045c38-140045c3f 1440->1443 1444 140045c6e-140045c7d call 14008acc0 1440->1444 1442 140045ca0-140045ca6 1441->1442 1445 140045ca8-140045cb0 IsWindow 1442->1445 1446 140045cbb-140045cc3 1442->1446 1447 140045c41-140045c45 1443->1447 1448 140045c60-140045c6a DestroyMenu 1443->1448 1455 140045c85-140045c8c 1444->1455 1456 140045c7f DeleteObject 1444->1456 1445->1446 1450 140045cb2-140045cb5 DestroyWindow 1445->1450 1446->1442 1451 140045cc5-140045ccc 1446->1451 1452 140045c57-140045c5e 1447->1452 1453 140045c47-140045c51 RemoveMenu 1447->1453 1448->1444 1450->1446 1457 140045d06-140045d31 DeleteCriticalSection OleUninitialize 1451->1457 1458 140045cce-140045cef mciSendStringW 1451->1458 1452->1447 1452->1448 1453->1452 1455->1440 1455->1441 1456->1455 1460 140045d33-140045d3c 1457->1460 1461 140045d59-140045d6a 1457->1461 1458->1457 1459 140045cf1-140045d00 mciSendStringW 1458->1459 1459->1457 1460->1461 1464 140045d3e-140045d45 1460->1464 1462 140045d92-140045da3 1461->1462 1463 140045d6c-140045d75 1461->1463 1466 140045da5-140045dae 1462->1466 1467 140045dcc-140045de9 1462->1467 1463->1462 1465 140045d77-140045d7e 1463->1465 1468 140045d47 call 1400c03a0 1464->1468 1469 140045d4c-140045d54 call 1400b9b7c 1464->1469 1471 140045d85-140045d8d call 1400b9b7c 1465->1471 1472 140045d80 call 1400c03a0 1465->1472 1466->1467 1473 140045db0-140045db7 1466->1473 1468->1469 1469->1461 1471->1462 1472->1471 1477 140045dbe-140045dcb call 1400b9b7c 1473->1477 1478 140045db9 call 1400c03a0 1473->1478 1477->1467 1478->1477
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Destroy$DeleteMenu$IconObjectRemoveWindow$SendString$ClipboardCriticalFormatHookInfoItemListenerNotifySectionShell_UnhookUninitializeUnregisterWindows
                    • String ID: close AHK_PlayMe$status AHK_PlayMe mode
                    • API String ID: 1504401695-1474590089
                    • Opcode ID: 03d74eb78b3e7f3522c10f87242200a8b1b4fe20afee92979267be5ddf5f4508
                    • Instruction ID: 89fb53ecffa7ac3b92ee77e636b00497143523e32b7a7474fa0bb93b66461368
                    • Opcode Fuzzy Hash: 03d74eb78b3e7f3522c10f87242200a8b1b4fe20afee92979267be5ddf5f4508
                    • Instruction Fuzzy Hash: 6AA17C71301A8086EB66AF23E8847E923A1FB4CFC5F098129EB4A57776DF38C841C754
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1581 140047fe4-140048027 call 1400d99e0 1585 1400484f3 1581->1585 1586 14004802d-140048032 1581->1586 1587 1400484f5-14004850f 1585->1587 1586->1585 1588 140048038-140048052 1586->1588 1590 140048054-140048067 call 140010ac0 1588->1590 1591 14004806c-14004806e 1588->1591 1590->1587 1593 140048081 1591->1593 1594 140048070-140048078 1591->1594 1595 140048086-14004809f call 1400c03bc 1593->1595 1594->1595 1597 14004807a-14004807f 1594->1597 1600 1400480a1-1400480b7 call 140010ac0 1595->1600 1601 1400480bc-1400480ec 1595->1601 1597->1595 1600->1587 1606 140048106-14004814b call 1400ced64 CharUpperW 1601->1606 1607 1400480ee-1400480fb 1601->1607 1618 140048197-1400481a1 1606->1618 1619 14004814d-140048155 1606->1619 1608 1400481a5-1400481c8 1607->1608 1610 1400482ce-1400482ec call 1400b9b84 call 140007d04 1608->1610 1611 1400481ce-1400481d8 1608->1611 1626 1400482ef-1400482f5 1610->1626 1611->1610 1614 1400481de-1400481f0 FindResourceW 1611->1614 1614->1610 1617 1400481f6-140048204 LoadResource 1614->1617 1623 1400482c2-1400482cc 1617->1623 1624 14004820a-14004821b LockResource 1617->1624 1618->1608 1620 140048157 1619->1620 1621 140048194 1619->1621 1625 140048160-140048186 CompareStringOrdinal 1620->1625 1621->1618 1623->1626 1624->1623 1628 140048221-14004827e SizeofResource call 1400b9b84 1624->1628 1629 1400484a3-1400484a8 1625->1629 1630 14004818c-140048192 1625->1630 1631 14004849a-1400484a1 1626->1631 1632 1400482fb-140048312 call 140099700 1626->1632 1639 140048295-1400482c0 1628->1639 1640 140048280-14004828f GetCPInfo 1628->1640 1629->1587 1630->1621 1630->1625 1631->1629 1634 1400484aa-1400484f1 call 14009c780 call 140010ac0 1631->1634 1632->1631 1642 140048318-14004832c 1632->1642 1634->1587 1639->1626 1640->1639 1643 140048291 1640->1643 1645 14004839d 1642->1645 1646 14004832e-140048334 1642->1646 1643->1639 1648 1400483a0-1400483a8 1645->1648 1649 140048336-14004833b 1646->1649 1650 14004838d-14004839b 1646->1650 1651 140048413-14004842f call 1400bb7fc 1648->1651 1652 1400483aa-1400483bc FindResourceW 1648->1652 1653 140048340-140048348 1649->1653 1650->1648 1665 140048431-140048442 1651->1665 1666 140048493-140048498 1651->1666 1655 1400483be-1400483d5 call 140048520 1652->1655 1656 1400483db-1400483e5 1652->1656 1653->1653 1657 14004834a-14004835d call 140098fd0 1653->1657 1655->1585 1655->1656 1660 1400483e7-1400483f7 call 140048520 1656->1660 1661 1400483fd-140048404 call 1400634b0 1656->1661 1669 140048363-140048366 1657->1669 1670 140048510-140048515 call 1400111d0 1657->1670 1660->1585 1660->1661 1671 140048409-14004840e 1661->1671 1672 140048472-14004847d SetCurrentDirectoryW 1665->1672 1673 140048444-14004844d 1665->1673 1666->1587 1675 140048378-14004838b 1669->1675 1676 140048368-140048373 call 1400bb960 1669->1676 1671->1587 1679 14004847f-140048486 1672->1679 1680 140048490 1672->1680 1673->1672 1677 14004844f-140048455 1673->1677 1675->1648 1676->1675 1677->1672 1682 140048457-14004846c 1677->1682 1679->1680 1684 140048488-14004848b call 140063520 1679->1684 1680->1666 1682->1672 1684->1680
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID:
                    • String ID: #Include$%s file "%s" cannot be opened.$*#2$Out of memory.$Script$Too many includes.
                    • API String ID: 0-3189951223
                    • Opcode ID: 25f58abcf70877d0393e6d7fe61fabe6833a0ce33ad76f4ee644de108c0889b3
                    • Instruction ID: 071d7d19930db8cf6a1b97dbbb6062903cf83215d0a502699230673e9709ca69
                    • Opcode Fuzzy Hash: 25f58abcf70877d0393e6d7fe61fabe6833a0ce33ad76f4ee644de108c0889b3
                    • Instruction Fuzzy Hash: 6EE1CD71201B8186EB729F12E9547ED63A4FB4CBC4F46483AEF4A07AB5EB78C545C704
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CharKeyboardLayoutUpper
                    • String ID: & $!#^+$!GetKeyState("%s")&&$%s up$%s%s%s$%s(-1),$%s(-1),Send("{Blind}{%s Up}")$Pause$Send("{Blind%s}%s%s{%s DownR}")$SetKeyDelay$SetMouseDelay${RCtrl up}
                    • API String ID: 1521781519-2990349010
                    • Opcode ID: a505fd65d52362747c50e748234c228e89114a8adeb066afcacdbe131fd8502e
                    • Instruction ID: bc3f60fe87f896683faf5c12d9819453134d8fd18d66f112445d21b02f982599
                    • Opcode Fuzzy Hash: a505fd65d52362747c50e748234c228e89114a8adeb066afcacdbe131fd8502e
                    • Instruction Fuzzy Hash: 57F1BD72604A9185EB62DB62E4503EE77A1FB497C8F850536FF4A07AB9DB38C505C308
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4194 14009d920-14009d953 4195 14009d959-14009d962 4194->4195 4196 14009db36 4194->4196 4197 14009d9a0-14009d9b4 call 1400cc8e4 4195->4197 4198 14009d964-14009d968 4195->4198 4199 14009db38-14009db58 4196->4199 4197->4196 4205 14009d9ba-14009d9ce call 1400bb8a8 4197->4205 4198->4197 4200 14009d96a-14009d99e 4198->4200 4202 14009da0d-14009da24 call 1400bb8a8 4200->4202 4208 14009da2a 4202->4208 4209 14009dac9-14009dacd 4202->4209 4211 14009d9d0-14009d9e2 call 1400bb8a8 4205->4211 4212 14009d9e8-14009d9f8 4205->4212 4215 14009da30-14009da49 FindFirstFileW 4208->4215 4213 14009dacf-14009dae0 FindFirstFileW 4209->4213 4214 14009db25-14009db34 4209->4214 4211->4212 4224 14009d9e4 4211->4224 4212->4196 4217 14009d9fe-14009da08 call 1400bb960 4212->4217 4213->4196 4218 14009dae2-14009daeb FindClose 4213->4218 4214->4199 4215->4196 4219 14009da4f-14009da5d FindClose 4215->4219 4217->4202 4222 14009daf0-14009dafa 4218->4222 4223 14009da60-14009da69 4219->4223 4222->4222 4225 14009dafc-14009db07 4222->4225 4223->4223 4226 14009da6b-14009da7a 4223->4226 4224->4212 4225->4196 4227 14009db09-14009db22 call 1400bb960 4225->4227 4226->4196 4228 14009da80-14009dabb call 1400bb960 call 1400bb8a8 4226->4228 4227->4214 4228->4215 4235 14009dac1 4228->4235 4235->4209
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID: \$\
                    • API String ID: 2295610775-164819647
                    • Opcode ID: e73b8370de9c52d677202e87a8e53b8dff247f877d796e0f2042b67aaafdd296
                    • Instruction ID: 3da68db80bccb2b57e221103536c07f3acd12d97c06b99c414afd54245188084
                    • Opcode Fuzzy Hash: e73b8370de9c52d677202e87a8e53b8dff247f877d796e0f2042b67aaafdd296
                    • Instruction Fuzzy Hash: 06519E32715A94D6EB16DF12E4093DA73A5FB48BC4F85C122EB49537A4EF78C64AC340
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1482 140004b30-140004b3d 1483 140004b8c 1482->1483 1484 140004b3f-140004b42 1482->1484 1485 140004b93-140004c71 call 140094730 call 140004e40 1483->1485 1484->1483 1486 140004b44-140004b4b 1484->1486 1495 140004c77-140004c84 call 1400478b0 1485->1495 1496 140004e1c 1485->1496 1488 140004b50-140004b57 1486->1488 1488->1488 1490 140004b59-140004b6c call 140098fd0 1488->1490 1497 140004b72-140004b75 1490->1497 1498 140004e34-140004e63 call 1400111d0 FindResourceW 1490->1498 1495->1496 1508 140004c8a-140004c8c 1495->1508 1503 140004e21-140004e33 1496->1503 1501 140004b85-140004b8a 1497->1501 1502 140004b77-140004b80 call 1400bb960 1497->1502 1509 140004e65-140004e6c 1498->1509 1510 140004e6f-140004e8d call 1400c05d4 1498->1510 1501->1485 1502->1501 1511 140004c92-140004c98 1508->1511 1512 140004e18-140004e1a 1508->1512 1509->1510 1522 1400050e2-14000512e call 140054320 1510->1522 1523 140004e93 1510->1523 1514 140004c9a-140004ca3 1511->1514 1515 140004d0e 1511->1515 1512->1503 1518 140004ca5-140004cac 1514->1518 1519 140004d1d-140004d37 FindWindowW 1514->1519 1516 140004d15-140004d17 1515->1516 1516->1519 1520 140004dbf-140004dcd call 1400462b0 1516->1520 1518->1516 1524 140004cae-140004cc8 FindWindowW 1518->1524 1519->1520 1521 140004d3d 1519->1521 1520->1496 1538 140004dcf-140004dd8 1520->1538 1526 140004d42-140004d6d PostMessageW Sleep IsWindow 1521->1526 1536 14000517e-1400051a0 call 1400c05d4 call 1400c05dc call 14008eb80 1522->1536 1537 140005130-140005134 1522->1537 1527 140004e97-1400050d5 call 1400c05dc call 1400c0224 call 1400c05d4 1523->1527 1524->1515 1528 140004cca-140004cd3 1524->1528 1531 140004db4-140004db9 Sleep 1526->1531 1532 140004d6f 1526->1532 1576 1400050db 1527->1576 1528->1512 1534 140004cd9-140004cdc 1528->1534 1531->1520 1539 140004d70-140004d73 1532->1539 1541 140004d07-140004d0c 1534->1541 1542 140004cde-140004d01 call 1400a3410 1534->1542 1545 1400051be 1536->1545 1575 1400051a2-1400051b7 call 1400a0ef0 call 140045df0 1536->1575 1544 14000513a-14000517c call 140054ba0 1537->1544 1537->1545 1546 140004e0a-140004e11 call 1400051e0 1538->1546 1547 140004dda-140004df0 call 1400c03b4 1538->1547 1549 140004d75-140004d92 call 1400a3410 1539->1549 1550 140004d9a-140004db2 Sleep IsWindow 1539->1550 1541->1526 1542->1512 1542->1541 1544->1536 1544->1545 1559 1400051c0-1400051da 1545->1559 1563 140004e16 1546->1563 1547->1546 1566 140004df2-140004e05 call 1400bc660 1547->1566 1549->1496 1568 140004d98 1549->1568 1550->1531 1550->1539 1563->1503 1566->1546 1568->1550 1580 1400051bc 1575->1580 1576->1522 1580->1559
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$FindSleep$MessagePostResource
                    • String ID: *#1$/restart$A_Args$An older instance of this script is already running. Replace it with this instance?Note: To avoid this message, see #SingleInsta$AutoHotkey$Could not close the previous instance of this script. Keep waiting?$d
                    • API String ID: 4027887910-2453278139
                    • Opcode ID: 7643cd0efcfef7604e2082d1e8aadb2e995d0cd05a43aa146ba4a6acac645d38
                    • Instruction ID: 54ed6987dece338f4776e2d73625c44d2a38d9c5d190a044efed92027d1a3ece
                    • Opcode Fuzzy Hash: 7643cd0efcfef7604e2082d1e8aadb2e995d0cd05a43aa146ba4a6acac645d38
                    • Instruction Fuzzy Hash: 5DC169B1204B8586FB12DF16E8543EA77A1FB88BC4F458229EB49477B6EF78C445CB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2590 140060e70-140060e9d 2591 140060ec4-140060ed2 2590->2591 2592 140060e9f-140060ebe RegisterWindowMessageW 2590->2592 2593 140060ed4-140060ed7 2591->2593 2594 140060edf-140060ee6 2591->2594 2592->2591 2593->2594 2595 140060ed9-140060edd 2593->2595 2596 140060ee8-140060f08 call 1400043e0 2594->2596 2597 140060f21-140060f47 2594->2597 2595->2597 2608 140060f13-140060f1a 2596->2608 2609 140060f0a-140060f0e 2596->2609 2599 140061255-14006125e 2597->2599 2600 140060f4d 2597->2600 2602 140061264-14006127c 2599->2602 2603 1400611ca-1400611d0 2599->2603 2604 140060f53-140060f56 2600->2604 2605 140061229-140061230 2600->2605 2619 1400613d3-1400613ea PostMessageW 2602->2619 2606 1400611d2-1400611d9 2603->2606 2607 1400611f0-1400611f4 2603->2607 2612 1400610d8-1400610de 2604->2612 2613 140060f5c 2604->2613 2610 140061236-140061250 PostMessageW 2605->2610 2611 140061120-140061122 2605->2611 2606->2607 2614 1400611db-1400611e9 call 140046830 2606->2614 2615 14006184a 2607->2615 2616 1400611fa-140061218 RegisterWindowMessageW 2607->2616 2608->2597 2618 14006192a-140061941 2609->2618 2617 14006191a-140061922 2610->2617 2611->2617 2620 1400611b6-1400611bc 2612->2620 2621 1400610e4 2612->2621 2622 140061083-14006108a 2613->2622 2623 140060f62-140060f68 2613->2623 2614->2607 2628 140061850-140061852 2615->2628 2616->2628 2617->2618 2619->2611 2629 1400613f0-1400613f7 2619->2629 2632 14006121d-140061224 2620->2632 2633 1400611be-1400611c4 2620->2633 2630 140061171-1400611a1 GetMenu CheckMenuItem 2621->2630 2631 1400610ea-1400610f1 2621->2631 2626 140061090-140061094 2622->2626 2627 140061909-140061914 DefWindowProcW 2622->2627 2623->2603 2624 140060f6e-140060f86 2623->2624 2624->2622 2626->2627 2635 14006109a-1400610a1 2626->2635 2627->2617 2628->2627 2636 140061858-140061860 2628->2636 2629->2611 2638 1400613fd-140061404 2629->2638 2630->2627 2637 1400611a7-1400611b1 2630->2637 2639 1400610f3-1400610f6 2631->2639 2640 140061159-14006116a call 140061ce0 2631->2640 2632->2627 2633->2603 2633->2619 2635->2627 2645 1400610a7-1400610ae 2635->2645 2636->2627 2647 140061866-1400618a2 2636->2647 2637->2627 2641 140061113-140061118 2638->2641 2642 14006140a-140061415 2638->2642 2643 140061127-140061134 2639->2643 2644 1400610f8-1400610fb 2639->2644 2640->2611 2663 14006116c 2640->2663 2641->2611 2650 14006111b call 1400016f0 2641->2650 2642->2641 2648 14006141b-14006141f 2642->2648 2643->2627 2651 14006113a-140061144 2643->2651 2644->2603 2649 140061101-140061104 2644->2649 2645->2611 2652 1400610b0-1400610be call 140047090 2645->2652 2654 1400618a4-1400618b0 inet_ntoa 2647->2654 2655 1400618ce-1400618d1 2647->2655 2658 140061453-140061457 2648->2658 2659 140061421-140061434 GetTickCount 2648->2659 2649->2627 2660 14006110a-140061111 2649->2660 2650->2611 2651->2627 2661 14006114a-140061154 ShowWindow 2651->2661 2652->2611 2673 1400610c0-1400610d3 call 1400474b0 2652->2673 2654->2655 2664 1400618b2-1400618b9 2654->2664 2656 1400618e5-1400618f4 call 14000ca44 2655->2656 2657 1400618d3-1400618e0 call 1400c59a8 2655->2657 2656->2627 2674 1400618f6-1400618fd 2656->2674 2657->2656 2658->2611 2668 14006145d 2658->2668 2659->2658 2667 140061436-14006143a 2659->2667 2660->2611 2660->2641 2661->2617 2663->2627 2670 1400618c0-1400618cc 2664->2670 2667->2658 2672 14006143c-140061447 2667->2672 2668->2641 2670->2655 2670->2670 2672->2658 2675 140061449 2672->2675 2673->2617 2674->2627 2677 140061904 call 140008b94 2674->2677 2675->2658 2677->2627
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageRegisterWindow
                    • String ID: 9000$AHK_ATTACH_DEBUGGER$D$TaskbarCreated
                    • API String ID: 1814269913-853869076
                    • Opcode ID: a624705b9db8bf2b896bd8577e0d78edfdd48db9fd4b730aeae411b211e85d5b
                    • Instruction ID: 4ebc5bbcfbca28030c3ab52e73f59fd0d4c871012c7746474e1565f3772997f6
                    • Opcode Fuzzy Hash: a624705b9db8bf2b896bd8577e0d78edfdd48db9fd4b730aeae411b211e85d5b
                    • Instruction Fuzzy Hash: 59C1C37260028086FB63CB27AC503E937A3B78DBD4F68492AEB4D576B1DB38C495D710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2679 14009e980-14009e9af 2680 14009e9c2 2679->2680 2681 14009e9b1-14009e9c0 LoadLibraryExW 2679->2681 2682 14009e9c9-14009e9cc 2680->2682 2681->2682 2683 14009e9d2-14009e9e4 2682->2683 2684 14009eba8-14009ebab 2682->2684 2685 14009e9f2-14009ea25 EnumResourceNamesW 2683->2685 2686 14009e9e6-14009e9f0 2683->2686 2687 14009ebad-14009ebb1 2684->2687 2688 14009ebb3-14009ebb7 2684->2688 2689 14009ea2a-14009ea2d 2685->2689 2686->2689 2690 14009ebbb-14009ebc3 ExtractIconW 2687->2690 2688->2690 2691 14009eb73-14009eb86 2689->2691 2692 14009ea33-14009ea45 FindResourceW 2689->2692 2693 14009ebc9-14009ebe1 2690->2693 2695 14009eb95-14009eb98 2691->2695 2696 14009eb88-14009eb8b 2691->2696 2692->2691 2694 14009ea4b-14009ea5a LoadResource 2692->2694 2694->2691 2697 14009ea60-14009ea6f LockResource 2694->2697 2699 14009eb9a-14009eb9d FreeLibrary 2695->2699 2700 14009eba3-14009eba6 2695->2700 2696->2695 2698 14009eb8d 2696->2698 2701 14009eb6b 2697->2701 2702 14009ea75-14009ea7f 2697->2702 2703 14009eb90-14009eb93 2698->2703 2699->2700 2700->2684 2700->2703 2701->2691 2704 14009ea8c-14009eaa0 2702->2704 2705 14009ea81-14009ea8a GetSystemMetrics 2702->2705 2703->2693 2704->2701 2706 14009eaa6-14009eaac 2704->2706 2705->2704 2707 14009eab1-14009eac3 2706->2707 2708 14009eacd 2707->2708 2709 14009eac5-14009eacb 2707->2709 2711 14009eacf-14009ead4 2708->2711 2712 14009ead6-14009ead9 2708->2712 2710 14009eadc-14009eade 2709->2710 2713 14009eae9-14009eaf5 2710->2713 2714 14009eae0-14009eae6 2710->2714 2711->2710 2712->2710 2713->2707 2715 14009eaf7-14009eafa 2713->2715 2714->2713 2715->2701 2716 14009eafc-14009eb15 FindResourceW 2715->2716 2716->2701 2717 14009eb17-14009eb26 LoadResource 2716->2717 2717->2701 2718 14009eb28-14009eb37 LockResource 2717->2718 2718->2701 2719 14009eb39-14009eb68 SizeofResource CreateIconFromResourceEx 2718->2719 2719->2701
                    APIs
                    • LoadLibraryExW.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009E9B7
                    • EnumResourceNamesW.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EA1F
                    • FindResourceW.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EA3C
                    • LoadResource.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EA51
                    • LockResource.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EA63
                    • GetSystemMetrics.USER32 ref: 000000014009EA84
                    • FindResourceW.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EB09
                    • LoadResource.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EB1D
                    • LockResource.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EB2B
                    • SizeofResource.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EB3F
                    • CreateIconFromResourceEx.USER32 ref: 000000014009EB62
                    • FreeLibrary.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,0000000140046339), ref: 000000014009EB9D
                    • ExtractIconW.SHELL32 ref: 000000014009EBC3
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Resource$Load$FindIconLibraryLock$CreateEnumExtractFreeFromMetricsNamesSizeofSystem
                    • String ID:
                    • API String ID: 766211583-0
                    • Opcode ID: 634d3ad30fd8c1ba5778364d75b1d6f66767c1cd8bef2732322fd43d425cc5ba
                    • Instruction ID: b0e8d27c0cec4f20f709b46babda9b7ccb174eb451a15dd575d6ff077e1abdb3
                    • Opcode Fuzzy Hash: 634d3ad30fd8c1ba5778364d75b1d6f66767c1cd8bef2732322fd43d425cc5ba
                    • Instruction Fuzzy Hash: D351AC71306A9085EB669F17A5903BB63A1BB4CFD0F588029FF4B57BA4DB3CD8469700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID: I$I$Out of memory.$Parameter #2 invalid.$String
                    • API String ID: 4145102785-4155359328
                    • Opcode ID: e426187927252d3bfd61b6de8c15d4f607ed7e4c3f068af3a79941f98d5d4e7c
                    • Instruction ID: 8715b352e98104ab6c45b0e643c6807df1a6a02983556ad471a07c49402b7772
                    • Opcode Fuzzy Hash: e426187927252d3bfd61b6de8c15d4f607ed7e4c3f068af3a79941f98d5d4e7c
                    • Instruction Fuzzy Hash: 2D228872601B80CAFB62CF66E8547EE37A5F749BC8F544125EB4A47AB5DB3AD480C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Directory$AttributesCurrentFile
                    • String ID: %s%s$An internal function call failed.$Line$Script file not found.$Unknown class.
                    • API String ID: 3162783167-1827641252
                    • Opcode ID: 715239dba67184b5a1cb22597ef0554ffa9bedbfe9708fe999cda1de76f3e97b
                    • Instruction ID: 582ea48f4903573bb8d5fc8dcea2a987374cf8de2f7c4cc262f6635a70a36d1b
                    • Opcode Fuzzy Hash: 715239dba67184b5a1cb22597ef0554ffa9bedbfe9708fe999cda1de76f3e97b
                    • Instruction Fuzzy Hash: 5AA14DB1210A4581FB63DB17E890BEA33A1F78CBC0F95512AEB8D536B5DB38C945C744
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3998 140045df0-140045e4f call 1400d99e0 GetModuleFileNameW 4001 140045e55-140045e5b 3998->4001 4002 140045f6a-140045f6d 3998->4002 4005 140045e61-140045e6d call 14009db60 4001->4005 4006 1400460c2-1400460c4 4001->4006 4003 140045f6f-140045f81 call 1400bb7fc 4002->4003 4004 140045fdb-140045fe1 4002->4004 4003->4006 4021 140045f87-140045f9a call 1400bb7fc 4003->4021 4010 140045fe7-140045fee 4004->4010 4011 140046071-140046080 4004->4011 4015 140045e72-140045e7f 4005->4015 4007 140046287-1400462a1 4006->4007 4012 140046005-14004600c 4010->4012 4013 140045ff0-140046003 4010->4013 4016 140046018-14004601e 4011->4016 4017 140046082-1400460aa GetFullPathNameW 4011->4017 4018 140046011 4012->4018 4013->4018 4022 140045ed1 4015->4022 4023 140045e81-140045e84 4015->4023 4019 140046024-14004602c 4016->4019 4020 1400460c9 4016->4020 4017->4006 4024 1400460ac-1400460b8 call 14009db60 4017->4024 4018->4016 4027 140046030-140046038 4019->4027 4026 1400460cc-1400460e8 call 1400bb7fc 4020->4026 4021->4006 4042 140045fa0-140045fb9 4021->4042 4028 140045ed4-140045ef0 call 1400bb7fc 4022->4028 4030 140045e86-140045e8e 4023->4030 4031 140045e9a-140045ead call 140098fd0 4023->4031 4032 1400460bd 4024->4032 4046 1400460ee-140046102 4026->4046 4047 14004619a-1400461a6 4026->4047 4027->4027 4034 14004603a-14004604d call 140098fd0 4027->4034 4049 140045f68 4028->4049 4050 140045ef2-140045f03 4028->4050 4037 140045e90-140045e98 4030->4037 4044 1400462a2-1400462a7 call 1400111d0 4031->4044 4045 140045eb3-140045eb6 4031->4045 4032->4016 4034->4044 4057 140046053-140046056 4034->4057 4037->4031 4037->4037 4042->4006 4051 140045fbf-140045fd7 4042->4051 4052 140045ec8-140045ecf 4045->4052 4053 140045eb8-140045ec3 call 1400bb960 4045->4053 4055 140046104-140046107 4046->4055 4056 140046159-14004615c 4046->4056 4060 1400461ad-1400461b1 4047->4060 4049->4002 4058 140045f05-140045f08 4050->4058 4059 140045f5a-140045f66 4050->4059 4051->4004 4052->4028 4053->4052 4064 140046109-14004610e 4055->4064 4065 14004611b-14004612e call 140098fd0 4055->4065 4062 14004615e-140046169 4056->4062 4066 140046068-14004606f 4057->4066 4067 140046058-140046063 call 1400bb960 4057->4067 4068 140045f0a-140045f0f 4058->4068 4069 140045f1c-140045f2f call 140098fd0 4058->4069 4059->4002 4070 1400461b3 4060->4070 4071 14004616b 4060->4071 4062->4060 4062->4071 4073 140046111-140046119 4064->4073 4065->4044 4085 140046134-140046137 4065->4085 4066->4026 4067->4066 4075 140045f12-140045f1a 4068->4075 4069->4044 4087 140045f35-140045f38 4069->4087 4077 1400461b6-1400461be 4070->4077 4072 14004616e-14004617f 4071->4072 4079 140046180-14004618d 4072->4079 4073->4065 4073->4073 4075->4069 4075->4075 4077->4077 4081 1400461c0-1400461d3 call 140098fd0 4077->4081 4083 1400461ff-140046226 call 14009c820 4079->4083 4084 14004618f-140046193 4079->4084 4081->4044 4096 1400461d9-1400461dc 4081->4096 4098 14004622b-140046231 4083->4098 4084->4079 4091 140046195 4084->4091 4092 140046149-140046157 4085->4092 4093 140046139-140046144 call 1400bb960 4085->4093 4088 140045f4a-140045f58 4087->4088 4089 140045f3a-140045f45 call 1400bb960 4087->4089 4088->4002 4089->4088 4091->4098 4092->4062 4093->4092 4099 1400461de-1400461e7 call 1400bb960 4096->4099 4100 1400461ec-1400461fa 4096->4100 4101 140046233-140046238 4098->4101 4102 14004627b-140046282 4098->4102 4099->4100 4100->4072 4104 140046240-140046248 4101->4104 4102->4007 4104->4104 4105 14004624a-14004625d call 140098fd0 4104->4105 4105->4044 4108 14004625f-140046262 4105->4108 4109 140046274-140046276 4108->4109 4110 140046264-14004626f call 1400bb960 4108->4110 4109->4102 4110->4109
                    APIs
                    • GetModuleFileNameW.KERNEL32(?,?,?,?,00000001,00000000,00000000,00000001400051BC), ref: 0000000140045E2D
                    • GetFullPathNameW.KERNEL32(?,?,?,00000001,00000000,00000000,00000001400051BC), ref: 0000000140046092
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Name$FileFullModulePath
                    • String ID: - %s$*$*#1$AutoHotkey v2.0.12
                    • API String ID: 1235081036-368449842
                    • Opcode ID: a204423d456522bf93164e03dbb0014e4869b66389150ebb5a93ec5773f5ef86
                    • Instruction ID: 4f52891cb8d1d47bd48faf49c9de3c251a2371810bcd9dd52d5b8a51af36ce25
                    • Opcode Fuzzy Hash: a204423d456522bf93164e03dbb0014e4869b66389150ebb5a93ec5773f5ef86
                    • Instruction Fuzzy Hash: 39C19E32201B8595EE66DF22D0543EA63A0FB4C7C4F4A4135AB4D477E5FBB8C549CB05
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4112 14005a3c0-14005a3c4 4113 14005a3c6-14005a3ca 4112->4113 4114 14005a3eb-14005a3f7 4112->4114 4115 14005a403-14005a40d 4113->4115 4116 14005a3cc-14005a3e5 call 1400453a0 4113->4116 4117 14005a40f-14005a41e call 140027730 4114->4117 4118 14005a3f9-14005a401 4114->4118 4119 14005a424-14005a435 4115->4119 4116->4114 4128 14005b484-14005b4a7 4116->4128 4117->4119 4126 14005b4ff-14005b51b 4117->4126 4118->4119 4123 14005a437-14005a43f 4119->4123 4124 14005a441 4119->4124 4127 14005a444-14005a471 4123->4127 4124->4127 4129 14005b51d-14005b532 call 14000f880 4126->4129 4130 14005b53a-14005b541 4126->4130 4131 14005a473 4127->4131 4132 14005a47a-14005a485 4127->4132 4128->4130 4133 14005b4ad-14005b4c5 call 14000f880 4128->4133 4129->4130 4135 14005b543-14005b558 call 14000f730 4130->4135 4136 14005b4ca-14005b4e5 call 140010880 4130->4136 4131->4132 4137 14005a928-14005a953 4132->4137 4138 14005a48b-14005a49b 4132->4138 4147 14005a35e-14005a379 4133->4147 4144 14005a959-14005a960 4137->4144 4145 14005b46c-14005b46f 4137->4145 4138->4137 4144->4145 4149 14005a966-14005a96e 4144->4149 4145->4147 4151 14005a986-14005a98b 4149->4151 4152 14005a970-14005a978 4149->4152 4153 14005a9a2-14005a9a9 4151->4153 4154 14005a98d-14005a991 4151->4154 4155 14005a97e-14005a981 4152->4155 4156 14005b4ea-14005b4fa 4152->4156 4160 14005a9af-14005a9b2 4153->4160 4161 14005a359 4153->4161 4158 14005a993-14005a998 4154->4158 4159 14005a99d 4154->4159 4157 14005b44c 4155->4157 4156->4147 4162 14005b44f-14005b452 4157->4162 4158->4157 4159->4153 4160->4157 4161->4147 4162->4161 4163 14005b458-14005b45f GetTickCount 4162->4163 4166 14005a0a4-14005a0c0 PeekMessageW 4163->4166 4167 14005a0db-14005a0df 4163->4167 4168 14005a0c2-14005a0ca call 1400016f0 4166->4168 4169 14005a0cf-14005a0d5 GetTickCount 4166->4169 4170 14005a0e1-14005a0e8 4167->4170 4171 14005a10b-14005a10f 4167->4171 4168->4169 4169->4167 4170->4171 4175 14005a0ea-14005a0f6 4170->4175 4172 14005a126-14005a134 4171->4172 4173 14005a111-14005a124 call 1400016f0 4171->4173 4177 14005a136-14005a167 GetTickCount 4172->4177 4178 14005a170-14005a178 4172->4178 4173->4172 4175->4171 4179 14005a0f8-14005a0fb 4175->4179 4177->4178 4181 14005a169 4177->4181 4182 14005a17a-14005a17f 4178->4182 4183 14005a189-14005a191 4178->4183 4179->4171 4184 14005a0fd-14005a101 4179->4184 4181->4178 4182->4183 4185 14005a181-14005a184 call 140008964 4182->4185 4186 14005a193-14005a198 4183->4186 4187 14005a1bf-14005a1ca 4183->4187 4184->4171 4185->4183 4186->4187 4190 14005a19a-14005a19f 4186->4190 4187->4162 4188 14005a1d0-14005a1e0 4187->4188 4188->4161 4190->4187 4191 14005a1a1-14005a1b9 call 1400764f0 4190->4191 4191->4147 4191->4187
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID:
                    • String ID: Parameter #1 invalid.$Parameter #2 invalid.
                    • API String ID: 0-2124710225
                    • Opcode ID: 376a78caf84d60c395970f09a97ef638a053951778157a3949332e4e22426cfe
                    • Instruction ID: 2fcb691cda60fa59801dae51d187950b3ba595484a27f103a646e3e8fee40ccd
                    • Opcode Fuzzy Hash: 376a78caf84d60c395970f09a97ef638a053951778157a3949332e4e22426cfe
                    • Instruction Fuzzy Hash: 63C1CA72605A84CAF762CF2AE8447EA37A4F74DBC8F544119FB49476B5DB3AC881C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4452 14005a9b7-14005a9cb 4453 14005aa23-14005aa2a 4452->4453 4454 14005a9cd-14005a9dc 4452->4454 4455 14005aa37-14005aa43 4453->4455 4456 14005aa2c-14005aa34 4453->4456 4454->4455 4457 14005a9de-14005a9e4 4454->4457 4458 14005aa45 4455->4458 4459 14005aa79-14005aa93 call 14005a010 4455->4459 4456->4455 4457->4455 4460 14005a9e6-14005a9f0 call 14009f9a0 4457->4460 4461 14005aa50-14005aa75 call 14005a010 4458->4461 4469 14005aa96-14005aaa9 4459->4469 4460->4455 4468 14005a9f2-14005a9f6 4460->4468 4470 14005aa77 4461->4470 4471 14005a9f8-14005a9fb 4468->4471 4472 14005aa01-14005aa08 4468->4472 4473 14005aaef-14005ab04 4469->4473 4474 14005aaab-14005aaae 4469->4474 4470->4469 4471->4472 4477 14005aa0f-14005aa14 4472->4477 4478 14005aa0a call 1400c03a0 4472->4478 4475 14005ab0a-14005ab0c 4473->4475 4476 14005ac1c-14005ac1e 4473->4476 4479 14005aac0-14005aac4 4474->4479 4480 14005aab0-14005aab5 4474->4480 4485 14005ab12-14005ab19 4475->4485 4486 14005ab8e-14005ab95 4475->4486 4481 14005ac2d-14005ac2f 4476->4481 4482 14005ac20-14005ac2b 4476->4482 4488 14005aa1c-14005aa1e 4477->4488 4489 14005aa17 call 1400b9b7c 4477->4489 4478->4477 4483 14005aac6-14005aac9 4479->4483 4484 14005aacf-14005aad6 4479->4484 4480->4479 4490 14005aab7-14005aabe 4480->4490 4491 14005ac31-14005ac38 4481->4491 4492 14005ac3b-14005ac3d 4481->4492 4482->4481 4482->4482 4483->4484 4494 14005aad8 call 1400c03a0 4484->4494 4495 14005aadd-14005aaea call 1400b9b7c 4484->4495 4498 14005ab81-14005ab8a 4485->4498 4499 14005ab1b-14005ab22 4485->4499 4496 14005ab97-14005ab99 4486->4496 4497 14005abf1-14005abf6 4486->4497 4493 14005b44f-14005b452 4488->4493 4489->4488 4490->4473 4491->4492 4500 14005ac43-14005ac47 4492->4500 4501 14005aced-14005acf2 4492->4501 4503 14005b458-14005b45f GetTickCount 4493->4503 4504 14005a359 4493->4504 4494->4495 4495->4473 4496->4497 4509 14005ab9b-14005abac call 1400971f0 4496->4509 4507 14005ac15-14005ac1a 4497->4507 4508 14005abf8-14005abff 4497->4508 4498->4485 4506 14005ab8c 4498->4506 4510 14005ab24-14005ab29 4499->4510 4511 14005ab6a-14005ab7b call 1400971f0 4499->4511 4514 14005ac52-14005ac94 call 14005a010 4500->4514 4515 14005ac49-14005ac4c 4500->4515 4512 14005acf4-14005acf7 4501->4512 4513 14005ad03-14005ad0a 4501->4513 4537 14005a0a4-14005a0c0 PeekMessageW 4503->4537 4538 14005a0db-14005a0df 4503->4538 4516 14005a35e-14005a379 4504->4516 4520 14005abec 4506->4520 4507->4481 4508->4492 4521 14005ac01-14005ac05 4508->4521 4509->4520 4542 14005abae-14005abb6 4509->4542 4510->4511 4523 14005ab2b-14005ab31 4510->4523 4511->4498 4527 14005b44c 4511->4527 4512->4513 4524 14005acf9-14005acfd 4512->4524 4525 14005b464-14005b46f 4513->4525 4526 14005ad10-14005ad14 4513->4526 4550 14005ac96-14005aca0 4514->4550 4551 14005acc8-14005accb 4514->4551 4515->4514 4515->4527 4520->4497 4521->4507 4531 14005ac07-14005ac0a 4521->4531 4523->4498 4533 14005ab33-14005ab35 4523->4533 4524->4513 4535 14005b636-14005b64c call 140011be0 4524->4535 4525->4516 4526->4525 4536 14005ad1a-14005ad1d 4526->4536 4527->4493 4531->4507 4541 14005ac0c-14005ac10 4531->4541 4534 14005ab40-14005ab52 call 1400971f0 4533->4534 4569 14005ab58-14005ab61 4534->4569 4570 14005b447 4534->4570 4535->4516 4562 14005b651-14005b659 4535->4562 4536->4527 4547 14005ad23-14005ad2b 4536->4547 4548 14005a0c2-14005a0ca call 1400016f0 4537->4548 4549 14005a0cf-14005a0d5 GetTickCount 4537->4549 4552 14005a0e1-14005a0e8 4538->4552 4553 14005a10b-14005a10f 4538->4553 4541->4527 4543 14005abb8-14005abbb 4542->4543 4544 14005abc1-14005abc8 4542->4544 4543->4544 4559 14005abcf-14005abe8 call 1400b9b7c 4544->4559 4560 14005abca call 1400c03a0 4544->4560 4547->4562 4563 14005ad31-14005ad34 4547->4563 4548->4549 4549->4538 4565 14005aca2-14005acb2 call 1400c03a0 4550->4565 4566 14005acba-14005acc1 4550->4566 4554 14005acd1-14005acd6 4551->4554 4555 14005b560-14005b563 4551->4555 4552->4553 4567 14005a0ea-14005a0f6 4552->4567 4556 14005a126-14005a134 4553->4556 4557 14005a111-14005a124 call 1400016f0 4553->4557 4554->4555 4574 14005acdc-14005acea 4554->4574 4577 14005b565-14005b569 4555->4577 4578 14005b58f-14005b595 4555->4578 4571 14005a136-14005a167 GetTickCount 4556->4571 4572 14005a170-14005a178 4556->4572 4557->4556 4559->4520 4560->4559 4562->4504 4563->4527 4565->4566 4599 14005acb4 4565->4599 4566->4551 4567->4553 4579 14005a0f8-14005a0fb 4567->4579 4569->4534 4581 14005ab63-14005ab68 4569->4581 4570->4527 4571->4572 4582 14005a169 4571->4582 4586 14005a17a-14005a17f 4572->4586 4587 14005a189-14005a191 4572->4587 4574->4501 4589 14005b574-14005b57b 4577->4589 4590 14005b56b-14005b56e 4577->4590 4583 14005b62f-14005b631 4578->4583 4584 14005b59b-14005b5b0 4578->4584 4579->4553 4591 14005a0fd-14005a101 4579->4591 4581->4498 4582->4572 4583->4516 4594 14005b5b2-14005b5d4 call 14000f880 4584->4594 4595 14005b5d9-14005b5e0 4584->4595 4586->4587 4596 14005a181-14005a184 call 140008964 4586->4596 4597 14005a193-14005a198 4587->4597 4598 14005a1bf-14005a1ca 4587->4598 4592 14005b582-14005b58a call 1400b9b7c 4589->4592 4593 14005b57d call 1400c03a0 4589->4593 4590->4589 4591->4553 4592->4578 4593->4592 4594->4516 4605 14005b608-14005b62a call 140010880 4595->4605 4606 14005b5e2-14005b603 call 14000f730 4595->4606 4596->4587 4597->4598 4607 14005a19a-14005a19f 4597->4607 4598->4493 4601 14005a1d0-14005a1e0 4598->4601 4599->4566 4601->4504 4605->4516 4606->4516 4607->4598 4610 14005a1a1-14005a1b9 call 1400764f0 4607->4610 4610->4516 4610->4598
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick
                    • String ID: Jumps cannot exit a FINALLY block.
                    • API String ID: 536389180-672026804
                    • Opcode ID: c78194a834533b78461066faae96fa62f7908b71ee353a7a5455a137114582bd
                    • Instruction ID: 0d371d3b79bcd3a3dc5b8ab90543bd4cfd297cad639536e9cdadb1041485a0a0
                    • Opcode Fuzzy Hash: c78194a834533b78461066faae96fa62f7908b71ee353a7a5455a137114582bd
                    • Instruction Fuzzy Hash: 00127C72202A8486FB62CF26D4507EA37A5F74EBD8F544516FB4A436B6DB3EC885C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4616 14005a88d-14005a8aa call 1400453a0 4619 14005a906-14005a919 GetLastError 4616->4619 4620 14005a8ac-14005a8f9 call 14005ce30 4616->4620 4621 14005a920 4619->4621 4622 14005a91b call 14000f3c0 4619->4622 4625 14005a923-14005a953 4620->4625 4626 14005a8fb-14005a904 RegCloseKey 4620->4626 4621->4625 4622->4621 4628 14005a959-14005a960 4625->4628 4629 14005b46c-14005b46f 4625->4629 4626->4625 4628->4629 4631 14005a966-14005a96e 4628->4631 4630 14005a35e-14005a379 4629->4630 4632 14005a986-14005a98b 4631->4632 4633 14005a970-14005a978 4631->4633 4634 14005a9a2-14005a9a9 4632->4634 4635 14005a98d-14005a991 4632->4635 4636 14005a97e-14005a981 4633->4636 4637 14005b4ea-14005b4fa 4633->4637 4641 14005a9af-14005a9b2 4634->4641 4642 14005a359 4634->4642 4639 14005a993-14005a998 4635->4639 4640 14005a99d 4635->4640 4638 14005b44c 4636->4638 4637->4630 4643 14005b44f-14005b452 4638->4643 4639->4638 4640->4634 4641->4638 4642->4630 4643->4642 4644 14005b458-14005b45f GetTickCount 4643->4644 4647 14005a0a4-14005a0c0 PeekMessageW 4644->4647 4648 14005a0db-14005a0df 4644->4648 4649 14005a0c2-14005a0ca call 1400016f0 4647->4649 4650 14005a0cf-14005a0d5 GetTickCount 4647->4650 4651 14005a0e1-14005a0e8 4648->4651 4652 14005a10b-14005a10f 4648->4652 4649->4650 4650->4648 4651->4652 4656 14005a0ea-14005a0f6 4651->4656 4653 14005a126-14005a134 4652->4653 4654 14005a111-14005a124 call 1400016f0 4652->4654 4658 14005a136-14005a167 GetTickCount 4653->4658 4659 14005a170-14005a178 4653->4659 4654->4653 4656->4652 4660 14005a0f8-14005a0fb 4656->4660 4658->4659 4662 14005a169 4658->4662 4663 14005a17a-14005a17f 4659->4663 4664 14005a189-14005a191 4659->4664 4660->4652 4665 14005a0fd-14005a101 4660->4665 4662->4659 4663->4664 4666 14005a181-14005a184 call 140008964 4663->4666 4667 14005a193-14005a198 4664->4667 4668 14005a1bf-14005a1ca 4664->4668 4665->4652 4666->4664 4667->4668 4671 14005a19a-14005a19f 4667->4671 4668->4643 4669 14005a1d0-14005a1e0 4668->4669 4669->4642 4671->4668 4672 14005a1a1-14005a1b9 call 1400764f0 4671->4672 4672->4630 4672->4668
                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$Close$ErrorInfoLastMessageOpenPeekQuery
                    • String ID:
                    • API String ID: 823228794-0
                    • Opcode ID: 1db6cb14c4c0eb567d22453a9e77b7a2e8c01fc3d298bc53af106039d1c6cfbb
                    • Instruction ID: 4104aa9c911e3267110fe66e900a1257710a51b20f66925b2b230a8bd8739496
                    • Opcode Fuzzy Hash: 1db6cb14c4c0eb567d22453a9e77b7a2e8c01fc3d298bc53af106039d1c6cfbb
                    • Instruction Fuzzy Hash: 67717972601B848AEB62CF26E8547EE37A1F74DBD8F444219EB49477B9DB3AC485C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4675 14005a765-14005a788 call 1400c0224 4678 14005a797-14005a79f call 14005d890 4675->4678 4679 14005a78a-14005a792 call 14005d400 4675->4679 4684 14005a928-14005a953 4678->4684 4679->4684 4685 14005a959-14005a960 4684->4685 4686 14005b46c-14005b46f 4684->4686 4685->4686 4688 14005a966-14005a96e 4685->4688 4687 14005a35e-14005a379 4686->4687 4689 14005a986-14005a98b 4688->4689 4690 14005a970-14005a978 4688->4690 4691 14005a9a2-14005a9a9 4689->4691 4692 14005a98d-14005a991 4689->4692 4693 14005a97e-14005a981 4690->4693 4694 14005b4ea-14005b4fa 4690->4694 4698 14005a9af-14005a9b2 4691->4698 4699 14005a359 4691->4699 4696 14005a993-14005a998 4692->4696 4697 14005a99d 4692->4697 4695 14005b44c 4693->4695 4694->4687 4700 14005b44f-14005b452 4695->4700 4696->4695 4697->4691 4698->4695 4699->4687 4700->4699 4701 14005b458-14005b45f GetTickCount 4700->4701 4704 14005a0a4-14005a0c0 PeekMessageW 4701->4704 4705 14005a0db-14005a0df 4701->4705 4706 14005a0c2-14005a0ca call 1400016f0 4704->4706 4707 14005a0cf-14005a0d5 GetTickCount 4704->4707 4708 14005a0e1-14005a0e8 4705->4708 4709 14005a10b-14005a10f 4705->4709 4706->4707 4707->4705 4708->4709 4713 14005a0ea-14005a0f6 4708->4713 4710 14005a126-14005a134 4709->4710 4711 14005a111-14005a124 call 1400016f0 4709->4711 4715 14005a136-14005a167 GetTickCount 4710->4715 4716 14005a170-14005a178 4710->4716 4711->4710 4713->4709 4717 14005a0f8-14005a0fb 4713->4717 4715->4716 4719 14005a169 4715->4719 4720 14005a17a-14005a17f 4716->4720 4721 14005a189-14005a191 4716->4721 4717->4709 4722 14005a0fd-14005a101 4717->4722 4719->4716 4720->4721 4723 14005a181-14005a184 call 140008964 4720->4723 4724 14005a193-14005a198 4721->4724 4725 14005a1bf-14005a1ca 4721->4725 4722->4709 4723->4721 4724->4725 4728 14005a19a-14005a19f 4724->4728 4725->4700 4726 14005a1d0-14005a1e0 4725->4726 4726->4699 4728->4725 4729 14005a1a1-14005a1b9 call 1400764f0 4728->4729 4729->4687 4729->4725
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek_invalid_parameter_noinfo
                    • String ID: CSV
                    • API String ID: 899558568-2651001053
                    • Opcode ID: 8f6ee383c0af09506e2d0f9d848b38996d4252da03e4b8b7ef9d24c1039a22a1
                    • Instruction ID: 77e45f125517460bf86c6afc63cce341de6c33b579f706e2a944bd809ab21caf
                    • Opcode Fuzzy Hash: 8f6ee383c0af09506e2d0f9d848b38996d4252da03e4b8b7ef9d24c1039a22a1
                    • Instruction Fuzzy Hash: BC518A72601A848AFB62CF27E8547E937A1F74EBC8F548115EB49472F5DB3AC484C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4922 14005a608-14005a61c 4923 14005a620-14005a62f 4922->4923 4924 14005a631-14005a634 call 140008964 4923->4924 4925 14005a639-14005a646 call 1400764f0 4923->4925 4924->4925 4929 14005a920 4925->4929 4930 14005a64c-14005a65a call 140067080 4925->4930 4932 14005a923-14005a953 4929->4932 4930->4932 4935 14005a660-14005a667 4930->4935 4936 14005a959-14005a960 4932->4936 4937 14005b46c-14005b46f 4932->4937 4939 14005a6a0-14005a6bb call 14005a010 4935->4939 4940 14005a669 4935->4940 4936->4937 4941 14005a966-14005a96e 4936->4941 4938 14005a35e-14005a379 4937->4938 4953 14005a6c2-14005a6c5 4939->4953 4943 14005a670-14005a699 call 14005a010 4940->4943 4944 14005a986-14005a98b 4941->4944 4945 14005a970-14005a978 4941->4945 4962 14005a69b-14005a69e 4943->4962 4947 14005a9a2-14005a9a9 4944->4947 4948 14005a98d-14005a991 4944->4948 4950 14005a97e-14005a981 4945->4950 4951 14005b4ea-14005b4fa 4945->4951 4956 14005a9af-14005a9b2 4947->4956 4957 14005a359 4947->4957 4954 14005a993-14005a998 4948->4954 4955 14005a99d 4948->4955 4952 14005b44c 4950->4952 4951->4938 4961 14005b44f-14005b452 4952->4961 4959 14005a6c7-14005a6cb 4953->4959 4960 14005a6dc-14005a6e0 4953->4960 4954->4952 4955->4947 4956->4952 4957->4938 4963 14005a6d2-14005a6d7 4959->4963 4964 14005a6cd-14005a6d0 4959->4964 4965 14005a6e2-14005a6e8 4960->4965 4966 14005a6ea-14005a6ee 4960->4966 4961->4957 4967 14005b458-14005b45f GetTickCount 4961->4967 4962->4953 4963->4932 4964->4963 4964->4965 4968 14005a6f4-14005a6fb 4965->4968 4966->4932 4966->4968 4973 14005a0a4-14005a0c0 PeekMessageW 4967->4973 4974 14005a0db-14005a0df 4967->4974 4971 14005a73e-14005a741 4968->4971 4972 14005a6fd-14005a735 GetTickCount 4968->4972 4971->4923 4972->4971 4975 14005a737 4972->4975 4976 14005a0c2-14005a0ca call 1400016f0 4973->4976 4977 14005a0cf-14005a0d5 GetTickCount 4973->4977 4978 14005a0e1-14005a0e8 4974->4978 4979 14005a10b-14005a10f 4974->4979 4975->4971 4976->4977 4977->4974 4978->4979 4983 14005a0ea-14005a0f6 4978->4983 4980 14005a126-14005a134 4979->4980 4981 14005a111-14005a124 call 1400016f0 4979->4981 4985 14005a136-14005a167 GetTickCount 4980->4985 4986 14005a170-14005a178 4980->4986 4981->4980 4983->4979 4987 14005a0f8-14005a0fb 4983->4987 4985->4986 4989 14005a169 4985->4989 4990 14005a17a-14005a17f 4986->4990 4991 14005a189-14005a191 4986->4991 4987->4979 4992 14005a0fd-14005a101 4987->4992 4989->4986 4990->4991 4993 14005a181-14005a184 call 140008964 4990->4993 4994 14005a193-14005a198 4991->4994 4995 14005a1bf-14005a1ca 4991->4995 4992->4979 4993->4991 4994->4995 4998 14005a19a-14005a19f 4994->4998 4995->4961 4996 14005a1d0-14005a1e0 4995->4996 4996->4957 4998->4995 4999 14005a1a1-14005a1b9 call 1400764f0 4998->4999 4999->4938 4999->4995
                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: 93c1d918ad317443bf8df0c9c7d8e188f27bdf01d6c17c49f8102e82e691c671
                    • Instruction ID: 33e2600d149920e805574af0d6674e57c9af582ca944070c43e09c5cb24a10ff
                    • Opcode Fuzzy Hash: 93c1d918ad317443bf8df0c9c7d8e188f27bdf01d6c17c49f8102e82e691c671
                    • Instruction Fuzzy Hash: FC917971202A84C9FB62CF27E8547EA33A5F74EBD8F584119EB59472F5DB3AC8858700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5002 140046e40-140046e69 call 1400c03b4 5005 140046e70-140046f40 SetTimer 5002->5005 5006 140046e6b-140046e6f 5002->5006 5007 140046f42-140046f45 5005->5007 5008 140046f4a-140046f8d GetTickCount * 2 5005->5008 5009 14004701c-140047030 5007->5009 5010 140046f8f-140046f94 call 140007bd8 5008->5010 5011 140046f9b-140046fa2 5008->5011 5012 140047068-140047089 5009->5012 5013 140047032-140047036 5009->5013 5010->5011 5015 140046fb5-140046fe2 call 14005a010 5011->5015 5016 140046fa4-140046fae 5011->5016 5018 140047038-14004703b 5013->5018 5019 140047041-140047048 5013->5019 5021 140046fe7-140047002 5015->5021 5016->5015 5018->5019 5022 14004704f-140047061 call 1400b9b7c 5019->5022 5023 14004704a call 1400c03a0 5019->5023 5024 140047015 5021->5024 5025 140047004-14004700e 5021->5025 5022->5012 5023->5022 5024->5009 5025->5024
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Timer
                    • String ID: Auto-execute
                    • API String ID: 2870079774-593629425
                    • Opcode ID: c0f0a12dcbd178ad7bef7700392ec235998ee81811fcd78ea4a12773cadba7d4
                    • Instruction ID: ec96fa6d2421463229ee5679f2b2dad60918d804fc3d36ccc341886e9d6b38ec
                    • Opcode Fuzzy Hash: c0f0a12dcbd178ad7bef7700392ec235998ee81811fcd78ea4a12773cadba7d4
                    • Instruction Fuzzy Hash: 1871F976915B84C6E706CF2AE9513A83360F79CF84F059219DB8953732EF39D1D58300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: b8a28d7819c6e5dad951789f027d8f5f1de3b356cb4bba9b3e3d009eaff66893
                    • Instruction ID: cea287ddeeec38fbdf27ef19f598763678142f1cda6d8f1b4df7a1adc33e4a91
                    • Opcode Fuzzy Hash: b8a28d7819c6e5dad951789f027d8f5f1de3b356cb4bba9b3e3d009eaff66893
                    • Instruction Fuzzy Hash: 02A18C72602A8486FB66CF23D554BEE37A1F74EBC8F545115EB49476B9EB3AC880C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: ca7d7cbddd641fdd44ef46863747d71250011b294a3ff2f5ba0b5e82ddc5d5a6
                    • Instruction ID: 05c5d5791944689f7b82d6c37af088a72164de7a9fc40c12bf6246d2f5090b3b
                    • Opcode Fuzzy Hash: ca7d7cbddd641fdd44ef46863747d71250011b294a3ff2f5ba0b5e82ddc5d5a6
                    • Instruction Fuzzy Hash: DD91AB72606A8486FB62CF27D8547EA27A5F74EBD8F444115FB4A432F6DB3AC885C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: f27081436feb00235da3a5e2f6d57000c1bb4d6f0bbfcc57f0c0a3f8aee90964
                    • Instruction ID: 89cdc886076ba1d75af60d1f2722bda59dc2f9fe0f6c8b1fb6955e06371d2e18
                    • Opcode Fuzzy Hash: f27081436feb00235da3a5e2f6d57000c1bb4d6f0bbfcc57f0c0a3f8aee90964
                    • Instruction Fuzzy Hash: 2D71BC72601B848AE762DF26E8447EE37A1F74DBD8F448129EB49476F6DB3AC484C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: 701e7b3b280401927e8f146b5fec901fb4fb66b2a7c23f7110feb716d115e464
                    • Instruction ID: b38e67661f4da5c4e1c25a6bcd427caf48553ed82718d1087719ff6e5aed400d
                    • Opcode Fuzzy Hash: 701e7b3b280401927e8f146b5fec901fb4fb66b2a7c23f7110feb716d115e464
                    • Instruction Fuzzy Hash: 6C618A72600A84C6F762DB26A8487EA37A1F74EBD8F484115EB59472F6CB3AD885C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: 101944649037532cff4ceef2b7d28f380bc817f90ef5cc58cdf9c6264ee92a78
                    • Instruction ID: 9e27009333dccea02e73c56fec57911c6250ae5aedc69a497e1fd0a0c658a74e
                    • Opcode Fuzzy Hash: 101944649037532cff4ceef2b7d28f380bc817f90ef5cc58cdf9c6264ee92a78
                    • Instruction Fuzzy Hash: 3A51B072601A84C6FBA2CF2AE8447E937A5F74DBD8F544215EB59472F1DB3AC885C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: 27c0e841c87dd67aedfc00afb4026fa3a3f1076ed7cdc8acf5abef5c362ac76d
                    • Instruction ID: 438df62315db4ed99b0bd879fad8fb29dcaaaeeab9f01469f8c50d10f724a5d2
                    • Opcode Fuzzy Hash: 27c0e841c87dd67aedfc00afb4026fa3a3f1076ed7cdc8acf5abef5c362ac76d
                    • Instruction Fuzzy Hash: B551E172601A84CAF762CF26E8447EA37A1F74DB98F548215EB59432F5DB3EC885C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$CloseErrorFileHandleInfoLastMessagePeekWrite
                    • String ID:
                    • API String ID: 3918787817-0
                    • Opcode ID: ae1c02854b2eed30d8de55c230565e1e3098524140e3c9704299990655672280
                    • Instruction ID: 68c450f79c0b0d4e2acf305779ab9c34387453eb9bb25e28cf16908fa37fb13a
                    • Opcode Fuzzy Hash: ae1c02854b2eed30d8de55c230565e1e3098524140e3c9704299990655672280
                    • Instruction Fuzzy Hash: 66519C72601B84CAF762CF26E8447E937A1F74DBC8F544119EB49472B5DB3AC484C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: f9bbfbd3d0dfd58b6f0c40e7ddabee6743906e268dcd8ff465bac07e4c6a7338
                    • Instruction ID: bb4b00c16a850494f34076c5bdf2c9cbebf0e1d266ef25a1e1f8b62f4922d03b
                    • Opcode Fuzzy Hash: f9bbfbd3d0dfd58b6f0c40e7ddabee6743906e268dcd8ff465bac07e4c6a7338
                    • Instruction Fuzzy Hash: 25519A72601A84CAFB62CF26E8447E937A1F74EBC8F548119EB59472F5DB3AC885C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: ed110d608cae22be87ae80aaf9a9fd23f5108ba85e6880a03b78dde776243354
                    • Instruction ID: ec7eac28983779933543574940b67126e0e60a64a2f5cdc49470eacb6d6e4039
                    • Opcode Fuzzy Hash: ed110d608cae22be87ae80aaf9a9fd23f5108ba85e6880a03b78dde776243354
                    • Instruction Fuzzy Hash: FB518B72601A84CAFB62DF2698487EA37A1F74EBC8F544119EB09472F5DB3EC885C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: 06cb773facb954db88a19da592f633fd18e872253058def5fd3782ad05fe57d2
                    • Instruction ID: 941738e0055236f6d5b47f32b2bcfd631a6ad54dbd402d2b4a811278d6cb2207
                    • Opcode Fuzzy Hash: 06cb773facb954db88a19da592f633fd18e872253058def5fd3782ad05fe57d2
                    • Instruction Fuzzy Hash: AA518A72601A84CAFB62CF26D8447EA37A1F74EBC8F548119EB19472F5DB3AC885C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTickTimer
                    • String ID: Out of memory.
                    • API String ID: 3511537334-4087320997
                    • Opcode ID: e86f3febd6f7aa6ad50afb119e2a6d95bdefe8b0b5e174018a34303c3c6a4361
                    • Instruction ID: 3dde8d9698fe01c46c6c01ad8ec5a7a0fb188b7571f57588f77488c52755c0ef
                    • Opcode Fuzzy Hash: e86f3febd6f7aa6ad50afb119e2a6d95bdefe8b0b5e174018a34303c3c6a4361
                    • Instruction Fuzzy Hash: B3D1BF72608B8485EB67AB66E8507EA77A5F78CBC4F58011AEB8A037B5DF3CC455C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$MoveProcShow
                    • String ID:
                    • API String ID: 3725351834-0
                    • Opcode ID: dc866f74383fb8820a29d1cbf2682560067a18ef2306e1bfc556eead18677c75
                    • Instruction ID: 0b611768745a4099534d712a02f5409cb0b07aca89ad3c9e734742cc4a678c7a
                    • Opcode Fuzzy Hash: dc866f74383fb8820a29d1cbf2682560067a18ef2306e1bfc556eead18677c75
                    • Instruction Fuzzy Hash: CE01A47221459085E7629B13AC513E96292FB8CBE5F148816EE8E83B74CF78C0869720
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$ProcessShow$CurrentEnumForegroundIconicThreadTimerWindows
                    • String ID:
                    • API String ID: 862268643-0
                    • Opcode ID: ceb5ba47a822f3d4eda79089171ce7273da0ff323020f9e3d620d1710c5a1474
                    • Instruction ID: 9c472f77364e141725e8c3fdb0b8ee2f6e603dd9fbbc7cdd6f0b157d8d1024ce
                    • Opcode Fuzzy Hash: ceb5ba47a822f3d4eda79089171ce7273da0ff323020f9e3d620d1710c5a1474
                    • Instruction Fuzzy Hash: FD012836600A8594EB228F66FC503D963A2BB8CBD4F284426DF0D87774DF38C4868710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CurrentDirectory
                    • String ID: :
                    • API String ID: 1611563598-336475711
                    • Opcode ID: c21feff3373a2bdcd24616ab868a5c1856d5d43183ef52ea47b6e48051914c54
                    • Instruction ID: 499f02814f42ff9356671dff2bcd092a9539322170032e95a6aa3c3f60800075
                    • Opcode Fuzzy Hash: c21feff3373a2bdcd24616ab868a5c1856d5d43183ef52ea47b6e48051914c54
                    • Instruction Fuzzy Hash: 01F02462A2064081EF678B53A8443F662B0EB1CB88F58A406F70A472E0FB3DC4C7C790
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetCPInfo.KERNEL32(?,?,?,000000014000F5ED,?,?,?,?,?,?,?,?,?,?,?,001207A1), ref: 0000000140099755
                    • GetCPInfo.KERNEL32(?,?,?,000000014000F5ED,?,?,?,?,?,?,?,?,?,?,?,001207A1), ref: 000000014009985C
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Info
                    • String ID:
                    • API String ID: 1807457897-0
                    • Opcode ID: 5ce00c56c794aa4379e89e62a0b0a1b43b952de851a58576c06746913a481660
                    • Instruction ID: 88657818d1bf5915f48b7f3a7c941ffc201772b56076c5c1f7ec4c08b04191b6
                    • Opcode Fuzzy Hash: 5ce00c56c794aa4379e89e62a0b0a1b43b952de851a58576c06746913a481660
                    • Instruction Fuzzy Hash: F6516432615B4086EB65CF2BE04439E77A5E78AFD8F48811AEB49077E8DF38C845CB51
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Initialize$CriticalSection
                    • String ID:
                    • API String ID: 49594357-0
                    • Opcode ID: 3882862bd4973286bc26a2fc48a4ffdcafcfc4d842ab72e8a7f056242dace125
                    • Instruction ID: 118a13e5a465747b4d8a83e116a6f8d5c4995d0a7f1a88b542014b8385c10bae
                    • Opcode Fuzzy Hash: 3882862bd4973286bc26a2fc48a4ffdcafcfc4d842ab72e8a7f056242dace125
                    • Instruction Fuzzy Hash: E35170B1411F8985F3038F97BC91BE237A9BB5DB10F98126DD698A3231DB78C1A4C350
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessagePostProcWindow
                    • String ID:
                    • API String ID: 1517762806-0
                    • Opcode ID: 7ae07f0ae93fab94fd9c50de429fb3bb20a423747e4f8f2bac26705ffea3adba
                    • Instruction ID: 3a99f0241fd8384ad7c87fb58b99034d81173d6656c3c69541b5bd5727beeff6
                    • Opcode Fuzzy Hash: 7ae07f0ae93fab94fd9c50de429fb3bb20a423747e4f8f2bac26705ffea3adba
                    • Instruction Fuzzy Hash: C8018F3131068581EB724B27AD257EA1392EB8DBD9F284816DF4D977B4DA38C5868320
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountMessagePostShowTickWindow
                    • String ID:
                    • API String ID: 60979374-0
                    • Opcode ID: 6f70ec5c2020247b00df806bffc32d8cdc9c5f2f85592df4dd21a90b49593508
                    • Instruction ID: 24b68d9e03313d0f7eb096cf95f580c148c25ca2cf5e2c9c88984f5c0bbeb10a
                    • Opcode Fuzzy Hash: 6f70ec5c2020247b00df806bffc32d8cdc9c5f2f85592df4dd21a90b49593508
                    • Instruction Fuzzy Hash: 4E115E76508290C6EB62CB36A9413D936E6F39DBD8F2C4719D74947AB0C734C5E9CB01
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: FocusProcWindow
                    • String ID:
                    • API String ID: 1691694861-0
                    • Opcode ID: c46562a1a78c51f0a429cb68be8c9c878e45932503c807510968efaed4679516
                    • Instruction ID: 392ee55105f45c8c4303a107cd48593f7fa875780ef8cbd167811236505c5e79
                    • Opcode Fuzzy Hash: c46562a1a78c51f0a429cb68be8c9c878e45932503c807510968efaed4679516
                    • Instruction Fuzzy Hash: 30E01A72214A81C1E7629B13FC613EA6396BB8CBE5F148813DF5E93774CE38C5869320
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: IconNotifyShell_
                    • String ID:
                    • API String ID: 1144537725-0
                    • Opcode ID: 29357af47a31f28dcff6a69dbb1a7c6dfea0cb714986cc88172a97117951cce4
                    • Instruction ID: ed608264fd30a2328826fddc125a9f9f83bc5915360b57eb901f2245a37153d3
                    • Opcode Fuzzy Hash: 29357af47a31f28dcff6a69dbb1a7c6dfea0cb714986cc88172a97117951cce4
                    • Instruction Fuzzy Hash: B1214AB270578097EB4DCF22E644799B7A4F748B80F008039AB6D83365EF78E1718B44
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide
                    • String ID:
                    • API String ID: 626452242-0
                    • Opcode ID: f15316203d7fff719e9890e0faae883163b4a1be7110ba5f4352658aa38894ad
                    • Instruction ID: 72a51dc298b90f08429b3901ae25242d1a37174b05b80c83f5ef725e34f26bfc
                    • Opcode Fuzzy Hash: f15316203d7fff719e9890e0faae883163b4a1be7110ba5f4352658aa38894ad
                    • Instruction Fuzzy Hash: BDB1C3B262429486EB668B1FE8447AD73E5F79C7D4F518125FF8683BE4D738C9428700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RtlAllocateHeap.NTDLL(?,?,?,00000001400D0E45,?,?,00000000,00000001400D42C7,?,?,?,00000001400CF837,?,?,?,00000001400CF72D), ref: 00000001400D0E06
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: 5eb8b6854a16ec681e6b4b13eb802a7a8bbb59f4a70b7021c4ac7a7062f00a9b
                    • Instruction ID: d8b428926375ff64d51e6fd59a63fcb0dd1e2713932fcfa9895de4cd678d1f45
                    • Opcode Fuzzy Hash: 5eb8b6854a16ec681e6b4b13eb802a7a8bbb59f4a70b7021c4ac7a7062f00a9b
                    • Instruction Fuzzy Hash: 62F01C7071574885FA6A6BB3A8513ED22915F8CBE0F084A257F2A872F6DA78C4924631
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessagePostQuit
                    • String ID:
                    • API String ID: 1657236379-0
                    • Opcode ID: 05cb24e83f89ff1d74f0f72d238eed04944c60908c23643176f7fabd67db726a
                    • Instruction ID: 506968dab7faac325b5610cf79f8ae105ad4c3076edb9e0ce753ffdf445f53bd
                    • Opcode Fuzzy Hash: 05cb24e83f89ff1d74f0f72d238eed04944c60908c23643176f7fabd67db726a
                    • Instruction Fuzzy Hash: A7E04631314640A2F607FB26E9217EC2621AB8CB84F400408E70E076F3CF38C009D746
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ProcWindow
                    • String ID:
                    • API String ID: 181713994-0
                    • Opcode ID: ca34d17a8f07a28549ca0089e46fa9cf8117f354b948dc3a65cc2efd0636a92a
                    • Instruction ID: 4a10ec8146a64a9e3a5765d828e3d30e31bb2803ec65dbef55c0ce31ee9d7492
                    • Opcode Fuzzy Hash: ca34d17a8f07a28549ca0089e46fa9cf8117f354b948dc3a65cc2efd0636a92a
                    • Instruction Fuzzy Hash: E4F0A03221468081F663DB23AC113E62296A78CBE4F284916AF5E932F5DA38C5868324
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • FindCloseChangeNotification.KERNELBASE(?,?,?,0000000140007DAC), ref: 000000014009A332
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ChangeCloseFindNotification
                    • String ID:
                    • API String ID: 2591292051-0
                    • Opcode ID: b49efc44b1fdb0dc500837521876b45b7b307e7279a77c85fe3da1e9e927beef
                    • Instruction ID: 526f9ce91fcd3ab7d5b3fe3432cd25783030c4d20f401207a99df67c4623b221
                    • Opcode Fuzzy Hash: b49efc44b1fdb0dc500837521876b45b7b307e7279a77c85fe3da1e9e927beef
                    • Instruction Fuzzy Hash: ECD05B3260054082EB26C76AD45537C2250E74DBF4F5C4300F7754B2F4DB38C5D38250
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 00000001400D0DC8: RtlAllocateHeap.NTDLL(?,?,?,00000001400D0E45,?,?,00000000,00000001400D42C7,?,?,?,00000001400CF837,?,?,?,00000001400CF72D), ref: 00000001400D0E06
                    • HeapReAlloc.KERNEL32(?,?,00000000,00000001400D42C7,?,?,?,00000001400CF837,?,?,?,00000001400CF72D,?,?,?,00000001400CFB0E), ref: 00000001400D0E95
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Heap$AllocAllocate
                    • String ID:
                    • API String ID: 2177240990-0
                    • Opcode ID: 4b5f3b9c5d605d6b538b732745da5be29b87f4cb192d50764708732b8532461e
                    • Instruction ID: be21f41fe575d56785039718b48f9df3ad1619fd122be0847214a60da19bf7f9
                    • Opcode Fuzzy Hash: 4b5f3b9c5d605d6b538b732745da5be29b87f4cb192d50764708732b8532461e
                    • Instruction Fuzzy Hash: 85011D7021564184FE5A67A379447ED12514F9CBE4F588E267F2D872F6DE38C4429221
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend$Window$Item$Rect$ClientDialogEnableFocusLongMovePointsProcShowText
                    • String ID: ---- %s$ $ $%s: %.500s$AutoHotkey v2.0.12$Critical Error$Error$For more details, read the documentation for #Warn.$Line:%dFile:$Specifically: %.80s%s$Stack$Text:%.80s%s$The current thread will exit.$The program is now unstable and will exit.$The program will exit.$The script was not reloaded; the old version will remain in effect.$Warning$__Delete will now return.$t
                    • API String ID: 2984752805-3670748612
                    • Opcode ID: e4b71d6c96a9ff7051a2357e437069eb2b0be0915ff0f7bc03722b77f306621d
                    • Instruction ID: c5e2e773bda85370fc0e25d66554ea89a040090808c1e1c4d169c16ca571653b
                    • Opcode Fuzzy Hash: e4b71d6c96a9ff7051a2357e437069eb2b0be0915ff0f7bc03722b77f306621d
                    • Instruction Fuzzy Hash: D0225D7620465086EB26DF66E454BEE63A2FB8DBC4F908015EB490BBB4CF7DC546DB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageTimer
                    • String ID: #32770$'$SysListView32$SysTreeView32
                    • API String ID: 1200668964-442130027
                    • Opcode ID: f158cc1782aa8f0ac49d7b21f174a745a63abd62b20e44f0898f2dc3c00f45ef
                    • Instruction ID: 9ce53d3f74694387105d242d91ce1e20f306c592397a9befb6e9e257a87e50c7
                    • Opcode Fuzzy Hash: f158cc1782aa8f0ac49d7b21f174a745a63abd62b20e44f0898f2dc3c00f45ef
                    • Instruction Fuzzy Hash: 24929EB22046808AFB66CF27E8547E937A2F78DBD4F144119EB4A47AB5DB38C985D700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Object$Delete$Create$CompatibleIconSelect$System$BitmapBitsDestroyErrorInfoLastMetricsRectReleaseWindow_invalid_parameter_noinfo$BrushDrawEntriesFillForegroundIconicPaletteSolid
                    • String ID: $Icon$Trans$dll$exe$ico
                    • API String ID: 2043964378-1617956751
                    • Opcode ID: 788c07d799799d62a64876d5ed4248b3641609c731d991ef39c97d5ccecb601a
                    • Instruction ID: e77bbcefa7cc1a1fcf308a93db9c43432532565d8170f84dfe42a9dc3ea70c4a
                    • Opcode Fuzzy Hash: 788c07d799799d62a64876d5ed4248b3641609c731d991ef39c97d5ccecb601a
                    • Instruction Fuzzy Hash: 9E82DF32615B818AEB278F66D4103EE77A1F78CBC8F108115EF8A57BA8DB78C585C740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Thread$CountTickWindow$Process$AsyncCloseHandleInputState$AttachBlockCreateCurrentErrorForegroundInfoKeyboardLastLayoutMessageMutexPeek_invalid_parameter_noinfo
                    • String ID: AHK Keybd$^+!#{}${Blind${Click${Text}
                    • API String ID: 2993791251-1448771239
                    • Opcode ID: f427a931fa081c38792bf05125be5e21ada062e4900f809bbe3bb2c9f74b32b5
                    • Instruction ID: 33f2c88e7f7d6382ff08455201b7dc6db32467853b375bc8ad74f9cf1a41f026
                    • Opcode Fuzzy Hash: f427a931fa081c38792bf05125be5e21ada062e4900f809bbe3bb2c9f74b32b5
                    • Instruction Fuzzy Hash: 5592F1712042908AF7678B27A8503F93BE1E75DBD9F04811AFB864B6F5CB3AC585E710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ErrorLast$AttributesCloseCreateCurrentDirectoryFileHandleProcess_invalid_parameter_noinfo$ExecuteFormatLogonMessageShellWith
                    • String ID: Verb: <%s>$"%s" %s$%sAction: <%-0.400s%s>%sParams: <%-0.400s%s>$...$.exe.bat.com.cmd.hta$Edit$Failed attempt to launch program or document:$Hide$Launch Error (possibly related to RunAs):$Max$Min$Parameter #2 invalid.$String too long.$System verbs unsupported with RunAs.$\/.$explore$find$open$print$properties
                    • API String ID: 3639814043-3158883562
                    • Opcode ID: f44e604d67a41d49b28df88f6d708bd39fc30f0fd3b3157d8a5ae26a07d91e9e
                    • Instruction ID: 8e637024b61dba167994f3bc0c35f639fb809f6e92ca8cacf06f3747464adf17
                    • Opcode Fuzzy Hash: f44e604d67a41d49b28df88f6d708bd39fc30f0fd3b3157d8a5ae26a07d91e9e
                    • Instruction Fuzzy Hash: 48628C72605B8185EB22DF22E8503EA23A5FB4DBD8F544615FB5D17BB9EB38C681D300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Rect$FocusMessageSendShow$InvalidateLong$CtrlEnableIconicParentPointsPropUpdateVisible
                    • String ID: ahk_dlg
                    • API String ID: 2920309579-2093416220
                    • Opcode ID: 15b49a2d775aa2b15ecdb5b42adc9b3b08469073a319d920837f31bcbd08a5d8
                    • Instruction ID: 6b0f15f292fd5b6e2c233084b5252e8842e392e0d1771d7e4a4e64847f093a7f
                    • Opcode Fuzzy Hash: 15b49a2d775aa2b15ecdb5b42adc9b3b08469073a319d920837f31bcbd08a5d8
                    • Instruction Fuzzy Hash: 36B19037204A4182EBB28B23D4547AE37A2FB8CBD4F149111EF4A036B5DF39C996D710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSendTimeout$Process$CloseHandleMemoryVirtual$FreeWrite$AllocOpenReadThreadWindowWow64
                    • String ID: Col$Count$Focused$Selected
                    • API String ID: 4284125963-81583591
                    • Opcode ID: d174a4fcb968ee5423fa22973b449e344a759fe88950dd7fcdb2adbb8730d1a5
                    • Instruction ID: 734d11a30da0b4c002f8edadc183279dbb4d4a0fd2f17bd27a528bf65f1bcf2e
                    • Opcode Fuzzy Hash: d174a4fcb968ee5423fa22973b449e344a759fe88950dd7fcdb2adbb8730d1a5
                    • Instruction Fuzzy Hash: 50228C72304B8086EB618B56E4407EEB7A1FB887E4F554225FFA947BE8DB78C445CB04
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: FormatTime$DateLocal
                    • String ID: %.17g$%03d$LongDate$ShortDate$String$Sys$Time$WDay$YDay$YDay0$YWeek$YearMonth$dMyg$hHmst
                    • API String ID: 367962810-2414579754
                    • Opcode ID: 96097ed3250f480d7fd2e80caa135ac679bc27a1f56186db5c29d2c5a2ba9d9b
                    • Instruction ID: d60b58efcd655f0e25fd9dcfd3f95dd2fb258c0b87b2891a4c877ab484c8f3c4
                    • Opcode Fuzzy Hash: 96097ed3250f480d7fd2e80caa135ac679bc27a1f56186db5c29d2c5a2ba9d9b
                    • Instruction Fuzzy Hash: 3D82C07261878185EB27AF27D4103EB67A1FB8DBC9F845112EF8A47AB5EB38C545C300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Global$Clipboard$Unlock$Close$Free$AllocDataEmptyLock
                    • String ID: An internal function call failed.$Can't open clipboard for writing.$EmptyClipboard$Out of memory.$Out of memory. The current thread will exit.$SetClipboardData
                    • API String ID: 870983584-3860257172
                    • Opcode ID: 63ec302d2dcc4e07dafa7ffbe875a7ec8decf3c84bb9ba25e6df6b3287bd95ea
                    • Instruction ID: ff896cda36521d4ffc1f2a28ace57411d0de1a9b79acbae4c44f8ebf8a808d26
                    • Opcode Fuzzy Hash: 63ec302d2dcc4e07dafa7ffbe875a7ec8decf3c84bb9ba25e6df6b3287bd95ea
                    • Instruction Fuzzy Hash: 8FA114B1611A4081FA27DB17F950BEA73A2BB8CBD0F05426AEB59176B0DFBCC841D711
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: HandleModule$AddressProc$ByteCharMultiWide$LibraryLoad
                    • String ID: Call to nonexistent function.$Failed to load DLL.$comctl32$gdi32$kernel32$user32
                    • API String ID: 2554685833-2055167431
                    • Opcode ID: 1c853968632f3c1745b7333d189281879c3be8abebc191bfb2c203d28efc3c37
                    • Instruction ID: fc907daecbf82522ccbdd24f04bd947d1e043591de6429c154a07a64520e4e07
                    • Opcode Fuzzy Hash: 1c853968632f3c1745b7333d189281879c3be8abebc191bfb2c203d28efc3c37
                    • Instruction Fuzzy Hash: 8D617F75205B8085EA22DF12E8543EA63A1FB9DBC5F948019EF8D43BB4EB3CC846C704
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Cursor$Load$Info
                    • String ID: Unknown
                    • API String ID: 2577412497-1654365787
                    • Opcode ID: 1a24f7e5dbec5a0ccffff61eba69a64616ce38ee737c9d0f6de7d77f58208063
                    • Instruction ID: f92dc1eb81ddf41376ac4e892ba927984eaa382153d77e127365fa185dbf900b
                    • Opcode Fuzzy Hash: 1a24f7e5dbec5a0ccffff61eba69a64616ce38ee737c9d0f6de7d77f58208063
                    • Instruction Fuzzy Hash: F5414771615B0182FB569B26F9543AE33A6FB4CB80F11803DEA4E937B4EF7CC4669200
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Foreground$Thread$AttachInput$Process$BringIconicShow
                    • String ID:
                    • API String ID: 1113931720-0
                    • Opcode ID: ceaf1cdb885d2cca2777cac268fb9c8570852c2afdc0f730b8f3851649dd4e14
                    • Instruction ID: 8446bd2a82e57b31e22cef29e4a505da68c482be2ea5d55c84675f3c8bc0714b
                    • Opcode Fuzzy Hash: ceaf1cdb885d2cca2777cac268fb9c8570852c2afdc0f730b8f3851649dd4e14
                    • Instruction Fuzzy Hash: 8A81BD7124124086FB639F27F9147EA6792AB9DBE4F184124EF46076B0EB3DC4C5DB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ErrorFileLast$CloseCreateHandleSize
                    • String ID: $Invalid option.$Raw
                    • API String ID: 3555958901-363237880
                    • Opcode ID: 7d8aa38b624f4f1238fba0f91475b0a4e6231b94694d88a287a1772b01d77ccd
                    • Instruction ID: 11fe17b2903f0102020f06be470a95e138520a59ce9213c74ebcaea935d57c71
                    • Opcode Fuzzy Hash: 7d8aa38b624f4f1238fba0f91475b0a4e6231b94694d88a287a1772b01d77ccd
                    • Instruction Fuzzy Hash: 6E12BE32205B9082EB66DB26E5447EA63A5F74CBE4F448229EF5D477F4DB38C846C340
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Global$Clipboard$Unlock$Close$AllocDataEmptyFreeLock
                    • String ID: An internal function call failed.$Can't open clipboard for writing.$Out of memory.$Out of memory. The current thread will exit.
                    • API String ID: 3628945100-33532317
                    • Opcode ID: 1ec1714f787a8418e8f8003842db356fff7f9f423bab0ea38b4ee5d5f2667ad8
                    • Instruction ID: 76b4e6dcde0c2f74af566f322619daeae61400d5e0c4dc68cb48a1ce9a9cd4e4
                    • Opcode Fuzzy Hash: 1ec1714f787a8418e8f8003842db356fff7f9f423bab0ea38b4ee5d5f2667ad8
                    • Instruction Fuzzy Hash: 96B13975601B4882FA229B17F8107EA73A1FB9CBD4F444229AF4917BB5DF78C895DB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Message$Send$Long$MetricsMoveRectSystem$ClassDialogNamePostScroll
                    • String ID:
                    • API String ID: 3989474902-0
                    • Opcode ID: 94171216bc189609904d06edf9e432b7d968d524b655154d06eef318c8b4dba1
                    • Instruction ID: d3cade3c17f5b0978618f472b05ac9d1ae1b5ca701c232821b4cb2010d53eec3
                    • Opcode Fuzzy Hash: 94171216bc189609904d06edf9e432b7d968d524b655154d06eef318c8b4dba1
                    • Instruction Fuzzy Hash: 6091A0322146508BEB21CF36D8147ED33A2FB4DBD8F548515FB864BBA8CB79D9468740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Object$CompatibleCreateSelect$BitsDeleteErrorLastReleaseWindow$BitmapEntriesForegroundIconicPaletteRectSystem
                    • String ID: $0x%06X
                    • API String ID: 971289671-894828092
                    • Opcode ID: 0efb5e6110e6aaa5385eab0b04ed213010bf5a5009a992293838c84c32dd925d
                    • Instruction ID: 0919d36f6abeef3c9b217660eabdf443cdc0c3a145fca1a5b737e3768672352b
                    • Opcode Fuzzy Hash: 0efb5e6110e6aaa5385eab0b04ed213010bf5a5009a992293838c84c32dd925d
                    • Instruction Fuzzy Hash: 2B12C03261A6D48AE7678B2AA4507EBB7E1F788790F104215BBC943BA5DF38D845CF40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Foreground$Menu$CheckItemMessagePost$CursorPopupProcessThreadTrack
                    • String ID: Invalid menu type.$Out of memory. The current thread will exit.
                    • API String ID: 2225002760-1068455092
                    • Opcode ID: 743c597454b3be43c3f2aed2df8bca673236ea7c6cebc33129033e8a1baef6a6
                    • Instruction ID: d8a0731b5f30e44b2710db1b0f44e8bc2cdfa18bc41ad10060a3e0d5f53f7497
                    • Opcode Fuzzy Hash: 743c597454b3be43c3f2aed2df8bca673236ea7c6cebc33129033e8a1baef6a6
                    • Instruction Fuzzy Hash: 36918972204A8096F7229F57E8903EA77A1FB8CBD4F444029EB4A07BB5DF78D945DB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Find$CountFileTick$CloseFirstMessageNextPeek
                    • String ID: %s\%s$.
                    • API String ID: 651082337-2631528844
                    • Opcode ID: a7ad65b75887f6bb0a78720b9c4c0a6822cb1cbc9a1c3474690cd60f6fe9e800
                    • Instruction ID: d4a450a648438bd3baab2923be5af58423fbdf0c8874e99ef2ae44be0ab66089
                    • Opcode Fuzzy Hash: a7ad65b75887f6bb0a78720b9c4c0a6822cb1cbc9a1c3474690cd60f6fe9e800
                    • Instruction Fuzzy Hash: 1D81913520068496EA66DF23F4487EA73A1F78CBE4F448219EBA5436F4DB78C896C710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: SendString$BeepMessage
                    • String ID: 1$Wait$close AHK_PlayMe$open "%s" alias AHK_PlayMe$play AHK_PlayMe$status AHK_PlayMe mode$stopped
                    • API String ID: 1706516490-1425068873
                    • Opcode ID: 3e6a7942dcd586a7a49b8a6bb3be91ca61c6799065a0667dcb4dc35582bb248e
                    • Instruction ID: b0b605cea56824aa5dbcf523a2e1657e3ff4ff3883325843012b21d6e7ec30d3
                    • Opcode Fuzzy Hash: 3e6a7942dcd586a7a49b8a6bb3be91ca61c6799065a0667dcb4dc35582bb248e
                    • Instruction Fuzzy Hash: 3A419F7270068081FB27EB22E854BEB63A1F79CBC8F888021EB4547AB5DF79C585C740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: File$Find$AttributesCountErrorFullLastMoveNamePathTick$CloseCopyDeleteFirstMessageNextPeek
                    • String ID:
                    • API String ID: 1736343220-0
                    • Opcode ID: eeb903dc2d26a3fe0958f64a3cc15026f3b927be2c8f746f5084ed9a988314bb
                    • Instruction ID: 79b3006321cdf311a7d10382ef0949fd9525ff1e63cb107ac64a1da45b11b71d
                    • Opcode Fuzzy Hash: eeb903dc2d26a3fe0958f64a3cc15026f3b927be2c8f746f5084ed9a988314bb
                    • Instruction Fuzzy Hash: B5A1A132210A8185EB22DF26E840BFD33A1FB58BD8FA48611EB5D476F4DB74C685C750
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Check$Col$Focus$Icon$Invalid option.$Select$Vis
                    • API String ID: 3850602802-503926001
                    • Opcode ID: 56e7e41665cdd55afb47ab008465baf9f3a554faa61e1f3d68e3f630b27a7e33
                    • Instruction ID: f4f219a7b6826fc0400ce4600ac753c9ab3edae5d44c9388f5bd7dce007dbd80
                    • Opcode Fuzzy Hash: 56e7e41665cdd55afb47ab008465baf9f3a554faa61e1f3d68e3f630b27a7e33
                    • Instruction Fuzzy Hash: 1512CF7260468086EB66DF26D4543EA37A1E78EBD8F44411AFF4A47AB9DF7CC984C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Virtual$CurrentThread
                    • String ID:
                    • API String ID: 1638833223-0
                    • Opcode ID: bdc894e039ec52adf191c63eec82c27dafdd723dc9a4fdc7f7397218c6bde346
                    • Instruction ID: dcd510dc6539ebb3944c50732aecd2de39c8cd898c3e5886c8b3ff5954b95174
                    • Opcode Fuzzy Hash: bdc894e039ec52adf191c63eec82c27dafdd723dc9a4fdc7f7397218c6bde346
                    • Instruction Fuzzy Hash: 48C136712002A086F7779B27A5503FA66E2BB9D7C4F04452AFF860B6F5CB7A8C45E310
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CloseHandle$Process32$NextProcess$CreateErrorFirstLastObjectOpenSingleSnapshotToolhelp32Wait
                    • String ID:
                    • API String ID: 2845856064-0
                    • Opcode ID: 8fc793c337cb8315fa228c8d38c63f260dd849eef2875a683f8c5c7517d8da3b
                    • Instruction ID: 4d50bce82f579856e269fa22d620e2ab2d71889743dcb0b7f492f2bea5b5d47e
                    • Opcode Fuzzy Hash: 8fc793c337cb8315fa228c8d38c63f260dd849eef2875a683f8c5c7517d8da3b
                    • Instruction Fuzzy Hash: 9861543621468142EA7697179D44BFE62A2FB4DBD1F688825FF4D436F4EB38C841D310
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$ClassLongMessage$CountDialogForegroundNameProcessThreadTick
                    • String ID: #32770
                    • API String ID: 3033631328-463685578
                    • Opcode ID: 1e76b0e4848886d363f8ac671c2fa73e534208e57d0e1302b471ff45dec0e4c9
                    • Instruction ID: 81857a2477c59fec3a28fb6101180fd9410f6b86d682e023a6a8ec29183bb257
                    • Opcode Fuzzy Hash: 1e76b0e4848886d363f8ac671c2fa73e534208e57d0e1302b471ff45dec0e4c9
                    • Instruction Fuzzy Hash: 97914AB620868086EB66CB27E8543E977A2F78DBD4F544115EF4A177B8CB38C945DB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CloseFileHandleWrite$Info
                    • String ID: </response>$<response command="source" success="0" transaction_id="%e"/>$<response command="source" success="1" transaction_id="%e" encoding="base64">$VUUU
                    • API String ID: 1727933286-561900851
                    • Opcode ID: 4fbc946d99f13ef0f90a1f74e9d82280b969860613419e885f5a362edcbf26e1
                    • Instruction ID: 4615b18248b3e48fc43e6b1d6530294d79f78952ad8a579c7af3c1935341cbde
                    • Opcode Fuzzy Hash: 4fbc946d99f13ef0f90a1f74e9d82280b969860613419e885f5a362edcbf26e1
                    • Instruction Fuzzy Hash: 3812CEB2325B4086EB66CF66E450BED63A0FB48BD4F545219FF5A67AA9CF38C540C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$CloseEnum$InfoMessageOpenPeekQueryValue
                    • String ID: %s%s%s
                    • API String ID: 1940444692-3094730333
                    • Opcode ID: d2e61b8c64aba5085da4612e3398950bc9e37db3df35f515e4e01106ab508119
                    • Instruction ID: 2ad3fe5e436fb87da2629d57f012d4a1b20e8c91a61a376b7c046a89718a74ed
                    • Opcode Fuzzy Hash: d2e61b8c64aba5085da4612e3398950bc9e37db3df35f515e4e01106ab508119
                    • Instruction Fuzzy Hash: F3F11572604B8189EB72CF66A8807EA73A5F78D7D4F144126EB9D47BB8DB39C541C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Long$ClassDragFinishMessageWindow
                    • String ID: #32770
                    • API String ID: 2113207214-463685578
                    • Opcode ID: 5d19153865f3a67c9ce714ee3aae9ced3635b607635fcc42d4316b31770b0af9
                    • Instruction ID: 97bca13195f52d4a0f1a975ca4f30a0bb5ac03896678fe6696676ef65dd9e863
                    • Opcode Fuzzy Hash: 5d19153865f3a67c9ce714ee3aae9ced3635b607635fcc42d4316b31770b0af9
                    • Instruction Fuzzy Hash: 827134B660965086FB66CB27E8503E937A2FB8DBD0F548115EF4A17BB4CB38C945DB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Clipboard$DataFormatName
                    • String ID: Embed Source$Link Source$MSDEVColumnSelect$MSDEVLineSelect$Native$ObjectLink$OwnerLink
                    • API String ID: 3172747766-1844231336
                    • Opcode ID: e3c9a9746ac282e7e970d11fdd9b8935da4bda7c7ad7a125f40c8527a37e865e
                    • Instruction ID: d81249cccab82eab5bede757a5be7dc1a70160123ca47dfcbc755457e08b0b5b
                    • Opcode Fuzzy Hash: e3c9a9746ac282e7e970d11fdd9b8935da4bda7c7ad7a125f40c8527a37e865e
                    • Instruction Fuzzy Hash: 1C311EB261464291FB26DB16F8947E923A1F79C3C4F848026BB4D875B5EF7CC649D700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$AttributeForegroundShowVisible
                    • String ID: %.17g$.$Target window not found.$ahk_group
                    • API String ID: 796407916-1395348258
                    • Opcode ID: 6799b98d8746d82bc15af626af90635f3ab0b693c892f4710665c9785bbc5909
                    • Instruction ID: ff3bf67e8d97b4c26144dec6605fe8c02aefe9509e9e8219b1ed718545242788
                    • Opcode Fuzzy Hash: 6799b98d8746d82bc15af626af90635f3ab0b693c892f4710665c9785bbc5909
                    • Instruction Fuzzy Hash: 7202CB7120468589FB63AB23A5143FB73A1FB8DBC8F544126EF49476B5EB78C880E700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID: Advapi32$An internal function call failed.$Number$SystemFunction036
                    • API String ID: 1646373207-678479747
                    • Opcode ID: e95c01405ecc2da4f765c8ea9c71eba1169503b08c637fb28b225376fb0af0b6
                    • Instruction ID: 19924129e6589892fd92434f36f4263114a956f4f837f98662d3aad899fe02a9
                    • Opcode Fuzzy Hash: e95c01405ecc2da4f765c8ea9c71eba1169503b08c637fb28b225376fb0af0b6
                    • Instruction Fuzzy Hash: 31D1A371604A4481EA67DB2795647FA6391AB8DBD0F69823AFB0E177B1DF35CC81E300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Find$File$CloseNext$AttributesFirst
                    • String ID: .$\\?\
                    • API String ID: 318733699-1717246988
                    • Opcode ID: 22ebcf6ab1c161f610ed45ce32986bf010b8e8e85ea7b26165e20528d1e8c9d1
                    • Instruction ID: 1ccb5ffe96613daf382a1888bec778e6dd3c4fa64e28d0b95ed2322420ad28ba
                    • Opcode Fuzzy Hash: 22ebcf6ab1c161f610ed45ce32986bf010b8e8e85ea7b26165e20528d1e8c9d1
                    • Instruction Fuzzy Hash: BE418E3660478181EB628F17F8503B962A1FB9ABD0F9C9229FB95436E4DF78CD85C740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: DiskErrorFreeLastSpace
                    • String ID: Invalid$NotReady$ReadOnly$Ready$Unknown
                    • API String ID: 1766372604-585993333
                    • Opcode ID: 39f7dcb66a60f25c6d2e69e45326e2c6d401d6957d6538df47d80c0d9d147818
                    • Instruction ID: f5dee007f64a9122d804245272e6d1e8f29747ad2550171696cf5cf1ad3324c8
                    • Opcode Fuzzy Hash: 39f7dcb66a60f25c6d2e69e45326e2c6d401d6957d6538df47d80c0d9d147818
                    • Instruction Fuzzy Hash: 11115271204A46D1EA67CB1AE888BE92365FB4C780F844116F78D43AB4EB38CD59C340
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Find$File$Next$CloseFirst$CountTick
                    • String ID:
                    • API String ID: 1617099276-0
                    • Opcode ID: d7e8f7a13cf5937fcef5dfaf0eb8f43e62a6d551720171a470e76beec005620e
                    • Instruction ID: e1b1713c91f2ef48adf5d10faf617cc97376aa767caaed075739504fcd9a9a46
                    • Opcode Fuzzy Hash: d7e8f7a13cf5937fcef5dfaf0eb8f43e62a6d551720171a470e76beec005620e
                    • Instruction Fuzzy Hash: 55D1E271214B8486EB62DF26E8447EA77E0F389BD4F448225EBAA477F4DB79C445C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CursorMetricsSystem
                    • String ID:
                    • API String ID: 3091566494-0
                    • Opcode ID: 148dbb4d9735cfe6e568a12dcb01c333680b3be8af3b9b687c4d3f1dbba1073d
                    • Instruction ID: 8003d722f9eb6136db5916c577753cedd06e7849ed5ef1ccd2222fe45aff6d8c
                    • Opcode Fuzzy Hash: 148dbb4d9735cfe6e568a12dcb01c333680b3be8af3b9b687c4d3f1dbba1073d
                    • Instruction Fuzzy Hash: 1F91E2723006508BE7168FABA9803ED32D2B7DC7C0F14412CFB86C3AA5CA39DD958B40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: StateThreadWindow$AttachForegroundInputProcess
                    • String ID:
                    • API String ID: 1229699718-0
                    • Opcode ID: 9f65819b8ecd6293ebf423b4a65d5416498106c53898bcb167ee0af9b2c0bbb1
                    • Instruction ID: 28b1e2376583cbdaec120c0af34dd6cd9aac9ac74a9abc402754f8557421bb7e
                    • Opcode Fuzzy Hash: 9f65819b8ecd6293ebf423b4a65d5416498106c53898bcb167ee0af9b2c0bbb1
                    • Instruction Fuzzy Hash: E081F172504280CAF7639B2BE8447F93BA1E74C7D8F04411AF7854B6F6CB3A8586EB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Unicode$KeyboardLayoutScanVirtual
                    • String ID:
                    • API String ID: 128590864-0
                    • Opcode ID: e95ce8d7020b94cddf26b5795dcdaeead364c31cb0d02bb84069c8a326ae1757
                    • Instruction ID: 90008bd4731f4e1de881c1b368101e20e072822b3be411406866e40227106f9a
                    • Opcode Fuzzy Hash: e95ce8d7020b94cddf26b5795dcdaeead364c31cb0d02bb84069c8a326ae1757
                    • Instruction Fuzzy Hash: F151D03220469486F7768B12E4153EAB3A1F78D795F88811AFBC9036E9CB3CC949CB11
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: FileTime$Find$CloseErrorFirstLastLocalSystem
                    • String ID: %04d%02d%02d%02d%02d%02d
                    • API String ID: 3800350769-4847443
                    • Opcode ID: 11b5ae121aede2ce4c9f4d89fbd3a9dfef37191a8fa5636ba0adf2821004d211
                    • Instruction ID: 936e0c331740e7d57fc4235fff54236f7f592c7bbaa422ee563d3cd24c1da6db
                    • Opcode Fuzzy Hash: 11b5ae121aede2ce4c9f4d89fbd3a9dfef37191a8fa5636ba0adf2821004d211
                    • Instruction Fuzzy Hash: C5419E72618681D2EB658F16F0843EDB761F788BD4F548116FB99436E8DB3CC985C710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProcVersion
                    • String ID: %u.%u.%u$RtlGetVersion$ntdll.dll
                    • API String ID: 3310240892-3038598640
                    • Opcode ID: 4f43a9c3fda9c7a89a565173d939fc814dad5b3c4a1bc23df9a25d21b49f90d9
                    • Instruction ID: 5ff04c1bdf52c8e3a375902f28dd0cbd055b095ad91d7d105ecabcd8b26ad957
                    • Opcode Fuzzy Hash: 4f43a9c3fda9c7a89a565173d939fc814dad5b3c4a1bc23df9a25d21b49f90d9
                    • Instruction Fuzzy Hash: 90415EF0A092818AF713DB67BA40FD63BA0A76DB44F84004DDB68937B1DA7DC548C751
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CloseControlCreateDeviceDriveFileHandleType
                    • String ID: .$\
                    • API String ID: 3103408351-1588022913
                    • Opcode ID: 54badcbd39a72c38a623f2e6fa07f4e9766c1ec956f62831d5e58ba943f9a138
                    • Instruction ID: 54591f6ccdbe6058aab5265b11a7fa8376d8960a265ac652398455d77e7d4fcf
                    • Opcode Fuzzy Hash: 54badcbd39a72c38a623f2e6fa07f4e9766c1ec956f62831d5e58ba943f9a138
                    • Instruction Fuzzy Hash: CE31A176710A40CAE721CF72A8447ED37A4F7487D8F555619EF99A3BA8CB38C985CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: File$CloseFind$CreateErrorFirstHandleLastSize
                    • String ID:
                    • API String ID: 2200430037-0
                    • Opcode ID: 18a5b86213b0339e7c79b28b6d11e2ef0b8e8398862aa857ecf8383ed2c9c57c
                    • Instruction ID: f38c011088169c92639564752aec75cb9a54368eef77fa6db70493ace0f5d1e9
                    • Opcode Fuzzy Hash: 18a5b86213b0339e7c79b28b6d11e2ef0b8e8398862aa857ecf8383ed2c9c57c
                    • Instruction Fuzzy Hash: 92417F76218B8086EB729F16F4487A977A1F74CBE0F148619EF5947BB4DB38C8419700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                    • String ID:
                    • API String ID: 1239891234-0
                    • Opcode ID: 424bca160bff8f16c28186baba2ed76aba4c4cbd6a2a66caac757d17b9f4fdc5
                    • Instruction ID: e6106713e9931a14a6ad76546475ca85d0f20a2f685bd26d91b072e9ae843756
                    • Opcode Fuzzy Hash: 424bca160bff8f16c28186baba2ed76aba4c4cbd6a2a66caac757d17b9f4fdc5
                    • Instruction Fuzzy Hash: EA314936214F8086EB618F26E8447EE73A4FB89794F544126EB9D43BA9DF38C5468B10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AlphaCharKeyboardLayout
                    • String ID: Out of memory.
                    • API String ID: 1265737128-4087320997
                    • Opcode ID: 15dca5860d2e74c77aeb69d3f03f0f7ed94de72c022857ba56cecfc583db2056
                    • Instruction ID: 4ccbeaf6c6cd2b83b32988bc7f578437bc95a5b91a9b71cff082bf4324990826
                    • Opcode Fuzzy Hash: 15dca5860d2e74c77aeb69d3f03f0f7ed94de72c022857ba56cecfc583db2056
                    • Instruction Fuzzy Hash: 4802017A62466185FB269B6780607FE27A1E70C7D8F84402AFF8A17AF5D638C845D360
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$ClientForegroundIconicRectScreen
                    • String ID:
                    • API String ID: 4031265896-0
                    • Opcode ID: 41106bca8e4d6fdee1269fd7711f10c2eee4d523243b74d23d70f71a623b0654
                    • Instruction ID: 1e5b58f1f12b006bc8d336e935c356a55b24407bda8b50d3abaaa08a629e62ad
                    • Opcode Fuzzy Hash: 41106bca8e4d6fdee1269fd7711f10c2eee4d523243b74d23d70f71a623b0654
                    • Instruction Fuzzy Hash: CA111C3620478086E7619F5AF851769F3B1EB98BD4F048026FB8983B68EB7CC855CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ClipboardCountOpenTick
                    • String ID:
                    • API String ID: 420724667-0
                    • Opcode ID: a48e17466997e5ac35c7dfe74067a632dbb42f07f43360ba36abceb57f30a5ae
                    • Instruction ID: d09b8feaa4d8e01456d64f682ad2d4a7b9ec1128acd7469e45b344cda75df2ce
                    • Opcode Fuzzy Hash: a48e17466997e5ac35c7dfe74067a632dbb42f07f43360ba36abceb57f30a5ae
                    • Instruction Fuzzy Hash: B4118CB0A11A4082F7569F23F8847A932A2FB8CB84F448128EB4D837B5DB7CC4459B10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: FreeTask$CreateInstance
                    • String ID:
                    • API String ID: 2903366249-0
                    • Opcode ID: de130d481df6d246c8daeabcfd6670aa84f9b1bf6eb00bec03ca93117cdf682a
                    • Instruction ID: 777b2e01834d3a1d8fc253f6b0307b3dcbd23a40f4199b8289b27b5cd4028ce5
                    • Opcode Fuzzy Hash: de130d481df6d246c8daeabcfd6670aa84f9b1bf6eb00bec03ca93117cdf682a
                    • Instruction Fuzzy Hash: 2241363A301A5482EB16DFA7D8503AE67A1FB88BD8F548021EF0947B65DF35D84AC340
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: State
                    • String ID:
                    • API String ID: 1649606143-0
                    • Opcode ID: 3996871507479036042684bcc4021d9056f638709d0320c508f73213e79c6dda
                    • Instruction ID: 753206a5835683367809f88daa9ef4f9472e5889a422fe984dbc783afa635e9f
                    • Opcode Fuzzy Hash: 3996871507479036042684bcc4021d9056f638709d0320c508f73213e79c6dda
                    • Instruction Fuzzy Hash: D11104B2A1000443FB775727D8A93F823D3E76D791F985A04FB59072F5EA394ADA8710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Name$ComputerUser
                    • String ID:
                    • API String ID: 4229901323-0
                    • Opcode ID: eb6e886ef39af206d3f3327bd0b8fb97085d052b64a8f252ebfaca08e5dfc3a5
                    • Instruction ID: 32cd38a5ae7f9d9d058559465e7d8956614bb015f5e85b4939abdd8f3aff5431
                    • Opcode Fuzzy Hash: eb6e886ef39af206d3f3327bd0b8fb97085d052b64a8f252ebfaca08e5dfc3a5
                    • Instruction Fuzzy Hash: 9A215832204B8492EA269F12E1903DE73B4F74CBD4F458226EBAD437A1EF78D695C740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: IconicZoomed
                    • String ID:
                    • API String ID: 435559836-0
                    • Opcode ID: 2a8e69cc5ae1fddbdf88daa0268b87576c453ce8237c10e4bcfeb49a51466850
                    • Instruction ID: 8f9127c491b996b4847d71c8234740fac82b451291c4ddedd448e0e4b26e1660
                    • Opcode Fuzzy Hash: 2a8e69cc5ae1fddbdf88daa0268b87576c453ce8237c10e4bcfeb49a51466850
                    • Instruction Fuzzy Hash: 13F03A71608A8486DB119B2AE85039A6BA0F7DABC4FA04121FB8DC37B4DE3DC5468B00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: KeyboardLayout
                    • String ID:
                    • API String ID: 194098044-0
                    • Opcode ID: aa1ee48bbcc0d2d99731703874260b3da3270325b6916f486c62deb5a078c9d6
                    • Instruction ID: 02948c7bad4c4e422c11b89e1abe5ab7a936529dc2eb7e288da650bcf4cd9432
                    • Opcode Fuzzy Hash: aa1ee48bbcc0d2d99731703874260b3da3270325b6916f486c62deb5a078c9d6
                    • Instruction Fuzzy Hash: 0C11017250159085E7768B6AD0103FE77B1EB29BD8F4A8832FF82431E4E738C855C319
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Item$Rect$Text$MessageSend$LongMove$ClientTimer$AddressAdjustDialogForegroundHandleInfoKillModuleParametersProcSystem
                    • String ID: MB_GetString$user32.dll
                    • API String ID: 1342405604-1499153162
                    • Opcode ID: 1fa8083e5e2a84330fe11154431abb781694cbe8818833f8754b6cabe81ea8d7
                    • Instruction ID: 7aa84403fa8cafd2ea37ad6e16d9102f360cd6579235d4fcd5ca4ab372027f5d
                    • Opcode Fuzzy Hash: 1fa8083e5e2a84330fe11154431abb781694cbe8818833f8754b6cabe81ea8d7
                    • Instruction Fuzzy Hash: 12F170727106008BE725CB6AE9547BD37A2F74CBC4F548129EF4A53BA8DF38D9468710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Auto$Case$Center$Desc$Float$Hdr$Icon$Integer$Invalid option.$Left$Locale$Logical$NoSort$Right$Sort$Text$Uni
                    • API String ID: 3850602802-3402781573
                    • Opcode ID: 781617fb86264e587e45b8206646482e198b3693bb4d4c6b0d2fca88f1d24b76
                    • Instruction ID: f1e2fa2d140c01f896ae1e2d70c5d367be161c25a4b2feedceaa14d210e1a881
                    • Opcode Fuzzy Hash: 781617fb86264e587e45b8206646482e198b3693bb4d4c6b0d2fca88f1d24b76
                    • Instruction Fuzzy Hash: 9F22CE727046918BFB26CB76D4407ED37B2A71A7C8F504029FF8A57AA9DE38C946D340
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Bold$Check$Expand$First$Icon$Invalid option.$Select$Sort$Vis$VisFirst
                    • API String ID: 3850602802-2126331379
                    • Opcode ID: a35d23067877e7015b532250066c81caee36de1cf9eac021e6917dad0cb0ba52
                    • Instruction ID: 50f0c08742ed61d2032d47370e6e6bf9f5ffc10c001e9f4cd7093ed0a6264e57
                    • Opcode Fuzzy Hash: a35d23067877e7015b532250066c81caee36de1cf9eac021e6917dad0cb0ba52
                    • Instruction Fuzzy Hash: 43E1EE32704A958AFB62DB66D4407EE37B1E7487D8F50411AEF8A57AF9DB38C846C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Unicode$ThreadWindow$Process$ClassForegroundInfoKeyboardLayoutMessageNamePostState
                    • String ID: ApplicationFrameWindow
                    • API String ID: 4050567146-3747838517
                    • Opcode ID: 218e7b83f5eb2c8e7176f5ef3c350d603da5645422c7d04de95885cbc7f91e06
                    • Instruction ID: 9292510e6e19fbebae22ff7e62855b3d51a8df17dfc9e347c0f09c5933e2d333
                    • Opcode Fuzzy Hash: 218e7b83f5eb2c8e7176f5ef3c350d603da5645422c7d04de95885cbc7f91e06
                    • Instruction Fuzzy Hash: A502D3722047D486EB228F26E4403EE77A1F78DB84F45421AEF895B7B5DB39C545CB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: $!$!$.ahk ($Call stack:$Stack$\$\
                    • API String ID: 3850602802-136706711
                    • Opcode ID: 396a792ce5b3ea134f5c815ade6e08470a872f25e6ec387ecba99cd2aa2588f6
                    • Instruction ID: 82d9148081cc5120461263ebf3aba5b1402e1cb0383f69feef038900162a5702
                    • Opcode Fuzzy Hash: 396a792ce5b3ea134f5c815ade6e08470a872f25e6ec387ecba99cd2aa2588f6
                    • Instruction Fuzzy Hash: 3A513F72204A8582EB21DF56E4157EE73A1FB88BC4F54C026AB4943FA4DB7CD58ADB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    • DBGP_COOKIE, xrefs: 000000014000CC51
                    • An internal error has occurred in the debugger engine.Continue running the script without the debugger?, xrefs: 000000014000CA8A
                    • DBGP_IDEKEY, xrefs: 000000014000CBB6
                    • Failed to connect to an active debugger client., xrefs: 000000014000CB27
                    • Failed to connect to an active debugger client.Continue running the script without the debugger?, xrefs: 000000014000CE7A
                    • <init appid="AutoHotkey" ide_key="%e" session="%e" thread="%u" parent="" language="AutoHotkey" protocol_version="1.0" fileuri="%r"/>, xrefs: 000000014000CD1F
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ErrorLastMessageStartupconnectsocket
                    • String ID: <init appid="AutoHotkey" ide_key="%e" session="%e" thread="%u" parent="" language="AutoHotkey" protocol_version="1.0" fileuri="%r"/>$An internal error has occurred in the debugger engine.Continue running the script without the debugger?$DBGP_COOKIE$DBGP_IDEKEY$Failed to connect to an active debugger client.$Failed to connect to an active debugger client.Continue running the script without the debugger?
                    • API String ID: 729609403-3505966831
                    • Opcode ID: 03d7cbc9fcde15db2010810b17c41da9f3b64f488473ba05652c4b7d578d9ee4
                    • Instruction ID: cef4481e29f7d1c4b9233c321390a611709d51d03b3cf5d555c8ccf45293c4e7
                    • Opcode Fuzzy Hash: 03d7cbc9fcde15db2010810b17c41da9f3b64f488473ba05652c4b7d578d9ee4
                    • Instruction Fuzzy Hash: 3AD14AB2215B8082EB16DB66E850BE977A0F78CBC4F04461AEF5A57BB9DF38C541D700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: DestroyIcon$MetricsSystem$Name$FileFreeFullLibraryModulePath
                    • String ID: Can't load icon.$HICON:$Out of memory. The current thread will exit.
                    • API String ID: 3423328202-2238219798
                    • Opcode ID: c5cda481bdfaaf9d95d0a3c9e0e07ea034255489de0d2e068af5f0976f90436a
                    • Instruction ID: d5bbcad2a68653648f0d4a65e572c63bc90445fbbcb30f5494c0179a3427a7e8
                    • Opcode Fuzzy Hash: c5cda481bdfaaf9d95d0a3c9e0e07ea034255489de0d2e068af5f0976f90436a
                    • Instruction Fuzzy Hash: D4B17271304B8085EA669F23E8507EA27A5FB8DBC0F494029EF8957BB1EF38C441CB55
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageProcessSendTimeout$ChildCloseCountEnumHandleTickVirtualWindowWindows$AllocFreeMemoryOpenReadThread
                    • String ID: No StatusBar.$msctls_statusbar321
                    • API String ID: 3407604232-1591047504
                    • Opcode ID: 3803c8052ae71d106e2f6689585dd4d7190f81ece6d8687426c21201564d11d4
                    • Instruction ID: 5676ea86f47b7a4a1f921471c46261178ed1ae56b5332398b453c590ee096cde
                    • Opcode Fuzzy Hash: 3803c8052ae71d106e2f6689585dd4d7190f81ece6d8687426c21201564d11d4
                    • Instruction Fuzzy Hash: 42915D7630478086EB628B16F8547EA67A1FB9CBD4F444229FF8943BA4DB7CC585CB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$AttributeEnumProcessThreadVisibleWindows$ChildClassForegroundLongNameText
                    • String ID:
                    • API String ID: 461396857-3916222277
                    • Opcode ID: 73d42d6d7e33039eeaee51972421491caf91df37a3043a67b4426a6877bbcbbe
                    • Instruction ID: 31ce4df825730b6fcf4e9e7081eb39d1d19cf99ddaf825be9ba07fb76abfad00
                    • Opcode Fuzzy Hash: 73d42d6d7e33039eeaee51972421491caf91df37a3043a67b4426a6877bbcbbe
                    • Instruction Fuzzy Hash: A3027E7270478185FB668B6AD4447ED67A1FB687C8F044226FF4A57AB8DB78C9C0CB40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Clipboard$AvailableCloseFormatGlobalUnlock
                    • String ID: Can't open clipboard for reading.$GlobalLock
                    • API String ID: 3455333789-2469064134
                    • Opcode ID: 43493f959cc677dc866e6b4409e2b61ce4f7eff5cdc0abb17c7af32e75e9099d
                    • Instruction ID: 364f5b4e674551645a779352b321ba83f7851cecac1fda8a8ee8e2ab3646cc47
                    • Opcode Fuzzy Hash: 43493f959cc677dc866e6b4409e2b61ce4f7eff5cdc0abb17c7af32e75e9099d
                    • Instruction Fuzzy Hash: 64717DB5601B15C1FA239B27F800BEA72E6AB4CBD0F154229EB59537B0EF79C8029310
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID:
                    • String ID: EndKey$H$Match$Max$Stopped$Timeout$sc%03X
                    • API String ID: 0-2590842051
                    • Opcode ID: 2022a53077d726e411971a65dcd39fff54e9eb01eba2f081f4e8c777a5153538
                    • Instruction ID: 3c89875c36ca25bfb463aec9ad4de739c5b4f318da18eea2d1fb87c11d0c1730
                    • Opcode Fuzzy Hash: 2022a53077d726e411971a65dcd39fff54e9eb01eba2f081f4e8c777a5153538
                    • Instruction Fuzzy Hash: 4651DF7931478485EB26DF23A454BE973A1FB8DBC4F48801AEB8903BB5DB38C946C341
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AddressLibraryProc$Load$DirectoryFreeSystem
                    • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                    • API String ID: 4000602377-744132762
                    • Opcode ID: e7de3b43e527802901f0ec36925fcb241a27c3be126581c61effdda7c727cece
                    • Instruction ID: 70f987835c88b4f38b3cb38c3a506682c33dbb7dc74eaf9e8064911aef4a297f
                    • Opcode Fuzzy Hash: e7de3b43e527802901f0ec36925fcb241a27c3be126581c61effdda7c727cece
                    • Instruction Fuzzy Hash: E0512876215B4091EB22DB12F8883E973A5FB48BD0F948126EE8E13774DF78C54AD710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 10d0f4c7bca51948e69ec7f76c2918a0d5ae743559b1cfd5d3b0ebbf438bcbc7
                    • Instruction ID: 288fc3bef980088e4737cdc1a74e4f598e59f45e1af4fcb63317e51aaa8c5dd3
                    • Opcode Fuzzy Hash: 10d0f4c7bca51948e69ec7f76c2918a0d5ae743559b1cfd5d3b0ebbf438bcbc7
                    • Instruction Fuzzy Hash: AC61713571571181FA678743A4207E962D2EF9CFD0F188429EF490BBA4EA7DCD839701
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: IconNotifyShell_$AddressFindHandleImageLoadMetricsModuleProcSystemWindow
                    • String ID: GetDpiForWindow$Shell_TrayWnd$user32.dll
                    • API String ID: 2322492689-3718927445
                    • Opcode ID: 72ebdcb2fc8c5504227c3001ba6b0ed423ae8ef3559db6210a52e754f54f2df0
                    • Instruction ID: d6cbc8fa7438736ab107560b0fc886020921e6c4210944446034173953855cc2
                    • Opcode Fuzzy Hash: 72ebdcb2fc8c5504227c3001ba6b0ed423ae8ef3559db6210a52e754f54f2df0
                    • Instruction Fuzzy Hash: 7C61807121074086FB539B27E850BEA27A6AB4DFD4F18852AFB45932B5DF38C865C310
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: KeyboardLayout$ActivateLibrary$AddressCloseFreeLoadNameOpenProcQueryValue
                    • String ID: KbdLayerDescriptor$Layout File
                    • API String ID: 1777063618-3758344021
                    • Opcode ID: 56653ad3d58c9c75aed3448171c772eac10b2685ef3e0c54e0c7ce495bbd2f79
                    • Instruction ID: 5c660dde4ae9c49ad7fe69eaa97c9db6e6bd4221d61f89ec985ca19c96cc2e3a
                    • Opcode Fuzzy Hash: 56653ad3d58c9c75aed3448171c772eac10b2685ef3e0c54e0c7ce495bbd2f79
                    • Instruction Fuzzy Hash: 2E518F32740A8196FB63CF6AA8407E963A1BF9C794F459129EF4847B74EF38C9469700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: IconNotifyShell_$AddressFindHandleImageLoadMetricsModuleProcSystemWindow
                    • String ID: GetDpiForWindow$Shell_TrayWnd$user32.dll
                    • API String ID: 2322492689-3718927445
                    • Opcode ID: 5611fd8e438885bbe0602197e7ccb512934c54d1f2f6a3ec331e51369c49c575
                    • Instruction ID: a8290b2470564f24dfec0fb15063f09df572338f4060a2d27c696e6238fee145
                    • Opcode Fuzzy Hash: 5611fd8e438885bbe0602197e7ccb512934c54d1f2f6a3ec331e51369c49c575
                    • Instruction Fuzzy Hash: FC419FB120169086FB528B23A8503E937E5EB0DFC4F09413AEF89472B5EF79C848CB15
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Value$ErrorLast$Heap$AllocFree
                    • String ID:
                    • API String ID: 570795689-0
                    • Opcode ID: 55b2b8631ef0a4b68e637ecd22dba7d11ddd625c272c56b6482c65d148f2fefe
                    • Instruction ID: 5b14f979098e7b562c93a7a6a336ac224fedeb3ee03c614df034aa252b5990b3
                    • Opcode Fuzzy Hash: 55b2b8631ef0a4b68e637ecd22dba7d11ddd625c272c56b6482c65d148f2fefe
                    • Instruction Fuzzy Hash: 8B41273430064182FA6BA37774613ED62828F4C7F0F149725BB3A0B6FBDA78D4438A21
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$ProcessThread$ClassNameText_invalid_parameter_noinfo
                    • String ID: ahk_$class$exe$group$pid
                    • API String ID: 1721056113-2955265324
                    • Opcode ID: 183d68eb4f578de8bcb8a594e6be2901f39867184aef330816d5902be8c75238
                    • Instruction ID: 8213f08824855f87dbd82a8cbae45c254f16c603d21e6a6adab6440c9d2a133d
                    • Opcode Fuzzy Hash: 183d68eb4f578de8bcb8a594e6be2901f39867184aef330816d5902be8c75238
                    • Instruction Fuzzy Hash: E3E1BF3220574482FB66DB17E8447EA73A5E7687D0F864225FB99877F1EB78C485CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$ForegroundText
                    • String ID: Key History has been disabled via KeyHistory(0).$Press [F5] to refresh.$ $ (preempted: they will resume when the current thread finishes)$%s $...$Window: %sKeybd hook: %sMouse hook: %sEnabled Timers: %u of %u (%s)Interrupted threads: %d%sPaused threads: %d of %d (%d$yes
                    • API String ID: 29597999-1471948537
                    • Opcode ID: c6e32eac616e878067eb90b258d77f25a6929db1dfc1f26d4462af23612c5beb
                    • Instruction ID: a147b3941f3b026c093d5af7e0bb19e1b47a7d0bc82e6b394065685defe890da
                    • Opcode Fuzzy Hash: c6e32eac616e878067eb90b258d77f25a6929db1dfc1f26d4462af23612c5beb
                    • Instruction Fuzzy Hash: A1719F75604B8496EB22DF26E4403EA77A0F78CB80F944126EB89537B5DF3DC949D740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: mouse_event$MetricsSystem
                    • String ID:
                    • API String ID: 218841513-0
                    • Opcode ID: c6b767b5f7cdefed2749eff802a5352fad08ab23e555bd60aeebe37bbbca1642
                    • Instruction ID: 82dc31e90b062288269306a943209235f1ff4dc99bf6a7f09e68bd1ef74bddf7
                    • Opcode Fuzzy Hash: c6b767b5f7cdefed2749eff802a5352fad08ab23e555bd60aeebe37bbbca1642
                    • Instruction Fuzzy Hash: C2C1BF7130479086E7B68B1BA5547EA66A1B78DBD4F54411DFF8A43BFACA39CC84CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend$ClientScreenWindow$PointsRect
                    • String ID:
                    • API String ID: 477361101-0
                    • Opcode ID: 7a946c89d1066cb12e11aaf8cfec6b5f413924ffc0d9270b63c462eac61b29bc
                    • Instruction ID: ce57565ebc86b32b3097f1c70dfb9602759a3e4c9defa9b822f9a39736d5ffd9
                    • Opcode Fuzzy Hash: 7a946c89d1066cb12e11aaf8cfec6b5f413924ffc0d9270b63c462eac61b29bc
                    • Instruction Fuzzy Hash: 9291B272301A848AEB66CF26E8547ED37B6F78C7A4F504226EB4A57BA8DF34C545C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Char$Lower$Upper$AlphaNumericStringType
                    • String ID: -()[]{}:;'"/\,.?!
                    • API String ID: 1964238978-2658396598
                    • Opcode ID: 76631c2379347cb0ef53a1d8f964148655f1757eea6bdb010e7178cac28230e3
                    • Instruction ID: ce3fbe2239e9d34bf3e5302f37802ee46c90c5996a0a3c5048485535956dea4a
                    • Opcode Fuzzy Hash: 76631c2379347cb0ef53a1d8f964148655f1757eea6bdb010e7178cac28230e3
                    • Instruction Fuzzy Hash: 7ED1C172214690C6EB63AF66E4803E973A1F708BDAF444119FB466F6B4EB79C991C310
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Long$ErrorLast$InvalidateRect
                    • String ID: +-^$7
                    • API String ID: 189950902-219994616
                    • Opcode ID: 73f8048acefa41082d85854672ad213925dbe40652548d363064fbd88be0a7dd
                    • Instruction ID: b98ca8fb24304897183ce8915dac54e967d1cda3110fe457ace1bed31b608562
                    • Opcode Fuzzy Hash: 73f8048acefa41082d85854672ad213925dbe40652548d363064fbd88be0a7dd
                    • Instruction Fuzzy Hash: B34151B661864082E7719B27E4407AE73A2F78CBC4F555125FB8983BB9DF3CD4419B04
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: sprintf
                    • String ID: %%%02X$&%s;$-_.!~*'()/\$-_.!~*()/$amp$apos$file:///$quot
                    • API String ID: 590974362-335269696
                    • Opcode ID: ce9f21c469da524fce4b99e7e04f296e1f7ac9a3ae1eb2066d04fd01aa62652c
                    • Instruction ID: 6ca0af727b97511e39348601c6b1c581fe9b694876dae7eb2636a333418a3bb1
                    • Opcode Fuzzy Hash: ce9f21c469da524fce4b99e7e04f296e1f7ac9a3ae1eb2066d04fd01aa62652c
                    • Instruction Fuzzy Hash: E7C1C0B2604A5086FB26DB6BA8503ED3BA0B70DBC8F55002BFF4A476B5EB35C551D321
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Char$Lower$Upper
                    • String ID:
                    • API String ID: 3371602591-0
                    • Opcode ID: ba337d3df143b47735bdd7c2b2afc8f7f2587077dbace194ab3a19806deb7c5f
                    • Instruction ID: 67b632df351dd55b68f7cab96e881b3166245ecad2c5d51451ab0b3dd94418b8
                    • Opcode Fuzzy Hash: ba337d3df143b47735bdd7c2b2afc8f7f2587077dbace194ab3a19806deb7c5f
                    • Instruction Fuzzy Hash: 1141D6B191099082EB6A4F13A8507BE7291FB8CFE5F088516FF97471E4D73CC891D260
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ProcessWindow$CountMessageTick$CloseHandleOpenPostSendTerminateThreadTimeout
                    • String ID:
                    • API String ID: 1366898224-0
                    • Opcode ID: 89787fcf77e94cafe116f819818f0599f7e20b28be08091e2ea48a681bf75b36
                    • Instruction ID: ce727cb888c6e625b93d460b8c14e95bc5db74abbaa8fe4eac46bc2368a10e35
                    • Opcode Fuzzy Hash: 89787fcf77e94cafe116f819818f0599f7e20b28be08091e2ea48a681bf75b36
                    • Instruction Fuzzy Hash: 39213E3171078487FA569F27B8147E962A2AFDDBC1F488138AF5A07BB5DF38C4469A10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: f$f$p$p$f
                    • API String ID: 3215553584-1325933183
                    • Opcode ID: e0f154aaf373d2a8a2c402d70ca73ac018b53d73cf3f3cb9bd4d013b8271bfbe
                    • Instruction ID: 12b37432c98239e0f4cf65519d4e4437ab897a51cbd09bd0f82c83bcfdb9bd76
                    • Opcode Fuzzy Hash: e0f154aaf373d2a8a2c402d70ca73ac018b53d73cf3f3cb9bd4d013b8271bfbe
                    • Instruction Fuzzy Hash: 9412C67270C38186FB2AAB16E0547EA76A1F38A7D4F984115FB8247AE8D77CC581CB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID:
                    • String ID: tcp$udp
                    • API String ID: 0-3725065008
                    • Opcode ID: fc5cb122b0f9bb61937347b5d29cce8e6153f31c7c03c9bf78d033e5f38f29b4
                    • Instruction ID: b55b16c48f43b93241971d7f59f7990ce2de91fda1a564aede4d2f0a7a96db9c
                    • Opcode Fuzzy Hash: fc5cb122b0f9bb61937347b5d29cce8e6153f31c7c03c9bf78d033e5f38f29b4
                    • Instruction Fuzzy Hash: E0A1E0B2605B8082EBB6CF17B4417EA6691BBADBC4F544125FFCA477A1EF38C9459300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Virtual
                    • String ID: %02X %03X%c%c%0.2f%-15s%s$E7 %04X%c%c%0.2f%c %s$NOTE: Only the script's own keyboard events are shown(not the user's), because the keyboard hook isn't installed.$NOTE: To disable the key history shown below, call KeyHistory(0). The same method can be used to change the size of the history$Modifiers (Hook's Logical) = %sModifiers (Hook's Physical) = %sPrefix key is down: %s$not found$yes
                    • API String ID: 4278518827-276158223
                    • Opcode ID: e2cbd22726a7865bec083472010cc48d559b8372ee2578d05dea3955ac0dc26e
                    • Instruction ID: a5e00fc6f6fbffadbafa1a3de60d9ac45652530cc7c8bce0b8dfcc8df85f860c
                    • Opcode Fuzzy Hash: e2cbd22726a7865bec083472010cc48d559b8372ee2578d05dea3955ac0dc26e
                    • Instruction Fuzzy Hash: 59C1CE7661878486E726DB56E490BEAB3B4F78CBC0F84411AFB894BAB4DB7DC544C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AsyncSelectioctlsocket
                    • String ID: <error code="%i"/></response>$<response command="%s" transaction_id="%e$<response command="%s" transaction_id="%e"/>$An internal error has occurred in the debugger engine.Continue running the script without the debugger?
                    • API String ID: 2629561747-4209491096
                    • Opcode ID: 647d34c965b91914b04bd1b4d9e22e818a6f8f9c48c40bf43a058d74ad954ae5
                    • Instruction ID: bac89f41bc0f395a65093f73fe7668529f07e729511d6f96d0ecac8347a7b3a9
                    • Opcode Fuzzy Hash: 647d34c965b91914b04bd1b4d9e22e818a6f8f9c48c40bf43a058d74ad954ae5
                    • Instruction Fuzzy Hash: 0CB1ABB220168085FB72DB2BE4543E927A2B75CBD8F545222EF99472F5EF78C846C310
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Create$RectWindow$DeleteEllipticObjectPolygonRound
                    • String ID: ind
                    • API String ID: 1229101157-166120149
                    • Opcode ID: 7e7ce2b3b5f361bd5794a13ec595d64ed6dea03a631bbbc2a77c3267feaa738d
                    • Instruction ID: b10a2700e05df787d79dd6a7e4806dabda623d74969a8271da0cb6b5620d0d9e
                    • Opcode Fuzzy Hash: 7e7ce2b3b5f361bd5794a13ec595d64ed6dea03a631bbbc2a77c3267feaa738d
                    • Instruction Fuzzy Hash: 7F81BE3231468282EB779B07E4103EE6395FB8CBC4F894035AF4A47BE9DB79C9418749
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Menu$DefaultItemRedrawVisible
                    • String ID: &Open$7$Out of memory.
                    • API String ID: 3179908897-4282791463
                    • Opcode ID: 07b35e72ff67c26046284c7247d3b489610f877d402085b6cd58e95f443d7877
                    • Instruction ID: 1f837915973623b27da8e1d1d5b57f660fd9c3c82d12bbc7bdea1e0f08b54a9f
                    • Opcode Fuzzy Hash: 07b35e72ff67c26046284c7247d3b489610f877d402085b6cd58e95f443d7877
                    • Instruction Fuzzy Hash: 4B717B73200B4082EB6A9F17E5807AA77A5FB48BD4F149425EB8907BB4DF38CA91C701
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID:
                    • String ID: 65535$udp
                    • API String ID: 0-1267037602
                    • Opcode ID: 74fccd7207e0305c7f7cef0121a90b924b7a41723053fd2a4e6171051b7f34f3
                    • Instruction ID: 636b295b883a596f78f7e2b7cb10ce2af3785b7d878f8f3cf7d7318aaf6870b9
                    • Opcode Fuzzy Hash: 74fccd7207e0305c7f7cef0121a90b924b7a41723053fd2a4e6171051b7f34f3
                    • Instruction Fuzzy Hash: F95136B220468086FA779A16A4143E96791F788BC4F498426FFC64B6F5CF7AC8429700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: DriveType
                    • String ID: :$CDROM$Fixed$Network$RAMDisk$Removable$Unknown
                    • API String ID: 338552980-2555398676
                    • Opcode ID: 909a4ed793ef40446d93ff385883bb3838f0dbeb9c5c60e0a76f77d72afbc8f2
                    • Instruction ID: cedc6639ab1cbf0f754efa16f276096b415d30660c9b5c073d13743465cdb74d
                    • Opcode Fuzzy Hash: 909a4ed793ef40446d93ff385883bb3838f0dbeb9c5c60e0a76f77d72afbc8f2
                    • Instruction Fuzzy Hash: 35416BB620474582FA26CB67E4403E9B3A0FB4CBD0F964029FB8547AB5EB79CC45C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: SendString
                    • String ID: close cd wait$open %s type cdaudio alias cd wait shareable$status cd mode$status cdaudio mode
                    • API String ID: 890592661-1928455816
                    • Opcode ID: d83ad806e646e5c31f0c19bd6b1a3a2134731d7313152e749ee0cfbeb934c543
                    • Instruction ID: fc7ed4aaff60ac7a9b70570785083fd0cf4f17390d018e0bbc05a7da8656e318
                    • Opcode Fuzzy Hash: d83ad806e646e5c31f0c19bd6b1a3a2134731d7313152e749ee0cfbeb934c543
                    • Instruction Fuzzy Hash: A811A772310641C2FB229BB7E464FE52350EF6CB89F849021FB4947AB1EA3CC98D8710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: $@$Invalid option.$Ptr$Raw$Size$stdout
                    • API String ID: 1452528299-1120262061
                    • Opcode ID: 1c98a925bf9093adf7b647cae7f0ec22a57c18780ac45f61d32cbfb89e3b7443
                    • Instruction ID: 675fb4d50e25badc3ca97a1fbb576dd48880fe2966fcb9a33888f95b70662432
                    • Opcode Fuzzy Hash: 1c98a925bf9093adf7b647cae7f0ec22a57c18780ac45f61d32cbfb89e3b7443
                    • Instruction Fuzzy Hash: 82E1CD7A206B9482EB76DB17A5003EA67A1F74DBE4F48421AEF5947BE5DB38CC45C300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AsyncState$CountTick
                    • String ID:
                    • API String ID: 2436570381-0
                    • Opcode ID: aef10cbef0ed53b1b30a3c37c509fedd19f8dc7236106950a77cc7134f9278c6
                    • Instruction ID: 519411c5d654a85a7b78f5c7ba6b8614bbb4fcb546991d8110f19e5540545a42
                    • Opcode Fuzzy Hash: aef10cbef0ed53b1b30a3c37c509fedd19f8dc7236106950a77cc7134f9278c6
                    • Instruction Fuzzy Hash: 7A416EB960477456E7179B53A4F03F833E1AB4D7A1F48451EBBD2532F5CE3C8449A620
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessagePost$FindWindow$CallHookNext
                    • String ID: #32771
                    • API String ID: 2023431067-1822717788
                    • Opcode ID: 95257e05f9c2394e904c9072d8b5a0321848e193cf33783d5dd37016e5ba754d
                    • Instruction ID: 1980ea8f98ef68cd47db0b41871657df9ccc36ebff5f3488b2a9e8d748dd39a3
                    • Opcode Fuzzy Hash: 95257e05f9c2394e904c9072d8b5a0321848e193cf33783d5dd37016e5ba754d
                    • Instruction Fuzzy Hash: 6FE1DF71208BC485F7639F17B8847EA2B91A75EBE4F48000AEB9A1B7B5DB3EC444C315
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: KeyboardLayout$CharLowerScan
                    • String ID: Alt$Ctrl$Shift
                    • API String ID: 3235444744-3426316353
                    • Opcode ID: 023f4c640116475e036300d9b53919de88955ced18bcebec943c9d8fd534972f
                    • Instruction ID: 5de7bc4a199e3d936ce5be86bf8c9bb9e7b762b9ab59cd174dd11c84cf970eb1
                    • Opcode Fuzzy Hash: 023f4c640116475e036300d9b53919de88955ced18bcebec943c9d8fd534972f
                    • Instruction Fuzzy Hash: 5C61CE33214A4185FB67BA27D1053F96691F70DBE8F8C8012FB85076F5EA38CA91A315
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: File$AttributesFullNamePath$Operation
                    • String ID: :$\
                    • API String ID: 37051200-1166558509
                    • Opcode ID: d19ae208d031546723495f6f10dda102006523714db42b4d252762e8e2e6a417
                    • Instruction ID: 19ca4a969a3122d41e46637e30e05a87884ff33d2752610a18ddd5678f4ff1c0
                    • Opcode Fuzzy Hash: d19ae208d031546723495f6f10dda102006523714db42b4d252762e8e2e6a417
                    • Instruction Fuzzy Hash: 4061C53222578085EB62CF66D8007FA63B2F75D794FA44915EB5D436F4EB39C586C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AttributesFile$FolderFreeKnownPathTask
                    • String ID: %s%s$\AutoHotkey\Lib\$\Lib\
                    • API String ID: 3145814908-2078434092
                    • Opcode ID: cd269d08f4680e23b4c32f520da4165f9812bb8cf58cfb6783b532d21c37e025
                    • Instruction ID: e516f5b3a10849f4eb63ca0378acc38e7817e70a0a7b7b6cd1c43ac3ee77abf6
                    • Opcode Fuzzy Hash: cd269d08f4680e23b4c32f520da4165f9812bb8cf58cfb6783b532d21c37e025
                    • Instruction Fuzzy Hash: 2B61C272604B8491EB22DF66E8843E9A360FB4CBD4F844126EB9D537B5EFB8C546C300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: InfoItemMenu_invalid_parameter_noinfo
                    • String ID: BarBreak$Break$Invalid option.$P$Radio$Right
                    • API String ID: 3785929784-2576641197
                    • Opcode ID: a8cf3c9a1cadbc62aacaceb0789ea9cc362bdcb37d9887d70724f85c600a25e7
                    • Instruction ID: 2a238d833165ff1d5458960380f6997134b888ca2dfa34f4c9d797f8755c8f73
                    • Opcode Fuzzy Hash: a8cf3c9a1cadbc62aacaceb0789ea9cc362bdcb37d9887d70724f85c600a25e7
                    • Instruction Fuzzy Hash: 0B51DC73604A2291EB329B16D9553EB23A0F7587D4F804021FF99876F5EB38CA86C780
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: DialogParamWindow
                    • String ID: AutoHotkey v2.0.12$Cancel$Result$Timeout$Value
                    • API String ID: 2019275597-724431160
                    • Opcode ID: 7e626913cc1702f375841c9b1e1d8f4dc1d83471c09c43b807871961051b9dcc
                    • Instruction ID: 68a1b95453503d52f4ab47430b96ec51f8da3e07aa48170ef783c2ea99cfe260
                    • Opcode Fuzzy Hash: 7e626913cc1702f375841c9b1e1d8f4dc1d83471c09c43b807871961051b9dcc
                    • Instruction Fuzzy Hash: 3F513976714B4089EB22CF66E4807E873B5B74C7A8F40432AAB6C57AE8DB34C5598300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AddressFreeLibraryProc
                    • String ID: api-ms-$ext-ms-
                    • API String ID: 3013587201-537541572
                    • Opcode ID: 159db3d9bbf04d04851cf1d1e761b69af192252fcc1579a5a9d320132951fada
                    • Instruction ID: e3b413d3b2b6f0401907cdcc9dce698bdd1ad0e267f31545943ee53743b1fb2e
                    • Opcode Fuzzy Hash: 159db3d9bbf04d04851cf1d1e761b69af192252fcc1579a5a9d320132951fada
                    • Instruction Fuzzy Hash: B0419431311B5082FB17DB17A8447ED2395BB4DBE0F499225BF1D977A4EE38C5868310
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 00000001400A2440: GetForegroundWindow.USER32(?,0000000140017E57), ref: 00000001400A24A7
                      • Part of subcall function 00000001400A2440: IsWindowVisible.USER32 ref: 00000001400A24C1
                      • Part of subcall function 00000001400A2440: DwmGetWindowAttribute.DWMAPI ref: 00000001400A24E4
                    • GetClassNameW.USER32 ref: 0000000140047213
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$AttributeClassForegroundNameVisible
                    • String ID: "%s"$#32770$AutoHotkey$Could not open script.$Edit$notepad.exe
                    • API String ID: 2970645299-1452042658
                    • Opcode ID: 6b59c39267a13e30f513af0db118b0e3d17db5941fa7e5941bf50df17fbccc9a
                    • Instruction ID: c0b20a92f3c14542c0716cd57cc2749fc21b6b489f2b530150e1854876097e21
                    • Opcode Fuzzy Hash: 6b59c39267a13e30f513af0db118b0e3d17db5941fa7e5941bf50df17fbccc9a
                    • Instruction Fuzzy Hash: E3516AB6214B8485EA22DB56E8407DA7760F79CBC4F84412AFF8D13B79EB78C141CB50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: DialogLibraryLoadParam
                    • String ID: Specifically: %s$%s (%d) : ==> %s%s$Warning: $riched20.dll$stderr
                    • API String ID: 1562155488-188717757
                    • Opcode ID: 78c8a46f9d54ddd52eb530714a1413f6025037552a6c041cb038a229b4c3a270
                    • Instruction ID: b1de09213ad0652267f6252353439471dd22a4f03977a0bbb5dbcc7dc9382cbf
                    • Opcode Fuzzy Hash: 78c8a46f9d54ddd52eb530714a1413f6025037552a6c041cb038a229b4c3a270
                    • Instruction Fuzzy Hash: 0C41B17260479086E762CF16E4543EAB3A0F79C7D4F50402AEBC95BBB5DBB9C585CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageMetricsSendSystem$DestroyIcon
                    • String ID: Can't load icon.
                    • API String ID: 3531782201-3453278282
                    • Opcode ID: 2390b116052a8d3896239615492bb6e449228f1b290b6d8cc06d7561ea873064
                    • Instruction ID: 377fb0bc1819b0c03cb0ff17e8a17e893ef70e559f7bcb5edfc6e9c74be75090
                    • Opcode Fuzzy Hash: 2390b116052a8d3896239615492bb6e449228f1b290b6d8cc06d7561ea873064
                    • Instruction Fuzzy Hash: E831BF72700B5087EB629F53A4507AA7395AB8DBD0F15402ABF4A07BA5DE3CC8838740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick
                    • String ID: EndKey$Match$Max$Stopped$Timeout
                    • API String ID: 536389180-511991314
                    • Opcode ID: f85a9bdf337413f3b482a9c17209b33990c9e08c763b7da80209dd1936c6102a
                    • Instruction ID: 22762733f37e2b0b1ab226cd12957e4a889bd2327c5794925df58edf05ee92f8
                    • Opcode Fuzzy Hash: f85a9bdf337413f3b482a9c17209b33990c9e08c763b7da80209dd1936c6102a
                    • Instruction Fuzzy Hash: B82121B6210A0089EB578F16E8647D472A5F78CBD5F944175EB894BBB4DA3EC491C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: DriveType
                    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown
                    • API String ID: 338552980-706929342
                    • Opcode ID: 0bca4e285b8e99fecf72d57e1c5447844d8591f8582512109d140a45826e729c
                    • Instruction ID: d8e9c1cbca2cc359d06aa5bc88d1d4a7b48976dc34665ca53b6b399b05f5e2b5
                    • Opcode Fuzzy Hash: 0bca4e285b8e99fecf72d57e1c5447844d8591f8582512109d140a45826e729c
                    • Instruction Fuzzy Hash: 24216A72204B8595E666DB27E944BD933A4FB4CBC0F944129EB8D43BB5DB38CE55C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Menu$CreateInfo$DefaultItemPopup
                    • String ID: ($(
                    • API String ID: 1934050479-222463766
                    • Opcode ID: c5b937a4c8ceaeba8ebc01967cd919c3534c672848948f715eea0281042e1c90
                    • Instruction ID: 787bd3d63772c8517e518d27491a83a6546169d9baf908723326b75ca13e6e08
                    • Opcode Fuzzy Hash: c5b937a4c8ceaeba8ebc01967cd919c3534c672848948f715eea0281042e1c90
                    • Instruction Fuzzy Hash: 9F2160B3315B4082EB618F16E1443AE73A1FB8CBC4F689115EB4D07B64DF79C1958B00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Destroy$DeleteIconObject$AcceleratorDragFinishTable
                    • String ID:
                    • API String ID: 2452034632-0
                    • Opcode ID: 6f96db7b165d86dbc481459d6dd6d3d332ceabe24f6f9e02801f8d6c1d84079e
                    • Instruction ID: 90e146107443520b3061d7277bcd6f3206acb2669711a3175d9ed2b1725ade82
                    • Opcode Fuzzy Hash: 6f96db7b165d86dbc481459d6dd6d3d332ceabe24f6f9e02801f8d6c1d84079e
                    • Instruction Fuzzy Hash: 83711576306B8496EB5A9F66D4903AC77A1FB88FC4F484025EF4A07BA9CF38D855C311
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Long$ClientDragFinishScreenShowVisible
                    • String ID:
                    • API String ID: 3330812502-0
                    • Opcode ID: 506d68f583ccb99facd6091ca72005ce9af712a26bb7af530a1f1dceac348e47
                    • Instruction ID: 9bf8ab5efd462c6f0fb0f420a4aa8445613e532a1d60f1187c4ab4e588c5c147
                    • Opcode Fuzzy Hash: 506d68f583ccb99facd6091ca72005ce9af712a26bb7af530a1f1dceac348e47
                    • Instruction Fuzzy Hash: 89619FB2204A4486EB66CF26E458BED7775F788BC8F458215EB4A477B8DF38C909C740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$LongParentPoints$MoveRect
                    • String ID:
                    • API String ID: 3732448687-0
                    • Opcode ID: b7d43a4a546222829877edb403244e97593d27bfffa414724e5fb1f019db905c
                    • Instruction ID: 29de0c4e30dff4dc8a0765f22a29c366a4265ccea2428b782ce4f089234067b3
                    • Opcode Fuzzy Hash: b7d43a4a546222829877edb403244e97593d27bfffa414724e5fb1f019db905c
                    • Instruction Fuzzy Hash: F7415E362086808AE661DF56E5447DEB7A1F7C9BE0F144125FF8987BA9CB7CC845CB04
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: HookWindows$ErrorLastMessageUnhook$PostThread
                    • String ID:
                    • API String ID: 2811735471-0
                    • Opcode ID: 07671e3ad933ecbdad02ff28953f9fb50b08270918b9e42d4f682d98390143d5
                    • Instruction ID: 0ca9d0b5ee58f0c12107d6137d9b98ac1a2168e4abe256e54699108b3e6d5c68
                    • Opcode Fuzzy Hash: 07671e3ad933ecbdad02ff28953f9fb50b08270918b9e42d4f682d98390143d5
                    • Instruction Fuzzy Hash: 3651CE71204A4082FB679B13E494FE9A7F2EB5CBC4F484019FB5E1BAB0DB3EC9449650
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: f$p$p
                    • API String ID: 3215553584-1995029353
                    • Opcode ID: 90cbabfd0163ca01f83631a335f8c8b2515d677f1137601d2991ffd8dda4623c
                    • Instruction ID: d77c2931127a110efa9f869fabce25942067c8930bb7a0f7dfdd34ded32eff70
                    • Opcode Fuzzy Hash: 90cbabfd0163ca01f83631a335f8c8b2515d677f1137601d2991ffd8dda4623c
                    • Instruction Fuzzy Hash: 4F12B27260C78186FB3A9F36E15C3EA76A1F3887D4F984516F786476E8D739C9808B10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$AttributeForegroundVisible$ChildEnumWindows
                    • String ID:
                    • API String ID: 3215277734-0
                    • Opcode ID: 390f548e8cc6006fd9f73b943cf06d71d38877cd616475546455fcf4c6407dc9
                    • Instruction ID: a1166deec737f1a0491fd3286fc436be659a0cc1b98fa95264decbfd953e3123
                    • Opcode Fuzzy Hash: 390f548e8cc6006fd9f73b943cf06d71d38877cd616475546455fcf4c6407dc9
                    • Instruction Fuzzy Hash: 06E1803270474099FB669B6BD8407ED67A1E7B87C4F148226FF4917AA8DB38C9C0CB40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountLongTickWindow$Parent
                    • String ID: OnMessage
                    • API String ID: 3367468570-3325017196
                    • Opcode ID: c8619ec50c0208649ebb9fbcdec775f55c4fa46f54882fe96aa09e98b1616b20
                    • Instruction ID: 0f15d589497cae4da03b56d90b4c17ce5cc5dd74c255ca69140691c62990ddc1
                    • Opcode Fuzzy Hash: c8619ec50c0208649ebb9fbcdec775f55c4fa46f54882fe96aa09e98b1616b20
                    • Instruction Fuzzy Hash: 6AA17BB2904B8096EB16CF26F9403A977A0F79DB84F108219EB8917B72DF39D0A5C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Char$LowerUpper$Alpha
                    • String ID: String
                    • API String ID: 1031401190-2568140703
                    • Opcode ID: 3f30b44934c042b2856ce3c93081d1d391d9b5d3df4a950c98a9ddb100c06546
                    • Instruction ID: ffee514d30b7b1eb546e2a087856810339cadc110dd5dc70275a08d560859d2c
                    • Opcode Fuzzy Hash: 3f30b44934c042b2856ce3c93081d1d391d9b5d3df4a950c98a9ddb100c06546
                    • Instruction Fuzzy Hash: D5715A36204A8481EB679B33E5553EF67A1EB4DBE8F488211EF9A076F6DB78C4518310
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: BitsObjectSelect$CompatibleCreateDeleteEntriesPaletteSystem
                    • String ID:
                    • API String ID: 3388690935-0
                    • Opcode ID: f226b6b64c8f24b1db0f2c68b3be67ccf10c122db036d6d0b240d150522c358a
                    • Instruction ID: da02b89cad8b6d19fe2a839a9f0a2fa3b053c036e6bc7dfd213044c1ce8537a7
                    • Opcode Fuzzy Hash: f226b6b64c8f24b1db0f2c68b3be67ccf10c122db036d6d0b240d150522c358a
                    • Instruction Fuzzy Hash: 81519D76311A908AE7628F36E8147EA77A4F749BD8F458215FF5887BA8DB38C505C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: StateThreadWindow$AttachForegroundInputProcess
                    • String ID:
                    • API String ID: 1229699718-0
                    • Opcode ID: 8dfc5b658355fb44ed421e86b923032a61677d075a5c2f99b62d5028bf4aa186
                    • Instruction ID: 26b9f3bced3580cffea2b907ec3700b4a1ecb87d6de4c054f12aaddcff9e13ca
                    • Opcode Fuzzy Hash: 8dfc5b658355fb44ed421e86b923032a61677d075a5c2f99b62d5028bf4aa186
                    • Instruction Fuzzy Hash: 3E810272504280CAF7639B2BE8447F93BA1E74C7D8F04411AF7854B6F6CB3A8586EB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: StateThreadWindow$AttachForegroundInputProcess
                    • String ID:
                    • API String ID: 1229699718-0
                    • Opcode ID: c4a84b9dab2af3cfe781f5a02f57bfed5353c2fb7a65f317ebf5d97134b9f6f7
                    • Instruction ID: 7c0de8956122fdac24af08edbe936727b272bb146dda366c46560ffb552c27dd
                    • Opcode Fuzzy Hash: c4a84b9dab2af3cfe781f5a02f57bfed5353c2fb7a65f317ebf5d97134b9f6f7
                    • Instruction Fuzzy Hash: BE81F272504280CAF7679B2BE8447F93BA1E74C7D8F14411AF7854B6F6CB3A8586EB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: StateThreadWindow$AttachForegroundInputProcess
                    • String ID:
                    • API String ID: 1229699718-0
                    • Opcode ID: eea027f25d53c5533d258e0e5f253c5b052ee1ec99c142371d92b35cabdca29f
                    • Instruction ID: 7b8574e694fc53ffb1db2ed981d66a7056a0c13034e74711fd7ff5b688e0a15c
                    • Opcode Fuzzy Hash: eea027f25d53c5533d258e0e5f253c5b052ee1ec99c142371d92b35cabdca29f
                    • Instruction Fuzzy Hash: E681F272504280CAF7679B2BE8447F93BA1E74C7D8F14411AF7854B6F6CB3A8586EB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CharUpper$Sleep
                    • String ID: %s%c${Raw}${Text}
                    • API String ID: 3503790639-2444501380
                    • Opcode ID: ec26f4a596df7e3007f20e2b3eed505feac34a5f8021f7d3481eed2582f5d3fe
                    • Instruction ID: d2f6bf787d73a65b79dcb031d65c1bb29df88ccc176a30ac6d335c7a129a6a8b
                    • Opcode Fuzzy Hash: ec26f4a596df7e3007f20e2b3eed505feac34a5f8021f7d3481eed2582f5d3fe
                    • Instruction Fuzzy Hash: 2861CF766006C08AEB72CF26A4403ED77E0FB4CBD8F889115EB990BBA6DB39D551C701
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$CountForegroundTick$MessagePost_invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 1713178899-0
                    • Opcode ID: dc6a54b78731cfeaf61b31e65cb2a7c3f85c09ec035adca057429391725632c5
                    • Instruction ID: aa71869b4f517493fad7554199e39a8d26de12dedef536b81cb359f15cbecd07
                    • Opcode Fuzzy Hash: dc6a54b78731cfeaf61b31e65cb2a7c3f85c09ec035adca057429391725632c5
                    • Instruction Fuzzy Hash: 9051A371614A8082FB569B27B5003EA22A1EB8CBD4F095135FF2517BEADB39C8818704
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ThreadWindow$ClientCountForegroundInfoProcessScreenTick
                    • String ID: H
                    • API String ID: 1246845418-2852464175
                    • Opcode ID: 704360c802ce9f18237775c80f64de7bd843cb4fb176fcf3012ff27824a55bc7
                    • Instruction ID: 3152a52f5c179c1f93d4d92c50c1ebccdaf79f4accd368c113e8019a4407d71c
                    • Opcode Fuzzy Hash: 704360c802ce9f18237775c80f64de7bd843cb4fb176fcf3012ff27824a55bc7
                    • Instruction Fuzzy Hash: BC516D7261568086FA66CF16F5407EEB7A1FB88BC0F468116EB59877A5DB38C846CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend$DestroyIcon
                    • String ID: Number
                    • API String ID: 3419509030-2436635234
                    • Opcode ID: 3411289984a212d2d1f0fdd127a023dfa607228e95779f5a74270936baeb4c64
                    • Instruction ID: 0bc40dfab8ffa14e6e64e515c485144836b2f16e87e25d0ffe96489d396ac703
                    • Opcode Fuzzy Hash: 3411289984a212d2d1f0fdd127a023dfa607228e95779f5a74270936baeb4c64
                    • Instruction Fuzzy Hash: 1F51C47271464482FB679F27E4A4BEB2762F78CBC4F558129EF1A437A4CA39CC528740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,001207A1,00000001,00000001,00000000,000000014000F7D5), ref: 000000014000F5B3
                    • WriteFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,001207A1,00000001,00000001,00000000,000000014000F7D5), ref: 000000014000F635
                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,001207A1,00000001,00000001,00000000,000000014000F7D5), ref: 000000014000F67D
                    • WriteFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,001207A1,00000001,00000001,00000000,000000014000F7D5), ref: 000000014000F6C3
                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,001207A1,00000001,00000001,00000000,000000014000F7D5), ref: 000000014000F6EB
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CloseFileHandleWrite$Info
                    • String ID: stdout
                    • API String ID: 1727933286-3267972124
                    • Opcode ID: 60d7604655fd3c1b57fa107a2e3a942ebb18f1ebc873cc4e6c890a261891886d
                    • Instruction ID: 52926526ade02851607b053a4cae6c938825e135268803a70c42fdd7b71f482c
                    • Opcode Fuzzy Hash: 60d7604655fd3c1b57fa107a2e3a942ebb18f1ebc873cc4e6c890a261891886d
                    • Instruction Fuzzy Hash: 8C51F6B2710A409AE722CF66E8407EC33A5F7487A8F408B15EE6953AF8DF35C555E740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Process$ClassCloseCurrentErrorHandleLastOpenPriority
                    • String ID: Target process not found.
                    • API String ID: 1041824230-3346438222
                    • Opcode ID: 9dd1ff6085653eb400bba2b90e0e13d8ee0e60ed4a28513622a49d25d576894d
                    • Instruction ID: 0b537e0432f5b43d6e6977ade9397ab86db69e8985ab0d4916a4c501f1a41fd5
                    • Opcode Fuzzy Hash: 9dd1ff6085653eb400bba2b90e0e13d8ee0e60ed4a28513622a49d25d576894d
                    • Instruction Fuzzy Hash: 3A31C23270460082F6679F2BA4643FB5392ABCDBC1F298026FB46473B5DE38C8419352
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$DestroyMessageSend$IconMenuShow
                    • String ID:
                    • API String ID: 1747553802-0
                    • Opcode ID: d4050c29df62f8fdbbcdd7f9987a3738d07cc42154ea03e43609c40e3a67900d
                    • Instruction ID: 3e74084718a91e74d2c616fd881273a88653bc446d1bb3d3472f8df53acb6273
                    • Opcode Fuzzy Hash: d4050c29df62f8fdbbcdd7f9987a3738d07cc42154ea03e43609c40e3a67900d
                    • Instruction Fuzzy Hash: A5414972611A4482FB969F26E8947E923A5EB8CFC4F485025EF1A573B4DF38C885C310
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Resource$File$CloseCreateFindHandleLoadLockSizeofWrite
                    • String ID:
                    • API String ID: 4054086306-0
                    • Opcode ID: bdf1da497c98b9b3745a7cb43526e43c7e8d2f79fd924d7a3bb232df337f35af
                    • Instruction ID: 59e18b48bfe192b9ae6cf3ffa7b7ffa6704e81d3dc6e76f66d6ce9b1e1341f41
                    • Opcode Fuzzy Hash: bdf1da497c98b9b3745a7cb43526e43c7e8d2f79fd924d7a3bb232df337f35af
                    • Instruction Fuzzy Hash: FD31813620568086EB629B26B4143EE63A1FB4CBE4F444225FF9A43BE4DF3CC5498700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CurrentDirectoryFileFullNamePath$AttributesCompareCopyOrdinalString
                    • String ID:
                    • API String ID: 2779534578-0
                    • Opcode ID: 84c8ed879c5abb9cda3e3d42fda8326555c498feeb9569fe237361083dacb7eb
                    • Instruction ID: 3043d371afc856d0e5065428a4bf3d013774c635f78bf41e03951d7b8ad1ff41
                    • Opcode Fuzzy Hash: 84c8ed879c5abb9cda3e3d42fda8326555c498feeb9569fe237361083dacb7eb
                    • Instruction Fuzzy Hash: CD215036725B8082EA62DB12F864BE96361FF98BC4F848015EA4947BA4DE3CC545D700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                    • String ID: CONOUT$
                    • API String ID: 3230265001-3130406586
                    • Opcode ID: 94cc898a5500309b9d7ea8c4d7175d1976eb790efe30e5873f400e1694985bca
                    • Instruction ID: c38799da15fe09cbb6a49b8c5e15ec820f72f94d01c60d0572a99f46c1f58d4b
                    • Opcode Fuzzy Hash: 94cc898a5500309b9d7ea8c4d7175d1976eb790efe30e5873f400e1694985bca
                    • Instruction Fuzzy Hash: 3D116D32324A8086E7518B53E8547AD67A5FB8CFE8F048224FB6D87BB4DF78C9458750
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 03d6ee2a2d24f6e9c654b3bfc1c94204d86c3fed09f33c2d51e546852fae1773
                    • Instruction ID: b673c431f06542764e1da05663f745b4742ea4ad91f234d2f6d5f275fbff832f
                    • Opcode Fuzzy Hash: 03d6ee2a2d24f6e9c654b3bfc1c94204d86c3fed09f33c2d51e546852fae1773
                    • Instruction Fuzzy Hash: B2C1C1B2208A808AEB67CF26E4447ED77A9F78DB94F554215EB8947BB8DF38C544C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: 5920e5e9a41b6263e316d5559f0cdc713c668bc4638368a719b294c029b8700a
                    • Instruction ID: 6b1e15711deae5a03f0368d9fe3adfa0907c1f55f3f15ef33cd7deb29212cff7
                    • Opcode Fuzzy Hash: 5920e5e9a41b6263e316d5559f0cdc713c668bc4638368a719b294c029b8700a
                    • Instruction Fuzzy Hash: BF613E72504B5581FB76AF26D0503AD33A0EB98BE4F558212FFA9073F5DB388842D31A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 180bad6ddadf2a70570e00863711d1c42d7120e41d4a12d6bf7710c76ff5a0b1
                    • Instruction ID: 67519ba94ec21199ce00ffefc51df12dff8b991e7a9498e6a67394645ffc230b
                    • Opcode Fuzzy Hash: 180bad6ddadf2a70570e00863711d1c42d7120e41d4a12d6bf7710c76ff5a0b1
                    • Instruction Fuzzy Hash: E261B4736086D09AE722DF66E4447DEBBA1F789384F548026FB8947E68CB7DC585CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Time$File$System$Local
                    • String ID:
                    • API String ID: 2859370177-0
                    • Opcode ID: 169bc0ab9809e8adeeebb3fe41f7700071cec3cf63a66f3ad487ceb95fb319df
                    • Instruction ID: 74c04fec7d8924bf8ace7124ac096cff2655c0df4cbdd2d8fa507655d5d1a743
                    • Opcode Fuzzy Hash: 169bc0ab9809e8adeeebb3fe41f7700071cec3cf63a66f3ad487ceb95fb319df
                    • Instruction Fuzzy Hash: 8641B6B271468982DB618B5AF440BED6361E78CBC4F489026FB89477B9EA7CC945DB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Long$AttributeClassVisible
                    • String ID:
                    • API String ID: 4166653807-0
                    • Opcode ID: 07ffc459cc559860d390ac519bf6cd5f06578f207a8fd76899ea2bbefd7872ed
                    • Instruction ID: ae4343ac9ac1897be7c6a9bad2b5960890569c3747c7fe57433cbf20c0bc5a6a
                    • Opcode Fuzzy Hash: 07ffc459cc559860d390ac519bf6cd5f06578f207a8fd76899ea2bbefd7872ed
                    • Instruction Fuzzy Hash: 7C216232715A5087EB628B27A44036D7361EB98FD0F485211FF56577A8CB38D8D3C711
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetLastError.KERNEL32(?,?,000082BFA5821DEA,00000001400D0595,?,?,?,?,00000001400D0E5E,?,?,00000000,00000001400D42C7,?,?,?), ref: 00000001400D0AAB
                    • FlsSetValue.KERNEL32(?,?,000082BFA5821DEA,00000001400D0595,?,?,?,?,00000001400D0E5E,?,?,00000000,00000001400D42C7,?,?,?), ref: 00000001400D0AE1
                    • FlsSetValue.KERNEL32(?,?,000082BFA5821DEA,00000001400D0595,?,?,?,?,00000001400D0E5E,?,?,00000000,00000001400D42C7,?,?,?), ref: 00000001400D0B0E
                    • FlsSetValue.KERNEL32(?,?,000082BFA5821DEA,00000001400D0595,?,?,?,?,00000001400D0E5E,?,?,00000000,00000001400D42C7,?,?,?), ref: 00000001400D0B1F
                    • FlsSetValue.KERNEL32(?,?,000082BFA5821DEA,00000001400D0595,?,?,?,?,00000001400D0E5E,?,?,00000000,00000001400D42C7,?,?,?), ref: 00000001400D0B30
                    • SetLastError.KERNEL32(?,?,000082BFA5821DEA,00000001400D0595,?,?,?,?,00000001400D0E5E,?,?,00000000,00000001400D42C7,?,?,?), ref: 00000001400D0B4B
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Value$ErrorLast
                    • String ID:
                    • API String ID: 2506987500-0
                    • Opcode ID: 5c06eb7282bb47ab910a8a4de708e04044efd97cb529e79fb271a8768e0beee5
                    • Instruction ID: dcd7ec2991de03568ea51072c6c3afe94dde3703c3647a1f174abfa327a86d48
                    • Opcode Fuzzy Hash: 5c06eb7282bb47ab910a8a4de708e04044efd97cb529e79fb271a8768e0beee5
                    • Instruction Fuzzy Hash: F311293430464083FA6BA777B5913ED62529F5C7F4F148726BB2A076FBDA78C4438A21
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Long$AttributesLayered
                    • String ID: Off
                    • API String ID: 2169480361-334568355
                    • Opcode ID: 6b89796878de489b667b02f9bd3e8bf8dc74f43bfa1cf7c0c38e04776ac77cb5
                    • Instruction ID: 4e47f3cc5cdadf2b6e8e34a1eefe97b1cd2bd3ef64cb5267a2fa6b4058f2893f
                    • Opcode Fuzzy Hash: 6b89796878de489b667b02f9bd3e8bf8dc74f43bfa1cf7c0c38e04776ac77cb5
                    • Instruction Fuzzy Hash: 3281FF72A0469081EB669B23A0443FE67A1F788BD4F466525FF8B47BF5EB38C841C344
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$KillTimer
                    • String ID: Timer
                    • API String ID: 807761965-2870079774
                    • Opcode ID: 739a371533fa8090fb36d5ba724fab2e9ed0b1a7686cf826d7259f4d51aed7e4
                    • Instruction ID: 3ed9c7c446903a1b89014b9dca57ddea94a9665f093d8d52dc5d5113344dee77
                    • Opcode Fuzzy Hash: 739a371533fa8090fb36d5ba724fab2e9ed0b1a7686cf826d7259f4d51aed7e4
                    • Instruction Fuzzy Hash: EFA17CF2A04A8096FB67CB26F5403E937A0F76DB98F145219EB45176B2CB38E4D6C704
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Message$ErrorLastPostSendTimeout
                    • String ID: Ptr$Timeout
                    • API String ID: 3306065770-2623692197
                    • Opcode ID: f4d78d9c8b4eb2622307af1b7250a06c5c1bf461d9ae8be478f7fed2f806bac5
                    • Instruction ID: df6be32f912254af3bfcbbc395a27cbc0e1d3fb6608fffb8c6c9a30a25717ee9
                    • Opcode Fuzzy Hash: f4d78d9c8b4eb2622307af1b7250a06c5c1bf461d9ae8be478f7fed2f806bac5
                    • Instruction Fuzzy Hash: 18814632705B8486EB22CF62E4403ED33A5F78CB88F56452AEF4A17BA8DB38C455C744
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick
                    • String ID: Press [F5] to refresh.$---- %s$Script lines most recently executed (oldest first). Press [F5] to refresh. The seconds elapsed between a line and the one after
                    • API String ID: 536389180-1384135373
                    • Opcode ID: dcab990e1d1aa0a1e7ae7a7423319d25d3cc0e46616d7c9fecfab63c5ad469e0
                    • Instruction ID: 08ef2545b8550b0fd43defee3b34f78db019d5305180cd534317096b19900834
                    • Opcode Fuzzy Hash: dcab990e1d1aa0a1e7ae7a7423319d25d3cc0e46616d7c9fecfab63c5ad469e0
                    • Instruction Fuzzy Hash: 4161E17630478489EB62CF2AE584BEA7364F74C784F904226EF9C43BA9EB39C404C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    • %u hotkeys have been received in the last %ums.Do you want to continue?(see A_MaxHotkeysPerInterval in the help file), xrefs: 0000000140018C32
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick
                    • String ID: %u hotkeys have been received in the last %ums.Do you want to continue?(see A_MaxHotkeysPerInterval in the help file)
                    • API String ID: 536389180-1114924310
                    • Opcode ID: 1b64a63ecc160ea2d7b0198e8a8f1662b9d12618da222be4848cba209c9a8bbb
                    • Instruction ID: e2da2c990c725bb693de79647b2b06ea58fa8d4153410aa03ebc159e39cb2a47
                    • Opcode Fuzzy Hash: 1b64a63ecc160ea2d7b0198e8a8f1662b9d12618da222be4848cba209c9a8bbb
                    • Instruction Fuzzy Hash: 7F617AB2609B8086E722CF27F8807E977A1F79CF84F144219EB4A5BBB4DB39C5408750
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AttributesFile$FolderFreeKnownPathTask
                    • String ID: \AutoHotkey\Lib\$\Lib\
                    • API String ID: 3145814908-2051091515
                    • Opcode ID: f2aa5674f55812654da1ed309786a7464b2aeb6e0293399537cfde90f18f8480
                    • Instruction ID: 8ecfb3978b4ea7bb9073374108bf7c413be5c54f4c9ce3c49a1a581104215d4e
                    • Opcode Fuzzy Hash: f2aa5674f55812654da1ed309786a7464b2aeb6e0293399537cfde90f18f8480
                    • Instruction Fuzzy Hash: 7751C372604A8491EB22DF66E8883EA6360FB4DBD4F848126EF5D537B5DFB9C546C300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Process$CloseDeviceFileHandleImageNameOpenQuery
                    • String ID: :
                    • API String ID: 284135930-336475711
                    • Opcode ID: e8a8bcc66b1ccfaa3b0c2f866f3db70d9a499328521be6f0b4f43508bd5aadac
                    • Instruction ID: 792e4219045a70f938ec6925c70befadb3ba142d8cfffbada423696173a80801
                    • Opcode Fuzzy Hash: e8a8bcc66b1ccfaa3b0c2f866f3db70d9a499328521be6f0b4f43508bd5aadac
                    • Instruction Fuzzy Hash: 1031B07621468192EB279F23E4443EA73A1FB8CBC0F449122EF49477A5EE39C986C750
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • OutputDebugStringW.KERNEL32(-00000041,00000000,?,0000000140054CE9), ref: 0000000140012271
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: DebugOutputString
                    • String ID: Specifically: %s$%s (%d) : ==> %s%s$Warning: $stderr
                    • API String ID: 1166629820-3119856357
                    • Opcode ID: 17da25d3f63d143be9664ca3406247cd11e442e63eb13d2cd58a86953177c761
                    • Instruction ID: f986b703b7e4f7eac70dc781d145a2d8f0a9bb1ae15b6e5121c7230ca5b9bdcb
                    • Opcode Fuzzy Hash: 17da25d3f63d143be9664ca3406247cd11e442e63eb13d2cd58a86953177c761
                    • Instruction Fuzzy Hash: 24418D72205A8092EB62DF12E8807EEB360F798BC4F844016FF8957A78DB3DC955D740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Global$Unlock$ClipboardCloseFree
                    • String ID: Out of memory. The current thread will exit.
                    • API String ID: 1156981608-3615672414
                    • Opcode ID: dbd133e0b2a0c6447763e525ac8836eeb30359b7383c1c842150ff79678f8afd
                    • Instruction ID: 862e3fa401de202f39cac21e5681ea99170bc55acbce0dcd19dc2c1c16d267ef
                    • Opcode Fuzzy Hash: dbd133e0b2a0c6447763e525ac8836eeb30359b7383c1c842150ff79678f8afd
                    • Instruction Fuzzy Hash: B54117B1604A4086E652DF57F950BEA73A1BB8CBC4F48412AEB4817B75DF78C8919710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID:
                    • String ID: Shell_TrayWnd
                    • API String ID: 0-2988720461
                    • Opcode ID: 3f504ff5607b228ace99186032984acc635cb8c7e8cc7254eba93b24709caf01
                    • Instruction ID: 9eeb307ecf1d9d7723fb0bf818179911ece080238c905fb4de47d79667c39de9
                    • Opcode Fuzzy Hash: 3f504ff5607b228ace99186032984acc635cb8c7e8cc7254eba93b24709caf01
                    • Instruction Fuzzy Hash: 2A415E75615B8085E762CB16E8813DAB3A5FB9CBD0F148229EB9943BB5DF38D481CB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: UTF-16$UTF-16-RAW$UTF-8$UTF-8-RAW
                    • API String ID: 3215553584-2787617770
                    • Opcode ID: 3fe9adab4c08f45d5b65463eaa55bd9396cb652b4aca0dc4d0e45c5b00427de3
                    • Instruction ID: 57da7f6f3e12add912c38cae6344caf6e4b560ef83df028cbce7209a0c1da9c1
                    • Opcode Fuzzy Hash: 3fe9adab4c08f45d5b65463eaa55bd9396cb652b4aca0dc4d0e45c5b00427de3
                    • Instruction Fuzzy Hash: 662130E5B0134142FB5A9B67B9513F512909B5C7D5F885035BF094B2F1EA78C9D69300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: File$AttributesDirectoryFullNameOperationPathRemove
                    • String ID: \
                    • API String ID: 934956312-2967466578
                    • Opcode ID: 5d51fb03fc7a8b287fad533664eca4e2e33f3c746549ad2d012522b43b2ed5fb
                    • Instruction ID: df21a5f8c25cae153c6bb7d6ab0ddffdc781a4072ab6aecfc58ed4e496c31ef3
                    • Opcode Fuzzy Hash: 5d51fb03fc7a8b287fad533664eca4e2e33f3c746549ad2d012522b43b2ed5fb
                    • Instruction Fuzzy Hash: D431523251478081EB618F16F4447EAA3B1FB99794F688715EB9D437F4DB39C589CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    • An internal error has occurred in the debugger engine.Continue running the script without the debugger?, xrefs: 000000014000CA2D
                    • <?xml version="1.0" encoding="UTF-8"?>, xrefs: 000000014000C9AD
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: send$sprintf
                    • String ID: <?xml version="1.0" encoding="UTF-8"?>$An internal error has occurred in the debugger engine.Continue running the script without the debugger?
                    • API String ID: 71988530-3162732081
                    • Opcode ID: 7a393633ae3d780b91c39dcc93a06cfe175881e4a76e7d84143160d0d2505b7e
                    • Instruction ID: 3d02886e26ff927cbba0ebbf8152cf799dce8e1ccf928625508e6c41a3348ff7
                    • Opcode Fuzzy Hash: 7a393633ae3d780b91c39dcc93a06cfe175881e4a76e7d84143160d0d2505b7e
                    • Instruction Fuzzy Hash: 1911A2B2720A4593EB22DB3AE5547E92361F78C7D8F444222F759479B5DF78C215C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,00000000,00000001400A1C4F,?,?,00000000,00000000,00000002,80000000,0000000140020ED2), ref: 00000001400A3680
                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,00000000,00000001400A1C4F,?,?,00000000,00000000,00000002,80000000,0000000140020ED2), ref: 00000001400A3690
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID: IsHungAppWindow$user32
                    • API String ID: 1646373207-934392274
                    • Opcode ID: c472ce45712707f961a85b07cdc46f4645a2ac9d255917eed8235940453b50c5
                    • Instruction ID: 186094a462297f9c04707812601706d8eff40aa3fa2fd8ab2d1d3fcf71a446e8
                    • Opcode Fuzzy Hash: c472ce45712707f961a85b07cdc46f4645a2ac9d255917eed8235940453b50c5
                    • Instruction Fuzzy Hash: 8201ADB1602B0083FF06CB26B8507A923A4AF9C7D0F488129AA4A43770EF3CC5958A14
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: DateFormat
                    • String ID: MMM$MMMM$ddd$dddd
                    • API String ID: 2793631785-2187213731
                    • Opcode ID: 4d09fc4fe8b9d5f61fb537979fc3d3d35cdd238933b9334ac10866ef80e44e5d
                    • Instruction ID: 15b902bfcfef20118eadb5c27813c62e7ea11a408ce85ff73d0faff01e91be60
                    • Opcode Fuzzy Hash: 4d09fc4fe8b9d5f61fb537979fc3d3d35cdd238933b9334ac10866ef80e44e5d
                    • Instruction Fuzzy Hash: 791106B2210A05C5EB55CF62E8457AD73A0F748B88F404125FB8D43BA4EB7CC995C780
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$MenuRedrawVisible
                    • String ID: 7
                    • API String ID: 1537645765-1790921346
                    • Opcode ID: 92718fec80f960ca9b64b8603bca16726184f301a22c2150b581c00e14b6b204
                    • Instruction ID: 58f99a724ee5356c9bafc2de5eb4a61e16efab1fe638157eed46aac9afe3d3eb
                    • Opcode Fuzzy Hash: 92718fec80f960ca9b64b8603bca16726184f301a22c2150b581c00e14b6b204
                    • Instruction Fuzzy Hash: 2E015272724A9082EB61CF26E454B6A6365FB8CFD8F085115EF4953B68CF78C541CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CloseHandle$CreateErrorLastMutex
                    • String ID: AHK Mouse
                    • API String ID: 2372642624-1022267635
                    • Opcode ID: 5d50c6fbf85414e1debec82b42195ad48613f87189a36abbde586e6f9381cc2d
                    • Instruction ID: 3b990641e00ba3d589790c9bb90652c6718c622d635d468fb8a1b93cb05704a0
                    • Opcode Fuzzy Hash: 5d50c6fbf85414e1debec82b42195ad48613f87189a36abbde586e6f9381cc2d
                    • Instruction Fuzzy Hash: E1F01775601B0181FB5A8B63B8547F822A2BB8CBC4F489024EF1A4B2B4CF3CC5469210
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: lstrcmpi
                    • String ID: %.17g$.$.$String
                    • API String ID: 1586166983-3009439657
                    • Opcode ID: 9b13102c51273c7c88edf156b2a6564ab9928b05807d7fd5c335c89181acc818
                    • Instruction ID: 35df742ba82c2dd154220a99105891669f3d06de4d52ae58e760345b6040a53e
                    • Opcode Fuzzy Hash: 9b13102c51273c7c88edf156b2a6564ab9928b05807d7fd5c335c89181acc818
                    • Instruction Fuzzy Hash: 40E1BD32604684C5FB77DB27C0613FE66A1EB8DBC4F584126FB4A076B9DB7AE840C611
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID: Compile error %d at offset %d: %hs
                    • API String ID: 3168844106-1211130369
                    • Opcode ID: 45e465fc30a7c4ba9c4f400e86f132928c9d60b4eb5fabbfee9062d34068ab19
                    • Instruction ID: a021edfb542db3872e31fda255732757ee7a1880a4030c70888e012f8f368c73
                    • Opcode Fuzzy Hash: 45e465fc30a7c4ba9c4f400e86f132928c9d60b4eb5fabbfee9062d34068ab19
                    • Instruction Fuzzy Hash: D5917972215B8486EB639F16E4403EAB3A0F788BC4F488516EF8A577A4EF38C945C340
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CharLower$MessagePost
                    • String ID:
                    • API String ID: 1413635493-0
                    • Opcode ID: 6f7228563148cd5db377a5e63305665e003d2762e6f66ca407b545163fbc6af7
                    • Instruction ID: 631e5018476359eefee08a6277e77e6d62724f31d9a264b434f1b4aa02104cc5
                    • Opcode Fuzzy Hash: 6f7228563148cd5db377a5e63305665e003d2762e6f66ca407b545163fbc6af7
                    • Instruction Fuzzy Hash: 7361CF32600250CBEB26AF27D5807A977A0F74CBD6F444125EF495FBA0EB36D862D700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Message$Send$CtrlPost
                    • String ID:
                    • API String ID: 195378345-0
                    • Opcode ID: 5a29d7807fcb7a40a4508b3948ec1832a676ace26152956a4bce0e4c7a825698
                    • Instruction ID: 3a05d15bb713a4dccf50ea99e2ab160a61d0ce492be03d17405b1985107e2873
                    • Opcode Fuzzy Hash: 5a29d7807fcb7a40a4508b3948ec1832a676ace26152956a4bce0e4c7a825698
                    • Instruction Fuzzy Hash: 1341C03330564086EB72CB67A4507ED27A2FB8CBD4F595525EF0A43BA5DB34CA968700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Long$ParentPointsRect
                    • String ID:
                    • API String ID: 2819293416-0
                    • Opcode ID: 905f86a98a61a0c7044bac08b6c602e56f0d8b7b877c0bbac510059615e28997
                    • Instruction ID: e22f1c936948d9bf034514bed4e5ecc65eacec65602a315b64e6e37b70b528c4
                    • Opcode Fuzzy Hash: 905f86a98a61a0c7044bac08b6c602e56f0d8b7b877c0bbac510059615e28997
                    • Instruction Fuzzy Hash: 5E314A32304B908ADB51CF16E4483DEB7A1F7C9BD0F598125EB9C4BBA8DB39C8418B44
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Menu$EnableItem
                    • String ID:
                    • API String ID: 3409067670-0
                    • Opcode ID: 3a483320af5099af0f3817a8d0dfd04a4154d504e67a1e2885b7aa335f91e16a
                    • Instruction ID: 05c2d2918710338adbff6093cf71c789c31c564ea7797628dc355aa77dd70291
                    • Opcode Fuzzy Hash: 3a483320af5099af0f3817a8d0dfd04a4154d504e67a1e2885b7aa335f91e16a
                    • Instruction Fuzzy Hash: DC31B43232074082F667AB2BE4547BB6795FB8EBC0F185026FB4A877B5CE38C8559350
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: State$ThreadWindow$CurrentForegroundProcessVirtual
                    • String ID:
                    • API String ID: 2333321213-0
                    • Opcode ID: 0d1386103f0c4f5102eeffef51c48bd188008dfd66f559c7e068be32abcb14d9
                    • Instruction ID: 28b3d793174e0da6e4ba66148a0e4936905aa053e0497bff4688962b918c3746
                    • Opcode Fuzzy Hash: 0d1386103f0c4f5102eeffef51c48bd188008dfd66f559c7e068be32abcb14d9
                    • Instruction Fuzzy Hash: E131EF3260425187E762CB66F8817EE77A2F7ECBD4F454219FB84036B5CB3AC801AB40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: 2e312d1957bd99225d90d207b0ed5b79a983b60f6d27eda64be17ca707034db6
                    • Instruction ID: be11b32ee1781b2b4267516e287fa4d1c7ede86072926714d35fa207573fa233
                    • Opcode Fuzzy Hash: 2e312d1957bd99225d90d207b0ed5b79a983b60f6d27eda64be17ca707034db6
                    • Instruction Fuzzy Hash: 23215331608780C6FB269B63E4403EDB7A1AB8CBE0F588625FB5957BF5DB38C4429711
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: _set_statfp
                    • String ID:
                    • API String ID: 1156100317-0
                    • Opcode ID: a08b61cdabab33a0e26783602128662f32891b73ad71f8ff16436045d9ace045
                    • Instruction ID: ada8af09da86b611ca4328990cd2af4031932c0a0124598aeed6e7006eab221c
                    • Opcode Fuzzy Hash: a08b61cdabab33a0e26783602128662f32891b73ad71f8ff16436045d9ace045
                    • Instruction Fuzzy Hash: 70117C32A50E1105F76A212EE486BED25406F9C3F4F080624BB7E176FAFB38C8438230
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • FlsGetValue.KERNEL32(?,?,?,00000001400D0067,?,?,00000000,00000001400D0302,?,?,?,?,?,00000001400D028E), ref: 00000001400D0B83
                    • FlsSetValue.KERNEL32(?,?,?,00000001400D0067,?,?,00000000,00000001400D0302,?,?,?,?,?,00000001400D028E), ref: 00000001400D0BA2
                    • FlsSetValue.KERNEL32(?,?,?,00000001400D0067,?,?,00000000,00000001400D0302,?,?,?,?,?,00000001400D028E), ref: 00000001400D0BCA
                    • FlsSetValue.KERNEL32(?,?,?,00000001400D0067,?,?,00000000,00000001400D0302,?,?,?,?,?,00000001400D028E), ref: 00000001400D0BDB
                    • FlsSetValue.KERNEL32(?,?,?,00000001400D0067,?,?,00000000,00000001400D0302,?,?,?,?,?,00000001400D028E), ref: 00000001400D0BEC
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Value
                    • String ID:
                    • API String ID: 3702945584-0
                    • Opcode ID: 3390332fc915b0d18d59a95c62756b0b1d8b5b0c2e379df4f6fa63f0fa262e72
                    • Instruction ID: 65abf92d003ca78cadcf08273f69525a7e654d1749d67f7dca947169d442d1ed
                    • Opcode Fuzzy Hash: 3390332fc915b0d18d59a95c62756b0b1d8b5b0c2e379df4f6fa63f0fa262e72
                    • Instruction Fuzzy Hash: 09110A3031464083FA5BA76775513ED62529F4C7F4F149326BA2A1B6FADE78D4438A20
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ErrorFileLast$CloseCreateHandleTime
                    • String ID:
                    • API String ID: 1269242970-0
                    • Opcode ID: acfa01ea6e2099e0b097abc4bc3b8e8f2621606bda5c768092a1d803013db7d4
                    • Instruction ID: 65cb11c0745fe7c89bdb86629eba169dada42a0adfb4582eadfbe09e7ab89642
                    • Opcode Fuzzy Hash: acfa01ea6e2099e0b097abc4bc3b8e8f2621606bda5c768092a1d803013db7d4
                    • Instruction Fuzzy Hash: CA11BF75704B4082E7929B67FA207A96791E78CBE4F448225EF5943BB4DA38C8829700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: KeyboardLayout
                    • String ID: Invalid key name.$Joy$Unsupported prefix key.
                    • API String ID: 194098044-3124078654
                    • Opcode ID: aefa913960ab03e36c23db47676779af62b392083bd8ec027fe3d543304e7470
                    • Instruction ID: c6332db75434526885a7121b6ee7335e38801b8f26e110e83065f2d4efbcf9dc
                    • Opcode Fuzzy Hash: aefa913960ab03e36c23db47676779af62b392083bd8ec027fe3d543304e7470
                    • Instruction Fuzzy Hash: 09C1F67260869041FF679B2795503FA63A1EB4ABD0F884116FF864B6F1EB3EC946D310
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: string
                    • API String ID: 3215553584-2663297705
                    • Opcode ID: 56768677618132ab276ad5c504a3ad07528e0b5aab01c0a9025fd99945f807ab
                    • Instruction ID: 6ca57cc089db8ae945988ed8baea41c34321b2f473d5bef84c56a95c84bdaf9b
                    • Opcode Fuzzy Hash: 56768677618132ab276ad5c504a3ad07528e0b5aab01c0a9025fd99945f807ab
                    • Instruction Fuzzy Hash: 4A91C132209B4485FB7B9B36D5583EE3795AB08BE4F488316EB6A473E4DB38C4468741
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID:
                    • String ID: Invalid option.$Password
                    • API String ID: 0-1717135785
                    • Opcode ID: de7265c16e4a62354581a2f016d57ae5925d38c569751c3e1df07f4f55403adb
                    • Instruction ID: 9c08882a54e5893ae32b46b9e9587b827b9be36f4d96795043b7400551572aaf
                    • Opcode Fuzzy Hash: de7265c16e4a62354581a2f016d57ae5925d38c569751c3e1df07f4f55403adb
                    • Instruction Fuzzy Hash: F251027A62464089E7678B37D400BF97AA1E78DBC8F508639FF4553AF9E638CC81C604
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID:
                    • String ID: The control is destroyed.
                    • API String ID: 0-604737106
                    • Opcode ID: 60ba2d63bb76951981cce1e63ca345a7bf43591103e3f1d1fcd638844ca5ef02
                    • Instruction ID: fa579814614ce4b588a52e5703e66f5f139e169399a5104aa2aa6dcfa4a8d72d
                    • Opcode Fuzzy Hash: 60ba2d63bb76951981cce1e63ca345a7bf43591103e3f1d1fcd638844ca5ef02
                    • Instruction Fuzzy Hash: B1412331704684C6FB22CB16E4907EA33E1E79CBD0F904029EB4A47BA5DA3DCD82DB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Message$Post
                    • String ID: AutoHotkey v2.0.12$Press OK to continue.
                    • API String ID: 3307098700-30377986
                    • Opcode ID: 2110b15ea21b28e690bcf56c472c1db13a5deb448f96eb32c03a5a8737fcdb9b
                    • Instruction ID: ed9aeb56e123151b030c04d161f682e6411e81132cab0349979210dad25d27ee
                    • Opcode Fuzzy Hash: 2110b15ea21b28e690bcf56c472c1db13a5deb448f96eb32c03a5a8737fcdb9b
                    • Instruction Fuzzy Hash: FC4162B2604AC485EA23DB26F4513EA73A4FFADBC4F448616BB45176B5DB38C5818B40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Menu$DeleteInfoItemObjectRemove
                    • String ID: P
                    • API String ID: 1523629976-3110715001
                    • Opcode ID: fe26a19f74bcbc306b22ef99270305339c91066869bfedb242ac03cdb3307969
                    • Instruction ID: 3c1177bdbc344999e7bfc51ade00b44686189e8dbbd84c2b078828f8a28d9814
                    • Opcode Fuzzy Hash: fe26a19f74bcbc306b22ef99270305339c91066869bfedb242ac03cdb3307969
                    • Instruction Fuzzy Hash: D0310332201B4087EB66CF22E5547AE73A4FB89F95F544125EB8A53F64CF38D9628740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountLocalTickTime
                    • String ID: %03d$MSec
                    • API String ID: 173086840-1589134449
                    • Opcode ID: aa066b016b8bf57499d64203e75f927de99ab3e90c45fcfdd48a2eea6c7fd18c
                    • Instruction ID: 611cdb57e25e50e33ab66944c601d88be98ad6f9f1351b18a8866e9c0b793f38
                    • Opcode Fuzzy Hash: aa066b016b8bf57499d64203e75f927de99ab3e90c45fcfdd48a2eea6c7fd18c
                    • Instruction Fuzzy Hash: 633104B230465187EB1ADB26F4503FA73A2E70CB84F484225EF5543AB5EB78C481C710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Menu$DeleteInfoItemObjectRemove
                    • String ID: P
                    • API String ID: 1523629976-3110715001
                    • Opcode ID: 4c443a5a421109167d42f42949d578c7f2bc99cfd770c11f79c3bedb10a844df
                    • Instruction ID: 4c7bb65e9eba881af41cbb766937a6bfdc824d86d17c1940d8ec4f25008e1ce6
                    • Opcode Fuzzy Hash: 4c443a5a421109167d42f42949d578c7f2bc99cfd770c11f79c3bedb10a844df
                    • Instruction Fuzzy Hash: 06312973201A0087EBA6CF26E5947AD33A1FB89B88F145115EB4E47AA5CF3DC9A5C740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Clipboard$AvailableFormat$CountFormats
                    • String ID: OnClipboardChange
                    • API String ID: 2374125688-2677261247
                    • Opcode ID: c88afefd0eaa79b4f476dc221cd6f29ba05156d13f7db15cf0a594b16040fe4d
                    • Instruction ID: 6de5f2338cd4656a93678dee41239f4af6bbeccf2913fb81099828d3b12a7cd9
                    • Opcode Fuzzy Hash: c88afefd0eaa79b4f476dc221cd6f29ba05156d13f7db15cf0a594b16040fe4d
                    • Instruction Fuzzy Hash: 6E3106B1605A8089EB53CFABF8957E973A5B79CB84F504429E74EA7770DF78C5848300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID: \\.\%c:
                    • API String ID: 823142352-1260769427
                    • Opcode ID: 652eed77f712fa215adef4abe4c5d507edfbb038aba7028adcfbb6b1e27e72de
                    • Instruction ID: 7c8f70c043d47d94de995aeadba6d4cd9f0e81df44b37ad1cfd7d12771aba875
                    • Opcode Fuzzy Hash: 652eed77f712fa215adef4abe4c5d507edfbb038aba7028adcfbb6b1e27e72de
                    • Instruction Fuzzy Hash: 2D11D0727246C082EB218B21F5447EE6360F7987E4F208305F79947AE8CB3DC448CB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Thread$ChildInfoProcessWindow
                    • String ID: H
                    • API String ID: 2321189416-2852464175
                    • Opcode ID: d7e86d82acf2f54f00ed2766fffdaf59ead89169b3b147057df290598db73afc
                    • Instruction ID: 4b3cbb74fecfb63aedd492cb48c4bda272bdac3788726934156f6d29e28e6233
                    • Opcode Fuzzy Hash: d7e86d82acf2f54f00ed2766fffdaf59ead89169b3b147057df290598db73afc
                    • Instruction Fuzzy Hash: 6C014472604A8082D765CF16E4403DEB3A2FBC9784F84C025E78E87B69DF3CC5198B00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • shutdown.WSOCK32(?,?,An internal error has occurred in the debugger engine.Continue running the script without the debugger?,000000014000CF89,?,?,00000001,000000014000CA39), ref: 000000014000CEC0
                    • closesocket.WSOCK32(?,?,An internal error has occurred in the debugger engine.Continue running the script without the debugger?,000000014000CF89,?,?,00000001,000000014000CA39), ref: 000000014000CECA
                    • WSACleanup.WSOCK32(?,?,An internal error has occurred in the debugger engine.Continue running the script without the debugger?,000000014000CF89,?,?,00000001,000000014000CA39), ref: 000000014000CED5
                    Strings
                    • An internal error has occurred in the debugger engine.Continue running the script without the debugger?, xrefs: 000000014000CEA8
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Cleanupclosesocketshutdown
                    • String ID: An internal error has occurred in the debugger engine.Continue running the script without the debugger?
                    • API String ID: 4072869047-3051851581
                    • Opcode ID: 7187ae2270285f8229a00b73a2b42a4fcbdc92e186b94f7d472f4d10cb0c5f4e
                    • Instruction ID: fb264974beb449c7346582f1024a55ce478a03df2db8da6d965833dbbfef1cb6
                    • Opcode Fuzzy Hash: 7187ae2270285f8229a00b73a2b42a4fcbdc92e186b94f7d472f4d10cb0c5f4e
                    • Instruction Fuzzy Hash: 10012CB3510A8087E3518F35D4493A833A2FB18B7EF294724EB754A1EACB78444A8311
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Unregister$RegisterTimer
                    • String ID:
                    • API String ID: 1006365865-0
                    • Opcode ID: b8c7260effb900c2f02a8a9f1f1f7facd87194166b92b337030e1ba911a1d58b
                    • Instruction ID: 4031f1dce82c4cbe3029638fe10fb3697aa687a2a6ddf17bf7e0911b7c39938a
                    • Opcode Fuzzy Hash: b8c7260effb900c2f02a8a9f1f1f7facd87194166b92b337030e1ba911a1d58b
                    • Instruction Fuzzy Hash: B4F1AC7260469086FB778B2794847E93BE5E31EB98F08410AEF950B6F5C73ACB94D350
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: FileWrite$ConsoleErrorLastOutput
                    • String ID:
                    • API String ID: 2718003287-0
                    • Opcode ID: b79a6ec082fe483fdd2605973ac1504d7a02aeb14b572a5d0d2793b889f7161a
                    • Instruction ID: 1b6d47bf3c867f37c93a683c75092a1eb2fadb6d5dff064733531a2b68f0d7e3
                    • Opcode Fuzzy Hash: b79a6ec082fe483fdd2605973ac1504d7a02aeb14b572a5d0d2793b889f7161a
                    • Instruction Fuzzy Hash: BCD19E32714A808AE712CF6AD4407EC37B6EB58BD8F444216EF5E97BA9EA34C517C710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001400D8313,00000000), ref: 00000001400D8444
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001400D8313,00000000), ref: 00000001400D84CF
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ConsoleErrorLastMode
                    • String ID:
                    • API String ID: 953036326-0
                    • Opcode ID: 7e18dfcf9d0e0a33a02a27009ee663a2e34e3ae49fc144e679e6a625f334d032
                    • Instruction ID: 5470b4d00b1d45224e85c680f77b61b531267a27246ceb2f8aa36545436c9caf
                    • Opcode Fuzzy Hash: 7e18dfcf9d0e0a33a02a27009ee663a2e34e3ae49fc144e679e6a625f334d032
                    • Instruction Fuzzy Hash: AC91A172710A5099F7729F6B94847ED2BA0FB48BD8F544119FF0A67AA9DB34C483C720
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$HookUnhookWindows
                    • String ID:
                    • API String ID: 4100890187-0
                    • Opcode ID: 9752b2dfa383e3bd4e87bf540c9b2dd52e3079e85b3a29855a46595f35fa1bc1
                    • Instruction ID: 5870de6e1e6f97b51e7a728abadb61a700535198d5710c8fd4196ef5c61b8079
                    • Opcode Fuzzy Hash: 9752b2dfa383e3bd4e87bf540c9b2dd52e3079e85b3a29855a46595f35fa1bc1
                    • Instruction Fuzzy Hash: 4671A1B2205A90CAE756CF2BE5503A97BA0F74CF94F44801AEF494B7B9DB39C891D710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$AttributeEnumForegroundVisibleWindows
                    • String ID:
                    • API String ID: 862223837-0
                    • Opcode ID: 1307dceefd0dc3aaea48b6d17cec6977302fb9a9ffc29d613ea10e2680e3af3e
                    • Instruction ID: ee19d53a1d4d3cb76b10e9f91c6afd2ad0597a828aac19bfe0978ca18c5b2b6c
                    • Opcode Fuzzy Hash: 1307dceefd0dc3aaea48b6d17cec6977302fb9a9ffc29d613ea10e2680e3af3e
                    • Instruction Fuzzy Hash: DE51AD32604B8488FB66DF23D8547E966A0AB4DBD4F4A5235EF4A477F5DB38C880C744
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CharLower
                    • String ID:
                    • API String ID: 1615517891-0
                    • Opcode ID: d5b017b055dc67834d6b85db1934eaa7c42cd291592b277cfa4d506457bee0f5
                    • Instruction ID: b3d47d02b322a5e1d24ab2eedc195732f509c291288ad1b79d7ac25385c42edb
                    • Opcode Fuzzy Hash: d5b017b055dc67834d6b85db1934eaa7c42cd291592b277cfa4d506457bee0f5
                    • Instruction Fuzzy Hash: 3751E6B2E2455481EB319B17A008BFE77A1F34DBE8F904216FB9A136E4D778C482C705
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$ShowVisible
                    • String ID:
                    • API String ID: 4185057100-0
                    • Opcode ID: 1f784e3e75de596441bbe620b1a0f760fc2fb5b97b33a0d76cea144d45e9f863
                    • Instruction ID: 0317a9d5720cbe0da388430cca8e27a74a5be66fc91fe2a9cedd0ec9d076241c
                    • Opcode Fuzzy Hash: 1f784e3e75de596441bbe620b1a0f760fc2fb5b97b33a0d76cea144d45e9f863
                    • Instruction Fuzzy Hash: 98517AB2604A8486EB66CF26E458BEE77A5F78DBC4F494115EB8A437B4DF38C548C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: e32fc103eb36b1a22ebe4ba43b9a32b87b561eb0cd1f9b123204ba5e6607db04
                    • Instruction ID: dd59329e4844af888e791bb4f58da224d038ba9796dc1723b5ceab2f4022caf3
                    • Opcode Fuzzy Hash: e32fc103eb36b1a22ebe4ba43b9a32b87b561eb0cd1f9b123204ba5e6607db04
                    • Instruction Fuzzy Hash: C6414D32504B4581FB66AF66D4013AD33A4FB48FE0F448212EFA9073E5EB78C491C316
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: a36f779ff009dd4323b8b6a5c5cdc3ce9a770f9aa3b89dc8721915226d1e89f8
                    • Instruction ID: 8791a8d4ad5f817d4638ed64445d334f2dfb8b5d36cbd93f80f7a54748feed31
                    • Opcode Fuzzy Hash: a36f779ff009dd4323b8b6a5c5cdc3ce9a770f9aa3b89dc8721915226d1e89f8
                    • Instruction Fuzzy Hash: 5821073271094482F7664B27F5557AE2292DB98BC4F148435FB4B97BE8DA3CCCD29700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Long$AttributesLayered
                    • String ID:
                    • API String ID: 2169480361-0
                    • Opcode ID: 0907af38386d0aa0492deaa43fb875f35270cf60df9fb004a2c9db8374acc113
                    • Instruction ID: 5916c8efc2b680f935134cf03221a4a42c0cee5d30aae29cc753ca9603814854
                    • Opcode Fuzzy Hash: 0907af38386d0aa0492deaa43fb875f35270cf60df9fb004a2c9db8374acc113
                    • Instruction Fuzzy Hash: DF21A135704A4082EB259F2BA4447AAB7A2ABC8BE0F158125FF8A437B4DB78C4858755
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ErrorLast$AttributesCreateDirectoryFile
                    • String ID:
                    • API String ID: 635176117-0
                    • Opcode ID: 1e1f7d628d4fc4de21c46309b4670a49f505ed4358d49ca0b8d6fafbe00b601b
                    • Instruction ID: 305b213195bf36953affd29313cd3e5fc4ec7bbddce1f8177739138899674636
                    • Opcode Fuzzy Hash: 1e1f7d628d4fc4de21c46309b4670a49f505ed4358d49ca0b8d6fafbe00b601b
                    • Instruction Fuzzy Hash: 7A11A336B1474081EB569B67B5487ED63A1EB8CBC4F085115FB5E477B5DE38C8C28704
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Thread$AttachInput$FocusProcessWindow
                    • String ID:
                    • API String ID: 2336002036-0
                    • Opcode ID: 666cd0efde42a4e80bc4a894c7507fb2c679ab2fa3e844137770aebc4515e153
                    • Instruction ID: d20d52ec5746f1e13a6f49fa1995b2616ef22ae230c1b2eef5c56462f9e09ea4
                    • Opcode Fuzzy Hash: 666cd0efde42a4e80bc4a894c7507fb2c679ab2fa3e844137770aebc4515e153
                    • Instruction Fuzzy Hash: D8210B31604B4082E7229B26F8917DA7362FBCDBD0F554129FB8947BB9DF39D8458B10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                    • String ID:
                    • API String ID: 2933794660-0
                    • Opcode ID: db55a7fd7ce89f31cbd65c327fee6df84e5d28cb2e2512aaf4126d20c480c642
                    • Instruction ID: 4db4768e0261470a34a50722439763c8d669bef10dd4185851e5fc04a3d71dcd
                    • Opcode Fuzzy Hash: db55a7fd7ce89f31cbd65c327fee6df84e5d28cb2e2512aaf4126d20c480c642
                    • Instruction Fuzzy Hash: B0111536715F008AEB00CF61E8543A933A4FB1DBA8F441A21EB6D87BA4DB78C1998340
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID:
                    • String ID: "$Out of memory.
                    • API String ID: 0-1555670740
                    • Opcode ID: 4b10c537d63a0949055f7124952f3c3e3b750db3f1013ca7832244fcd6bda647
                    • Instruction ID: 2041c2237d8245c866b2564919848e1aab9507616a8f74384433317555c12fed
                    • Opcode Fuzzy Hash: 4b10c537d63a0949055f7124952f3c3e3b750db3f1013ca7832244fcd6bda647
                    • Instruction Fuzzy Hash: 8EC18872601A90C5EB72DF2694407EA37A5F748BE4F898617FB99077E4EB36C981C300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick
                    • String ID: Callback
                    • API String ID: 536389180-2156861040
                    • Opcode ID: ad88c62e088bdafcc3909c7b00ab17768b8c3689d022b2eb07620a17c7b20ac9
                    • Instruction ID: ed89b7c79fab8bbacf1fa38e36b4b1e8b8344ac3b30116dbc7d86ad070ee2a1e
                    • Opcode Fuzzy Hash: ad88c62e088bdafcc3909c7b00ab17768b8c3689d022b2eb07620a17c7b20ac9
                    • Instruction Fuzzy Hash: 73A1B172A14BC096EB12CF26E8413E937A0F35DB98F544319EB9D17AB2DB39D495C300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Window$Foreground
                    • String ID: %.17g$String
                    • API String ID: 62970417-734013530
                    • Opcode ID: 67c9fbb32bc6c1d64bc17dc0c82eba770737688e538e22503c82d891e373050a
                    • Instruction ID: de0493117823689b7928deeb636cf65e0e7ff16bb75ce32a3abc1f2b5ecf30c6
                    • Opcode Fuzzy Hash: 67c9fbb32bc6c1d64bc17dc0c82eba770737688e538e22503c82d891e373050a
                    • Instruction Fuzzy Hash: 89715B3260878081EB639B17A5443E96BA5F79DBD8F564032FF8907AB5CB78C8858748
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: IconNotifyShell_
                    • String ID:
                    • API String ID: 1144537725-3916222277
                    • Opcode ID: bc2fa053150f835eea45821aca818997962e76aa597078730b3f665593754b9a
                    • Instruction ID: 008b3f679a2ea4be15213c15d6b2ba2d57aaccdb7c63a17ee6f9b44bee1d1953
                    • Opcode Fuzzy Hash: bc2fa053150f835eea45821aca818997962e76aa597078730b3f665593754b9a
                    • Instruction Fuzzy Hash: 2441837224878087E7768F56E8943EAB3A5F748BC4F148529EB8D43BA5E77CC545CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick
                    • String ID: #HotIf
                    • API String ID: 536389180-3987657291
                    • Opcode ID: 3d969a4b4755e06f2bfde7ddf43d8df316e133a3a848f2357b6edf974bf3813e
                    • Instruction ID: 11c41f4039230f910fb9e0441254e9cd704b55423ff3907b9be500d01dc8f586
                    • Opcode Fuzzy Hash: 3d969a4b4755e06f2bfde7ddf43d8df316e133a3a848f2357b6edf974bf3813e
                    • Instruction Fuzzy Hash: BF9136B2904B80C6E712CF2AF8413E977A4F79DB98F145229EF98536B6DB39D091C700
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: NamePath$FullShort
                    • String ID: Out of memory.
                    • API String ID: 4229621559-4087320997
                    • Opcode ID: e124eb6b2dae3212a517217e50a262e1339da0ee15031f6a6558c60faa13fe68
                    • Instruction ID: 189aeb1ff8701719b3778cad28f82c70165e46a5c049042406aeb048933b5b72
                    • Opcode Fuzzy Hash: e124eb6b2dae3212a517217e50a262e1339da0ee15031f6a6558c60faa13fe68
                    • Instruction Fuzzy Hash: 9751B272211B8586EB66DB26E8847DAB3E0F70C7C4F448129EB9E03B61EF39E545C340
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: _set_statfp
                    • String ID: !$acos
                    • API String ID: 1156100317-2870037509
                    • Opcode ID: 1e22b8de1b4a75e790d95826593da5c634cf3d276b437eeec1797679699e6813
                    • Instruction ID: 2c15be268ed98462e7ec72b0d96ae52749330ed3086d9a6ea5100b5138b90736
                    • Opcode Fuzzy Hash: 1e22b8de1b4a75e790d95826593da5c634cf3d276b437eeec1797679699e6813
                    • Instruction Fuzzy Hash: 7D6162B1A24F4489E623CB3694503AAA765AFAB7D0F519303EB5A36E74DB3CC0835640
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide
                    • String ID: %u">$VUUU
                    • API String ID: 626452242-3222289237
                    • Opcode ID: 239ed7a31aac56ccebcaf9bbb58b9d74f0f686132656142c2b947916e8ecd4a5
                    • Instruction ID: 25d9b6ca83e7821511183228dd790cbd4531c762e6e10e3ab2e00afecd1cbb25
                    • Opcode Fuzzy Hash: 239ed7a31aac56ccebcaf9bbb58b9d74f0f686132656142c2b947916e8ecd4a5
                    • Instruction Fuzzy Hash: 234137B271069083EB65EA17E5407E973D6F759BD0F458136AF194BBE4EE3CC9428300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: _set_statfp
                    • String ID: !$asin
                    • API String ID: 1156100317-2188059690
                    • Opcode ID: 16268775c515c6675f9bb71ddf5fda950e51b33550d6b907857f06ec06823b41
                    • Instruction ID: cbc948d92d5219b80105b78c8ab26f8f64dd77d29acc69ad5a82befaba616d82
                    • Opcode Fuzzy Hash: 16268775c515c6675f9bb71ddf5fda950e51b33550d6b907857f06ec06823b41
                    • Instruction Fuzzy Hash: 40518671A24F8489E613CB3698513AEA365AFAA7D0F519307FB9636D74DB3CD0838640
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ErrorFileLastWrite
                    • String ID: U
                    • API String ID: 442123175-4171548499
                    • Opcode ID: e272f7c9a49b8b55932eefaeaad7d2eb71207848587f8df50fbc2ec66db4b458
                    • Instruction ID: 4560c0dc84ad7e5284cb1d201f1c4077f61d9f0fd61722ea771707b1d70bfbd2
                    • Opcode Fuzzy Hash: e272f7c9a49b8b55932eefaeaad7d2eb71207848587f8df50fbc2ec66db4b458
                    • Instruction Fuzzy Hash: 8741BF36314A8082EB218F26E8443EEB7A5FB88BD4F404025EF4D877A8DB38C446C710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RtlPcToFileHeader.KERNEL32(?,?,?,?,00000000,009DEE08,00A1AAF0,00000009,00000000,0000000140011DA9), ref: 00000001400DA4BB
                    • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00000001400DA517
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: FileFindHeaderInstanceTargetType
                    • String ID: Bad dynamic_cast!
                    • API String ID: 746355257-2956939130
                    • Opcode ID: 98210f854d0daaa40dd30e5b3534991e368a089433d78b7d691dc8c5a9dfada0
                    • Instruction ID: 15bb5e2ef274abf57b014ac5607f966985dfc731686b591c743429ff167e62ca
                    • Opcode Fuzzy Hash: 98210f854d0daaa40dd30e5b3534991e368a089433d78b7d691dc8c5a9dfada0
                    • Instruction Fuzzy Hash: 57316E72315A8486EA61CB66E484BEE63A0FB89BD4F108525EF9D47B64DB3CD142C710
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Time$FileSystem
                    • String ID: %04d%02d%02d%02d%02d%02d
                    • API String ID: 2086374402-4847443
                    • Opcode ID: 824800b2213910b982a5c6b4ac3912c1f58b4398438a9cd6b2d4f33b764ce5a2
                    • Instruction ID: 02f9ca928da2b835cbb07f6412830828d84dc6a835c057a990705415662ca512
                    • Opcode Fuzzy Hash: 824800b2213910b982a5c6b4ac3912c1f58b4398438a9cd6b2d4f33b764ce5a2
                    • Instruction Fuzzy Hash: F341A672718A4482DB528F1AF0403AEB3A1F788BC5F548125FBC843A69EB7DC895DB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ClipboardCloseGlobalUnlock
                    • String ID: Out of memory. The current thread will exit.
                    • API String ID: 3794156920-3615672414
                    • Opcode ID: 1a3546b48a1fccc2608f86df88af9b62e9e7296f7700aff3631a47e350de6087
                    • Instruction ID: aef381c8a757cf2e58b5d0736ce20821b016687a79d6c1061f03d60ef524f82c
                    • Opcode Fuzzy Hash: 1a3546b48a1fccc2608f86df88af9b62e9e7296f7700aff3631a47e350de6087
                    • Instruction Fuzzy Hash: D2414B76604A4086EB62DF57F940B9AB3A1F78CBD0F48412AEB8817B75DF7DC5918B00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Caps
                    • String ID: 4
                    • API String ID: 130273448-4088798008
                    • Opcode ID: daac607ccdf1ee62e4488e812bf2d484490bc0fbce089329ef5b35bc6609566d
                    • Instruction ID: a3756bffd14d3f1c9b30efc8498a4c3ec07030bb8465af1b9d46370ebc2f9a6f
                    • Opcode Fuzzy Hash: daac607ccdf1ee62e4488e812bf2d484490bc0fbce089329ef5b35bc6609566d
                    • Instruction Fuzzy Hash: 1C31DC3221474486E7B68F26E8053AD23A7F79D7C8F684A16EF49076A4DB78C946CB10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID: 4
                    • API String ID: 410705778-4088798008
                    • Opcode ID: 37ec13f7abfb177683c2ef6bfdd0afdf530490a608cdf9945233f07c7b0dcd2f
                    • Instruction ID: b34215d1700f897ca88641b13869883014a8aab2df37f6b57c5da6dc08c23783
                    • Opcode Fuzzy Hash: 37ec13f7abfb177683c2ef6bfdd0afdf530490a608cdf9945233f07c7b0dcd2f
                    • Instruction Fuzzy Hash: 3421E2F221079086EB12DB13E4847AD77A5F34CB84F455126EB8A43BA5DBBCCA51C704
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Menu$Item$CountCreateInsert
                    • String ID: P
                    • API String ID: 203066352-3110715001
                    • Opcode ID: 6ce140100a7755df49b8d9d68e588fac83162ff79cd5cc6666ab3e28d4ceda79
                    • Instruction ID: 3e6e9dc8e3017c5a6646ff3f6ef79e065f74ba37244e00699861018eaca82d78
                    • Opcode Fuzzy Hash: 6ce140100a7755df49b8d9d68e588fac83162ff79cd5cc6666ab3e28d4ceda79
                    • Instruction Fuzzy Hash: 9521E476705B4086E761CF16E480B5AB7A4F78CBD4F144166EF9D83B28DB38C991CB40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Time$File$LocalSystem
                    • String ID: %04d%02d%02d%02d%02d%02d
                    • API String ID: 1748579591-4847443
                    • Opcode ID: d2af93afa79dfda6858d718f8886287010bf4483f2b6b72b730c9c4684303eae
                    • Instruction ID: ccaf81971ec95f2e9a00edffd2a2822164232b087f1e4063b5019730bd282a30
                    • Opcode Fuzzy Hash: d2af93afa79dfda6858d718f8886287010bf4483f2b6b72b730c9c4684303eae
                    • Instruction Fuzzy Hash: 58215172618690C2DB558F1AF4403AEB7B1F798BC4F148616FB8943AB8DB39C552DB40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000001400DA5A8,?,?,?,?,00000000,009DEE08), ref: 00000001400BC5D0
                    • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000001400DA5A8,?,?,?,?,00000000,009DEE08), ref: 00000001400BC611
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: ExceptionFileHeaderRaise
                    • String ID: csm
                    • API String ID: 2573137834-1018135373
                    • Opcode ID: 35d9d709ec47ba8c85ff61062c985731ce1e3bf38a539542953e9992716c57b4
                    • Instruction ID: b2fe5872ed4f0537e60a27478831ea2c6880de1afe052b1c45f23b3614fcb7cd
                    • Opcode Fuzzy Hash: 35d9d709ec47ba8c85ff61062c985731ce1e3bf38a539542953e9992716c57b4
                    • Instruction Fuzzy Hash: 2F11FB32214F4082EB628F26F4403997BE5FB88B94F588225EF9D47768DF38D591CB00
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Time$File$LocalSystem
                    • String ID: %04d%02d%02d%02d%02d%02d
                    • API String ID: 1748579591-4847443
                    • Opcode ID: 0e81479946cecbf40def1f4ef14968b3c4e6513bde2852a62c7952bf53d4ddb8
                    • Instruction ID: f325a50b0d22d3892a6122fd713e35841e1cb7654e2b89f3ae100ef47286f730
                    • Opcode Fuzzy Hash: 0e81479946cecbf40def1f4ef14968b3c4e6513bde2852a62c7952bf53d4ddb8
                    • Instruction Fuzzy Hash: 18115B72618790C2DB568F16F4403ABB7B1FB88BD5F144626FB9A43AA8DB3CC151DB40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Time$LocalSystem
                    • String ID: %04d%02d%02d%02d%02d%02d
                    • API String ID: 1098363292-4847443
                    • Opcode ID: 5618753d2a30a99a1ee3543bb788d7539afb03105aebc21dfc800c736236680e
                    • Instruction ID: 09d605c943687260c825acd7a49a9c43b908153414408b8034867a10cc8a2647
                    • Opcode Fuzzy Hash: 5618753d2a30a99a1ee3543bb788d7539afb03105aebc21dfc800c736236680e
                    • Instruction Fuzzy Hash: 7C01ADB2908600C2D7468F12F04036EB7B1F388B45F104112FB9903A98D73DC0A4CB20
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: FindMessagePostWindow
                    • String ID: Shell_TrayWnd
                    • API String ID: 2578315405-2988720461
                    • Opcode ID: 52e13443fee94e155041505f7e733e79c5b52a77beffbe9f4b25b530498307fb
                    • Instruction ID: 58d24cd1f139bfa688bfbc018106ff2477e3c2fb5920922eaeda3f1c78125e30
                    • Opcode Fuzzy Hash: 52e13443fee94e155041505f7e733e79c5b52a77beffbe9f4b25b530498307fb
                    • Instruction Fuzzy Hash: A7E0DF74B0100082F30A8B13EC613E42252A79CB90FA48124FB0A03BF0DA3885868300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.1671501756.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000002.00000002.1671487178.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671572743.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671618306.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671632671.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671647627.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671661194.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671676475.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671693193.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671709705.0000000140127000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000002.00000002.1671743892.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: FindMessagePostWindow
                    • String ID: Shell_TrayWnd
                    • API String ID: 2578315405-2988720461
                    • Opcode ID: ef10025ab184a58e9e0bc033ac5c55dd31c3319b5ae39170cc84956cd8386965
                    • Instruction ID: 60e4b397298d782e6bf67713b2db8ee302796ad3dc57a93f33ed77d20d77b31d
                    • Opcode Fuzzy Hash: ef10025ab184a58e9e0bc033ac5c55dd31c3319b5ae39170cc84956cd8386965
                    • Instruction Fuzzy Hash: D6E02670F0100482F30B8B13FC913F42252A7CCB90FA48224EF0A03BF0DD3884868300
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:2.3%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:2000
                    Total number of Limit Nodes:103
                    execution_graph 187646 14005a746 187668 14005c1b0 187646->187668 187648 14005a076 187649 14005a1d0 187648->187649 187650 14005a087 GetTickCount 187648->187650 187654 14005a136 GetTickCount 187648->187654 187658 1400764f0 187648->187658 187681 140008964 ioctlsocket 187648->187681 187650->187648 187651 14005a0a4 PeekMessageW 187650->187651 187652 14005a0c2 187651->187652 187653 14005a0cf GetTickCount 187651->187653 187652->187653 187653->187648 187654->187648 187655 14005a169 187654->187655 187655->187648 187659 14007651f __std_exception_copy 187658->187659 187660 140076556 187659->187660 187665 1400767e2 187659->187665 187667 1400767d6 __std_exception_copy memcpy_s 187659->187667 187682 1400722c0 187659->187682 187660->187648 187661 140076932 GetTickCount 187663 140076948 187661->187663 187664 140076951 SetTimer 187661->187664 187663->187660 187663->187664 187664->187660 187728 1400122d0 802 API calls 187665->187728 187667->187660 187667->187661 189589 140075090 187668->189589 187670 14005c25c __std_exception_copy 187674 14005c2a7 187670->187674 189593 14008cdd0 802 API calls __std_exception_copy 187670->189593 187672 14005c2ce __std_exception_copy 187672->187674 187675 14005a010 802 API calls 187672->187675 187676 14005c562 GetTickCount 187672->187676 187678 1400764f0 802 API calls 187672->187678 189594 14008d090 802 API calls __std_exception_copy 187672->189594 189595 140008964 ioctlsocket 187672->189595 189596 140067080 55 API calls 187672->189596 187674->187648 187675->187672 187676->187672 187677 14005c59c 187676->187677 187677->187672 187678->187672 187681->187648 187696 140072350 __std_exception_copy memcpy_s 187682->187696 187683 140074693 187684 140074e04 187683->187684 187685 140074e2a 187683->187685 187718 14007457f __std_exception_copy memcpy_s 187683->187718 187823 14000f730 121 API calls 187684->187823 187824 140010880 DialogBoxParamW 187685->187824 187686 140074605 187686->187683 187690 140074903 187686->187690 187691 14007462c 187686->187691 187686->187718 187688 1400672c0 55 API calls 187688->187696 187690->187683 187692 140074910 187690->187692 187815 14009f9a0 802 API calls __std_exception_copy 187691->187815 187697 140074924 187692->187697 187704 1400749b0 187692->187704 187696->187683 187696->187686 187696->187688 187701 14007465f 187696->187701 187703 140074784 187696->187703 187708 140073c85 187696->187708 187712 140074712 187696->187712 187696->187718 187719 14002bda0 55 API calls 187696->187719 187720 14009c780 54 API calls 187696->187720 187721 14009cfe0 55 API calls 187696->187721 187722 1400c5974 52 API calls 187696->187722 187723 1400609a0 55 API calls 187696->187723 187724 1400a12d0 56 API calls 187696->187724 187729 1400a1720 187696->187729 187739 140075250 187696->187739 187748 14008da80 187696->187748 187778 140093260 187696->187778 187786 140010d10 802 API calls 187696->187786 187787 140054320 187696->187787 187814 14009f9a0 802 API calls __std_exception_copy 187696->187814 187700 140074972 187697->187700 187713 14007492a 187697->187713 187820 140067080 55 API calls 187700->187820 187701->187683 187714 140054320 802 API calls 187701->187714 187817 140011280 802 API calls 187703->187817 187705 140074a03 187704->187705 187706 140074d6d 187704->187706 187704->187718 187707 140074d53 187705->187707 187705->187708 187822 1400c5974 52 API calls 187706->187822 187821 14009f4e0 54 API calls 187707->187821 187708->187718 187818 140011560 802 API calls 187708->187818 187816 1400122d0 802 API calls 187712->187816 187713->187718 187819 140067120 55 API calls 187713->187819 187714->187683 187718->187659 187719->187696 187720->187696 187721->187696 187722->187696 187723->187696 187724->187696 187728->187667 187730 1400a1751 187729->187730 187732 1400a1889 187730->187732 187735 1400a17f3 __std_exception_copy 187730->187735 187825 1400055e0 187730->187825 187732->187735 187829 14008ea00 187732->187829 187733 1400055e0 58 API calls 187733->187735 187735->187733 187736 1400a1931 187735->187736 187738 1400a1843 __std_exception_copy 187735->187738 187737 14008ea00 802 API calls 187736->187737 187736->187738 187737->187738 187738->187696 187741 140075289 187739->187741 187855 1400da444 187741->187855 187744 14007539c __std_exception_copy 187744->187696 187745 1400752fb 187745->187744 187746 140093260 802 API calls 187745->187746 187747 14008da80 802 API calls 187745->187747 187746->187744 187747->187744 187758 14008dabb 187748->187758 187750 1400055e0 58 API calls 187755 14008dc2e 187750->187755 187751 14008e04e 187753 14008e23a 187751->187753 187777 14008e057 memcpy_s 187751->187777 187752 14008df83 187754 14008df88 187752->187754 187760 14008dfe2 187752->187760 187761 14008e260 187753->187761 187771 14008ddc1 __std_exception_copy memcpy_s 187753->187771 187772 14008e31c 187753->187772 187757 14008ea00 802 API calls 187754->187757 187755->187750 187756 14008dcb7 187755->187756 187766 14008dc0f __std_exception_copy memcpy_s 187755->187766 187756->187766 187868 140091a40 187756->187868 187757->187771 187758->187755 187758->187766 187769 14008dc04 187758->187769 187864 140092bb0 187758->187864 187763 14008ea00 802 API calls 187760->187763 187760->187771 187761->187771 187880 140093150 52 API calls memcpy_s 187761->187880 187762 14008e3be 187762->187771 187879 140010f40 802 API calls 187762->187879 187763->187771 187766->187769 187770 14008def2 187766->187770 187766->187771 187768 1400da444 3 API calls 187773 14008e38b 187768->187773 187769->187751 187769->187752 187769->187771 187871 140011280 802 API calls 187770->187871 187771->187696 187772->187762 187772->187768 187773->187762 187775 14008e390 187773->187775 187873 1400450b0 187775->187873 187777->187771 187872 140011280 802 API calls 187777->187872 187779 14009326e 187778->187779 187780 14009329d 187778->187780 187779->187780 187894 140093850 187779->187894 187898 140005970 187779->187898 187929 1400758d0 187779->187929 187932 140075640 187779->187932 187781 140093294 187781->187696 187786->187696 187788 140054357 187787->187788 187812 140054454 187787->187812 187789 14005459f 187788->187789 187795 1400543b4 187788->187795 187788->187812 187790 1400c0224 58 API calls 187789->187790 187792 1400545ee 187789->187792 187790->187789 187791 1400c0224 58 API calls 187791->187795 187804 140054591 187792->187804 187792->187812 189470 140053a10 128 API calls 187792->189470 187793 1400c0224 58 API calls 187796 1400543fb 187793->187796 187795->187791 187795->187796 187796->187793 187800 140054463 187796->187800 187796->187812 187797 140054624 187798 140054630 187797->187798 187797->187804 189471 140054ba0 187798->189471 187803 14005450f 187800->187803 187800->187804 187800->187812 189469 140054770 802 API calls 187800->189469 187801 140054654 187805 1400a0ef0 802 API calls 187801->187805 187801->187812 187802 1400c0224 58 API calls 187802->187804 187807 140054558 187803->187807 187808 14005452c 187803->187808 187803->187812 187804->187802 187809 140054728 187804->187809 187804->187812 187805->187812 187807->187804 187811 140054320 802 API calls 187807->187811 187810 140054320 802 API calls 187808->187810 187809->187812 189490 140054e50 60 API calls memcpy_s 187809->189490 187810->187812 187811->187804 187812->187696 187814->187696 187815->187718 187816->187718 187817->187718 187818->187718 187819->187718 187820->187718 187821->187718 187822->187718 187823->187718 187824->187718 187826 140005624 187825->187826 187827 140005662 187825->187827 187826->187827 187833 1400c0224 187826->187833 187827->187730 187830 14008ea32 memcpy_s 187829->187830 187831 14008eb44 __std_exception_copy 187830->187831 187832 140093260 802 API calls 187830->187832 187831->187735 187832->187831 187834 1400c0255 187833->187834 187835 1400c0231 187833->187835 187837 1400c028f 187834->187837 187840 1400c02ae 187834->187840 187835->187834 187836 1400c0236 187835->187836 187850 1400d058c 11 API calls memcpy_s 187836->187850 187852 1400d058c 11 API calls memcpy_s 187837->187852 187854 1400c0148 52 API calls _CallSETranslator 187840->187854 187841 1400c023b 187851 1400d03a4 52 API calls _invalid_parameter_noinfo 187841->187851 187842 1400c0294 187853 1400d03a4 52 API calls _invalid_parameter_noinfo 187842->187853 187846 1400c0246 187846->187826 187847 1400d040c 58 API calls 187849 1400c02bb 187847->187849 187848 1400c029f 187848->187826 187849->187847 187849->187848 187850->187841 187851->187846 187852->187842 187853->187848 187854->187849 187856 1400da48a 187855->187856 187858 1400752ef 187855->187858 187857 1400da4b0 RtlPcToFileHeader 187856->187857 187859 1400da4ce FindMITargetTypeInstance 187856->187859 187857->187859 187858->187745 187862 14008d380 802 API calls 187858->187862 187859->187858 187863 1400bc580 RtlPcToFileHeader RaiseException 187859->187863 187861 1400da5a8 187862->187745 187863->187861 187865 140092c3e 187864->187865 187867 140092bf5 187864->187867 187865->187758 187866 1400c0224 58 API calls 187866->187867 187867->187865 187867->187866 187881 1400b9b84 187868->187881 187870 140091a63 187870->187766 187871->187771 187872->187771 187874 140045145 187873->187874 187878 1400450f5 187873->187878 187893 140093150 52 API calls memcpy_s 187874->187893 187876 140045153 187876->187771 187877 1400c0224 58 API calls 187877->187878 187878->187874 187878->187876 187878->187877 187879->187771 187880->187771 187882 1400b9b8f 187881->187882 187883 1400b9ba8 187882->187883 187885 1400b9bae 187882->187885 187890 1400cef30 EnterCriticalSection LeaveCriticalSection memcpy_s 187882->187890 187883->187870 187888 1400b9bb9 187885->187888 187891 1400ba1f4 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 187885->187891 187892 1400ba214 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 187888->187892 187889 1400b9bbf 187889->187870 187890->187882 187892->187889 187893->187876 187895 140093877 187894->187895 187939 1400758f0 187895->187939 187897 140093892 187897->187781 187899 140005a05 187898->187899 187903 1400059b5 187898->187903 187900 140005a0b 187899->187900 187910 140005a25 187899->187910 188018 140010f40 802 API calls 187900->188018 187901 1400059eb 188017 140010f40 802 API calls 187901->188017 187903->187899 187903->187901 187905 140006269 187994 1400b9ae9 187905->187994 187907 140005bbf 187909 1400055e0 58 API calls 187907->187909 187908 14000628b 187925 1400062c1 __std_exception_copy 187908->187925 188026 140011af0 802 API calls 187908->188026 187912 140005bcf 187909->187912 187910->187907 187920 140005b41 187910->187920 188019 140011560 802 API calls 187912->188019 187914 1400059fe __std_exception_copy 187914->187781 187915 14000622d 188025 140011b40 802 API calls 187915->188025 187916 1400da444 3 API calls 187916->187920 187920->187905 187920->187908 187920->187915 187920->187916 188020 14009c780 54 API calls swprintf 187920->188020 188021 1400c5974 52 API calls 187920->188021 188022 140067120 55 API calls 187920->188022 188023 140067080 55 API calls 187920->188023 188024 140067760 55 API calls 187920->188024 187922 1400da444 3 API calls 187922->187925 187925->187914 187925->187922 187927 1400a12d0 56 API calls 187925->187927 187928 1400a0ef0 802 API calls 187925->187928 188027 14009f9a0 802 API calls __std_exception_copy 187925->188027 187927->187925 187928->187925 187930 1400758f0 802 API calls 187929->187930 187931 1400758e2 187930->187931 187931->187781 189249 140075470 187932->189249 187934 1400756d7 187934->187781 187935 140075665 187935->187934 189264 1400988d0 187935->189264 189315 140090f80 187935->189315 189328 140025540 187935->189328 187942 140075924 187939->187942 187945 140075981 187939->187945 187940 14007595b 187981 140010f40 802 API calls 187940->187981 187942->187940 187942->187945 187943 140075c17 187982 140010f40 802 API calls 187943->187982 187947 1400b9b84 4 API calls 187945->187947 187951 140075b80 187945->187951 187958 14007596e __std_exception_copy 187945->187958 187946 1400760e6 187949 1400b9b84 4 API calls 187946->187949 187957 1400761b2 187946->187957 187947->187951 187948 1400b9b84 4 API calls 187964 140075c2f 187948->187964 187956 140076110 187949->187956 187950 140076284 187950->187958 187970 14005a010 187950->187970 187951->187943 187951->187951 187951->187964 187952 1400a0da0 802 API calls 187969 140075e29 187952->187969 187955 14007632f 187991 140010f40 802 API calls 187955->187991 187960 1400a0ef0 802 API calls 187956->187960 187957->187950 187957->187958 187961 14005a010 802 API calls 187957->187961 187958->187897 187960->187957 187961->187957 187962 1400da444 3 API calls 187962->187969 187964->187948 187964->187969 187983 1400a0ef0 187964->187983 187965 1400762fe 187990 140011b90 802 API calls 187965->187990 187969->187946 187969->187952 187969->187955 187969->187958 187969->187962 187969->187965 187988 14009f9a0 802 API calls __std_exception_copy 187969->187988 187971 14005a1d0 187970->187971 187979 14005a06c 187970->187979 187971->187958 187989 140008964 ioctlsocket 187971->187989 187972 14005a087 GetTickCount 187973 14005a0a4 PeekMessageW 187972->187973 187972->187979 187974 14005a0c2 187973->187974 187975 14005a0cf GetTickCount 187973->187975 187974->187975 187975->187979 187976 14005a136 GetTickCount 187977 14005a169 187976->187977 187976->187979 187977->187979 187979->187971 187979->187972 187979->187976 187980 1400764f0 798 API calls 187979->187980 187992 140008964 ioctlsocket 187979->187992 187980->187979 187981->187958 187982->187958 187984 1400a0f06 187983->187984 187987 1400a0f4a __std_exception_copy 187984->187987 187993 14009fc60 802 API calls 187984->187993 187986 1400a0f32 187986->187964 187987->187964 187988->187969 187989->187958 187990->187958 187991->187958 187992->187979 187993->187986 188028 140076c70 187994->188028 188031 140083e01 187994->188031 188099 140083e6d 187994->188099 188165 140078890 187994->188165 188169 140077550 187994->188169 188185 140083d95 187994->188185 188253 1400664c0 187994->188253 188263 1400769a0 187994->188263 188266 140043260 187994->188266 188272 1400411e0 187994->188272 188286 140083d59 187994->188286 188352 140083d27 187994->188352 188418 140083c00 187994->188418 188487 140083d1a 187994->188487 188552 140042570 187994->188552 188569 140076b70 187994->188569 188572 14002add0 187994->188572 188577 140083ea5 187994->188577 188652 140076cb0 187994->188652 188655 140076df0 187994->188655 188658 140076b50 187994->188658 187995 1400b9b3d 187995->187908 188017->187914 188018->187914 188019->187914 188020->187920 188021->187920 188022->187920 188023->187920 188024->187920 188025->187914 188026->187925 188027->187925 188661 1400772f0 188028->188661 188955 1400c0410 188031->188955 188033 140083e16 188034 1400c0410 58 API calls 188033->188034 188038 140083cd7 188033->188038 188034->188038 188035 140084289 188035->187995 188036 140084096 ShowWindow 188039 1400840a7 188036->188039 188037 140084152 IsIconic 188041 140084167 188037->188041 188055 1400842ee 188037->188055 188038->188035 188038->188036 188038->188039 188039->188037 188040 1400840e0 188039->188040 188046 1400840ce 188039->188046 188042 140084119 188040->188042 188043 1400840ec MulDiv 188040->188043 188045 140084290 188041->188045 188059 140084170 188041->188059 188042->188037 188049 140084125 MulDiv 188042->188049 188043->188042 188044 140084374 IsWindowVisible 188047 14008438a GetWindowLongW GetMenu GetWindowLongW AdjustWindowRectEx 188044->188047 188048 140084647 188044->188048 188051 14008420a 188045->188051 188052 1400842d7 GetClientRect 188045->188052 188045->188055 188972 1400886b0 12 API calls 188046->188972 188056 1400843f1 188047->188056 188057 1400843e3 GetSystemMetrics 188047->188057 188054 140084681 IsWindowVisible 188048->188054 188062 140084675 ShowWindow 188048->188062 188063 140084655 GetForegroundWindow 188048->188063 188049->188037 188050 140084353 188050->188044 188051->188055 188058 140084237 GetWindowLongW 188051->188058 188052->188055 188065 140084698 188054->188065 188055->188044 188055->188050 188067 14008433e 188055->188067 188060 140084406 188056->188060 188061 1400843f8 GetSystemMetrics 188056->188061 188057->188056 188058->188055 188064 14008424c GetWindowRect 188058->188064 188059->188051 188068 1400841b7 GetWindowLongW 188059->188068 188069 1400841a8 GetParent 188059->188069 188071 14008440b SendMessageW 188060->188071 188072 140084437 188060->188072 188061->188060 188062->188054 188063->188062 188066 140084664 DefDlgProcW 188063->188066 188064->188055 188065->188035 188070 1400846c8 GetAncestor 188065->188070 188066->188062 188973 140087f30 25 API calls 188067->188973 188068->188059 188074 1400841cb GetWindowRect MapWindowPoints 188068->188074 188069->188059 188069->188068 188070->188035 188075 1400846e1 GetForegroundWindow 188070->188075 188071->188072 188076 14008446f SystemParametersInfoW 188072->188076 188079 140084460 GetClientRect 188072->188079 188074->188059 188100 1400c0410 58 API calls 188099->188100 188102 140083cd7 188100->188102 188101 140084096 ShowWindow 188106 1400840a7 188101->188106 188102->188101 188102->188106 188141 140084289 188102->188141 188103 140084152 IsIconic 188105 140084167 188103->188105 188120 1400842ee 188103->188120 188104 1400840e0 188107 140084119 188104->188107 188108 1400840ec MulDiv 188104->188108 188110 140084290 188105->188110 188124 140084170 188105->188124 188106->188103 188106->188104 188111 1400840ce 188106->188111 188107->188103 188114 140084125 MulDiv 188107->188114 188108->188107 188109 140084374 IsWindowVisible 188112 14008438a GetWindowLongW GetMenu GetWindowLongW AdjustWindowRectEx 188109->188112 188113 140084647 188109->188113 188116 14008420a 188110->188116 188117 1400842d7 GetClientRect 188110->188117 188110->188120 188981 1400886b0 12 API calls 188111->188981 188121 1400843f1 188112->188121 188122 1400843e3 GetSystemMetrics 188112->188122 188119 140084681 IsWindowVisible 188113->188119 188127 140084675 ShowWindow 188113->188127 188128 140084655 GetForegroundWindow 188113->188128 188114->188103 188115 140084353 188115->188109 188116->188120 188123 140084237 GetWindowLongW 188116->188123 188117->188120 188130 140084698 188119->188130 188120->188109 188120->188115 188132 14008433e 188120->188132 188125 140084406 188121->188125 188126 1400843f8 GetSystemMetrics 188121->188126 188122->188121 188123->188120 188129 14008424c GetWindowRect 188123->188129 188124->188116 188133 1400841b7 GetWindowLongW 188124->188133 188134 1400841a8 GetParent 188124->188134 188136 14008440b SendMessageW 188125->188136 188137 140084437 188125->188137 188126->188125 188127->188119 188128->188127 188131 140084664 DefDlgProcW 188128->188131 188129->188120 188135 1400846c8 GetAncestor 188130->188135 188130->188141 188131->188127 188982 140087f30 25 API calls 188132->188982 188133->188124 188139 1400841cb GetWindowRect MapWindowPoints 188133->188139 188134->188124 188134->188133 188140 1400846e1 GetForegroundWindow 188135->188140 188135->188141 188136->188137 188142 14008446f SystemParametersInfoW 188137->188142 188145 140084460 GetClientRect 188137->188145 188139->188124 188143 1400846f0 188140->188143 188144 1400846f8 188140->188144 188141->187995 188151 140084484 GetWindowRect 188142->188151 188983 1400a1b30 48 API calls 188143->188983 188144->188141 188147 140084705 GetFocus 188144->188147 188145->188151 188148 14008471e 188147->188148 188149 14008478b 188147->188149 188148->188141 188149->188141 188163 14008451f 188151->188163 188156 1400845e3 IsZoomed 188163->188113 188163->188156 188166 14007889e 188165->188166 188985 140079a00 GetWindowRect ScreenToClient 188166->188985 188170 14007781e 188169->188170 188171 14007757b 188169->188171 188173 140077869 188170->188173 188176 14007783d 188170->188176 188171->188170 188172 140077588 188171->188172 189009 140080420 188172->189009 189033 14000f150 802 API calls 188173->189033 189032 140010880 DialogBoxParamW 188176->189032 188178 1400775ac 188179 1400776ec CreateWindowExW 188178->188179 188180 140077649 LoadCursorW RegisterClassExW 188178->188180 188184 1400775b0 188178->188184 188181 140077747 SetWindowLongPtrW 188179->188181 188179->188184 188180->188179 188180->188184 188182 140077764 SendMessageW SendMessageW 188181->188182 188182->188184 188184->187995 188186 1400c0410 58 API calls 188185->188186 188187 140083daa 188186->188187 188188 1400c0410 58 API calls 188187->188188 188189 140083cd7 188187->188189 188188->188189 188190 140084096 ShowWindow 188189->188190 188194 1400840a7 188189->188194 188242 140084289 188189->188242 188190->188194 188191 140084152 IsIconic 188193 140084167 188191->188193 188208 1400842ee 188191->188208 188192 1400840e0 188195 140084119 188192->188195 188196 1400840ec MulDiv 188192->188196 188198 140084290 188193->188198 188212 140084170 188193->188212 188194->188191 188194->188192 188199 1400840ce 188194->188199 188195->188191 188202 140084125 MulDiv 188195->188202 188196->188195 188197 140084374 IsWindowVisible 188200 14008438a GetWindowLongW GetMenu GetWindowLongW AdjustWindowRectEx 188197->188200 188201 140084647 188197->188201 188204 14008420a 188198->188204 188205 1400842d7 GetClientRect 188198->188205 188198->188208 189034 1400886b0 12 API calls 188199->189034 188209 1400843f1 188200->188209 188210 1400843e3 GetSystemMetrics 188200->188210 188207 140084681 IsWindowVisible 188201->188207 188215 140084675 ShowWindow 188201->188215 188216 140084655 GetForegroundWindow 188201->188216 188202->188191 188203 140084353 188203->188197 188204->188208 188211 140084237 GetWindowLongW 188204->188211 188205->188208 188222 140084698 188207->188222 188208->188197 188208->188203 188219 14008433e 188208->188219 188213 140084406 188209->188213 188214 1400843f8 GetSystemMetrics 188209->188214 188210->188209 188211->188208 188217 14008424c GetWindowRect 188211->188217 188212->188204 188220 1400841b7 GetWindowLongW 188212->188220 188221 1400841a8 GetParent 188212->188221 188224 14008440b SendMessageW 188213->188224 188225 140084437 188213->188225 188214->188213 188215->188207 188216->188215 188218 140084664 DefDlgProcW 188216->188218 188217->188208 188218->188215 189035 140087f30 25 API calls 188219->189035 188220->188212 188227 1400841cb GetWindowRect MapWindowPoints 188220->188227 188221->188212 188221->188220 188223 1400846c8 GetAncestor 188222->188223 188222->188242 188228 1400846e1 GetForegroundWindow 188223->188228 188223->188242 188224->188225 188229 14008446f SystemParametersInfoW 188225->188229 188232 140084460 GetClientRect 188225->188232 188227->188212 188230 1400846f0 188228->188230 188231 1400846f8 188228->188231 188240 140084484 GetWindowRect 188229->188240 189036 1400a1b30 48 API calls 188230->189036 188234 140084705 GetFocus 188231->188234 188231->188242 188232->188240 188239 14008471e 188234->188239 188252 14008478b 188234->188252 188239->188242 188250 14008451f 188240->188250 188242->187995 188250->188201 188252->188242 188254 1400664d2 188253->188254 188255 1400664de 188253->188255 188254->187995 188256 14006652b 188255->188256 188257 14006651b ImageList_GetIconSize 188255->188257 189038 14009e190 188256->189038 188257->188256 188260 14006655c 188260->187995 188261 140066570 ImageList_AddMasked DeleteObject 188261->188260 188262 1400665a9 ImageList_ReplaceIcon DestroyIcon 188262->188260 189139 140029ef0 188263->189139 188265 1400769bb 188265->187995 188267 14004327e 188266->188267 188268 1400b9b84 4 API calls 188267->188268 188269 1400432f1 188268->188269 189160 140042f70 188269->189160 188271 140043370 __std_exception_copy 188271->187995 189194 140044990 188272->189194 188275 1400412aa GetWindowRect 188277 1400412c6 MapWindowPoints 188275->188277 188285 1400412bc 188275->188285 188276 140041271 GetWindowLongW 188276->188275 188278 140041285 GetParent 188276->188278 188279 1400412e1 GetParent 188277->188279 188278->188275 188280 140041293 GetWindowLongW 188278->188280 188282 14004130c MapWindowPoints 188279->188282 188283 140041323 MoveWindow 188279->188283 188280->188275 188280->188278 188282->188283 188283->188285 188285->187995 188287 1400c0410 58 API calls 188286->188287 188289 140083cd7 188287->188289 188288 140084096 ShowWindow 188293 1400840a7 188288->188293 188289->188288 188289->188293 188328 140084289 188289->188328 188290 140084152 IsIconic 188292 140084167 188290->188292 188307 1400842ee 188290->188307 188291 1400840e0 188294 140084119 188291->188294 188295 1400840ec MulDiv 188291->188295 188297 140084290 188292->188297 188311 140084170 188292->188311 188293->188290 188293->188291 188298 1400840ce 188293->188298 188294->188290 188301 140084125 MulDiv 188294->188301 188295->188294 188296 140084374 IsWindowVisible 188299 14008438a GetWindowLongW GetMenu GetWindowLongW AdjustWindowRectEx 188296->188299 188300 140084647 188296->188300 188303 14008420a 188297->188303 188304 1400842d7 GetClientRect 188297->188304 188297->188307 189223 1400886b0 12 API calls 188298->189223 188308 1400843f1 188299->188308 188309 1400843e3 GetSystemMetrics 188299->188309 188306 140084681 IsWindowVisible 188300->188306 188314 140084675 ShowWindow 188300->188314 188315 140084655 GetForegroundWindow 188300->188315 188301->188290 188302 140084353 188302->188296 188303->188307 188310 140084237 GetWindowLongW 188303->188310 188304->188307 188317 140084698 188306->188317 188307->188296 188307->188302 188319 14008433e 188307->188319 188312 140084406 188308->188312 188313 1400843f8 GetSystemMetrics 188308->188313 188309->188308 188310->188307 188316 14008424c GetWindowRect 188310->188316 188311->188303 188320 1400841b7 GetWindowLongW 188311->188320 188321 1400841a8 GetParent 188311->188321 188323 14008440b SendMessageW 188312->188323 188324 140084437 188312->188324 188313->188312 188314->188306 188315->188314 188318 140084664 DefDlgProcW 188315->188318 188316->188307 188322 1400846c8 GetAncestor 188317->188322 188317->188328 188318->188314 189224 140087f30 25 API calls 188319->189224 188320->188311 188326 1400841cb GetWindowRect MapWindowPoints 188320->188326 188321->188311 188321->188320 188327 1400846e1 GetForegroundWindow 188322->188327 188322->188328 188323->188324 188329 14008446f SystemParametersInfoW 188324->188329 188332 140084460 GetClientRect 188324->188332 188326->188311 188330 1400846f0 188327->188330 188331 1400846f8 188327->188331 188328->187995 188337 140084484 GetWindowRect 188329->188337 189225 1400a1b30 48 API calls 188330->189225 188331->188328 188334 140084705 GetFocus 188331->188334 188332->188337 188335 14008471e 188334->188335 188347 14008478b 188334->188347 188335->188328 188336 140084720 GetDlgCtrlID 188335->188336 188340 140084744 GetParent 188335->188340 188341 14008475d 188335->188341 188336->188335 188336->188340 188350 14008451f 188337->188350 188339 1400847ac SetFocus 188339->188328 188340->188328 188340->188335 188341->188328 188341->188347 188342 1400845e3 IsZoomed 188343 140084600 188342->188343 188344 1400845f1 ShowWindow 188342->188344 188344->188343 188347->188328 188347->188339 188350->188300 188350->188342 188353 1400c0410 58 API calls 188352->188353 188355 140083cd7 188353->188355 188354 140084096 ShowWindow 188359 1400840a7 188354->188359 188355->188354 188355->188359 188394 140084289 188355->188394 188356 140084152 IsIconic 188358 140084167 188356->188358 188373 1400842ee 188356->188373 188357 1400840e0 188360 140084119 188357->188360 188361 1400840ec MulDiv 188357->188361 188363 140084290 188358->188363 188377 140084170 188358->188377 188359->188356 188359->188357 188364 1400840ce 188359->188364 188360->188356 188367 140084125 MulDiv 188360->188367 188361->188360 188362 140084374 IsWindowVisible 188365 14008438a GetWindowLongW GetMenu GetWindowLongW AdjustWindowRectEx 188362->188365 188366 140084647 188362->188366 188369 14008420a 188363->188369 188370 1400842d7 GetClientRect 188363->188370 188363->188373 189227 1400886b0 12 API calls 188364->189227 188374 1400843f1 188365->188374 188375 1400843e3 GetSystemMetrics 188365->188375 188372 140084681 IsWindowVisible 188366->188372 188380 140084675 ShowWindow 188366->188380 188381 140084655 GetForegroundWindow 188366->188381 188367->188356 188368 140084353 188368->188362 188369->188373 188376 140084237 GetWindowLongW 188369->188376 188370->188373 188383 140084698 188372->188383 188373->188362 188373->188368 188385 14008433e 188373->188385 188378 140084406 188374->188378 188379 1400843f8 GetSystemMetrics 188374->188379 188375->188374 188376->188373 188382 14008424c GetWindowRect 188376->188382 188377->188369 188386 1400841b7 GetWindowLongW 188377->188386 188387 1400841a8 GetParent 188377->188387 188389 14008440b SendMessageW 188378->188389 188390 140084437 188378->188390 188379->188378 188380->188372 188381->188380 188384 140084664 DefDlgProcW 188381->188384 188382->188373 188388 1400846c8 GetAncestor 188383->188388 188383->188394 188384->188380 189228 140087f30 25 API calls 188385->189228 188386->188377 188392 1400841cb GetWindowRect MapWindowPoints 188386->188392 188387->188377 188387->188386 188393 1400846e1 GetForegroundWindow 188388->188393 188388->188394 188389->188390 188395 14008446f SystemParametersInfoW 188390->188395 188398 140084460 GetClientRect 188390->188398 188392->188377 188396 1400846f0 188393->188396 188397 1400846f8 188393->188397 188394->187995 188404 140084484 GetWindowRect 188395->188404 189229 1400a1b30 48 API calls 188396->189229 188397->188394 188400 140084705 GetFocus 188397->188400 188398->188404 188401 14008471e 188400->188401 188417 14008478b 188400->188417 188401->188394 188411 14008451f 188404->188411 188405 1400847ac SetFocus 188405->188394 188407 1400845e3 IsZoomed 188411->188366 188411->188407 188417->188394 188417->188405 188419 140083c2f IsZoomed IsIconic 188418->188419 188420 140083c1f 188418->188420 188442 140083c91 188419->188442 189231 140076fb0 802 API calls 188420->189231 188422 140083c24 188422->187995 188423 140084096 ShowWindow 188427 1400840a7 188423->188427 188424 140084152 IsIconic 188426 140084167 188424->188426 188441 1400842ee 188424->188441 188425 1400840e0 188428 140084119 188425->188428 188429 1400840ec MulDiv 188425->188429 188431 140084290 188426->188431 188446 140084170 188426->188446 188427->188424 188427->188425 188432 1400840ce 188427->188432 188428->188424 188435 140084125 MulDiv 188428->188435 188429->188428 188430 140084374 IsWindowVisible 188433 14008438a GetWindowLongW GetMenu GetWindowLongW AdjustWindowRectEx 188430->188433 188434 140084647 188430->188434 188437 14008420a 188431->188437 188438 1400842d7 GetClientRect 188431->188438 188431->188441 189232 1400886b0 12 API calls 188432->189232 188443 1400843f1 188433->188443 188444 1400843e3 GetSystemMetrics 188433->188444 188440 140084681 IsWindowVisible 188434->188440 188449 140084675 ShowWindow 188434->188449 188450 140084655 GetForegroundWindow 188434->188450 188435->188424 188436 140084353 188436->188430 188437->188441 188445 140084237 GetWindowLongW 188437->188445 188438->188441 188452 140084698 188440->188452 188441->188430 188441->188436 188454 14008433e 188441->188454 188442->188423 188442->188427 188463 140084289 188442->188463 188447 140084406 188443->188447 188448 1400843f8 GetSystemMetrics 188443->188448 188444->188443 188445->188441 188451 14008424c GetWindowRect 188445->188451 188446->188437 188455 1400841b7 GetWindowLongW 188446->188455 188456 1400841a8 GetParent 188446->188456 188458 14008440b SendMessageW 188447->188458 188459 140084437 188447->188459 188448->188447 188449->188440 188450->188449 188453 140084664 DefDlgProcW 188450->188453 188451->188441 188457 1400846c8 GetAncestor 188452->188457 188452->188463 188453->188449 189233 140087f30 25 API calls 188454->189233 188455->188446 188461 1400841cb GetWindowRect MapWindowPoints 188455->188461 188456->188446 188456->188455 188462 1400846e1 GetForegroundWindow 188457->188462 188457->188463 188458->188459 188464 14008446f SystemParametersInfoW 188459->188464 188467 140084460 GetClientRect 188459->188467 188461->188446 188465 1400846f0 188462->188465 188466 1400846f8 188462->188466 188463->187995 188472 140084484 GetWindowRect 188464->188472 189234 1400a1b30 48 API calls 188465->189234 188466->188463 188469 140084705 GetFocus 188466->188469 188467->188472 188470 14008471e 188469->188470 188482 14008478b 188469->188482 188470->188463 188471 140084720 GetDlgCtrlID 188470->188471 188475 140084744 GetParent 188470->188475 188476 14008475d 188470->188476 188471->188470 188471->188475 188485 14008451f 188472->188485 188474 1400847ac SetFocus 188474->188463 188475->188463 188475->188470 188476->188463 188476->188482 188477 1400845e3 IsZoomed 188478 140084600 188477->188478 188479 1400845f1 ShowWindow 188477->188479 188479->188478 188482->188463 188482->188474 188485->188434 188485->188477 188489 140083cd7 188487->188489 188488 140084096 ShowWindow 188493 1400840a7 188488->188493 188489->188488 188489->188493 188528 140084289 188489->188528 188490 140084152 IsIconic 188492 140084167 188490->188492 188507 1400842ee 188490->188507 188491 1400840e0 188494 140084119 188491->188494 188495 1400840ec MulDiv 188491->188495 188497 140084290 188492->188497 188511 140084170 188492->188511 188493->188490 188493->188491 188498 1400840ce 188493->188498 188494->188490 188501 140084125 MulDiv 188494->188501 188495->188494 188496 140084374 IsWindowVisible 188499 14008438a GetWindowLongW GetMenu GetWindowLongW AdjustWindowRectEx 188496->188499 188500 140084647 188496->188500 188503 14008420a 188497->188503 188504 1400842d7 GetClientRect 188497->188504 188497->188507 189236 1400886b0 12 API calls 188498->189236 188508 1400843f1 188499->188508 188509 1400843e3 GetSystemMetrics 188499->188509 188506 140084681 IsWindowVisible 188500->188506 188514 140084675 ShowWindow 188500->188514 188515 140084655 GetForegroundWindow 188500->188515 188501->188490 188502 140084353 188502->188496 188503->188507 188510 140084237 GetWindowLongW 188503->188510 188504->188507 188517 140084698 188506->188517 188507->188496 188507->188502 188519 14008433e 188507->188519 188512 140084406 188508->188512 188513 1400843f8 GetSystemMetrics 188508->188513 188509->188508 188510->188507 188516 14008424c GetWindowRect 188510->188516 188511->188503 188520 1400841b7 GetWindowLongW 188511->188520 188521 1400841a8 GetParent 188511->188521 188523 14008440b SendMessageW 188512->188523 188524 140084437 188512->188524 188513->188512 188514->188506 188515->188514 188518 140084664 DefDlgProcW 188515->188518 188516->188507 188522 1400846c8 GetAncestor 188517->188522 188517->188528 188518->188514 189237 140087f30 25 API calls 188519->189237 188520->188511 188526 1400841cb GetWindowRect MapWindowPoints 188520->188526 188521->188511 188521->188520 188527 1400846e1 GetForegroundWindow 188522->188527 188522->188528 188523->188524 188529 14008446f SystemParametersInfoW 188524->188529 188532 140084460 GetClientRect 188524->188532 188526->188511 188530 1400846f0 188527->188530 188531 1400846f8 188527->188531 188528->187995 188537 140084484 GetWindowRect 188529->188537 189238 1400a1b30 48 API calls 188530->189238 188531->188528 188534 140084705 GetFocus 188531->188534 188532->188537 188535 14008471e 188534->188535 188547 14008478b 188534->188547 188535->188528 188536 140084720 GetDlgCtrlID 188535->188536 188540 140084744 GetParent 188535->188540 188541 14008475d 188535->188541 188536->188535 188536->188540 188550 14008451f 188537->188550 188539 1400847ac SetFocus 188539->188528 188540->188528 188540->188535 188541->188528 188541->188547 188542 1400845e3 IsZoomed 188543 140084600 188542->188543 188544 1400845f1 ShowWindow 188542->188544 188544->188543 188547->188528 188547->188539 188550->188500 188550->188542 188553 140044990 799 API calls 188552->188553 188560 1400425c5 188553->188560 188554 1400426ba 188555 1400426c3 SendMessageTimeoutW 188554->188555 188556 14004271b PostMessageW 188554->188556 188557 140042732 188555->188557 188556->188557 188561 14004273d GetLastError 188557->188561 188562 1400426d0 188557->188562 188560->188554 188560->188562 189240 140063e90 802 API calls __std_exception_copy 188560->189240 189241 14009ce80 55 API calls 188560->189241 188561->188562 188566 14004274c 188561->188566 188562->187995 188564 1400427ac 189243 14000f150 802 API calls 188564->189243 188566->188562 188566->188564 188567 140042782 188566->188567 189242 140010880 DialogBoxParamW 188567->189242 188570 1400772f0 802 API calls 188569->188570 188571 140076b7e 188570->188571 188571->187995 188573 14002adef 188572->188573 188574 14002ae08 188573->188574 188575 14002ae0d ImageList_GetIconSize GetSystemMetrics 188573->188575 188576 14002ae34 SendMessageW 188574->188576 188575->188576 188576->187995 188578 1400c0410 58 API calls 188577->188578 188579 140083ebb 188578->188579 188580 1400c0410 58 API calls 188579->188580 188600 140083cd7 188579->188600 188581 140083f1f 188580->188581 188581->188600 189244 1400cc73c 52 API calls 2 library calls 188581->189244 188583 140083f4b 188586 140083f7d 188583->188586 188587 140083fc4 188583->188587 188583->188600 188584 140084096 ShowWindow 188591 1400840a7 188584->188591 188585 140084152 IsIconic 188589 140084167 188585->188589 188607 1400842ee 188585->188607 188594 140083fa1 MulDiv 188586->188594 188586->188600 188590 140083fcd MulDiv 188587->188590 188587->188600 188588 1400840e0 188592 140084119 188588->188592 188593 1400840ec MulDiv 188588->188593 188596 140084290 188589->188596 188614 140084170 188589->188614 188590->188600 188591->188585 188591->188588 188597 1400840ce 188591->188597 188592->188585 188598 140084125 MulDiv 188592->188598 188593->188592 188594->188600 188595 140084374 IsWindowVisible 188601 14008438a GetWindowLongW GetMenu GetWindowLongW AdjustWindowRectEx 188595->188601 188602 140084647 188595->188602 188603 14008420a 188596->188603 188604 1400842d7 GetClientRect 188596->188604 188596->188607 189245 1400886b0 12 API calls 188597->189245 188598->188585 188599 140084353 188599->188595 188600->188584 188600->188591 188642 140084289 188600->188642 188608 1400843f1 188601->188608 188609 1400843e3 GetSystemMetrics 188601->188609 188606 140084681 IsWindowVisible 188602->188606 188611 140084675 ShowWindow 188602->188611 188612 140084655 GetForegroundWindow 188602->188612 188603->188607 188610 140084237 GetWindowLongW 188603->188610 188604->188607 188613 140084698 188606->188613 188607->188595 188607->188599 188619 14008433e 188607->188619 188615 140084406 188608->188615 188616 1400843f8 GetSystemMetrics 188608->188616 188609->188608 188610->188607 188617 14008424c GetWindowRect 188610->188617 188611->188606 188612->188611 188618 140084664 DefDlgProcW 188612->188618 188622 1400846c8 GetAncestor 188613->188622 188613->188642 188614->188603 188620 1400841b7 GetWindowLongW 188614->188620 188621 1400841a8 GetParent 188614->188621 188623 14008440b SendMessageW 188615->188623 188624 140084437 188615->188624 188616->188615 188617->188607 188618->188611 189246 140087f30 25 API calls 188619->189246 188620->188614 188626 1400841cb GetWindowRect MapWindowPoints 188620->188626 188621->188614 188621->188620 188627 1400846e1 GetForegroundWindow 188622->188627 188622->188642 188623->188624 188628 14008446f SystemParametersInfoW 188624->188628 188631 140084460 GetClientRect 188624->188631 188626->188614 188629 1400846f0 188627->188629 188630 1400846f8 188627->188630 188634 140084484 GetWindowRect 188628->188634 189247 1400a1b30 48 API calls 188629->189247 188633 140084705 GetFocus 188630->188633 188630->188642 188631->188634 188646 14008451f 188634->188646 188642->187995 188646->188602 188653 1400772f0 802 API calls 188652->188653 188654 140076cbe 188653->188654 188654->187995 188656 1400772f0 802 API calls 188655->188656 188657 140076dfe 188656->188657 188657->187995 188659 1400772f0 802 API calls 188658->188659 188660 140076b5e 188659->188660 188660->187995 188666 140077333 188661->188666 188679 1400773ec 188661->188679 188662 1400774d0 188680 14007c490 188662->188680 188663 1400774c9 188833 140076fb0 802 API calls 188663->188833 188667 1400773c8 188666->188667 188668 14007737e 188666->188668 188669 1400773d6 188667->188669 188670 1400773a4 188667->188670 188671 1400da444 3 API calls 188668->188671 188674 1400774a7 188669->188674 188675 1400773e7 188669->188675 188669->188679 188830 140011560 802 API calls 188670->188830 188672 140077398 188671->188672 188672->188670 188672->188679 188832 1400c5974 52 API calls 188674->188832 188675->188679 188831 14009c780 54 API calls swprintf 188675->188831 188677 140076c7e 188677->187995 188679->188662 188679->188663 188681 14007c4df 188680->188681 188687 14007c5ee 188680->188687 188682 14007c536 188681->188682 188686 14007c4fe 188681->188686 188684 1400b9b84 4 API calls 188682->188684 188683 14007c71e 188685 1400b9b84 4 API calls 188683->188685 188688 14007c547 188684->188688 188689 14007c744 memcpy_s 188685->188689 188922 140010880 DialogBoxParamW 188686->188922 188687->188683 188691 14007c628 188687->188691 188923 14000eda0 802 API calls __std_exception_copy 188688->188923 188708 14007c82a 188689->188708 188713 14007c816 SendMessageW 188689->188713 188694 14007c679 188691->188694 188701 14007c647 188691->188701 188693 14007c526 188693->188677 188696 1400b9b84 4 API calls 188694->188696 188695 14007c56a 188697 14007c5a5 188695->188697 188698 14007c572 188695->188698 188700 14007c68a 188696->188700 188705 14007c5bf 188697->188705 188706 14007c5db 188697->188706 188924 14000f2f0 119 API calls 188698->188924 188927 14000eda0 802 API calls __std_exception_copy 188700->188927 188926 140010880 DialogBoxParamW 188701->188926 188703 14007c595 188703->188677 188925 1400a3410 30 API calls 188705->188925 188706->188677 188707 14007c6ad 188711 14007c6b5 188707->188711 188712 14007c6e0 188707->188712 188709 14007c853 188708->188709 188715 14007c9d9 188708->188715 188720 14007c95f 188709->188720 188722 14007c895 188709->188722 188928 14000f2f0 119 API calls 188711->188928 188717 14007c6fa 188712->188717 188829 14007c671 188712->188829 188713->188708 188716 14007c9bb 188715->188716 188729 14007c9ed 188715->188729 188725 14007cb1c 188716->188725 188938 140089790 MulDiv MulDiv 188716->188938 188929 1400a3410 30 API calls 188717->188929 188719 14007c8f4 188723 1400b9b84 4 API calls 188719->188723 188720->188716 188732 14007c9c9 188720->188732 188722->188719 188727 14007c8c2 188722->188727 188724 14007c905 188723->188724 188931 14000eda0 802 API calls __std_exception_copy 188724->188931 188834 140080d90 188725->188834 188726 14007ca4c 188731 1400b9b84 4 API calls 188726->188731 188930 140010880 DialogBoxParamW 188727->188930 188729->188726 188735 14007ca1a 188729->188735 188737 14007ca5d 188731->188737 188933 1400886b0 12 API calls 188732->188933 188934 140010880 DialogBoxParamW 188735->188934 188935 14000eda0 802 API calls __std_exception_copy 188737->188935 188738 14007c9d4 188738->188716 188829->188677 188830->188677 188831->188679 188832->188679 188833->188677 188835 140082ba2 188834->188835 188905 140080de3 __std_exception_copy 188834->188905 188836 140082bb5 GetWindowLongW 188835->188836 188892 14007ce13 188835->188892 188836->188892 188892->188829 188905->188835 188905->188892 188922->188693 188923->188695 188924->188703 188925->188706 188926->188829 188927->188707 188928->188829 188929->188829 188930->188829 188933->188738 188934->188829 188938->188725 188956 1400c041d 188955->188956 188957 1400c0441 188955->188957 188956->188957 188958 1400c0422 188956->188958 188960 1400c0483 188957->188960 188963 1400c04a2 188957->188963 188976 1400d058c 11 API calls memcpy_s 188958->188976 188978 1400d058c 11 API calls memcpy_s 188960->188978 188961 1400c0427 188977 1400d03a4 52 API calls _invalid_parameter_noinfo 188961->188977 188969 1400c0493 __crtLCMapStringW 188963->188969 188980 1400c0148 52 API calls _CallSETranslator 188963->188980 188965 1400c0488 188979 1400d03a4 52 API calls _invalid_parameter_noinfo 188965->188979 188967 1400c0432 188967->188033 188969->188033 188970 1400c04bb 188970->188969 188971 1400d040c 58 API calls 188970->188971 188971->188970 188972->188039 188973->188055 188976->188961 188977->188967 188978->188965 188979->188969 188980->188970 188981->188106 188982->188120 188983->188144 188986 140079a54 188985->188986 188988 140079a77 188985->188988 188987 140079a5d MulDiv 188986->188987 188986->188988 188987->188988 188989 140079aaa GetParent MapWindowPoints 188988->188989 188990 140079aa6 188988->188990 188991 140079a8c MulDiv 188988->188991 188992 140079ae7 188989->188992 188993 140079add 188989->188993 188990->188989 188991->188989 188992->188993 188994 140079af0 MulDiv 188992->188994 188995 140079b24 188993->188995 188997 140079b33 MulDiv 188993->188997 188994->188993 188996 140079b4b MoveWindow 188995->188996 188998 140079b7b 188996->188998 188999 1400788f6 188996->188999 188997->188996 189000 140079b87 SendMessageW SendMessageW 188998->189000 189001 140079c0f 188998->189001 188999->187995 189002 140079be4 189000->189002 189003 140079bbd SendMessageW InvalidateRect 189000->189003 189001->188999 189004 140079c13 GetPropW 189001->189004 189002->188999 189005 140079be9 SendMessageW InvalidateRect 189002->189005 189003->189002 189004->188999 189006 140079c46 189004->189006 189005->188999 189007 140079c57 SetPropW 189006->189007 189008 140079c62 RemovePropW 189006->189008 189007->188999 189008->188999 189010 140080466 GetWindowLongW GetWindowLongW 189009->189010 189030 140080488 189009->189030 189010->189030 189011 140080b19 189012 1400809e4 189011->189012 189013 140080b41 IsWindowVisible 189011->189013 189012->188178 189014 140080b4b IsIconic 189013->189014 189015 140080b59 189013->189015 189014->189015 189016 140080b76 189015->189016 189017 140080b67 SetWindowLongW 189015->189017 189018 140080b8d 189016->189018 189019 140080b7e SetWindowLongW 189016->189019 189017->189016 189018->189012 189020 140080b91 SetWindowPos InvalidateRect 189018->189020 189019->189018 189020->189012 189021 1400c0410 58 API calls 189021->189030 189022 140080adc SetParent 189022->189030 189023 140080aab SetParent 189023->189030 189024 140080ac0 SetWindowLongPtrW 189024->189030 189025 140080a37 IsWindow 189025->189030 189026 140080593 SetWindowPos 189026->189030 189027 1400c0224 58 API calls 189027->189030 189028 1400806a1 EnableWindow 189028->189030 189029 140080bf0 57 API calls 189029->189030 189030->189011 189030->189012 189030->189021 189030->189022 189030->189023 189030->189024 189030->189025 189030->189026 189030->189027 189030->189028 189030->189029 189031 14009ce80 55 API calls 189030->189031 189031->189030 189032->188184 189033->188184 189034->188194 189035->188208 189036->188231 189039 14009e1d2 189038->189039 189040 1400c0410 58 API calls 189039->189040 189099 140066554 189039->189099 189041 14009e1f9 189040->189041 189042 14009e212 189041->189042 189043 1400c0410 58 API calls 189041->189043 189045 14009e25d 189042->189045 189138 14009cfe0 55 API calls 189042->189138 189043->189042 189046 14009e352 189045->189046 189047 14009e300 189045->189047 189050 1400c0224 58 API calls 189045->189050 189045->189099 189049 1400c0224 58 API calls 189046->189049 189052 14009e326 189046->189052 189118 14009e980 189047->189118 189051 14009e36b 189049->189051 189053 14009e2b0 189050->189053 189051->189052 189055 1400c0224 58 API calls 189051->189055 189054 14009e403 LoadLibraryW 189052->189054 189061 14009e41b 189052->189061 189052->189099 189053->189047 189057 1400c0224 58 API calls 189053->189057 189054->189061 189056 14009e387 189055->189056 189056->189052 189060 1400c0224 58 API calls 189056->189060 189059 14009e2c3 189057->189059 189058 14009e74a 189062 14009e85c 189058->189062 189068 14009e75e GetIconInfo 189058->189068 189069 14009e774 GetObjectW 189058->189069 189059->189047 189070 1400c0224 58 API calls 189059->189070 189065 14009e39a 189060->189065 189067 14009e470 189061->189067 189075 14009e44f LoadImageW 189061->189075 189066 14009e862 CopyImage 189062->189066 189085 14009e8a0 189062->189085 189063 14009e52f LoadLibraryW 189071 14009e541 189063->189071 189064 14009e681 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 189073 14009e741 FreeLibrary 189064->189073 189115 14009e6f8 189064->189115 189065->189052 189067->189058 189074 1400c0224 58 API calls 189067->189074 189067->189099 189112 14009e51e 189067->189112 189076 14009e84c DestroyIcon 189068->189076 189077 14009e770 189068->189077 189078 14009e789 189069->189078 189079 14009e2d6 189070->189079 189071->189064 189082 14009e54e CreateFileW 189071->189082 189073->189058 189081 14009e4f8 189074->189081 189075->189067 189083 14009e480 GetFileAttributesW 189075->189083 189076->189099 189077->189069 189078->189062 189079->189047 189086 1400c0224 58 API calls 189079->189086 189081->189071 189091 1400c0224 58 API calls 189081->189091 189082->189099 189089 14009e492 189083->189089 189083->189099 189085->189099 189089->189067 189094 14009e980 13 API calls 189089->189094 189099->188260 189099->188261 189099->188262 189112->189063 189112->189064 189112->189071 189115->189073 189119 14009e9c2 189118->189119 189120 14009e9b1 LoadLibraryW 189118->189120 189121 14009eba3 189119->189121 189122 14009e9f2 EnumResourceNamesW 189119->189122 189123 14009e9e6 189119->189123 189120->189119 189124 14009ebbb ExtractIconW 189121->189124 189127 14009eb8d 189121->189127 189122->189123 189125 14009eb6b 189123->189125 189126 14009ea33 FindResourceW 189123->189126 189124->189127 189125->189121 189125->189127 189130 14009eb9a FreeLibrary 189125->189130 189126->189125 189128 14009ea4b LoadResource 189126->189128 189127->189052 189128->189125 189129 14009ea60 LockResource 189128->189129 189129->189125 189130->189121 189138->189045 189140 140029f15 189139->189140 189150 140029f26 189139->189150 189159 140077050 802 API calls 189140->189159 189142 140029f1a 189142->188265 189143 14002a1fe 189144 14002a232 SendMessageW 189143->189144 189157 14002a265 189143->189157 189145 14002a510 189144->189145 189151 14002a263 189144->189151 189146 140029fc0 189145->189146 189147 14002a52c SendMessageW 189145->189147 189146->188265 189147->189146 189148 14002a372 SendMessageW 189148->189146 189148->189157 189149 14002a3b6 SendMessageW 189149->189151 189149->189157 189150->189143 189150->189146 189156 14009cfe0 55 API calls 189150->189156 189158 1400c0410 58 API calls 189150->189158 189152 14002a3db SendMessageW 189151->189152 189151->189157 189152->189157 189153 14002a4c2 SendMessageW 189153->189157 189154 1400c5974 52 API calls 189154->189157 189155 14009f4e0 54 API calls 189155->189157 189156->189150 189157->189145 189157->189148 189157->189149 189157->189151 189157->189153 189157->189154 189157->189155 189158->189150 189159->189142 189161 140042fac 189160->189161 189170 140042fc3 189160->189170 189192 140044570 802 API calls 189161->189192 189163 140043120 189168 140042fce 189163->189168 189174 1400a38b0 189163->189174 189166 1400430ad GetForegroundWindow 189166->189168 189169 1400430bb 189166->189169 189167 14004317b EnumWindows 189167->189168 189168->188271 189169->189168 189171 1400430cb IsWindowVisible 189169->189171 189170->189163 189170->189166 189170->189168 189172 1400430d8 DwmGetWindowAttribute 189171->189172 189173 140043102 189171->189173 189172->189168 189172->189173 189173->189168 189179 1400a38e6 __std_exception_copy memcpy_s 189174->189179 189175 14009cfe0 55 API calls 189175->189179 189176 1400a3c82 IsWindow 189176->189179 189186 140043177 189176->189186 189177 1400c0410 58 API calls 189177->189179 189178 1400a3cca 189180 1400a3d11 GetWindowTextW 189178->189180 189181 1400a3d2a 189178->189181 189178->189186 189179->189175 189179->189176 189179->189177 189179->189178 189179->189186 189191 1400c0224 58 API calls 189179->189191 189180->189181 189182 1400a3d3c GetWindowThreadProcessId 189181->189182 189183 1400a3d50 189181->189183 189182->189183 189184 1400a3d93 189183->189184 189185 1400a3d56 GetWindowThreadProcessId 189183->189185 189184->189186 189188 1400a3d99 GetClassNameW 189184->189188 189185->189184 189187 1400a3d6f 189185->189187 189186->189167 189186->189168 189193 140031ae4 4 API calls 2 library calls 189187->189193 189188->189186 189190 1400a3d87 189190->189184 189191->189179 189192->189170 189193->189190 189195 1400449d9 189194->189195 189209 140044acf 189194->189209 189215 140044570 802 API calls 189195->189215 189198 140044bd8 189211 140044bf4 189198->189211 189214 140041244 189198->189214 189221 1400a31f0 EnumChildWindows EnumChildWindows __std_exception_copy 189198->189221 189199 1400449ee 189200 140044ab6 189199->189200 189205 140044a15 189199->189205 189199->189214 189202 140044b90 189200->189202 189203 140044aca 189200->189203 189200->189209 189219 1400c5974 52 API calls 189202->189219 189203->189209 189218 14009c780 54 API calls swprintf 189203->189218 189204 140044a76 189217 14000f150 802 API calls 189204->189217 189205->189204 189210 140044a4c 189205->189210 189205->189214 189220 1400446c0 802 API calls 189209->189220 189216 140010880 DialogBoxParamW 189210->189216 189211->189214 189222 140010880 DialogBoxParamW 189211->189222 189214->188275 189214->188276 189214->188285 189215->189199 189216->189214 189217->189214 189218->189209 189219->189209 189220->189198 189221->189211 189222->189214 189223->188293 189224->188307 189225->188331 189227->188359 189228->188373 189229->188397 189231->188422 189232->188427 189233->188441 189234->188466 189236->188493 189237->188507 189238->188531 189240->188560 189241->188560 189242->188562 189243->188562 189244->188583 189245->188591 189246->188607 189247->188630 189250 1400754e5 189249->189250 189255 140075499 189249->189255 189251 140075507 189250->189251 189252 1400754ed 189250->189252 189257 1400755a0 189251->189257 189260 140075532 189251->189260 189393 140010f40 802 API calls 189252->189393 189253 1400754cb 189392 140010f40 802 API calls 189253->189392 189255->189250 189255->189253 189394 140010f30 802 API calls 189257->189394 189259 1400754de 189259->187935 189260->189259 189261 140075617 189260->189261 189262 1400da444 3 API calls 189260->189262 189395 140011b90 802 API calls 189261->189395 189262->189260 189265 1400989c0 189264->189265 189285 14009892f 189264->189285 189266 140098a94 189265->189266 189291 140098b06 189265->189291 189282 140098ad0 189266->189282 189414 14009c780 54 API calls swprintf 189266->189414 189268 1400c0224 58 API calls 189271 1400989bc 189268->189271 189270 140098b92 189272 140098b9a 189270->189272 189270->189282 189271->189265 189276 1400c0224 58 API calls 189271->189276 189416 140011af0 802 API calls 189272->189416 189273 140098d5f 189275 140098e83 189273->189275 189280 140098d71 189273->189280 189274 140098ea2 189396 140097e70 RegOpenKeyExW 189274->189396 189422 140098250 802 API calls 189275->189422 189277 1400989ef 189276->189277 189277->189265 189287 1400c0224 58 API calls 189277->189287 189278 140098c50 189289 140098d22 189278->189289 189290 140098c65 189278->189290 189303 140098c6a 189278->189303 189292 140098daf RegOpenKeyExW 189280->189292 189295 140098d76 189280->189295 189282->189278 189283 140098c24 189282->189283 189282->189303 189417 140011b40 802 API calls 189283->189417 189285->189265 189285->189268 189286 140098a56 189286->187934 189293 140098a08 189287->189293 189289->189303 189419 1400c5974 52 API calls 189289->189419 189290->189303 189418 14009c780 54 API calls swprintf 189290->189418 189415 1400453a0 59 API calls 189291->189415 189296 140098de6 189292->189296 189297 140098e55 189292->189297 189293->189265 189302 1400c0224 58 API calls 189293->189302 189294 140098edc RegCloseKey 189294->189286 189295->189286 189295->189294 189299 140098e3c RegDeleteValueW RegCloseKey 189296->189299 189300 140098df3 189296->189300 189297->189295 189421 140011340 802 API calls 189297->189421 189299->189297 189420 1400987a0 RegEnumKeyExW RegOpenKeyExW 189300->189420 189306 140098a21 189302->189306 189303->189273 189303->189274 189306->189265 189309 1400c0224 58 API calls 189306->189309 189307 140098df8 RegCloseKey 189307->189297 189308 140098e0c 189307->189308 189310 140098e32 RegDeleteKeyW 189308->189310 189311 140098e25 RegDeleteKeyExW 189308->189311 189312 140098a3a 189309->189312 189310->189297 189311->189297 189312->189265 189313 140098a47 189312->189313 189413 140011af0 802 API calls 189313->189413 189316 140090fac 189315->189316 189317 1400da444 3 API calls 189316->189317 189318 140090ff7 189317->189318 189319 140091108 189318->189319 189320 1400055e0 58 API calls 189318->189320 189436 140011af0 802 API calls 189319->189436 189321 14009100f 189320->189321 189323 1400da444 3 API calls 189321->189323 189324 14009103e 189323->189324 189324->189319 189325 14009104a 189324->189325 189326 1400910e6 189325->189326 189424 140091140 189325->189424 189326->187934 189329 14002559c 189328->189329 189333 14002569e 189328->189333 189330 1400255c4 189329->189330 189337 1400255ab 189329->189337 189447 14009c530 55 API calls 189330->189447 189331 1400255c2 189334 1400255f7 189331->189334 189335 1400255de 189331->189335 189338 140025735 189333->189338 189345 1400256bc 189333->189345 189350 14002565d 189333->189350 189342 140025601 189334->189342 189449 14009cfe0 55 API calls 189334->189449 189448 140011b40 802 API calls 189335->189448 189337->189331 189337->189335 189446 140060840 55 API calls 189337->189446 189338->189350 189452 14009cfe0 55 API calls 189338->189452 189343 14002564b 189342->189343 189342->189350 189450 140011af0 802 API calls 189343->189450 189379 1400255f2 189345->189379 189451 140063e90 802 API calls __std_exception_copy 189345->189451 189347 1400c0410 58 API calls 189349 1400258ea 189347->189349 189348 1400c0224 58 API calls 189391 140025809 memcpy_s 189348->189391 189349->189348 189349->189391 189350->189347 189350->189379 189350->189391 189351 140025e9e 189352 140025eac 189351->189352 189353 140025f4e 189351->189353 189354 140025f40 189352->189354 189356 140025ec0 189352->189356 189353->189354 189355 140025f57 189353->189355 189438 140024dc0 SetLastError 189354->189438 189461 1400252b0 802 API calls 189355->189461 189458 140011af0 802 API calls 189356->189458 189359 140025f64 189359->189354 189361 140025f69 189359->189361 189368 140025f6d 189361->189368 189363 14002686f 189465 140010ef0 122 API calls 189363->189465 189365 140025fa7 FreeLibrary 189365->189379 189366 140026889 189466 140010ef0 122 API calls 189366->189466 189367 140025ff5 189390 140026026 __std_exception_copy __crtLCMapStringW 189367->189390 189462 14000f3c0 802 API calls 189367->189462 189368->189365 189368->189379 189370 140025f1b 189460 140010f30 802 API calls 189370->189460 189371 1400da444 3 API calls 189371->189391 189375 140025edd 189459 140011560 802 API calls 189375->189459 189376 14009c530 55 API calls 189376->189391 189377 1400b9b84 4 API calls 189377->189391 189379->187934 189384 14009cfe0 55 API calls 189384->189391 189385 140060840 55 API calls 189385->189391 189386 140024c10 801 API calls 189386->189390 189390->189366 189390->189368 189390->189386 189463 140011280 802 API calls 189390->189463 189464 1400a13d0 122 API calls __crtLCMapStringW 189390->189464 189391->189351 189391->189370 189391->189371 189391->189375 189391->189376 189391->189377 189391->189379 189391->189384 189391->189385 189453 140063e90 802 API calls __std_exception_copy 189391->189453 189454 1400609a0 55 API calls 189391->189454 189455 14002bda0 55 API calls 189391->189455 189456 140099370 6 API calls __std_exception_copy 189391->189456 189457 14000e6e0 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection __std_exception_copy 189391->189457 189392->189259 189393->189259 189394->189259 189395->189259 189397 140097ee0 RegQueryValueExW 189396->189397 189398 1400981e2 189396->189398 189399 1400981d8 RegCloseKey 189397->189399 189400 140097f08 189397->189400 189402 140098207 189398->189402 189423 140011340 802 API calls 189398->189423 189399->189398 189401 1400980af RegQueryValueExW 189400->189401 189404 140097f8c RegQueryValueExW 189400->189404 189405 140097f2c 189400->189405 189410 1400980de 189401->189410 189411 140097f3a 189401->189411 189402->189295 189408 140097fbb 189404->189408 189404->189411 189406 140097f31 189405->189406 189407 140097f44 RegQueryValueExW 189405->189407 189406->189401 189406->189411 189407->189411 189408->189411 189412 140097fe8 RegQueryValueExW 189408->189412 189409 14009810e RegQueryValueExW 189409->189411 189410->189409 189410->189411 189411->189399 189412->189411 189413->189286 189414->189282 189415->189270 189416->189286 189417->189286 189418->189303 189419->189303 189420->189307 189421->189295 189422->189295 189423->189402 189427 14009118c 189424->189427 189429 1400911cc __std_exception_copy 189424->189429 189425 1400055e0 58 API calls 189425->189427 189426 1400055e0 58 API calls 189426->189429 189427->189425 189427->189429 189430 1400911d7 189427->189430 189428 1400912cc __std_exception_copy 189435 140091268 189428->189435 189437 140010f30 802 API calls 189428->189437 189429->189426 189429->189428 189431 140091323 189429->189431 189429->189435 189430->189429 189433 14008ea00 802 API calls 189430->189433 189431->189428 189434 14008ea00 802 API calls 189431->189434 189433->189429 189434->189428 189435->189326 189436->189326 189437->189435 189439 140024e22 189438->189439 189440 140024ec9 GetLastError 189439->189440 189441 140024f24 189440->189441 189442 140024edf 189440->189442 189441->189363 189441->189367 189467 1400c5a50 52 API calls 189442->189467 189444 140024ef5 189468 14000f150 802 API calls 189444->189468 189446->189331 189447->189331 189448->189379 189449->189342 189450->189379 189451->189350 189452->189350 189453->189391 189454->189391 189455->189391 189456->189391 189457->189391 189458->189379 189459->189379 189460->189379 189461->189359 189462->189390 189463->189390 189464->189390 189467->189444 189468->189441 189469->187803 189470->187797 189472 140054bbe 189471->189472 189475 140054bdb 189471->189475 189497 140010ac0 802 API calls 189472->189497 189474 140054bcd 189474->187801 189479 140054c25 189475->189479 189498 1400a14b0 189475->189498 189477 140054ce9 189484 140054cfe memcpy_s 189477->189484 189491 140098fd0 189477->189491 189479->189477 189480 140054320 802 API calls 189479->189480 189488 140054d71 189479->189488 189485 140054c86 189480->189485 189481 140054d4e 189483 140099070 4 API calls 189481->189483 189481->189488 189483->189488 189484->189481 189484->189488 189521 140099070 189484->189521 189485->189477 189519 14009c780 54 API calls swprintf 189485->189519 189487 140054cc7 189520 140012140 123 API calls 189487->189520 189488->187801 189490->187812 189492 140099022 189491->189492 189493 140098fdf 189491->189493 189492->189484 189494 140099070 4 API calls 189493->189494 189495 140098fee 189493->189495 189494->189495 189495->189492 189496 140099070 4 API calls 189495->189496 189496->189492 189497->189474 189499 1400a14c8 189498->189499 189501 1400a14d2 189498->189501 189499->189479 189503 1400a1528 189501->189503 189524 1400c4f60 189501->189524 189502 1400a1678 189502->189479 189503->189502 189504 1400c0224 58 API calls 189503->189504 189507 1400a159e 189503->189507 189504->189503 189506 1400c0410 58 API calls 189506->189507 189507->189506 189508 1400a15f7 189507->189508 189518 1400a1662 189507->189518 189509 1400c0224 58 API calls 189508->189509 189508->189518 189510 1400a1616 189509->189510 189511 1400c0224 58 API calls 189510->189511 189510->189518 189512 1400a1629 189511->189512 189513 1400c0224 58 API calls 189512->189513 189512->189518 189514 1400a163c 189513->189514 189515 1400c0224 58 API calls 189514->189515 189514->189518 189516 1400a164f 189515->189516 189517 1400c0224 58 API calls 189516->189517 189516->189518 189517->189518 189518->189502 189533 1400a1450 802 API calls 189518->189533 189519->189487 189520->189477 189522 1400b9b84 4 API calls 189521->189522 189523 140099080 189522->189523 189523->189481 189525 1400c4f79 189524->189525 189526 1400c4f9c 189524->189526 189525->189501 189534 1400d0924 GetLastError 189526->189534 189530 1400c4fba 189530->189525 189578 1400d2410 55 API calls __FrameHandler3::FrameUnwindToEmptyState 189530->189578 189532 1400c4ff3 189532->189501 189533->189502 189535 1400d0965 FlsSetValue 189534->189535 189536 1400d0948 FlsGetValue 189534->189536 189538 1400d0955 189535->189538 189539 1400d0977 189535->189539 189537 1400d095f 189536->189537 189536->189538 189537->189535 189541 1400d09d1 SetLastError 189538->189541 189579 1400d2518 11 API calls memcpy_s 189539->189579 189543 1400c4fa1 189541->189543 189544 1400d09f1 189541->189544 189542 1400d0986 189545 1400d09a4 FlsSetValue 189542->189545 189546 1400d0994 FlsSetValue 189542->189546 189577 1400d0c84 52 API calls swprintf 189543->189577 189587 1400cffc8 52 API calls _CallSETranslator 189544->189587 189550 1400d09b0 FlsSetValue 189545->189550 189551 1400d09c2 189545->189551 189549 1400d099d 189546->189549 189580 1400d0d8c 189549->189580 189550->189549 189586 1400d06d4 11 API calls memcpy_s 189551->189586 189560 1400d09ca 189564 1400d0d8c __free_lconv_num 11 API calls 189560->189564 189564->189541 189577->189530 189578->189532 189579->189542 189581 1400d09a2 189580->189581 189582 1400d0d91 RtlRestoreThreadPreferredUILanguages 189580->189582 189581->189538 189582->189581 189583 1400d0dac GetLastError 189582->189583 189584 1400d0db9 __free_lconv_num 189583->189584 189586->189560 189590 1400750d1 __std_exception_copy memcpy_s 189589->189590 189591 1400722c0 802 API calls 189590->189591 189592 1400750dd 189590->189592 189591->189592 189592->187670 189593->187672 189594->187672 189595->187672 189596->187672 189597 14005a1e5 189598 14005a1fe 189597->189598 189599 14005a1ee 189597->189599 189626 140067080 55 API calls 189598->189626 189599->189598 189600 14005a1f7 189599->189600 189625 140067120 55 API calls 189600->189625 189603 14005a1fc 189604 14005a212 189603->189604 189605 14005a2ae 189603->189605 189606 14005a249 189604->189606 189607 14005a21b 189604->189607 189609 14005a2c6 189605->189609 189610 14005a2f9 189605->189610 189619 14005a076 189605->189619 189608 14005a010 802 API calls 189606->189608 189612 14005a010 802 API calls 189607->189612 189607->189619 189608->189619 189613 14005a010 802 API calls 189609->189613 189609->189619 189611 14005a010 802 API calls 189610->189611 189611->189619 189612->189607 189613->189609 189614 14005a087 GetTickCount 189616 14005a0a4 PeekMessageW 189614->189616 189614->189619 189615 14005a1d0 189617 14005a0c2 189616->189617 189618 14005a0cf GetTickCount 189616->189618 189617->189618 189618->189619 189619->189614 189619->189615 189620 14005a136 GetTickCount 189619->189620 189623 1400764f0 802 API calls 189619->189623 189624 140008964 ioctlsocket 189619->189624 189620->189619 189621 14005a169 189620->189621 189621->189619 189623->189619 189624->189619 189625->189603 189626->189603 189627 14007ec44 189628 14007ed37 CreateWindowExW 189627->189628 189629 14007ec56 189627->189629 189630 14007eda9 189628->189630 189632 14007efad 189628->189632 189718 14009c0c0 56 API calls memcpy_s 189629->189718 189633 14007edb0 SendMessageW 189630->189633 189634 14007edcb 189630->189634 189639 14007f7c0 189632->189639 189641 14007f7b3 ReleaseDC 189632->189641 189642 14007f7a2 SelectObject 189632->189642 189633->189634 189636 14007edd5 SendMessageW 189634->189636 189637 14007edf1 189634->189637 189635 14007ec65 189638 14007ed2f 189635->189638 189652 14007ec73 189635->189652 189636->189637 189640 14007ee35 189637->189640 189643 14007ee04 SendMessageW 189637->189643 189638->189628 189644 14007fc9d 189639->189644 189665 14007f7ca 189639->189665 189645 14007ee57 SendMessageW 189640->189645 189646 14007ee3f SendMessageW 189640->189646 189641->189639 189642->189641 189643->189640 189654 14007fcd0 189644->189654 189676 14007fcde 189644->189676 189649 14007ee96 189645->189649 189650 14007eea3 SendMessageW 189645->189650 189646->189645 189647 14007eccb 189653 1400b9b84 4 API calls 189647->189653 189649->189632 189649->189650 189650->189632 189651 14007eec2 189650->189651 189655 14007eed1 189651->189655 189660 14007eed6 SendMessageW 189651->189660 189652->189647 189656 14007eca0 189652->189656 189657 14007ecdc 189653->189657 189726 140087b50 8 API calls 189654->189726 189663 14007e81c MoveWindow 189655->189663 189672 14007ef49 189655->189672 189719 140010880 DialogBoxParamW 189656->189719 189720 14000eda0 802 API calls __std_exception_copy 189657->189720 189659 14007fbfb 189662 1400b9b84 4 API calls 189659->189662 189660->189655 189667 14007fc0c 189662->189667 189663->189632 189665->189659 189669 14007f803 189665->189669 189666 14007fd35 SetWindowTheme 189670 14007fd4d 189666->189670 189723 14000eda0 802 API calls __std_exception_copy 189667->189723 189668 14007ecfb 189673 14007ed07 189668->189673 189674 14007fc5f 189668->189674 189722 140010880 DialogBoxParamW 189669->189722 189677 14007fd84 189670->189677 189682 14007fd58 SendMessageW 189670->189682 189680 14007ef53 GetDC SelectObject 189672->189680 189681 14007ef8e GetTextMetricsW 189672->189681 189721 14000f2f0 119 API calls 189673->189721 189686 14007fc79 189674->189686 189717 14007ecc3 189674->189717 189676->189666 189676->189670 189683 14007fda1 189677->189683 189684 14007fd8d SendMessageW 189677->189684 189678 14007fc2f 189678->189674 189685 14007fc37 189678->189685 189680->189681 189681->189632 189682->189677 189687 1400837b0 60 API calls 189683->189687 189684->189683 189724 14000f2f0 119 API calls 189685->189724 189725 1400a3410 30 API calls 189686->189725 189693 14007fdb0 189687->189693 189690 14007fe6e 189692 14007ff3a 189690->189692 189695 14007fe87 GetClientRect 189690->189695 189696 14007ff25 189690->189696 189691 14007fde1 SendMessageW 189691->189690 189699 14007ff45 GetWindowRect 189692->189699 189712 14007ff9d 189692->189712 189693->189690 189693->189691 189697 14007fdd8 189693->189697 189698 14007fe05 GetWindowLongW 189693->189698 189700 14007fea1 SetWindowLongW SendMessageW SetWindowLongW 189695->189700 189701 14007fee0 SendMessageW 189695->189701 189696->189692 189727 140088990 8 API calls 189696->189727 189697->189690 189697->189691 189704 14007fe22 SendMessageW 189698->189704 189705 14007fe3f SendMessageW 189698->189705 189706 14007ff73 189699->189706 189699->189712 189702 14007fef5 MoveWindow 189700->189702 189701->189702 189702->189692 189704->189690 189705->189690 189710 14007ff86 SendMessageW 189706->189710 189711 14007ff80 189706->189711 189706->189712 189707 140080017 189708 140080020 SetWindowPos 189707->189708 189709 140080042 189707->189709 189708->189709 189716 140080055 MapWindowPoints 189709->189716 189709->189717 189710->189712 189711->189710 189712->189707 189713 14007ffeb 189712->189713 189714 14007ffb6 GetWindowRect MapWindowPoints InvalidateRect 189712->189714 189713->189707 189715 14007fff1 SetWindowPos 189713->189715 189714->189713 189715->189707 189716->189717 189718->189635 189719->189717 189720->189668 189721->189717 189722->189717 189723->189678 189724->189717 189725->189717 189726->189676 189727->189692 189728 14007e0b0 CreateWindowExW 189729 14007e112 189728->189729 189732 14007f785 189728->189732 189730 14007e11e SendMessageW 189729->189730 189729->189732 189730->189732 189731 14007f7c0 189735 14007fc9d 189731->189735 189740 14007f7ca 189731->189740 189732->189731 189733 14007f7b3 ReleaseDC 189732->189733 189734 14007f7a2 SelectObject 189732->189734 189733->189731 189734->189733 189736 14007fcd0 189735->189736 189747 14007fcde 189735->189747 189791 140087b50 8 API calls 189736->189791 189738 14007fbfb 189739 1400b9b84 4 API calls 189738->189739 189742 14007fc0c 189739->189742 189740->189738 189743 14007f803 189740->189743 189741 14007fd35 SetWindowTheme 189744 14007fd4d 189741->189744 189788 14000eda0 802 API calls __std_exception_copy 189742->189788 189787 140010880 DialogBoxParamW 189743->189787 189748 14007fd84 189744->189748 189750 14007fd58 SendMessageW 189744->189750 189747->189741 189747->189744 189751 14007fda1 189748->189751 189752 14007fd8d SendMessageW 189748->189752 189749 14007fc2f 189753 14007fc37 189749->189753 189754 14007fc5f 189749->189754 189750->189748 189755 1400837b0 60 API calls 189751->189755 189752->189751 189789 14000f2f0 119 API calls 189753->189789 189757 14007fc79 189754->189757 189786 14007f82a 189754->189786 189762 14007fdb0 189755->189762 189790 1400a3410 30 API calls 189757->189790 189758 14007fe6e 189761 14007ff3a 189758->189761 189764 14007fe87 GetClientRect 189758->189764 189765 14007ff25 189758->189765 189759 14007fde1 SendMessageW 189759->189758 189768 14007ff45 GetWindowRect 189761->189768 189781 14007ff9d 189761->189781 189762->189758 189762->189759 189766 14007fdd8 189762->189766 189767 14007fe05 GetWindowLongW 189762->189767 189769 14007fea1 SetWindowLongW SendMessageW SetWindowLongW 189764->189769 189770 14007fee0 SendMessageW 189764->189770 189765->189761 189792 140088990 8 API calls 189765->189792 189766->189758 189766->189759 189773 14007fe22 SendMessageW 189767->189773 189774 14007fe3f SendMessageW 189767->189774 189775 14007ff73 189768->189775 189768->189781 189771 14007fef5 MoveWindow 189769->189771 189770->189771 189771->189761 189773->189758 189774->189758 189779 14007ff86 SendMessageW 189775->189779 189780 14007ff80 189775->189780 189775->189781 189776 140080017 189777 140080020 SetWindowPos 189776->189777 189778 140080042 189776->189778 189777->189778 189785 140080055 MapWindowPoints 189778->189785 189778->189786 189779->189781 189780->189779 189781->189776 189782 14007ffeb 189781->189782 189783 14007ffb6 GetWindowRect MapWindowPoints InvalidateRect 189781->189783 189782->189776 189784 14007fff1 SetWindowPos 189782->189784 189783->189782 189784->189776 189785->189786 189787->189786 189788->189749 189789->189786 189790->189786 189791->189747 189792->189761 189793 14005b34d 189794 14005b3ad 189793->189794 189798 14005b357 189793->189798 189796 1400764f0 802 API calls 189794->189796 189795 14005b39a 189813 14009f9a0 802 API calls __std_exception_copy 189795->189813 189805 14005a076 189796->189805 189798->189795 189799 14005b384 189798->189799 189812 1400122d0 802 API calls 189799->189812 189801 14005a087 GetTickCount 189802 14005a0a4 PeekMessageW 189801->189802 189801->189805 189803 14005a0c2 189802->189803 189804 14005a0cf GetTickCount 189802->189804 189803->189804 189804->189805 189805->189801 189806 14005a136 GetTickCount 189805->189806 189808 14005a1d0 189805->189808 189810 1400764f0 802 API calls 189805->189810 189811 140008964 ioctlsocket 189805->189811 189806->189805 189807 14005a169 189806->189807 189807->189805 189810->189805 189811->189805 189812->189805 189813->189805 189814 1400b9f28 189839 1400b9c28 189814->189839 189817 1400ba074 189890 1400ba410 7 API calls 2 library calls 189817->189890 189819 1400b9f44 __scrt_acquire_startup_lock 189820 1400ba07e 189819->189820 189822 1400b9f62 189819->189822 189891 1400ba410 7 API calls 2 library calls 189820->189891 189829 1400b9fa4 __scrt_release_startup_lock 189822->189829 189845 1400cfdc0 189822->189845 189825 1400ba089 _CallSETranslator 189826 1400b9f87 189828 1400ba00d 189853 1400ba55c 189828->189853 189829->189828 189887 1400ce87c 52 API calls 189829->189887 189831 1400ba012 189856 140004af0 SetErrorMode 189831->189856 189892 1400ba248 189839->189892 189842 1400b9c53 189842->189817 189842->189819 189843 1400b9c57 __scrt_initialize_crt 189843->189842 189894 1400bc4ac 7 API calls 2 library calls 189843->189894 189846 1400cfdd3 189845->189846 189847 1400b9f83 189846->189847 189895 1400b9e44 189846->189895 189847->189826 189849 1400cfd7c 189847->189849 189850 1400cfdb2 189849->189850 189851 1400cfd81 189849->189851 189850->189829 189851->189850 189975 140001180 189851->189975 189983 1400bc660 189853->189983 189855 1400ba573 GetStartupInfoW 189855->189831 189985 140063520 189856->189985 189858 140004b1b 189858->189858 189860 140098fd0 4 API calls 189858->189860 189867 140004b72 memcpy_s 189858->189867 189863 140004b66 189860->189863 189864 140004e34 189863->189864 189863->189867 190179 1400111d0 122 API calls 189864->190179 189991 140094730 189867->189991 189887->189828 189890->189820 189891->189825 189893 1400b9c4a __scrt_dllmain_crt_thread_attach 189892->189893 189893->189842 189893->189843 189894->189842 189896 1400b9e54 189895->189896 189912 1400cfe08 189896->189912 189898 1400b9e60 189918 1400b9c74 189898->189918 189901 1400b9e78 _RTC_Initialize 189910 1400b9ecd 189901->189910 189923 1400b9e24 189901->189923 189903 1400b9ef9 189903->189846 189904 1400b9e8d 189926 1400cf330 189904->189926 189911 1400b9ee9 189910->189911 189952 1400ba410 7 API calls 2 library calls 189910->189952 189911->189846 189913 1400cfe19 189912->189913 189915 1400cfe21 189913->189915 189953 1400d058c 11 API calls memcpy_s 189913->189953 189915->189898 189916 1400cfe30 189954 1400d03a4 52 API calls _invalid_parameter_noinfo 189916->189954 189919 1400b9c85 189918->189919 189922 1400b9c8a __scrt_acquire_startup_lock 189918->189922 189919->189922 189955 1400ba410 7 API calls 2 library calls 189919->189955 189921 1400b9cfe 189922->189901 189956 1400b9de8 189923->189956 189925 1400b9e2d 189925->189904 189927 1400b9e99 189926->189927 189928 1400cf350 189926->189928 189927->189910 189951 1400ba714 InitializeSListHead 189927->189951 189929 1400cf36e GetModuleFileNameW 189928->189929 189930 1400cf358 189928->189930 189934 1400cf399 189929->189934 189971 1400d058c 11 API calls memcpy_s 189930->189971 189932 1400cf35d 189972 1400d03a4 52 API calls _invalid_parameter_noinfo 189932->189972 189973 1400cf2d0 11 API calls 2 library calls 189934->189973 189936 1400cf3d9 189937 1400cf3e1 189936->189937 189940 1400cf3f9 189936->189940 189974 1400d058c 11 API calls memcpy_s 189937->189974 189939 1400cf3e6 189941 1400d0d8c __free_lconv_num 11 API calls 189939->189941 189944 1400cf447 189940->189944 189946 1400cf460 189940->189946 189949 1400cf41b 189940->189949 189942 1400cf3f4 189941->189942 189942->189927 189943 1400d0d8c __free_lconv_num 11 API calls 189943->189927 189945 1400d0d8c __free_lconv_num 11 API calls 189944->189945 189948 1400cf450 189945->189948 189946->189946 189947 1400d0d8c __free_lconv_num 11 API calls 189946->189947 189947->189949 189950 1400d0d8c __free_lconv_num 11 API calls 189948->189950 189949->189943 189950->189942 189952->189903 189953->189916 189954->189915 189955->189921 189957 1400b9e02 189956->189957 189958 1400b9dfb 189956->189958 189960 1400cfacc 189957->189960 189958->189925 189963 1400cf708 189960->189963 189970 1400d2d9c EnterCriticalSection 189963->189970 189971->189932 189972->189927 189973->189936 189974->189939 189980 140045840 189975->189980 189977 140001189 189978 1400b9de8 55 API calls 189977->189978 189979 1400b9e2d 189978->189979 189979->189851 189981 140045a2b memcpy_s 189980->189981 189982 140045a59 InitializeCriticalSection OleInitializeWOW 189981->189982 189982->189977 189984 1400bc640 189983->189984 189984->189855 189984->189984 190180 1400d99e0 189985->190180 189988 140063552 190182 140060550 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection __std_exception_copy 189988->190182 189989 14006355e 189989->189858 189992 1400b9b84 4 API calls 189991->189992 189993 140094761 189992->189993 189994 140092bb0 58 API calls 189993->189994 189995 1400947c6 189994->189995 189997 1400947e1 189995->189997 190286 140093150 52 API calls memcpy_s 189995->190286 189998 1400b9b84 4 API calls 189997->189998 189999 140094817 189998->189999 190000 140092bb0 58 API calls 189999->190000 190001 14009486b 190000->190001 190003 140094886 190001->190003 190287 140093150 52 API calls memcpy_s 190001->190287 190004 1400b9b84 4 API calls 190003->190004 190005 1400948c5 190004->190005 190006 140092bb0 58 API calls 190005->190006 190007 140094919 190006->190007 190181 14006352c GetCurrentDirectoryW 190180->190181 190181->189988 190181->189989 190182->189989 190286->189997 190287->190003 191401 14007e44a 191402 14007e457 CreateWindowExW 191401->191402 191403 14007e452 191401->191403 191404 14007e4c4 191402->191404 191407 14007f785 191402->191407 191403->191402 191405 14007f777 DestroyWindow 191404->191405 191411 14007e4db memcpy_s 191404->191411 191405->191407 191406 14007f7c0 191410 14007fc9d 191406->191410 191420 14007f7ca 191406->191420 191407->191406 191408 14007f7b3 ReleaseDC 191407->191408 191409 14007f7a2 SelectObject 191407->191409 191408->191406 191409->191408 191412 14007fcd0 191410->191412 191435 14007fcde 191410->191435 191413 14007e516 SendMessageW 191411->191413 191414 14007e52c 191411->191414 191496 140087b50 8 API calls 191412->191496 191413->191414 191418 14007e548 191414->191418 191419 14007e533 SendMessageW 191414->191419 191416 14007fbfb 191417 1400b9b84 4 API calls 191416->191417 191422 14007fc0c 191417->191422 191423 14007e54e SendMessageW 191418->191423 191424 14007e58c 191418->191424 191419->191418 191420->191416 191425 14007f803 191420->191425 191421 14007fd35 SetWindowTheme 191428 14007fd4d 191421->191428 191493 14000eda0 802 API calls __std_exception_copy 191422->191493 191430 14007e567 SendMessageW 191423->191430 191431 14007e57f 191423->191431 191426 14007e598 191424->191426 191427 14007e5a1 SendMessageW 191424->191427 191492 140010880 DialogBoxParamW 191425->191492 191433 14007e60e 191426->191433 191438 14007e5c7 GetSysColor 191426->191438 191439 14007e5d2 SendMessageW SendMessageW 191426->191439 191427->191426 191434 14007e5fe InvalidateRect 191427->191434 191436 14007fd84 191428->191436 191441 14007fd58 SendMessageW 191428->191441 191430->191424 191431->191424 191433->191407 191440 14007e622 SendMessageW 191433->191440 191434->191433 191435->191421 191435->191428 191442 14007fda1 191436->191442 191443 14007fd8d SendMessageW 191436->191443 191437 14007fc2f 191444 14007fc37 191437->191444 191445 14007fc5f 191437->191445 191438->191439 191439->191434 191446 14007e7c5 191440->191446 191447 14007e65d 191440->191447 191441->191436 191448 1400837b0 60 API calls 191442->191448 191443->191442 191494 14000f2f0 119 API calls 191444->191494 191453 14007fc79 191445->191453 191491 14007f82a 191445->191491 191450 14007e7ef SendMessageW 191446->191450 191455 14007e7e2 191446->191455 191451 14007e666 191447->191451 191452 14007e795 SendMessageW 191447->191452 191465 14007fdb0 191448->191465 191454 14007e815 MoveWindow 191450->191454 191456 14007e670 GetDC SelectObject 191451->191456 191457 14007e6ab GetTextMetricsW 191451->191457 191452->191454 191495 1400a3410 30 API calls 191453->191495 191454->191407 191455->191450 191456->191457 191462 14007e6c5 SendMessageW 191457->191462 191463 14007e75b GetSystemMetrics 191457->191463 191458 14007fe6e 191464 14007ff3a 191458->191464 191469 14007fe87 GetClientRect 191458->191469 191470 14007ff25 191458->191470 191459 14007fde1 SendMessageW 191459->191458 191467 14007e716 GetSystemMetrics 191462->191467 191468 14007e700 191462->191468 191463->191454 191473 14007ff45 GetWindowRect 191464->191473 191486 14007ff9d 191464->191486 191465->191458 191465->191459 191471 14007fdd8 191465->191471 191472 14007fe05 GetWindowLongW 191465->191472 191467->191454 191468->191467 191474 14007fea1 SetWindowLongW SendMessageW SetWindowLongW 191469->191474 191475 14007fee0 SendMessageW 191469->191475 191470->191464 191497 140088990 8 API calls 191470->191497 191471->191458 191471->191459 191478 14007fe22 SendMessageW 191472->191478 191479 14007fe3f SendMessageW 191472->191479 191480 14007ff73 191473->191480 191473->191486 191476 14007fef5 MoveWindow 191474->191476 191475->191476 191476->191464 191478->191458 191479->191458 191484 14007ff86 SendMessageW 191480->191484 191485 14007ff80 191480->191485 191480->191486 191481 140080017 191482 140080020 SetWindowPos 191481->191482 191483 140080042 191481->191483 191482->191483 191490 140080055 MapWindowPoints 191483->191490 191483->191491 191484->191486 191485->191484 191486->191481 191487 14007ffeb 191486->191487 191488 14007ffb6 GetWindowRect MapWindowPoints InvalidateRect 191486->191488 191487->191481 191489 14007fff1 SetWindowPos 191487->191489 191488->191487 191489->191481 191490->191491 191492->191491 191493->191437 191494->191491 191495->191491 191496->191435 191497->191464 191498 14007deea 191499 14007de96 CreateWindowExW 191498->191499 191501 14007f785 191498->191501 191499->191501 191500 14007f7c0 191504 14007fc9d 191500->191504 191509 14007f7ca 191500->191509 191501->191500 191502 14007f7b3 ReleaseDC 191501->191502 191503 14007f7a2 SelectObject 191501->191503 191502->191500 191503->191502 191505 14007fcd0 191504->191505 191516 14007fcde 191504->191516 191560 140087b50 8 API calls 191505->191560 191507 14007fbfb 191508 1400b9b84 4 API calls 191507->191508 191511 14007fc0c 191508->191511 191509->191507 191512 14007f803 191509->191512 191510 14007fd35 SetWindowTheme 191513 14007fd4d 191510->191513 191557 14000eda0 802 API calls __std_exception_copy 191511->191557 191556 140010880 DialogBoxParamW 191512->191556 191517 14007fd84 191513->191517 191519 14007fd58 SendMessageW 191513->191519 191516->191510 191516->191513 191520 14007fda1 191517->191520 191521 14007fd8d SendMessageW 191517->191521 191518 14007fc2f 191522 14007fc37 191518->191522 191523 14007fc5f 191518->191523 191519->191517 191524 1400837b0 60 API calls 191520->191524 191521->191520 191558 14000f2f0 119 API calls 191522->191558 191526 14007fc79 191523->191526 191555 14007f82a 191523->191555 191530 14007fdb0 191524->191530 191559 1400a3410 30 API calls 191526->191559 191527 14007fe6e 191531 14007ff3a 191527->191531 191533 14007fe87 GetClientRect 191527->191533 191534 14007ff25 191527->191534 191528 14007fde1 SendMessageW 191528->191527 191530->191527 191530->191528 191535 14007fdd8 191530->191535 191536 14007fe05 GetWindowLongW 191530->191536 191537 14007ff45 GetWindowRect 191531->191537 191546 14007ff9d 191531->191546 191538 14007fea1 SetWindowLongW SendMessageW SetWindowLongW 191533->191538 191539 14007fee0 SendMessageW 191533->191539 191534->191531 191561 140088990 8 API calls 191534->191561 191535->191527 191535->191528 191542 14007fe22 SendMessageW 191536->191542 191543 14007fe3f SendMessageW 191536->191543 191544 14007ff73 191537->191544 191537->191546 191540 14007fef5 MoveWindow 191538->191540 191539->191540 191540->191531 191542->191527 191543->191527 191544->191546 191549 14007ff86 SendMessageW 191544->191549 191550 14007ff80 191544->191550 191545 140080017 191547 140080020 SetWindowPos 191545->191547 191548 140080042 191545->191548 191546->191545 191551 14007ffeb 191546->191551 191552 14007ffb6 GetWindowRect MapWindowPoints InvalidateRect 191546->191552 191547->191548 191554 140080055 MapWindowPoints 191548->191554 191548->191555 191549->191546 191550->191549 191551->191545 191553 14007fff1 SetWindowPos 191551->191553 191552->191551 191553->191545 191554->191555 191556->191555 191557->191518 191558->191555 191559->191555 191560->191516 191561->191531 191562 14007dfaa CreateWindowExW 191563 14007e010 191562->191563 191564 14007f78c 191562->191564 191563->191564 191565 14007e01a 191563->191565 191566 14007f7c0 191564->191566 191569 14007f7b3 ReleaseDC 191564->191569 191570 14007f7a2 SelectObject 191564->191570 191567 14007e028 GetWindowLongW SendMessageW 191565->191567 191568 14007e070 SendMessageW SendMessageW 191565->191568 191571 14007fc9d 191566->191571 191576 14007f7ca 191566->191576 191567->191568 191568->191564 191569->191566 191570->191569 191572 14007fcd0 191571->191572 191585 14007fcde 191571->191585 191627 140087b50 8 API calls 191572->191627 191574 14007fbfb 191575 1400b9b84 4 API calls 191574->191575 191578 14007fc0c 191575->191578 191576->191574 191579 14007f803 191576->191579 191577 14007fd35 SetWindowTheme 191580 14007fd4d 191577->191580 191624 14000eda0 802 API calls __std_exception_copy 191578->191624 191623 140010880 DialogBoxParamW 191579->191623 191583 14007fd84 191580->191583 191586 14007fd58 SendMessageW 191580->191586 191587 14007fda1 191583->191587 191588 14007fd8d SendMessageW 191583->191588 191584 14007fc2f 191589 14007fc37 191584->191589 191590 14007fc5f 191584->191590 191585->191577 191585->191580 191586->191583 191591 1400837b0 60 API calls 191587->191591 191588->191587 191625 14000f2f0 119 API calls 191589->191625 191593 14007fc79 191590->191593 191622 14007f82a 191590->191622 191598 14007fdb0 191591->191598 191626 1400a3410 30 API calls 191593->191626 191594 14007fe6e 191597 14007ff3a 191594->191597 191600 14007fe87 GetClientRect 191594->191600 191603 14007ff25 191594->191603 191595 14007fde1 SendMessageW 191595->191594 191604 14007ff45 GetWindowRect 191597->191604 191617 14007ff9d 191597->191617 191598->191594 191598->191595 191601 14007fdd8 191598->191601 191602 14007fe05 GetWindowLongW 191598->191602 191605 14007fea1 SetWindowLongW SendMessageW SetWindowLongW 191600->191605 191606 14007fee0 SendMessageW 191600->191606 191601->191594 191601->191595 191609 14007fe22 SendMessageW 191602->191609 191610 14007fe3f SendMessageW 191602->191610 191603->191597 191628 140088990 8 API calls 191603->191628 191611 14007ff73 191604->191611 191604->191617 191607 14007fef5 MoveWindow 191605->191607 191606->191607 191607->191597 191609->191594 191610->191594 191615 14007ff86 SendMessageW 191611->191615 191616 14007ff80 191611->191616 191611->191617 191612 140080017 191613 140080020 SetWindowPos 191612->191613 191614 140080042 191612->191614 191613->191614 191621 140080055 MapWindowPoints 191614->191621 191614->191622 191615->191617 191616->191615 191617->191612 191618 14007ffeb 191617->191618 191619 14007ffb6 GetWindowRect MapWindowPoints InvalidateRect 191617->191619 191618->191612 191620 14007fff1 SetWindowPos 191618->191620 191619->191618 191620->191612 191621->191622 191623->191622 191624->191584 191625->191622 191626->191622 191627->191585 191628->191597 191629 140086ba7 GetClassLongW 191630 140086f4d DefDlgProcW 191629->191630 191631 140086bc2 GetWindowLongPtrW 191629->191631 191641 140086ce7 191630->191641 191631->191630 191632 140086bdc 191631->191632 191634 140086be2 ScreenToClient 191632->191634 191635 140086c57 GetDlgCtrlID 191632->191635 191634->191630 191636 140086c2e 191634->191636 191640 140086c7d 191635->191640 191636->191630 191637 140086c38 191636->191637 191637->191635 191638 140086c3e EnumChildWindows 191637->191638 191638->191635 191639 140086cee PostMessageW 191639->191641 191640->191639 191640->191641 191642 14006180a 191643 14006181b ioctlsocket 191642->191643 191644 140061909 DefWindowProcW 191642->191644 191646 14006182e 191643->191646 191645 14006191a 191644->191645 191646->191644 191648 140008b94 106 API calls memcpy_s 191646->191648 191648->191644 191649 14005a7d4 191650 1400b9b84 4 API calls 191649->191650 191651 14005a7ef 191650->191651 191665 14005c700 191651->191665 191653 14005a817 191659 14005a076 __std_exception_copy 191653->191659 191675 14005c950 191653->191675 191655 14005a087 GetTickCount 191656 14005a0a4 PeekMessageW 191655->191656 191655->191659 191657 14005a0c2 191656->191657 191658 14005a0cf GetTickCount 191656->191658 191657->191658 191658->191659 191659->191655 191660 14005a136 GetTickCount 191659->191660 191662 14005a1d0 191659->191662 191664 1400764f0 802 API calls 191659->191664 191697 140008964 ioctlsocket 191659->191697 191660->191659 191661 14005a169 191660->191661 191661->191659 191664->191659 191670 14005c724 memcpy_s 191665->191670 191666 14005c84e GetFullPathNameW 191667 14005c892 191666->191667 191668 14005c7ca 191666->191668 191669 14009d920 4 API calls 191667->191669 191668->191653 191671 14005c8ed 191669->191671 191670->191666 191670->191668 191672 1400cc130 52 API calls 191671->191672 191673 14005c90f 191672->191673 191673->191668 191674 14005c91f GetShortPathNameW 191673->191674 191674->191668 191677 14005c9a7 memcpy_s 191675->191677 191676 14005ca16 191676->191659 191677->191676 191678 14005ca46 FindFirstFileW 191677->191678 191679 14005ca6d 191678->191679 191685 14005ca91 191678->191685 191683 14005ca7f FindNextFileW 191679->191683 191679->191685 191680 14005cc25 191680->191676 191684 14005cc4b FindFirstFileW 191680->191684 191681 14005cc1c FindClose 191681->191680 191682 14005a010 802 API calls 191682->191685 191683->191679 191683->191685 191684->191676 191696 14005cc7b memcpy_s 191684->191696 191685->191682 191686 14005cb2d 191685->191686 191687 14005cbe0 FindNextFileW 191685->191687 191690 14005cb72 GetTickCount 191685->191690 191693 1400764f0 802 API calls 191685->191693 191698 140008964 ioctlsocket 191685->191698 191699 140067080 55 API calls 191685->191699 191686->191680 191686->191681 191687->191685 191688 14005cde7 FindNextFileW 191689 14005cdfb FindClose 191688->191689 191688->191696 191689->191676 191690->191685 191691 14005cba5 191690->191691 191691->191685 191693->191685 191695 14005c950 802 API calls 191695->191696 191696->191688 191696->191689 191696->191695 191697->191659 191698->191685 191699->191685 191700 14000177e GetTickCount 191701 140001784 191700->191701 191702 140001795 191701->191702 191703 140001790 191701->191703 191704 1400017a6 191702->191704 191705 1400017ba 191702->191705 191768 1400042d0 joyGetPosEx PostMessageW 191703->191768 191769 140003fb0 15 API calls 191704->191769 191709 1400017d7 SetTimer 191705->191709 191745 1400017fb 191705->191745 191708 1400017ab 191708->191705 191709->191745 191710 1400019ad GetForegroundWindow 191711 1400019bf GetWindowThreadProcessId 191710->191711 191722 140001945 191710->191722 191711->191722 191712 1400019df GetClassNameW 191712->191722 191713 14000196b GetMessageW 191713->191745 191714 140001a29 GetFocus 191717 140001a38 GetClassNameW 191714->191717 191714->191722 191715 140001c1a PeekMessageW 191715->191745 191716 140001bba GetTickCount 191716->191722 191716->191745 191718 1400c0224 58 API calls 191717->191718 191718->191722 191719 14000192b GetTickCount 191719->191722 191719->191745 191720 1400022ec GetTickCount 191720->191722 191734 140003dda 191720->191734 191721 140001c35 Sleep 191721->191745 191722->191712 191722->191714 191722->191715 191723 140001aef PeekMessageW 191722->191723 191724 1400c0224 58 API calls 191722->191724 191726 140002313 Sleep 191722->191726 191733 140001ab5 GetTickCount 191722->191733 191722->191734 191722->191745 191770 1400044f0 15 API calls 191722->191770 191771 1400042d0 joyGetPosEx PostMessageW 191722->191771 191772 140003fb0 15 API calls 191722->191772 191728 140001b2b PeekMessageW 191723->191728 191723->191745 191724->191722 191725 1400022c2 Sleep 191725->191745 191726->191745 191728->191722 191729 140001d80 GetClassLongW 191731 140001d97 GetWindowLongPtrW 191729->191731 191732 140001dad GetWindowLongW 191729->191732 191730 140003e37 191731->191732 191731->191745 191735 140001dc1 GetParent 191732->191735 191732->191745 191733->191722 191734->191730 191739 140003e23 KillTimer 191734->191739 191735->191729 191735->191745 191736 140001df7 TranslateAcceleratorW 191736->191745 191737 1400024ec GetForegroundWindow 191740 1400024fe GetWindowThreadProcessId 191737->191740 191738 1400020e1 IsDialogMessageW 191738->191745 191739->191730 191744 140002515 GetClassNameW 191740->191744 191741 140002050 GetDlgCtrlID 191741->191745 191747 14000207c GetParent 191741->191747 191743 140002448 SendMessageW 191743->191745 191744->191745 191745->191710 191745->191713 191745->191715 191745->191716 191745->191719 191745->191720 191745->191721 191745->191722 191745->191725 191745->191729 191745->191736 191745->191737 191745->191738 191745->191741 191745->191743 191746 140001e54 GetDlgCtrlID 191745->191746 191745->191747 191749 140002488 ShowWindow 191745->191749 191750 140002431 SendMessageW 191745->191750 191751 140001e79 GetParent 191745->191751 191752 14000202c GetKeyState 191745->191752 191753 140002267 GetTickCount 191745->191753 191754 140002559 IsDialogMessageW 191745->191754 191756 140002cd2 DragFinish 191745->191756 191757 140002779 DragFinish 191745->191757 191758 140002162 GetWindowLongW 191745->191758 191759 1400021a0 SendMessageW 191745->191759 191760 140001ef4 GetKeyState 191745->191760 191763 1400023ed PostMessageW 191745->191763 191764 140003d7f 191745->191764 191765 140001f12 GetWindowLongW 191745->191765 191766 140001fc8 IsWindowEnabled 191745->191766 191767 140001fee GetKeyState 191745->191767 191773 140088550 30 API calls 191745->191773 191746->191745 191746->191751 191747->191745 191749->191745 191750->191745 191751->191745 191752->191745 191755 14000203a GetKeyState 191752->191755 191753->191722 191753->191734 191754->191745 191755->191745 191756->191745 191757->191745 191758->191745 191761 140002177 SendMessageW 191758->191761 191759->191745 191760->191745 191761->191745 191763->191745 191765->191745 191766->191745 191767->191745 191768->191702 191769->191708 191770->191722 191771->191722 191772->191722 191773->191745 191774 1400591d9 191775 140059332 191774->191775 191777 1400591fd 191774->191777 191776 140054250 802 API calls 191776->191777 191777->191775 191777->191776

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4847 140047ff0-140048027 call 1400d99e0 4850 1400484f3 4847->4850 4851 14004802d-140048032 4847->4851 4853 1400484f5-14004850f 4850->4853 4851->4850 4852 140048038-140048046 4851->4852 4854 1400480d1 4852->4854 4855 14004804c-140048052 4852->4855 4856 1400480d8-1400480e6 4854->4856 4857 140048054-140048067 call 140010ac0 4855->4857 4858 14004806c-14004806e 4855->4858 4859 1400480e8-1400480ec 4856->4859 4860 140048100-140048104 4856->4860 4857->4853 4862 140048081 4858->4862 4863 140048070-140048078 4858->4863 4864 140048106-14004812c call 1400ced64 CharUpperW 4859->4864 4865 1400480ee-1400480fb 4859->4865 4860->4864 4867 14004812e-140048142 GetFullPathNameW 4860->4867 4868 140048086-14004809f call 1400c03bc 4862->4868 4863->4868 4869 14004807a-14004807f 4863->4869 4872 140048148-14004814b 4864->4872 4870 1400481a5-1400481c8 4865->4870 4867->4872 4883 1400480a1-1400480b7 call 140010ac0 4868->4883 4884 1400480bc-1400480cf 4868->4884 4869->4868 4874 1400482ce-1400482ec call 1400b9b84 call 140007d04 4870->4874 4875 1400481ce-1400481d8 4870->4875 4877 140048197-1400481a1 4872->4877 4878 14004814d-140048155 4872->4878 4898 1400482ef-1400482f5 4874->4898 4875->4874 4880 1400481de-1400481f0 FindResourceW 4875->4880 4877->4870 4881 140048157 4878->4881 4882 140048194 4878->4882 4880->4874 4886 1400481f6-140048204 LoadResource 4880->4886 4887 140048160-140048186 CompareStringOrdinal 4881->4887 4882->4877 4883->4853 4884->4856 4891 1400482c2-1400482cc 4886->4891 4892 14004820a-14004821b LockResource 4886->4892 4893 1400484a3-1400484a8 4887->4893 4894 14004818c-140048192 4887->4894 4891->4898 4892->4891 4897 140048221-14004827e SizeofResource call 1400b9b84 4892->4897 4893->4853 4894->4882 4894->4887 4906 140048295-1400482c0 4897->4906 4907 140048280-14004828f GetCPInfo 4897->4907 4899 14004849a-1400484a1 4898->4899 4900 1400482fb-140048312 call 140099700 4898->4900 4899->4893 4904 1400484aa-1400484f1 call 14009c780 call 140010ac0 4899->4904 4900->4899 4910 140048318-14004832c 4900->4910 4904->4853 4906->4898 4907->4906 4911 140048291 4907->4911 4913 14004839d 4910->4913 4914 14004832e-140048334 4910->4914 4911->4906 4916 1400483a0-1400483a8 4913->4916 4917 140048336-14004833b 4914->4917 4918 14004838d-14004839b 4914->4918 4919 140048413-14004842f call 1400bb7fc 4916->4919 4920 1400483aa-1400483bc FindResourceW 4916->4920 4921 140048340-140048348 4917->4921 4918->4916 4931 140048431-140048442 4919->4931 4932 140048493-140048498 4919->4932 4923 1400483be-1400483d5 call 140048520 4920->4923 4924 1400483db-1400483e5 4920->4924 4921->4921 4925 14004834a-14004835d call 140098fd0 4921->4925 4923->4850 4923->4924 4928 1400483e7-1400483f7 call 140048520 4924->4928 4929 1400483fd-140048404 call 1400634b0 4924->4929 4940 140048363-140048366 4925->4940 4941 140048510-140048515 call 1400111d0 4925->4941 4928->4850 4928->4929 4942 140048409-14004840e 4929->4942 4937 140048472-14004847d SetCurrentDirectoryW 4931->4937 4938 140048444-14004844d 4931->4938 4932->4853 4945 14004847f-140048486 4937->4945 4946 140048490 4937->4946 4938->4937 4943 14004844f-140048455 4938->4943 4947 140048378-14004838b 4940->4947 4948 140048368-140048373 call 1400bb960 4940->4948 4942->4853 4943->4937 4949 140048457-14004846c 4943->4949 4945->4946 4951 140048488-14004848b call 140063520 4945->4951 4946->4932 4947->4916 4948->4947 4949->4937 4951->4946
                    APIs
                    • FindResourceW.KERNEL32(?,?,?,?,?,00000000,0000000D,00000001400479D8,?,0000000140004C81), ref: 00000001400481E4
                    • LoadResource.KERNEL32(?,?,?,?,?,00000000,0000000D,00000001400479D8,?,0000000140004C81), ref: 00000001400481FB
                    • LockResource.KERNEL32(?,?,?,?,?,00000000,0000000D,00000001400479D8,?,0000000140004C81), ref: 000000014004820D
                    • SizeofResource.KERNEL32(?,?,?,?,?,00000000,0000000D,00000001400479D8,?,0000000140004C81), ref: 0000000140048226
                    • GetCPInfo.KERNEL32(?,?,?,?,?,00000000,0000000D,00000001400479D8,?,0000000140004C81), ref: 0000000140048287
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2844711127.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000003.00000002.2844699445.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844763181.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844763181.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844797434.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844810451.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844821911.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844833316.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844844753.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844856077.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844867461.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844879776.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: Resource$FindInfoLoadLockSizeof
                    • String ID: #Include$%s file "%s" cannot be opened.$*#2$Out of memory.$Script$Too many includes.
                    • API String ID: 3440836517-3189951223
                    • Opcode ID: 55b505f00f643f4b07a49b7a0203a743e1d66ec772f2415d1c59bb64ed21dc11
                    • Instruction ID: e8812c980ce5eb44ff6a433d7afc1314506459352e0d2e6e266adaaa7e7f0338
                    • Opcode Fuzzy Hash: 55b505f00f643f4b07a49b7a0203a743e1d66ec772f2415d1c59bb64ed21dc11
                    • Instruction Fuzzy Hash: 75E1AA71201B8186EB729F12E9947ED63A4FB4CBC4F46483AEF4A07AB5EB78C545C704
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.2844711127.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000003.00000002.2844699445.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844763181.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844763181.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844797434.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844810451.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844821911.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844833316.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844844753.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844856077.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844867461.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844879776.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CreateMessageObjectReleaseSelectSendWindow
                    • String ID: Button$Can't create control.
                    • API String ID: 464545779-3367292703
                    • Opcode ID: 891497140b1780c56a72102a3e7454dda2d1eb53daf1dc48c71fd13769d36083
                    • Instruction ID: 391c2e39b5b3f9af42ccf435a296449173c414d0a8ee3cede1d0666bf4b782bb
                    • Opcode Fuzzy Hash: 891497140b1780c56a72102a3e7454dda2d1eb53daf1dc48c71fd13769d36083
                    • Instruction Fuzzy Hash: DD312736205B8086EB62CF26E4907A977A5F78CBD4F14401AEF8957B78DB38C580DB40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.2844711127.0000000140001000.00000020.00000001.01000000.00000007.sdmp, Offset: 0000000140000000, based on PE: true
                    • Associated: 00000003.00000002.2844699445.0000000140000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844763181.00000001400DF000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844763181.00000001400FB000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844797434.000000014011C000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844810451.000000014011D000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844821911.000000014011F000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844833316.0000000140120000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844844753.0000000140121000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844856077.0000000140122000.00000008.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844867461.0000000140123000.00000004.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000003.00000002.2844879776.000000014012A000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_140000000_AutoHotkeyUX.jbxd
                    Similarity
                    • API ID: CountTick$MessagePeek
                    • String ID:
                    • API String ID: 4145102785-0
                    • Opcode ID: f2a7d29b70befd35a0dd0eb8794bd4a0c4204ecdc39ff761e175921a1e1b1d41
                    • Instruction ID: 438df62315db4ed99b0bd879fad8fb29dcaaaeeab9f01469f8c50d10f724a5d2
                    • Opcode Fuzzy Hash: f2a7d29b70befd35a0dd0eb8794bd4a0c4204ecdc39ff761e175921a1e1b1d41
                    • Instruction Fuzzy Hash: B551E172601A84CAF762CF26E8447EA37A1F74DB98F548215EB59432F5DB3EC885C700
                    Uniqueness

                    Uniqueness Score: -1.00%