Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SUNNY HONG VSL PARTICULARS.xlsx.exe

Overview

General Information

Sample name:SUNNY HONG VSL PARTICULARS.xlsx.exe
Analysis ID:1542951
MD5:ffd144af7387b81accc7ce4842bdf03c
SHA1:cdf69c6e18b742685ea17d104ae06949ea974c7e
SHA256:b0a9b18f3545271f7f14514d68f7126bb55feba2e7d016f369f76301e04d5889
Tags:exeRedLineStealeruser-threatcat_ch
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SUNNY HONG VSL PARTICULARS.xlsx.exe (PID: 2472 cmdline: "C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe" MD5: FFD144AF7387B81ACCC7CE4842BDF03C)
    • RegSvcs.exe (PID: 2140 cmdline: "C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://beirutrest.com", "Username": "belogs@beirutrest.com", "Password": "9yXQ39wz(uL+"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4141441498.000000000316F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 18 entries
            SourceRuleDescriptionAuthorStrings
            1.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x1300:$s3: 83 EC 38 53 B0 EE 88 44 24 2B 88 44 24 2F B0 F2 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1fdd0:$s5: delete[]
            • 0x1f288:$s6: constructor or from DllMain.
            0.2.SUNNY HONG VSL PARTICULARS.xlsx.exe.3c40000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 EE 88 44 24 2B 88 44 24 2F B0 F2 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            1.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 EE 88 44 24 2B 88 44 24 2F B0 F2 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            1.2.RegSvcs.exe.5580000.6.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.RegSvcs.exe.5580000.6.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 78 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe", CommandLine: "C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe", CommandLine|base64offset|contains: F, Image: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe, NewProcessName: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe, OriginalFileName: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe", ProcessId: 2472, ProcessName: SUNNY HONG VSL PARTICULARS.xlsx.exe
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 1.2.RegSvcs.exe.4142990.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://beirutrest.com", "Username": "belogs@beirutrest.com", "Password": "9yXQ39wz(uL+"}
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeReversingLabs: Detection: 57%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeJoe Sandbox ML: detected
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000003.1684777356.0000000004860000.00000004.00001000.00020000.00000000.sdmp, SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000003.1683759036.00000000046C0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000003.1684777356.0000000004860000.00000004.00001000.00020000.00000000.sdmp, SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000003.1683759036.00000000046C0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
                Source: Joe Sandbox ViewIP Address: 50.87.144.157 50.87.144.157
                Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0044289D InternetQueryDataAvailable,InternetReadFile,0_2_0044289D
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                Source: global trafficDNS traffic detected: DNS query: beirutrest.com
                Source: RegSvcs.exe, 00000001.00000002.4141441498.000000000316F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://beirutrest.com
                Source: RegSvcs.exe, 00000001.00000002.4141441498.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: RegSvcs.exe, 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4141441498.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: RegSvcs.exe, 00000001.00000002.4141441498.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: RegSvcs.exe, 00000001.00000002.4141441498.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, n00.cs.Net Code: lGCzgIzdr
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046C5D0
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00459FFF
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046C5D0
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00456354 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,0_2_00456354
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C08E

                System Summary

                barindex
                Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.SUNNY HONG VSL PARTICULARS.xlsx.exe.3c40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 1.2.RegSvcs.exe.5580000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.5580000.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.4142990.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.4142990.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.40f5570.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.40f5570.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.2d4fb76.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.2d4fb76.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.5580ee8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.5580ee8.7.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.2d4ec8e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.2d4ec8e.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.40f6458.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.40f6458.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.55d0000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.55d0000.8.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.5580000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.5580000.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.40f5570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.40f5570.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.2d4ec8e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.2d4ec8e.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 00000000.00000002.1685872943.0000000003C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 00000001.00000002.4140508725.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00434D50: GetFullPathNameW,__swprintf,_wcslen,_wcslen,_wcslen,CreateDirectoryW,CreateFileW,_memset,_wcslen,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00434D50
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004461ED _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_004461ED
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004120380_2_00412038
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0047E1FA0_2_0047E1FA
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0041A46B0_2_0041A46B
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0041240C0_2_0041240C
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004045E00_2_004045E0
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004128180_2_00412818
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0047CBF00_2_0047CBF0
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0044EBBC0_2_0044EBBC
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00412C380_2_00412C38
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0044ED9A0_2_0044ED9A
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00424F700_2_00424F70
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0041AF0D0_2_0041AF0D
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004271610_2_00427161
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004212BE0_2_004212BE
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004433900_2_00443390
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004433910_2_00443391
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0041D7500_2_0041D750
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004037E00_2_004037E0
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004278590_2_00427859
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0040F8900_2_0040F890
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0042397B0_2_0042397B
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00409A400_2_00409A40
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00411B630_2_00411B63
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00423EBF0_2_00423EBF
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0403C5E80_2_0403C5E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00408C601_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040DC111_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00407C3F1_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00418CCC1_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00406CA01_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004028B01_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041A4BE1_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00408C601_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004182441_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004016501_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402F201_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004193C41_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004187881_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402F891_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402B901_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004073A01_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02E0D6401_2_02E0D640
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02E0CA281_2_02E0CA28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02E00FD01_2_02E00FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02E010301_2_02E01030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02E0CD701_2_02E0CD70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06B252221_2_06B25222
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06B2A0D81_2_06B2A0D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06B200401_2_06B20040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06B261A81_2_06B261A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06B211301_2_06B21130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 43 times
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: String function: 00445975 appears 65 times
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: String function: 0041171A appears 37 times
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: String function: 0041718C appears 44 times
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: String function: 0040E6D0 appears 35 times
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000003.1683759036.00000000047E3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SUNNY HONG VSL PARTICULARS.xlsx.exe
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000003.1684436789.000000000498D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SUNNY HONG VSL PARTICULARS.xlsx.exe
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000002.1685872943.0000000003C40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename2ee75d06-d489-4537-90fc-92fe0f559436.exe4 vs SUNNY HONG VSL PARTICULARS.xlsx.exe
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.SUNNY HONG VSL PARTICULARS.xlsx.exe.3c40000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 1.2.RegSvcs.exe.5580000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.5580000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.4142990.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.4142990.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.40f5570.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.40f5570.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.2d4fb76.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.2d4fb76.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.5580ee8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.5580ee8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.2d4ec8e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.2d4ec8e.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.40f6458.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.40f6458.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.55d0000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.55d0000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.5580000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.5580000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.40f5570.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.40f5570.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.2d4ec8e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.2d4ec8e.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 00000000.00000002.1685872943.0000000003C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 00000001.00000002.4140508725.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, NpXw3kw.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, NpXw3kw.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0044AF5C GetLastError,FormatMessageW,0_2_0044AF5C
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464422
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0045D517 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D517
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0043701F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,__wcsicoll,CloseHandle,0_2_0043701F
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0047A999 OleInitialize,CLSIDFromProgID,CoCreateInstance,CoInitializeSecurity,_memset,_wcslen,_memset,CoCreateInstanceEx,CoSetProxyBlanket,0_2_0047A999
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0043614F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043614F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeFile created: C:\Users\user\AppData\Local\Temp\MelberJump to behavior
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeReversingLabs: Detection: 57%
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeFile read: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe "C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe"
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe"
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeStatic file information: File size 1270709 > 1048576
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000003.1684777356.0000000004860000.00000004.00001000.00020000.00000000.sdmp, SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000003.1683759036.00000000046C0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000003.1684777356.0000000004860000.00000004.00001000.00020000.00000000.sdmp, SUNNY HONG VSL PARTICULARS.xlsx.exe, 00000000.00000003.1683759036.00000000046C0000.00000004.00001000.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeStatic PE information: real checksum: 0xa2135 should be: 0x13b475
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004171D1 push ecx; ret 0_2_004171E4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C40C push cs; iretd 1_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00423149 push eax; ret 1_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C50E push cs; iretd 1_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004231C8 push eax; ret 1_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040E21D push ecx; ret 1_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C6BE push ebx; ret 1_2_0041C6BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040BB97 push dword ptr [ecx-75h]; iretd 1_2_0040BBA3
                Source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'RKd8LArnJ50fU', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'RKd8LArnJ50fU', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'RKd8LArnJ50fU', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'RKd8LArnJ50fU', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'RKd8LArnJ50fU', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: Possible double extension: xlsx.exeStatic PE information: SUNNY HONG VSL PARTICULARS.xlsx.exe
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_004772DE
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004440780_2_00444078
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeAPI/Special instruction interceptor: Address: 403C20C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,1_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599327Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599218Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599053Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596440Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596266Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596156Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596046Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595937Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595718Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594937Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594594Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594484Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594374Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1728Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8118Jump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-90273
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-89006
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeAPI coverage: 3.0 %
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599327Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599218Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599053Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596440Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596266Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596156Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596046Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595937Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595718Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594937Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594594Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594484Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594374Jump to behavior
                Source: RegSvcs.exe, 00000001.00000002.4143290448.0000000005A42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeAPI call chain: ExitProcess graph end nodegraph_0-88856
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeAPI call chain: ExitProcess graph end nodegraph_0-88977
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0045A259 BlockInput,0_2_0045A259
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,1_2_004019F0
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0403C478 mov eax, dword ptr fs:[00000030h]0_2_0403C478
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0403C4D8 mov eax, dword ptr fs:[00000030h]0_2_0403C4D8
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0403AE78 mov eax, dword ptr fs:[00000030h]0_2_0403AE78
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00426DA1 CreateFileW,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00426DA1
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0042202E SetUnhandledExceptionFilter,0_2_0042202E
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004230F5
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00417D93
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00421FA7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004123F1 SetUnhandledExceptionFilter,1_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F03008Jump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0043916A LogonUserW,0_2_0043916A
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00436431 __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_00436431
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00445DD3 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00445DD3
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeBinary or memory string: Shell_TrayWnd
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_00410D10 cpuid 0_2_00410D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,1_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004223BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004223BC
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004711D2 GetUserNameW,0_2_004711D2
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0042039F __invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,0_2_0042039F
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4142990.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f5570.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4fb76.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4ec8e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f6458.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.55d0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f5570.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4ec8e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.4141441498.000000000316F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4141441498.0000000003144000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2140, type: MEMORYSTR
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4142990.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f5570.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4fb76.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4ec8e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f6458.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.55d0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f5570.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4ec8e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 6, 0USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonestrwstrintbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoubleptrhwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeBinary or memory string: WIN_XP
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeBinary or memory string: WIN_XPe
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeBinary or memory string: WIN_VISTA
                Source: SUNNY HONG VSL PARTICULARS.xlsx.exeBinary or memory string: WIN_7
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4142990.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f5570.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4fb76.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4ec8e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.55d0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f6458.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f5570.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4ec8e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4141441498.0000000003144000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2140, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4142990.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f5570.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4fb76.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4ec8e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f6458.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.55d0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f5570.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4ec8e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.4141441498.000000000316F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4141441498.0000000003144000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2140, type: MEMORYSTR
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.55d0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4142990.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f5570.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4fb76.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4ec8e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4fb76.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f6458.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.4142990.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.55d0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.5580000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f5570.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.2d4ec8e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.40f6458.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_004741BB
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,0_2_0046483C
                Source: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exeCode function: 0_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0047AD92
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts3
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                121
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                12
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                Software Packing
                NTDS148
                System Information Discovery
                Distributed Component Object Model121
                Input Capture
                13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets341
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials121
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Valid Accounts
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job121
                Virtualization/Sandbox Evasion
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
                Process Injection
                Network Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SUNNY HONG VSL PARTICULARS.xlsx.exe58%ReversingLabsWin32.Trojan.AutoitInject
                SUNNY HONG VSL PARTICULARS.xlsx.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://api.ipify.org/0%URL Reputationsafe
                https://api.ipify.org0%URL Reputationsafe
                https://account.dyn.com/0%URL Reputationsafe
                https://api.ipify.org/t0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                beirutrest.com
                50.87.144.157
                truetrue
                  unknown
                  api.ipify.org
                  172.67.74.152
                  truefalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.orgRegSvcs.exe, 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4141441498.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://account.dyn.com/RegSvcs.exe, 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.org/tRegSvcs.exe, 00000001.00000002.4141441498.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.4141441498.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://beirutrest.comRegSvcs.exe, 00000001.00000002.4141441498.000000000316F000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      50.87.144.157
                      beirutrest.comUnited States
                      46606UNIFIEDLAYER-AS-1UStrue
                      172.67.74.152
                      api.ipify.orgUnited States
                      13335CLOUDFLARENETUSfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1542951
                      Start date and time:2024-10-27 00:12:04 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 8m 56s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:SUNNY HONG VSL PARTICULARS.xlsx.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 95%
                      • Number of executed functions: 38
                      • Number of non-executed functions: 320
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: SUNNY HONG VSL PARTICULARS.xlsx.exe
                      TimeTypeDescription
                      18:12:58API Interceptor13296099x Sleep call for process: RegSvcs.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      50.87.144.157WINNING DILIGENCE - VESSEL PARTICULARS.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        COSCO SHIPPING WISDOM SHIP PARTICULARS.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          PETRON SI F SHENYUAN KX278800.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            ASL OTSL 2 ship's Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              ATLANTIC STAR - VESSEL DETAILS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                Appt. Letter-SCM2403795.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  Jia Run-Full_Appointment_Letter_JRP-252432-1.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    SPARES REQUISITION.XLSX.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      CMB FLORIS DETAILS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        SUN ACE TBN VESSEL DETAILS.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          172.67.74.15267065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                          • api.ipify.org/
                                          Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                                          • api.ipify.org/
                                          y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                          • api.ipify.org/
                                          file.exeGet hashmaliciousRDPWrap ToolBrowse
                                          • api.ipify.org/
                                          Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                          • api.ipify.org/
                                          2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                                          • api.ipify.org/
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          beirutrest.comWINNING DILIGENCE - VESSEL PARTICULARS.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          COSCO SHIPPING WISDOM SHIP PARTICULARS.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          PETRON SI F SHENYUAN KX278800.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          ASL OTSL 2 ship's Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          ATLANTIC STAR - VESSEL DETAILS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          Appt. Letter-SCM2403795.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          Jia Run-Full_Appointment_Letter_JRP-252432-1.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          SPARES REQUISITION.XLSX.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          CMB FLORIS DETAILS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          SUN ACE TBN VESSEL DETAILS.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          api.ipify.orgSecuriteInfo.com.Trojan.Inject5.10837.16335.2292.exeGet hashmaliciousAgentTeslaBrowse
                                          • 172.67.74.152
                                          Rampage.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 104.26.13.205
                                          Order Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 104.26.12.205
                                          https://pub-535a4999ab4b4c1e81647bad9b888e40.r2.dev/onedrivefresh.htmlGet hashmaliciousUnknownBrowse
                                          • 172.67.74.152
                                          https://ipfox.co.uk/pages/thanks.html#RXJpay5Kb2huc29uQGFnLnN0YXRlLm1uLnVzGet hashmaliciousUnknownBrowse
                                          • 104.26.13.205
                                          https://gf5q.sqpbij.shop/?c2V0aC5wZW1iZXJAYXV0b3BhcnRpbnRsLmNvbTp3NThyNgGet hashmaliciousHTMLPhisherBrowse
                                          • 104.26.13.205
                                          New_Order_568330_Material_Specifications.exeGet hashmaliciousAgentTesla, MassLogger RAT, Phoenix Stealer, RedLine, SugarDump, XWormBrowse
                                          • 104.26.12.205
                                          https://www.canva.com/design/DAGUUU-VdiI/DdL4Z-_loK4X7NMMbGGnJg/view?utm_content=DAGUUU-VdiI&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                          • 104.26.12.205
                                          https://www.canva.com/design/DAGUUU-VdiI/DdL4Z-_loK4X7NMMbGGnJg/view?utm_content=DAGUUU-VdiI&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                          • 104.26.13.205
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          UNIFIEDLAYER-AS-1USWINNING DILIGENCE - VESSEL PARTICULARS.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.144.157
                                          https://www.google.co.uk/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp/taxigiarebienhoa.vn/nini/ybmex/captcha/Z3VsYW1yYXN1bC5jaGVwdXdhbGFAY2V2YWxvZ2lzdGljcy5jb20Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                          • 192.185.209.0
                                          botnet.arm.elfGet hashmaliciousMirai, MoobotBrowse
                                          • 162.147.158.141
                                          botnet.sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                          • 162.145.242.81
                                          SOLICITUD URGENTE RFQ-05567.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 192.185.118.238
                                          la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                          • 166.63.118.243
                                          la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                          • 162.241.137.87
                                          yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                          • 173.254.28.29
                                          OREN Engine Stores Requisition 4th quarter OREN-ES-2024-010 & OREN-ES-2024-011.exeGet hashmaliciousFormBookBrowse
                                          • 162.241.63.77
                                          la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                          • 50.6.54.191
                                          CLOUDFLARENETUSJOSXXL1.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 188.114.96.3
                                          WINNING DILIGENCE - VESSEL PARTICULARS.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 104.26.13.205
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.95.91
                                          SR3JZpolPo.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 104.21.9.210
                                          R5AREmpD4S.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 104.21.9.210
                                          DBUfLVzZhf.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 104.21.9.210
                                          MHQMJCOxjl.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 172.67.161.82
                                          73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 172.67.161.82
                                          SR3JZpolPo.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 188.114.97.3
                                          DBUfLVzZhf.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 188.114.96.3
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          3b5074b1b5d032e5620f69f9f700ff0eJOSXXL1.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 172.67.74.152
                                          WINNING DILIGENCE - VESSEL PARTICULARS.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 172.67.74.152
                                          MHQMJCOxjl.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 172.67.74.152
                                          73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 172.67.74.152
                                          MHQMJCOxjl.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 172.67.74.152
                                          73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                          • 172.67.74.152
                                          6VTskjqyxX.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.74.152
                                          6VTskjqyxX.exeGet hashmaliciousUnknownBrowse
                                          • 172.67.74.152
                                          gI1wz7QtZV.lnkGet hashmaliciousLonePageBrowse
                                          • 172.67.74.152
                                          Hxn7F5YIYJ.lnkGet hashmaliciousUnknownBrowse
                                          • 172.67.74.152
                                          No context
                                          Process:C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):266752
                                          Entropy (8bit):7.862814514877365
                                          Encrypted:false
                                          SSDEEP:6144:axXR88oyiJXrPxYUOl4KOkcRkILpP2UaVV1ijNnN3w03z:uh88oyiJXrPOhemALN2pNibw03z
                                          MD5:AB0474BEB11F4EED142DDBFBF4CAB57B
                                          SHA1:DA6DECBBFB152DB98F4C286C3B691B7CA8AB9D0D
                                          SHA-256:CB8A75BC44A72EE8905B2888EC6BCD06784AEB08FA3EF67E2CDB45D9FE8725AD
                                          SHA-512:4B643C3E142730F3A3DCE2041DBC99F3A2D5E221C11FE542C4DF6E20A863301A63EF0BED82DA9365BC1C6321564DA9368BFB12F3874D2908F60B2D91A6D96290
                                          Malicious:false
                                          Reputation:low
                                          Preview:...65NFTHR6U..H0.6NFTLR6.LCH066NFTLR6ULCH066NFTLR6ULCH066NFT.R6UB\.>6.G.u.Sz.m. YE.>4;+ W8l )^XY:f6)rD "c!^.r..t!=R0bNE:.6NFTLR6=\.e.G.0j%.,.$.=z.IHq7.2Y..2h9.H.?.*.#.+~`&N*G.8fo;H.=.6..M0k%.,d</+dA.HNFTLR6ULCH066NFT"..0LCH0fsNF.MV6!.C.066NFTLR.UoBC1?6N.ULR@WLCH06..FTLB6UL.I066.FT\R6UNCH566NFTLR3ULCH066N&PLR2UL.s264NF.LR&ULSH066^FT\R6ULCH 66NFTLR6ULC.%46.FTLRVWL..166NFTLR6ULCH066NFTLR6ULCH..7NZTLR6ULCH066NFTLR6ULCH066NFT._4U.CH066NFTLR6U.BH.76NFTLR6ULCH066NFTLR6ULCH06.:#,8R6UT.I06&NFT.S6UHCH066NFTLR6ULCh06V`40-&WUL.%066.GTL<6UL.I066NFTLR6ULCHp66.h0-&WULC..66NfVLR ULCB266NFTLR6ULCH0v6N.z>!D6LCH..7NF4NR6.MCH.46NFTLR6ULCH06vNF.LR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6ULCH066NFTLR6U
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):7.477971491823115
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 95.11%
                                          • AutoIt3 compiled script executable (510682/80) 4.86%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:SUNNY HONG VSL PARTICULARS.xlsx.exe
                                          File size:1'270'709 bytes
                                          MD5:ffd144af7387b81accc7ce4842bdf03c
                                          SHA1:cdf69c6e18b742685ea17d104ae06949ea974c7e
                                          SHA256:b0a9b18f3545271f7f14514d68f7126bb55feba2e7d016f369f76301e04d5889
                                          SHA512:7287d4078fbf893dcc45406e8057e0a7aec3bd14301987db0be54386a0c8a1c54722d6d818e991ebb255af840a5a7146e249c813c99e9d3dae73588793474ba2
                                          SSDEEP:24576:ffmMv6Ckr7Mny5QLqSYl+nOQlAiJryp6JO+b715Uyq2:f3v+7/5QLqSY8OQlpryYO+bdq2
                                          TLSH:7E45F112B7D680B6D9A339712A3BE32ADF3475194323C4DBA7E12E768F211109B37761
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
                                          Icon Hash:1733312925935517
                                          Entrypoint:0x416310
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                          Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:0
                                          File Version Major:5
                                          File Version Minor:0
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:0
                                          Import Hash:aaaa8913c89c8aa4a5d93f06853894da
                                          Instruction
                                          call 00007FB4CD1C10FCh
                                          jmp 00007FB4CD1B4ECEh
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          push ebp
                                          mov ebp, esp
                                          push edi
                                          push esi
                                          mov esi, dword ptr [ebp+0Ch]
                                          mov ecx, dword ptr [ebp+10h]
                                          mov edi, dword ptr [ebp+08h]
                                          mov eax, ecx
                                          mov edx, ecx
                                          add eax, esi
                                          cmp edi, esi
                                          jbe 00007FB4CD1B505Ah
                                          cmp edi, eax
                                          jc 00007FB4CD1B51FAh
                                          cmp ecx, 00000100h
                                          jc 00007FB4CD1B5071h
                                          cmp dword ptr [004A94E0h], 00000000h
                                          je 00007FB4CD1B5068h
                                          push edi
                                          push esi
                                          and edi, 0Fh
                                          and esi, 0Fh
                                          cmp edi, esi
                                          pop esi
                                          pop edi
                                          jne 00007FB4CD1B505Ah
                                          pop esi
                                          pop edi
                                          pop ebp
                                          jmp 00007FB4CD1B54BAh
                                          test edi, 00000003h
                                          jne 00007FB4CD1B5067h
                                          shr ecx, 02h
                                          and edx, 03h
                                          cmp ecx, 08h
                                          jc 00007FB4CD1B507Ch
                                          rep movsd
                                          jmp dword ptr [00416494h+edx*4]
                                          nop
                                          mov eax, edi
                                          mov edx, 00000003h
                                          sub ecx, 04h
                                          jc 00007FB4CD1B505Eh
                                          and eax, 03h
                                          add ecx, eax
                                          jmp dword ptr [004163A8h+eax*4]
                                          jmp dword ptr [004164A4h+ecx*4]
                                          nop
                                          jmp dword ptr [00416428h+ecx*4]
                                          nop
                                          mov eax, E4004163h
                                          arpl word ptr [ecx+00h], ax
                                          or byte ptr [ecx+eax*2+00h], ah
                                          and edx, ecx
                                          mov al, byte ptr [esi]
                                          mov byte ptr [edi], al
                                          mov al, byte ptr [esi+01h]
                                          mov byte ptr [edi+01h], al
                                          mov al, byte ptr [esi+02h]
                                          shr ecx, 02h
                                          mov byte ptr [edi+02h], al
                                          add esi, 03h
                                          add edi, 03h
                                          cmp ecx, 08h
                                          jc 00007FB4CD1B501Eh
                                          Programming Language:
                                          • [ASM] VS2008 SP1 build 30729
                                          • [ C ] VS2008 SP1 build 30729
                                          • [C++] VS2008 SP1 build 30729
                                          • [ C ] VS2005 build 50727
                                          • [IMP] VS2005 build 50727
                                          • [ASM] VS2008 build 21022
                                          • [RES] VS2008 build 21022
                                          • [LNK] VS2008 SP1 build 30729
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9298.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0xab0000x92980x9400f6be76de0ef2c68f397158bf01bdef3eFalse0.4896801097972973data5.530303089784181IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                          RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                          RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                          RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                          RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                          RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                          RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                          RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                          RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                          RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                          RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                          RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                          RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                          RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                          RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                          RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                          RT_STRING0xb28380x43adataEnglishGreat Britain0.3733826247689464
                                          RT_STRING0xb2c780x5fcdataEnglishGreat Britain0.3087467362924282
                                          RT_STRING0xb32780x65cdataEnglishGreat Britain0.34336609336609336
                                          RT_STRING0xb38d80x388dataEnglishGreat Britain0.377212389380531
                                          RT_STRING0xb3c600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                          RT_GROUP_ICON0xb3db80x84dataEnglishGreat Britain0.6439393939393939
                                          RT_GROUP_ICON0xb3e400x14dataEnglishGreat Britain1.15
                                          RT_GROUP_ICON0xb3e580x14dataEnglishGreat Britain1.25
                                          RT_GROUP_ICON0xb3e700x14dataEnglishGreat Britain1.25
                                          RT_VERSION0xb3e880x19cdataEnglishGreat Britain0.5339805825242718
                                          RT_MANIFEST0xb40280x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                          DLLImport
                                          WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                          VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                          COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                          MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                          PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                          USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                          KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
                                          USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
                                          GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
                                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                          ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
                                          SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                          ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
                                          OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishGreat Britain
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 27, 2024 00:12:58.524454117 CEST49730443192.168.2.4172.67.74.152
                                          Oct 27, 2024 00:12:58.524553061 CEST44349730172.67.74.152192.168.2.4
                                          Oct 27, 2024 00:12:58.524673939 CEST49730443192.168.2.4172.67.74.152
                                          Oct 27, 2024 00:12:58.534817934 CEST49730443192.168.2.4172.67.74.152
                                          Oct 27, 2024 00:12:58.534858942 CEST44349730172.67.74.152192.168.2.4
                                          Oct 27, 2024 00:12:59.150417089 CEST44349730172.67.74.152192.168.2.4
                                          Oct 27, 2024 00:12:59.150515079 CEST49730443192.168.2.4172.67.74.152
                                          Oct 27, 2024 00:12:59.155266047 CEST49730443192.168.2.4172.67.74.152
                                          Oct 27, 2024 00:12:59.155294895 CEST44349730172.67.74.152192.168.2.4
                                          Oct 27, 2024 00:12:59.155709982 CEST44349730172.67.74.152192.168.2.4
                                          Oct 27, 2024 00:12:59.198349953 CEST49730443192.168.2.4172.67.74.152
                                          Oct 27, 2024 00:12:59.214804888 CEST49730443192.168.2.4172.67.74.152
                                          Oct 27, 2024 00:12:59.259325027 CEST44349730172.67.74.152192.168.2.4
                                          Oct 27, 2024 00:12:59.392491102 CEST44349730172.67.74.152192.168.2.4
                                          Oct 27, 2024 00:12:59.392628908 CEST44349730172.67.74.152192.168.2.4
                                          Oct 27, 2024 00:12:59.392729998 CEST49730443192.168.2.4172.67.74.152
                                          Oct 27, 2024 00:12:59.399353981 CEST49730443192.168.2.4172.67.74.152
                                          Oct 27, 2024 00:13:00.288999081 CEST4973121192.168.2.450.87.144.157
                                          Oct 27, 2024 00:13:00.295572042 CEST214973150.87.144.157192.168.2.4
                                          Oct 27, 2024 00:13:00.295670986 CEST4973121192.168.2.450.87.144.157
                                          Oct 27, 2024 00:13:00.298326015 CEST4973121192.168.2.450.87.144.157
                                          Oct 27, 2024 00:13:00.305054903 CEST214973150.87.144.157192.168.2.4
                                          Oct 27, 2024 00:13:00.305123091 CEST4973121192.168.2.450.87.144.157
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 27, 2024 00:12:58.509179115 CEST6020953192.168.2.41.1.1.1
                                          Oct 27, 2024 00:12:58.516658068 CEST53602091.1.1.1192.168.2.4
                                          Oct 27, 2024 00:12:59.908637047 CEST4956353192.168.2.41.1.1.1
                                          Oct 27, 2024 00:13:00.287992001 CEST53495631.1.1.1192.168.2.4
                                          Oct 27, 2024 00:13:42.208405018 CEST5365117162.159.36.2192.168.2.4
                                          Oct 27, 2024 00:13:42.974603891 CEST53592451.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 27, 2024 00:12:58.509179115 CEST192.168.2.41.1.1.10x1e2bStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                          Oct 27, 2024 00:12:59.908637047 CEST192.168.2.41.1.1.10xfcbeStandard query (0)beirutrest.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 27, 2024 00:12:58.516658068 CEST1.1.1.1192.168.2.40x1e2bNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                          Oct 27, 2024 00:12:58.516658068 CEST1.1.1.1192.168.2.40x1e2bNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                          Oct 27, 2024 00:12:58.516658068 CEST1.1.1.1192.168.2.40x1e2bNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                          Oct 27, 2024 00:13:00.287992001 CEST1.1.1.1192.168.2.40xfcbeNo error (0)beirutrest.com50.87.144.157A (IP address)IN (0x0001)false
                                          • api.ipify.org
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.449730172.67.74.1524432140C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-26 22:12:59 UTC155OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                          Host: api.ipify.org
                                          Connection: Keep-Alive
                                          2024-10-26 22:12:59 UTC211INHTTP/1.1 200 OK
                                          Date: Sat, 26 Oct 2024 22:12:59 GMT
                                          Content-Type: text/plain
                                          Content-Length: 14
                                          Connection: close
                                          Vary: Origin
                                          cf-cache-status: DYNAMIC
                                          Server: cloudflare
                                          CF-RAY: 8d8dca7e7a93464d-DFW
                                          2024-10-26 22:12:59 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 36 38
                                          Data Ascii: 173.254.250.68


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:18:12:54
                                          Start date:26/10/2024
                                          Path:C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe"
                                          Imagebase:0x400000
                                          File size:1'270'709 bytes
                                          MD5 hash:FFD144AF7387B81ACCC7CE4842BDF03C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1685872943.0000000003C40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low
                                          Has exited:true

                                          Target ID:1
                                          Start time:18:12:55
                                          Start date:26/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe"
                                          Imagebase:0xc20000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4141441498.000000000316F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4141125168.0000000002D0E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                          • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000001.00000002.4142938355.0000000005580000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                          • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000001.00000002.4143023363.00000000055D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4142520524.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000001.00000002.4140508725.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4141441498.0000000003144000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4141441498.0000000003144000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:3%
                                            Dynamic/Decrypted Code Coverage:1.3%
                                            Signature Coverage:3.8%
                                            Total number of Nodes:1399
                                            Total number of Limit Nodes:32
                                            execution_graph 88787 40f110 RegOpenKeyExW 88788 40f13c RegQueryValueExW RegCloseKey 88787->88788 88789 40f15f 88787->88789 88788->88789 88790 429212 88795 410b90 88790->88795 88796 410b9a __write_nolock 88795->88796 88815 41171a 88796->88815 88800 410c66 _wcsncat 88830 413e3c 88800->88830 88803 41171a 75 API calls 88804 410ca3 _wcscpy 88803->88804 88805 410cd1 RegOpenKeyExW 88804->88805 88806 429bc3 RegQueryValueExW 88805->88806 88807 410cf7 88805->88807 88808 429cd9 RegCloseKey 88806->88808 88810 429bf2 _wcscat _wcslen _wcsncpy 88806->88810 88812 411421 88807->88812 88809 41171a 75 API calls 88809->88810 88810->88809 88811 429cd8 88810->88811 88811->88808 88905 4113e5 88812->88905 88814 41142e 88817 411724 88815->88817 88818 410c31 GetModuleFileNameW 88817->88818 88822 411740 std::bad_alloc::bad_alloc 88817->88822 88833 4138ba 88817->88833 88851 411afc 6 API calls __decode_pointer 88817->88851 88827 413db0 88818->88827 88820 411766 88852 4116fd 67 API calls std::exception::exception 88820->88852 88822->88820 88824 411421 __cinit 74 API calls 88822->88824 88823 411770 88853 41805b RaiseException 88823->88853 88824->88820 88826 41177e 88863 413b95 88827->88863 88893 41abec 88830->88893 88834 41396d 88833->88834 88843 4138cc 88833->88843 88861 411afc 6 API calls __decode_pointer 88834->88861 88836 413973 88862 417f23 67 API calls __getptd_noexit 88836->88862 88841 413929 RtlAllocateHeap 88841->88843 88843->88841 88844 4138dd 88843->88844 88845 413959 88843->88845 88848 41395e 88843->88848 88850 413965 88843->88850 88857 41386b 67 API calls 4 library calls 88843->88857 88858 411afc 6 API calls __decode_pointer 88843->88858 88844->88843 88854 418252 67 API calls 2 library calls 88844->88854 88855 4180a7 67 API calls 7 library calls 88844->88855 88856 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 88844->88856 88859 417f23 67 API calls __getptd_noexit 88845->88859 88860 417f23 67 API calls __getptd_noexit 88848->88860 88850->88817 88851->88817 88852->88823 88853->88826 88854->88844 88855->88844 88857->88843 88858->88843 88859->88848 88860->88850 88861->88836 88862->88850 88864 413c2f 88863->88864 88871 413bae 88863->88871 88865 413d60 88864->88865 88866 413d7b 88864->88866 88889 417f23 67 API calls __getptd_noexit 88865->88889 88891 417f23 67 API calls __getptd_noexit 88866->88891 88869 413d65 88875 413cfb 88869->88875 88890 417ebb 6 API calls 2 library calls 88869->88890 88871->88864 88881 413c1d 88871->88881 88885 41ab19 67 API calls __wctomb_s_l 88871->88885 88873 413d03 88873->88864 88873->88875 88877 413d8e 88873->88877 88874 413cb9 88874->88864 88876 413cd6 88874->88876 88887 41ab19 67 API calls __wctomb_s_l 88874->88887 88875->88800 88876->88864 88876->88875 88880 413cef 88876->88880 88892 41ab19 67 API calls __wctomb_s_l 88877->88892 88888 41ab19 67 API calls __wctomb_s_l 88880->88888 88881->88864 88884 413c9b 88881->88884 88886 41ab19 67 API calls __wctomb_s_l 88881->88886 88884->88873 88884->88874 88885->88881 88886->88884 88887->88876 88888->88875 88889->88869 88891->88869 88892->88875 88894 41ac02 88893->88894 88895 41abfd 88893->88895 88902 417f23 67 API calls __getptd_noexit 88894->88902 88895->88894 88901 41ac22 88895->88901 88899 410c99 88899->88803 88900 41ac07 88903 417ebb 6 API calls 2 library calls 88900->88903 88901->88899 88904 417f23 67 API calls __getptd_noexit 88901->88904 88902->88900 88904->88900 88906 4113f1 _fprintf 88905->88906 88913 41181b 88906->88913 88912 411412 _fprintf 88912->88814 88939 418407 88913->88939 88915 4113f6 88916 4112fa 88915->88916 89004 4169e9 TlsGetValue 88916->89004 88919 4169e9 __decode_pointer 6 API calls 88920 41131e 88919->88920 88921 4113a1 88920->88921 89014 4170e7 68 API calls 5 library calls 88920->89014 88936 41141b 88921->88936 88923 41133c 88924 411388 88923->88924 88926 411357 88923->88926 88927 411366 88923->88927 88925 41696e __encode_pointer 6 API calls 88924->88925 88928 411396 88925->88928 89015 417047 73 API calls _realloc 88926->89015 88927->88921 88930 411360 88927->88930 88931 41696e __encode_pointer 6 API calls 88928->88931 88930->88927 88933 41137c 88930->88933 89016 417047 73 API calls _realloc 88930->89016 88931->88921 89017 41696e TlsGetValue 88933->89017 88934 411376 88934->88921 88934->88933 89029 411824 88936->89029 88940 41841c 88939->88940 88941 41842f EnterCriticalSection 88939->88941 88946 418344 88940->88946 88941->88915 88943 418422 88943->88941 88974 4117af 67 API calls 3 library calls 88943->88974 88945 41842e 88945->88941 88947 418350 _fprintf 88946->88947 88948 418360 88947->88948 88949 418378 88947->88949 88975 418252 67 API calls 2 library calls 88948->88975 88961 418386 _fprintf 88949->88961 88978 416fb6 88949->88978 88952 418365 88976 4180a7 67 API calls 7 library calls 88952->88976 88955 4183a7 88959 418407 __lock 67 API calls 88955->88959 88956 418398 88984 417f23 67 API calls __getptd_noexit 88956->88984 88957 41836c 88977 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 88957->88977 88962 4183ae 88959->88962 88961->88943 88964 4183e2 88962->88964 88965 4183b6 88962->88965 88966 413a88 ___freetlocinfo 67 API calls 88964->88966 88985 4189e6 InitializeCriticalSectionAndSpinCount _fprintf 88965->88985 88968 4183d3 88966->88968 89000 4183fe LeaveCriticalSection _doexit 88968->89000 88969 4183c1 88969->88968 88986 413a88 88969->88986 88972 4183cd 88999 417f23 67 API calls __getptd_noexit 88972->88999 88974->88945 88975->88952 88976->88957 88981 416fbf 88978->88981 88979 4138ba _malloc 66 API calls 88979->88981 88980 416ff5 88980->88955 88980->88956 88981->88979 88981->88980 88982 416fd6 Sleep 88981->88982 88983 416feb 88982->88983 88983->88980 88983->88981 88984->88961 88985->88969 88987 413a94 _fprintf 88986->88987 88989 418407 __lock 65 API calls 88987->88989 88993 413b0d _realloc _fprintf 88987->88993 88998 413ad3 88987->88998 88988 413ae8 RtlFreeHeap 88990 413afa 88988->88990 88988->88993 88995 413aab ___sbh_find_block 88989->88995 89003 417f23 67 API calls __getptd_noexit 88990->89003 88992 413aff GetLastError 88992->88993 88993->88972 88994 413ac5 89002 413ade LeaveCriticalSection _doexit 88994->89002 88995->88994 89001 419f9d __VEC_memcpy VirtualFree VirtualFree HeapFree __cftoe2_l 88995->89001 88998->88988 88998->88993 88999->88968 89000->88961 89001->88994 89002->88998 89003->88992 89005 416a01 89004->89005 89006 416a22 GetModuleHandleW 89004->89006 89005->89006 89007 416a0b TlsGetValue 89005->89007 89008 416a32 89006->89008 89009 416a3d GetProcAddress 89006->89009 89013 416a16 89007->89013 89027 41177f Sleep GetModuleHandleW 89008->89027 89010 41130e 89009->89010 89010->88919 89012 416a38 89012->89009 89012->89010 89013->89006 89013->89010 89014->88923 89015->88930 89016->88934 89018 4169a7 GetModuleHandleW 89017->89018 89019 416986 89017->89019 89020 4169c2 GetProcAddress 89018->89020 89021 4169b7 89018->89021 89019->89018 89022 416990 TlsGetValue 89019->89022 89024 41699f 89020->89024 89028 41177f Sleep GetModuleHandleW 89021->89028 89026 41699b 89022->89026 89024->88924 89025 4169bd 89025->89020 89025->89024 89026->89018 89026->89024 89027->89012 89028->89025 89032 41832d LeaveCriticalSection 89029->89032 89031 411420 89031->88912 89032->89031 89033 409030 89047 409110 117 API calls 89033->89047 89035 42ceb6 89061 410ae0 VariantClear moneypunct 89035->89061 89037 40906e 89037->89035 89039 42cea9 89037->89039 89041 4090a4 89037->89041 89038 42cebf 89060 45e62e 116 API calls 3 library calls 89039->89060 89048 404160 89041->89048 89044 4090f0 moneypunct 89045 4090be moneypunct 89045->89044 89056 4092c0 89045->89056 89047->89037 89049 4092c0 VariantClear 89048->89049 89050 40416e 89049->89050 89062 404120 89050->89062 89052 40419b 89066 4734b7 89052->89066 89110 40efe0 89052->89110 89053 4041c6 89053->89035 89053->89045 89057 4092c8 moneypunct 89056->89057 89058 429db0 VariantClear 89057->89058 89059 4092d5 moneypunct 89057->89059 89058->89059 89059->89045 89060->89035 89061->89038 89063 40412e 89062->89063 89064 4092c0 VariantClear 89063->89064 89065 404138 89064->89065 89065->89052 89118 453063 89066->89118 89069 473545 89122 463c42 89069->89122 89070 47350c 89071 4092c0 VariantClear 89070->89071 89078 473514 89071->89078 89073 473558 89074 47355c 89073->89074 89091 473595 89073->89091 89076 4092c0 VariantClear 89074->89076 89075 473616 89135 463d7e 89075->89135 89085 473564 89076->89085 89078->89053 89079 473622 89081 473697 89079->89081 89082 47362c 89079->89082 89080 453063 111 API calls 89080->89091 89169 457838 89081->89169 89084 4092c0 VariantClear 89082->89084 89088 473634 89084->89088 89085->89053 89088->89053 89090 473655 89093 4092c0 VariantClear 89090->89093 89091->89075 89091->89080 89091->89090 89181 462f5a 87 API calls __wcsicoll 89091->89181 89102 47365d 89093->89102 89094 4736b0 89182 45e62e 116 API calls 3 library calls 89094->89182 89095 4736c9 89183 40e7e0 76 API calls 89095->89183 89098 4736ba GetCurrentProcess TerminateProcess 89098->89095 89099 4736db 89106 4736ff 89099->89106 89184 40d030 76 API calls 89099->89184 89100 473731 89107 473744 FreeLibrary 89100->89107 89108 47374b 89100->89108 89102->89053 89103 4736f1 89185 46b945 134 API calls 2 library calls 89103->89185 89106->89100 89186 40d030 76 API calls 89106->89186 89187 46b945 134 API calls 2 library calls 89106->89187 89107->89108 89108->89053 89111 40eff5 CreateFileW 89110->89111 89112 4299bf 89110->89112 89114 40f017 89111->89114 89113 4299c4 CreateFileW 89112->89113 89112->89114 89113->89114 89115 4299ea 89113->89115 89114->89053 89232 40e0d0 SetFilePointerEx SetFilePointerEx 89115->89232 89117 4299f5 89117->89114 89119 45306e 89118->89119 89120 45307a 89118->89120 89119->89120 89188 452e2a 111 API calls 5 library calls 89119->89188 89120->89069 89120->89070 89189 45335b 76 API calls 89122->89189 89124 463c5d 89190 442c52 80 API calls _wcslen 89124->89190 89126 463c72 89134 463cac 89126->89134 89191 40c060 89126->89191 89131 463ca4 89197 40c740 89131->89197 89132 463cf7 89132->89073 89134->89132 89202 462f5a 87 API calls __wcsicoll 89134->89202 89136 453063 111 API calls 89135->89136 89137 463d99 89136->89137 89138 463de0 89137->89138 89139 463dca 89137->89139 89214 40c760 78 API calls 89138->89214 89213 453081 111 API calls 89139->89213 89142 463dd0 LoadLibraryW 89153 463e09 89142->89153 89143 463de7 89147 463e19 89143->89147 89215 40c760 78 API calls 89143->89215 89145 463e3e 89148 463e4e 89145->89148 89149 463e7b 89145->89149 89146 463dfb 89146->89147 89216 40c760 78 API calls 89146->89216 89147->89079 89217 40d500 75 API calls 89148->89217 89219 40c760 78 API calls 89149->89219 89153->89145 89153->89147 89154 463e82 GetProcAddress 89158 463e90 89154->89158 89155 463e57 89218 45efe7 77 API calls moneypunct 89155->89218 89157 463e62 GetProcAddress 89160 463e79 89157->89160 89158->89147 89159 463edf 89158->89159 89158->89160 89159->89147 89162 463eef FreeLibrary 89159->89162 89160->89158 89220 403470 75 API calls _realloc 89160->89220 89162->89147 89163 463eb4 89221 40d500 75 API calls 89163->89221 89165 463ebd 89222 45efe7 77 API calls moneypunct 89165->89222 89167 463ec8 GetProcAddress 89223 401330 moneypunct 89167->89223 89170 457a4c 89169->89170 89175 45785f _strcat moneypunct _wcslen _wcscpy 89169->89175 89177 410d40 89170->89177 89171 40c760 78 API calls 89171->89175 89172 453081 111 API calls 89172->89175 89173 443576 78 API calls 89173->89175 89174 4138ba 67 API calls _malloc 89174->89175 89175->89170 89175->89171 89175->89172 89175->89173 89175->89174 89224 40f580 89175->89224 89179 410d55 89177->89179 89178 410ded VirtualProtect 89180 410dbb 89178->89180 89179->89178 89179->89180 89180->89094 89180->89095 89181->89091 89182->89098 89183->89099 89184->89103 89185->89106 89186->89106 89187->89106 89188->89120 89189->89124 89190->89126 89192 41171a 75 API calls 89191->89192 89193 40c088 89192->89193 89194 41171a 75 API calls 89193->89194 89195 40c096 89194->89195 89196 4608ce 75 API calls _realloc 89195->89196 89196->89131 89198 40c752 89197->89198 89199 40c747 89197->89199 89198->89134 89199->89198 89203 402ae0 89199->89203 89201 42a572 _realloc 89201->89134 89202->89132 89204 42a06a 89203->89204 89205 402aef 89203->89205 89210 401380 89204->89210 89205->89201 89207 42a072 89208 41171a 75 API calls 89207->89208 89209 42a095 _realloc 89208->89209 89209->89201 89211 41171a 75 API calls 89210->89211 89212 401387 89211->89212 89212->89207 89213->89142 89214->89143 89215->89146 89216->89153 89217->89155 89218->89157 89219->89154 89220->89163 89221->89165 89222->89167 89223->89159 89225 429440 89224->89225 89226 40f589 _wcslen 89224->89226 89227 40f58f WideCharToMultiByte 89226->89227 89228 40f5d8 89227->89228 89229 40f5ad 89227->89229 89228->89175 89230 41171a 75 API calls 89229->89230 89231 40f5bb WideCharToMultiByte 89230->89231 89231->89175 89232->89117 89233 4034b0 89234 4034b9 89233->89234 89235 4034bd 89233->89235 89236 42a0ba 89235->89236 89237 41171a 75 API calls 89235->89237 89238 4034fe moneypunct _realloc 89237->89238 89239 4161c2 89240 4161d3 89239->89240 89274 41aa31 HeapCreate 89240->89274 89243 416212 89276 416e29 GetModuleHandleW 89243->89276 89247 416223 __RTC_Initialize 89310 41b669 89247->89310 89250 416231 89251 41623d GetCommandLineW 89250->89251 89379 4117af 67 API calls 3 library calls 89250->89379 89325 42235f GetEnvironmentStringsW 89251->89325 89254 41624c 89331 4222b1 GetModuleFileNameW 89254->89331 89255 41623c 89255->89251 89257 416256 89258 416261 89257->89258 89380 4117af 67 API calls 3 library calls 89257->89380 89335 422082 89258->89335 89262 416272 89348 41186e 89262->89348 89265 416279 89267 416284 __wwincmdln 89265->89267 89382 4117af 67 API calls 3 library calls 89265->89382 89354 40d7f0 89267->89354 89270 4162b3 89384 411a4b 67 API calls _doexit 89270->89384 89273 4162b8 _fprintf 89275 416206 89274->89275 89275->89243 89377 41616a 67 API calls 3 library calls 89275->89377 89277 416e44 89276->89277 89278 416e3d 89276->89278 89280 416fac 89277->89280 89281 416e4e GetProcAddress GetProcAddress GetProcAddress GetProcAddress 89277->89281 89385 41177f Sleep GetModuleHandleW 89278->89385 89395 416ad5 70 API calls 2 library calls 89280->89395 89284 416e97 TlsAlloc 89281->89284 89283 416e43 89283->89277 89286 416218 89284->89286 89287 416ee5 TlsSetValue 89284->89287 89286->89247 89378 41616a 67 API calls 3 library calls 89286->89378 89287->89286 89288 416ef6 89287->89288 89386 411a69 6 API calls 4 library calls 89288->89386 89290 416efb 89291 41696e __encode_pointer 6 API calls 89290->89291 89292 416f06 89291->89292 89293 41696e __encode_pointer 6 API calls 89292->89293 89294 416f16 89293->89294 89295 41696e __encode_pointer 6 API calls 89294->89295 89296 416f26 89295->89296 89297 41696e __encode_pointer 6 API calls 89296->89297 89298 416f36 89297->89298 89387 41828b InitializeCriticalSectionAndSpinCount __alloc_osfhnd 89298->89387 89300 416f43 89300->89280 89301 4169e9 __decode_pointer 6 API calls 89300->89301 89302 416f57 89301->89302 89302->89280 89388 416ffb 89302->89388 89305 4169e9 __decode_pointer 6 API calls 89306 416f8a 89305->89306 89306->89280 89307 416f91 89306->89307 89394 416b12 67 API calls 5 library calls 89307->89394 89309 416f99 GetCurrentThreadId 89309->89286 89414 41718c 89310->89414 89312 41b675 GetStartupInfoA 89313 416ffb __calloc_crt 67 API calls 89312->89313 89320 41b696 89313->89320 89314 41b8b4 _fprintf 89314->89250 89315 41b831 GetStdHandle 89319 41b7fb 89315->89319 89316 41b896 SetHandleCount 89316->89314 89317 416ffb __calloc_crt 67 API calls 89317->89320 89318 41b843 GetFileType 89318->89319 89319->89314 89319->89315 89319->89316 89319->89318 89416 4189e6 InitializeCriticalSectionAndSpinCount _fprintf 89319->89416 89320->89314 89320->89317 89320->89319 89321 41b77e 89320->89321 89321->89314 89321->89319 89322 41b7a7 GetFileType 89321->89322 89415 4189e6 InitializeCriticalSectionAndSpinCount _fprintf 89321->89415 89322->89321 89326 422370 89325->89326 89327 422374 89325->89327 89326->89254 89328 416fb6 __malloc_crt 67 API calls 89327->89328 89330 422395 _realloc 89328->89330 89329 42239c FreeEnvironmentStringsW 89329->89254 89330->89329 89332 4222e6 _wparse_cmdline 89331->89332 89333 416fb6 __malloc_crt 67 API calls 89332->89333 89334 422329 _wparse_cmdline 89332->89334 89333->89334 89334->89257 89336 42209a _wcslen 89335->89336 89339 416267 89335->89339 89337 416ffb __calloc_crt 67 API calls 89336->89337 89338 4220be _wcslen 89337->89338 89338->89339 89340 422123 89338->89340 89342 416ffb __calloc_crt 67 API calls 89338->89342 89343 422149 89338->89343 89346 422108 89338->89346 89417 426349 67 API calls __wctomb_s_l 89338->89417 89339->89262 89381 4117af 67 API calls 3 library calls 89339->89381 89341 413a88 ___freetlocinfo 67 API calls 89340->89341 89341->89339 89342->89338 89344 413a88 ___freetlocinfo 67 API calls 89343->89344 89344->89339 89346->89338 89418 417d93 10 API calls 3 library calls 89346->89418 89350 41187c __IsNonwritableInCurrentImage 89348->89350 89419 418486 89350->89419 89351 41189a __initterm_e 89352 411421 __cinit 74 API calls 89351->89352 89353 4118b9 __IsNonwritableInCurrentImage __initterm 89351->89353 89352->89353 89353->89265 89355 431bcb 89354->89355 89356 40d80c 89354->89356 89357 4092c0 VariantClear 89356->89357 89358 40d847 89357->89358 89423 40eb50 89358->89423 89363 40d877 89426 411ac6 67 API calls 4 library calls 89363->89426 89364 40d888 89427 411b24 67 API calls __wctomb_s_l 89364->89427 89366 40d891 89428 40f370 SystemParametersInfoW SystemParametersInfoW 89366->89428 89368 40d89f 89429 40d6d0 GetCurrentDirectoryW 89368->89429 89370 40d8a7 SystemParametersInfoW 89371 40d8d4 89370->89371 89372 40d8cd FreeLibrary 89370->89372 89373 4092c0 VariantClear 89371->89373 89372->89371 89374 40d8dd 89373->89374 89375 4092c0 VariantClear 89374->89375 89376 40d8e6 89375->89376 89376->89270 89383 411a1f 67 API calls _doexit 89376->89383 89377->89243 89378->89247 89379->89255 89380->89258 89381->89262 89382->89267 89383->89270 89384->89273 89385->89283 89386->89290 89387->89300 89389 417004 89388->89389 89391 416f70 89389->89391 89392 417022 Sleep 89389->89392 89396 422452 89389->89396 89391->89280 89391->89305 89393 417037 89392->89393 89393->89389 89393->89391 89394->89309 89395->89286 89397 42245e _fprintf 89396->89397 89398 422476 89397->89398 89408 422495 _memset 89397->89408 89409 417f23 67 API calls __getptd_noexit 89398->89409 89400 42247b 89410 417ebb 6 API calls 2 library calls 89400->89410 89401 422507 HeapAlloc 89401->89408 89404 418407 __lock 66 API calls 89404->89408 89405 42248b _fprintf 89405->89389 89408->89401 89408->89404 89408->89405 89411 41a74c 5 API calls 2 library calls 89408->89411 89412 42254e LeaveCriticalSection _doexit 89408->89412 89413 411afc 6 API calls __decode_pointer 89408->89413 89409->89400 89411->89408 89412->89408 89413->89408 89414->89312 89415->89321 89416->89319 89417->89338 89418->89346 89420 41848c 89419->89420 89421 41696e __encode_pointer 6 API calls 89420->89421 89422 4184a4 89420->89422 89421->89420 89422->89351 89467 40eb70 89423->89467 89426->89364 89427->89366 89428->89368 89471 401f80 89429->89471 89431 40d6f1 IsDebuggerPresent 89432 431a9d MessageBoxA 89431->89432 89433 40d6ff 89431->89433 89434 431ab6 89432->89434 89433->89434 89435 40d71f 89433->89435 89573 403e90 75 API calls 3 library calls 89434->89573 89541 40f3b0 89435->89541 89439 40d73a GetFullPathNameW 89571 401440 127 API calls _wcscat 89439->89571 89441 40d77a 89442 40d782 89441->89442 89443 431b09 SetCurrentDirectoryW 89441->89443 89444 40d78b 89442->89444 89574 43604b 6 API calls 89442->89574 89443->89442 89553 4101f0 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 89444->89553 89447 431b28 89447->89444 89450 431b30 GetModuleFileNameW 89447->89450 89452 431ba4 GetForegroundWindow ShellExecuteW 89450->89452 89453 431b4c 89450->89453 89451 40d795 89457 40d7a8 89451->89457 89561 40e1e0 89451->89561 89458 40d7c7 89452->89458 89575 401b70 89453->89575 89457->89458 89572 401000 Shell_NotifyIconW _memset 89457->89572 89460 40d7d1 SetCurrentDirectoryW 89458->89460 89460->89370 89461 431b66 89582 40d3b0 75 API calls 2 library calls 89461->89582 89464 431b72 GetForegroundWindow ShellExecuteW 89465 431b9f 89464->89465 89465->89458 89466 40eba0 LoadLibraryA GetProcAddress 89466->89363 89468 40d86e 89467->89468 89469 40eb76 LoadLibraryA 89467->89469 89468->89363 89468->89466 89469->89468 89470 40eb87 GetProcAddress 89469->89470 89470->89468 89583 40e680 89471->89583 89475 401fa2 GetModuleFileNameW 89601 40ff90 89475->89601 89477 401fbd 89613 4107b0 89477->89613 89480 401b70 75 API calls 89481 401fe4 89480->89481 89616 4019e0 89481->89616 89483 401ff2 89484 4092c0 VariantClear 89483->89484 89485 402002 89484->89485 89486 401b70 75 API calls 89485->89486 89487 40201c 89486->89487 89488 4019e0 76 API calls 89487->89488 89489 40202c 89488->89489 89490 401b70 75 API calls 89489->89490 89491 40203c 89490->89491 89624 40c3e0 89491->89624 89493 40204d 89494 40c060 75 API calls 89493->89494 89495 402061 89494->89495 89642 401a70 89495->89642 89497 40206e 89649 4115d0 89497->89649 89500 42c174 89502 401a70 75 API calls 89500->89502 89501 402088 89503 4115d0 __wcsicoll 79 API calls 89501->89503 89504 42c189 89502->89504 89505 402093 89503->89505 89507 401a70 75 API calls 89504->89507 89505->89504 89506 40209e 89505->89506 89508 4115d0 __wcsicoll 79 API calls 89506->89508 89509 42c1a7 89507->89509 89510 4020a9 89508->89510 89511 42c1b0 GetModuleFileNameW 89509->89511 89510->89511 89512 4020b4 89510->89512 89514 401a70 75 API calls 89511->89514 89513 4115d0 __wcsicoll 79 API calls 89512->89513 89515 4020bf 89513->89515 89516 42c1e2 89514->89516 89517 402107 89515->89517 89520 42c20a _wcscpy 89515->89520 89524 401a70 75 API calls 89515->89524 89661 40df50 75 API calls 89516->89661 89519 402119 89517->89519 89517->89520 89523 42c243 89519->89523 89657 40e7e0 76 API calls 89519->89657 89528 401a70 75 API calls 89520->89528 89521 42c1f1 89522 401a70 75 API calls 89521->89522 89526 42c201 89522->89526 89525 4020e5 _wcscpy 89524->89525 89531 401a70 75 API calls 89525->89531 89526->89520 89536 402148 89528->89536 89529 402132 89658 40d030 76 API calls 89529->89658 89531->89517 89532 40213e 89533 4092c0 VariantClear 89532->89533 89533->89536 89535 402184 89538 4092c0 VariantClear 89535->89538 89536->89535 89539 401a70 75 API calls 89536->89539 89659 40d030 76 API calls 89536->89659 89660 40e640 76 API calls 89536->89660 89540 402196 moneypunct 89538->89540 89539->89536 89540->89431 89542 42ccf4 _memset 89541->89542 89543 40f3c9 89541->89543 89546 42cd05 GetOpenFileNameW 89542->89546 90344 40ffb0 76 API calls moneypunct 89543->90344 89545 40f3d2 90345 410130 SHGetMalloc 89545->90345 89546->89543 89548 40d732 89546->89548 89548->89439 89548->89441 89549 40f3d9 90350 410020 88 API calls __wcsicoll 89549->90350 89551 40f3e7 90351 40f400 89551->90351 89554 42b9d3 89553->89554 89555 41025a LoadImageW RegisterClassExW 89553->89555 90403 443e8f EnumResourceNamesW LoadImageW 89554->90403 90402 4102f0 7 API calls 89555->90402 89558 40d790 89560 4103e0 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 89558->89560 89559 42b9da 89560->89451 89563 40e207 _memset 89561->89563 89562 40e262 89568 40e2a4 89562->89568 90426 43737d 84 API calls __wcsicoll 89562->90426 89563->89562 89564 42aa14 DestroyIcon 89563->89564 89564->89562 89566 40e2c0 Shell_NotifyIconW 90404 401be0 89566->90404 89567 42aa50 Shell_NotifyIconW 89568->89566 89568->89567 89570 40e2da 89570->89457 89571->89441 89572->89458 89573->89441 89574->89447 89576 401b76 _wcslen 89575->89576 89577 401bc5 89576->89577 89578 41171a 75 API calls 89576->89578 89581 40d3b0 75 API calls 2 library calls 89577->89581 89579 401bad _realloc 89578->89579 89580 41171a 75 API calls 89579->89580 89580->89577 89581->89461 89582->89464 89584 40c060 75 API calls 89583->89584 89585 401f90 89584->89585 89586 402940 89585->89586 89587 40294a __write_nolock 89586->89587 89662 4021e0 89587->89662 89590 402972 89592 4029a4 89590->89592 89674 401cf0 89590->89674 89591 402ae0 75 API calls 89591->89592 89592->89591 89593 402a8c 89592->89593 89596 401b70 75 API calls 89592->89596 89599 401cf0 75 API calls 89592->89599 89677 40d970 75 API calls 2 library calls 89592->89677 89594 402abe 89593->89594 89595 401b70 75 API calls 89593->89595 89594->89475 89594->89594 89597 402ab3 89595->89597 89596->89592 89678 40d970 75 API calls 2 library calls 89597->89678 89599->89592 89680 40f5e0 89601->89680 89604 40ffa6 89604->89477 89606 42b6d8 89609 42b6e6 89606->89609 89736 434fe1 89606->89736 89608 413a88 ___freetlocinfo 67 API calls 89610 42b6f5 89608->89610 89609->89608 89611 434fe1 106 API calls 89610->89611 89612 42b702 89611->89612 89612->89477 89614 41171a 75 API calls 89613->89614 89615 401fd6 89614->89615 89615->89480 89617 401a03 89616->89617 89623 4019e5 89616->89623 89618 401a1a 89617->89618 89617->89623 90333 404260 76 API calls 89618->90333 89620 4019ff 89620->89483 89622 401a26 89622->89483 89623->89620 90332 404260 76 API calls 89623->90332 89625 40c3e4 89624->89625 89626 40c42c 89624->89626 89629 40c3f0 89625->89629 89635 42a475 89625->89635 89627 42a422 89626->89627 89628 40c435 89626->89628 89632 42a445 89627->89632 89636 42a427 89627->89636 89630 40c441 89628->89630 89634 42a455 89628->89634 90334 4042f0 75 API calls __cinit 89629->90334 90335 4042f0 75 API calls __cinit 89630->90335 90337 453155 75 API calls 89632->90337 90338 453155 75 API calls 89634->90338 90339 453155 75 API calls 89635->90339 89641 40c3fb 89636->89641 90336 453155 75 API calls 89636->90336 89641->89493 89643 401a90 89642->89643 89644 401a77 89642->89644 89646 4021e0 75 API calls 89643->89646 89645 401a8d 89644->89645 90340 404080 75 API calls _realloc 89644->90340 89645->89497 89648 401a9c 89646->89648 89648->89497 89650 411650 89649->89650 89651 4115e1 89649->89651 90343 4114bf 79 API calls 3 library calls 89650->90343 89656 40207d 89651->89656 90341 417f23 67 API calls __getptd_noexit 89651->90341 89654 4115ed 90342 417ebb 6 API calls 2 library calls 89654->90342 89656->89500 89656->89501 89657->89529 89658->89532 89659->89536 89660->89536 89661->89521 89663 4021f1 _wcslen 89662->89663 89664 42a598 89662->89664 89667 402205 89663->89667 89668 402226 89663->89668 89665 40c740 75 API calls 89664->89665 89666 42a5a2 89665->89666 89679 404020 75 API calls moneypunct 89667->89679 89669 401380 75 API calls 89668->89669 89671 40222d 89669->89671 89671->89666 89673 41171a 75 API calls 89671->89673 89672 40220c _realloc 89672->89590 89673->89672 89675 402ae0 75 API calls 89674->89675 89676 401cf7 89675->89676 89676->89590 89677->89592 89678->89594 89679->89672 89681 40f580 77 API calls 89680->89681 89682 40f5f8 _strcat moneypunct 89681->89682 89740 40f6d0 89682->89740 89687 42b2ee 89769 4151b0 89687->89769 89689 40f679 89689->89687 89691 40f681 89689->89691 89756 414e94 89691->89756 89694 40f68b 89694->89604 89699 452574 89694->89699 89696 42b31d 89775 415484 89696->89775 89698 42b33d 89700 41557c _fseek 105 API calls 89699->89700 89701 4525df 89700->89701 90277 4523ce 89701->90277 89704 4525fc 89704->89606 89705 4151b0 __fread_nolock 81 API calls 89706 45261d 89705->89706 89707 4151b0 __fread_nolock 81 API calls 89706->89707 89708 45262e 89707->89708 89709 4151b0 __fread_nolock 81 API calls 89708->89709 89710 452649 89709->89710 89711 4151b0 __fread_nolock 81 API calls 89710->89711 89712 452666 89711->89712 89713 41557c _fseek 105 API calls 89712->89713 89714 452682 89713->89714 89715 4138ba _malloc 67 API calls 89714->89715 89716 45268e 89715->89716 89717 4138ba _malloc 67 API calls 89716->89717 89718 45269b 89717->89718 89719 4151b0 __fread_nolock 81 API calls 89718->89719 89720 4526ac 89719->89720 89721 44afdc GetSystemTimeAsFileTime 89720->89721 89722 4526bf 89721->89722 89723 4526d5 89722->89723 89724 4526fd 89722->89724 89727 413a88 ___freetlocinfo 67 API calls 89723->89727 89725 452704 89724->89725 89726 45275b 89724->89726 90283 44b195 89725->90283 89729 413a88 ___freetlocinfo 67 API calls 89726->89729 89730 4526df 89727->89730 89732 452759 89729->89732 89733 413a88 ___freetlocinfo 67 API calls 89730->89733 89731 452753 89734 413a88 ___freetlocinfo 67 API calls 89731->89734 89732->89606 89735 4526e8 89733->89735 89734->89732 89735->89606 89737 434ff1 89736->89737 89738 434feb 89736->89738 89737->89609 89739 414e94 __fcloseall 106 API calls 89738->89739 89739->89737 89741 40f6dd _strlen 89740->89741 89788 40f790 89741->89788 89744 414e06 89808 414d40 89744->89808 89746 40f666 89746->89687 89747 40f450 89746->89747 89748 40f45a _strcat _realloc __write_nolock 89747->89748 89749 4151b0 __fread_nolock 81 API calls 89748->89749 89750 40f531 89748->89750 89752 42936d 89748->89752 89891 41557c 89748->89891 89749->89748 89750->89689 89753 41557c _fseek 105 API calls 89752->89753 89754 429394 89753->89754 89755 4151b0 __fread_nolock 81 API calls 89754->89755 89755->89750 89757 414ea0 _fprintf 89756->89757 89758 414ed1 89757->89758 89759 414eb4 89757->89759 89761 415965 __lock_file 68 API calls 89758->89761 89765 414ec9 _fprintf 89758->89765 90030 417f23 67 API calls __getptd_noexit 89759->90030 89763 414ee9 89761->89763 89762 414eb9 90031 417ebb 6 API calls 2 library calls 89762->90031 90014 414e1d 89763->90014 89765->89694 90099 41511a 89769->90099 89771 4151c8 89772 44afdc 89771->89772 90270 4431e0 89772->90270 89774 44affd 89774->89696 89776 415490 _fprintf 89775->89776 89777 4154bb 89776->89777 89778 41549e 89776->89778 89779 415965 __lock_file 68 API calls 89777->89779 90274 417f23 67 API calls __getptd_noexit 89778->90274 89781 4154c3 89779->89781 89784 4152e7 __ftell_nolock 71 API calls 89781->89784 89782 4154a3 90275 417ebb 6 API calls 2 library calls 89782->90275 89785 4154cf 89784->89785 90276 4154e8 LeaveCriticalSection LeaveCriticalSection _fprintf 89785->90276 89787 4154b3 _fprintf 89787->89698 89790 40f7ae _memset 89788->89790 89789 42a349 89790->89789 89792 40f628 89790->89792 89793 415258 89790->89793 89792->89744 89794 415285 89793->89794 89795 415268 89793->89795 89794->89795 89797 41528c 89794->89797 89804 417f23 67 API calls __getptd_noexit 89795->89804 89806 41c551 103 API calls 14 library calls 89797->89806 89798 41526d 89805 417ebb 6 API calls 2 library calls 89798->89805 89800 4152b2 89802 41527d 89800->89802 89807 4191c9 101 API calls 6 library calls 89800->89807 89802->89790 89804->89798 89806->89800 89807->89802 89809 414d4c _fprintf 89808->89809 89810 414d5f 89809->89810 89812 414d95 89809->89812 89860 417f23 67 API calls __getptd_noexit 89810->89860 89827 41e28c 89812->89827 89813 414d64 89861 417ebb 6 API calls 2 library calls 89813->89861 89816 414d9a 89817 414da1 89816->89817 89818 414dae 89816->89818 89862 417f23 67 API calls __getptd_noexit 89817->89862 89820 414dd6 89818->89820 89821 414db6 89818->89821 89845 41dfd8 89820->89845 89863 417f23 67 API calls __getptd_noexit 89821->89863 89825 414d74 @_EH4_CallFilterFunc@8 _fprintf 89825->89746 89828 41e298 _fprintf 89827->89828 89829 418407 __lock 67 API calls 89828->89829 89830 41e2a6 89829->89830 89831 41e322 89830->89831 89835 418344 __mtinitlocknum 67 API calls 89830->89835 89842 41e31b 89830->89842 89868 4159a6 68 API calls __lock 89830->89868 89869 415a14 LeaveCriticalSection LeaveCriticalSection _doexit 89830->89869 89833 416fb6 __malloc_crt 67 API calls 89831->89833 89834 41e32c 89833->89834 89834->89842 89870 4189e6 InitializeCriticalSectionAndSpinCount _fprintf 89834->89870 89835->89830 89837 41e3b0 _fprintf 89837->89816 89839 41e351 89840 41e35c 89839->89840 89841 41e36f EnterCriticalSection 89839->89841 89843 413a88 ___freetlocinfo 67 API calls 89840->89843 89841->89842 89865 41e3bb 89842->89865 89843->89842 89853 41dffb __wopenfile 89845->89853 89846 41e015 89875 417f23 67 API calls __getptd_noexit 89846->89875 89848 41e01a 89876 417ebb 6 API calls 2 library calls 89848->89876 89850 41e247 89872 425db0 89850->89872 89853->89846 89859 41e1e9 89853->89859 89877 4136bc 79 API calls 2 library calls 89853->89877 89855 41e1e2 89855->89859 89878 4136bc 79 API calls 2 library calls 89855->89878 89857 41e201 89857->89859 89879 4136bc 79 API calls 2 library calls 89857->89879 89859->89846 89859->89850 89860->89813 89862->89825 89863->89825 89864 414dfc LeaveCriticalSection LeaveCriticalSection _fprintf 89864->89825 89871 41832d LeaveCriticalSection 89865->89871 89867 41e3c2 89867->89837 89868->89830 89869->89830 89870->89839 89871->89867 89880 425ce4 89872->89880 89874 414de1 89874->89864 89875->89848 89877->89855 89878->89857 89879->89859 89883 425cf0 _fprintf 89880->89883 89881 425d03 89882 417f23 __wctomb_s_l 67 API calls 89881->89882 89884 425d08 89882->89884 89883->89881 89885 425d41 89883->89885 89886 417ebb __wctomb_s_l 6 API calls 89884->89886 89887 4255c4 __tsopen_nolock 132 API calls 89885->89887 89890 425d17 _fprintf 89886->89890 89888 425d5b 89887->89888 89889 425d82 __sopen_helper LeaveCriticalSection 89888->89889 89889->89890 89890->89874 89895 415588 _fprintf 89891->89895 89892 415596 89922 417f23 67 API calls __getptd_noexit 89892->89922 89894 4155c4 89904 415965 89894->89904 89895->89892 89895->89894 89897 41559b 89923 417ebb 6 API calls 2 library calls 89897->89923 89903 4155ab _fprintf 89903->89748 89905 415977 89904->89905 89906 415999 EnterCriticalSection 89904->89906 89905->89906 89908 41597f 89905->89908 89907 4155cc 89906->89907 89910 4154f2 89907->89910 89909 418407 __lock 67 API calls 89908->89909 89909->89907 89911 415512 89910->89911 89912 415502 89910->89912 89914 415524 89911->89914 89925 4152e7 89911->89925 89979 417f23 67 API calls __getptd_noexit 89912->89979 89942 41486c 89914->89942 89915 415507 89924 4155f7 LeaveCriticalSection LeaveCriticalSection _fprintf 89915->89924 89922->89897 89924->89903 89926 41531a 89925->89926 89927 4152fa 89925->89927 89928 41453a __fileno 67 API calls 89926->89928 89980 417f23 67 API calls __getptd_noexit 89927->89980 89930 415320 89928->89930 89933 41efd4 __locking 71 API calls 89930->89933 89931 4152ff 89981 417ebb 6 API calls 2 library calls 89931->89981 89935 415335 89933->89935 89934 41530f 89934->89914 89935->89934 89936 4153a9 89935->89936 89938 415364 89935->89938 89982 417f23 67 API calls __getptd_noexit 89936->89982 89938->89934 89939 41efd4 __locking 71 API calls 89938->89939 89940 415404 89939->89940 89940->89934 89941 41efd4 __locking 71 API calls 89940->89941 89941->89934 89943 4148a7 89942->89943 89944 414885 89942->89944 89948 41453a 89943->89948 89944->89943 89945 41453a __fileno 67 API calls 89944->89945 89946 4148a0 89945->89946 89983 41c3cf 101 API calls 6 library calls 89946->89983 89949 414549 89948->89949 89953 41455e 89948->89953 89984 417f23 67 API calls __getptd_noexit 89949->89984 89951 41454e 89985 417ebb 6 API calls 2 library calls 89951->89985 89954 41efd4 89953->89954 89955 41efe0 _fprintf 89954->89955 89956 41f003 89955->89956 89957 41efe8 89955->89957 89958 41f011 89956->89958 89963 41f052 89956->89963 90006 417f36 67 API calls __getptd_noexit 89957->90006 90008 417f36 67 API calls __getptd_noexit 89958->90008 89961 41efed 90007 417f23 67 API calls __getptd_noexit 89961->90007 89962 41f016 90009 417f23 67 API calls __getptd_noexit 89962->90009 89986 41ba3b 89963->89986 89967 41f01d 90010 417ebb 6 API calls 2 library calls 89967->90010 89968 41f058 89970 41f065 89968->89970 89971 41f07b 89968->89971 89996 41ef5f 89970->89996 90011 417f23 67 API calls __getptd_noexit 89971->90011 89973 41eff5 _fprintf 89973->89915 89975 41f080 90012 417f36 67 API calls __getptd_noexit 89975->90012 89976 41f073 90013 41f0a6 LeaveCriticalSection __unlock_fhandle 89976->90013 89979->89915 89980->89931 89982->89934 89983->89943 89984->89951 89987 41ba47 _fprintf 89986->89987 89988 41baa2 89987->89988 89989 418407 __lock 67 API calls 89987->89989 89990 41bac4 _fprintf 89988->89990 89991 41baa7 EnterCriticalSection 89988->89991 89992 41ba73 89989->89992 89990->89968 89991->89990 89993 41ba8a 89992->89993 89994 4189e6 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 89992->89994 89995 41bad2 ___lock_fhandle LeaveCriticalSection 89993->89995 89994->89993 89995->89988 89997 41b9c4 __close_nolock 67 API calls 89996->89997 89998 41ef6e 89997->89998 89999 41ef84 SetFilePointer 89998->89999 90000 41ef74 89998->90000 90002 41efa3 89999->90002 90003 41ef9b GetLastError 89999->90003 90001 417f23 __wctomb_s_l 67 API calls 90000->90001 90005 41ef79 90001->90005 90004 417f49 __dosmaperr 67 API calls 90002->90004 90002->90005 90003->90002 90004->90005 90005->89976 90006->89961 90007->89973 90008->89962 90009->89967 90011->89975 90012->89976 90013->89973 90015 414e31 90014->90015 90016 414e4d 90014->90016 90060 417f23 67 API calls __getptd_noexit 90015->90060 90018 414e46 90016->90018 90020 41486c __flush 101 API calls 90016->90020 90032 414f08 LeaveCriticalSection LeaveCriticalSection _fprintf 90018->90032 90019 414e36 90061 417ebb 6 API calls 2 library calls 90019->90061 90021 414e59 90020->90021 90033 41e680 90021->90033 90025 41453a __fileno 67 API calls 90026 414e67 90025->90026 90037 41e5b3 90026->90037 90028 414e6d 90028->90018 90029 413a88 ___freetlocinfo 67 API calls 90028->90029 90029->90018 90030->89762 90032->89765 90034 41e690 90033->90034 90035 414e61 90033->90035 90034->90035 90036 413a88 ___freetlocinfo 67 API calls 90034->90036 90035->90025 90036->90035 90038 41e5bf _fprintf 90037->90038 90039 41e5e2 90038->90039 90040 41e5c7 90038->90040 90042 41e5f0 90039->90042 90047 41e631 90039->90047 90077 417f36 67 API calls __getptd_noexit 90040->90077 90079 417f36 67 API calls __getptd_noexit 90042->90079 90043 41e5cc 90078 417f23 67 API calls __getptd_noexit 90043->90078 90046 41e5f5 90080 417f23 67 API calls __getptd_noexit 90046->90080 90048 41ba3b ___lock_fhandle 68 API calls 90047->90048 90050 41e637 90048->90050 90052 41e652 90050->90052 90053 41e644 90050->90053 90051 41e5fc 90081 417ebb 6 API calls 2 library calls 90051->90081 90082 417f23 67 API calls __getptd_noexit 90052->90082 90062 41e517 90053->90062 90057 41e5d4 _fprintf 90057->90028 90058 41e64c 90083 41e676 LeaveCriticalSection __unlock_fhandle 90058->90083 90060->90019 90084 41b9c4 90062->90084 90064 41e57d 90097 41b93e 68 API calls 2 library calls 90064->90097 90066 41e527 90066->90064 90067 41b9c4 __close_nolock 67 API calls 90066->90067 90076 41e55b 90066->90076 90071 41e552 90067->90071 90068 41b9c4 __close_nolock 67 API calls 90072 41e567 CloseHandle 90068->90072 90069 41e585 90070 41e5a7 90069->90070 90098 417f49 67 API calls 3 library calls 90069->90098 90070->90058 90074 41b9c4 __close_nolock 67 API calls 90071->90074 90072->90064 90075 41e573 GetLastError 90072->90075 90074->90076 90075->90064 90076->90064 90076->90068 90077->90043 90078->90057 90079->90046 90080->90051 90082->90058 90083->90057 90085 41b9d1 90084->90085 90088 41b9e9 90084->90088 90086 417f36 __read 67 API calls 90085->90086 90087 41b9d6 90086->90087 90090 417f23 __wctomb_s_l 67 API calls 90087->90090 90089 417f36 __read 67 API calls 90088->90089 90091 41ba2e 90088->90091 90092 41ba17 90089->90092 90094 41b9de 90090->90094 90091->90066 90093 417f23 __wctomb_s_l 67 API calls 90092->90093 90095 41ba1e 90093->90095 90094->90066 90096 417ebb __wctomb_s_l 6 API calls 90095->90096 90096->90091 90097->90069 90098->90070 90100 415126 _fprintf 90099->90100 90101 41513a _memset 90100->90101 90102 41516f 90100->90102 90103 415164 _fprintf 90100->90103 90128 417f23 67 API calls __getptd_noexit 90101->90128 90104 415965 __lock_file 68 API calls 90102->90104 90103->89771 90106 415177 90104->90106 90112 414f10 90106->90112 90107 415154 90129 417ebb 6 API calls 2 library calls 90107->90129 90114 414f2e _memset 90112->90114 90118 414f4c 90112->90118 90113 414f37 90181 417f23 67 API calls __getptd_noexit 90113->90181 90114->90113 90114->90118 90124 414f8b 90114->90124 90116 414f3c 90182 417ebb 6 API calls 2 library calls 90116->90182 90130 4151a6 LeaveCriticalSection LeaveCriticalSection _fprintf 90118->90130 90120 4150d5 _memset 90185 417f23 67 API calls __getptd_noexit 90120->90185 90121 4150a9 _memset 90184 417f23 67 API calls __getptd_noexit 90121->90184 90122 41453a __fileno 67 API calls 90122->90124 90124->90118 90124->90120 90124->90121 90124->90122 90131 41ed9e 90124->90131 90161 41e6b1 90124->90161 90183 41ee9b 67 API calls 3 library calls 90124->90183 90128->90107 90130->90103 90132 41edaa _fprintf 90131->90132 90133 41edb2 90132->90133 90134 41edcd 90132->90134 90255 417f36 67 API calls __getptd_noexit 90133->90255 90136 41eddb 90134->90136 90139 41ee1c 90134->90139 90257 417f36 67 API calls __getptd_noexit 90136->90257 90137 41edb7 90256 417f23 67 API calls __getptd_noexit 90137->90256 90142 41ee29 90139->90142 90143 41ee3d 90139->90143 90141 41ede0 90258 417f23 67 API calls __getptd_noexit 90141->90258 90260 417f36 67 API calls __getptd_noexit 90142->90260 90146 41ba3b ___lock_fhandle 68 API calls 90143->90146 90149 41ee43 90146->90149 90147 41ede7 90259 417ebb 6 API calls 2 library calls 90147->90259 90148 41ee2e 90261 417f23 67 API calls __getptd_noexit 90148->90261 90151 41ee50 90149->90151 90152 41ee66 90149->90152 90186 41e7dc 90151->90186 90262 417f23 67 API calls __getptd_noexit 90152->90262 90154 41edbf _fprintf 90154->90124 90157 41ee5e 90264 41ee91 LeaveCriticalSection __unlock_fhandle 90157->90264 90158 41ee6b 90263 417f36 67 API calls __getptd_noexit 90158->90263 90162 41e6c1 90161->90162 90165 41e6de 90161->90165 90268 417f23 67 API calls __getptd_noexit 90162->90268 90164 41e6c6 90269 417ebb 6 API calls 2 library calls 90164->90269 90167 41e713 90165->90167 90173 41e6d6 90165->90173 90265 423600 90165->90265 90169 41453a __fileno 67 API calls 90167->90169 90170 41e727 90169->90170 90171 41ed9e __read 79 API calls 90170->90171 90172 41e72e 90171->90172 90172->90173 90174 41453a __fileno 67 API calls 90172->90174 90173->90124 90175 41e751 90174->90175 90175->90173 90176 41453a __fileno 67 API calls 90175->90176 90177 41e75d 90176->90177 90177->90173 90178 41453a __fileno 67 API calls 90177->90178 90179 41e769 90178->90179 90180 41453a __fileno 67 API calls 90179->90180 90180->90173 90181->90116 90183->90124 90184->90116 90185->90116 90187 41e813 90186->90187 90188 41e7f8 90186->90188 90189 41e822 90187->90189 90191 41e849 90187->90191 90190 417f36 __read 67 API calls 90188->90190 90192 417f36 __read 67 API calls 90189->90192 90193 41e7fd 90190->90193 90195 41e868 90191->90195 90206 41e87c 90191->90206 90194 41e827 90192->90194 90196 417f23 __wctomb_s_l 67 API calls 90193->90196 90198 417f23 __wctomb_s_l 67 API calls 90194->90198 90199 417f36 __read 67 API calls 90195->90199 90207 41e805 90196->90207 90197 41e8d4 90201 417f36 __read 67 API calls 90197->90201 90200 41e82e 90198->90200 90202 41e86d 90199->90202 90203 417ebb __wctomb_s_l 6 API calls 90200->90203 90204 41e8d9 90201->90204 90205 417f23 __wctomb_s_l 67 API calls 90202->90205 90203->90207 90208 417f23 __wctomb_s_l 67 API calls 90204->90208 90209 41e874 90205->90209 90206->90197 90206->90207 90210 41e8b0 90206->90210 90213 41e8f5 90206->90213 90207->90157 90208->90209 90211 417ebb __wctomb_s_l 6 API calls 90209->90211 90210->90197 90212 41e8bb ReadFile 90210->90212 90211->90207 90217 41ed62 GetLastError 90212->90217 90218 41e9e7 90212->90218 90215 416fb6 __malloc_crt 67 API calls 90213->90215 90216 41e90b 90215->90216 90221 41e931 90216->90221 90222 41e913 90216->90222 90219 41ebe8 90217->90219 90220 41ed6f 90217->90220 90218->90217 90225 41e9fb 90218->90225 90229 417f49 __dosmaperr 67 API calls 90219->90229 90250 41eb6d 90219->90250 90223 417f23 __wctomb_s_l 67 API calls 90220->90223 90226 423462 __lseeki64_nolock 69 API calls 90221->90226 90224 417f23 __wctomb_s_l 67 API calls 90222->90224 90227 41ed74 90223->90227 90228 41e918 90224->90228 90234 41ea17 90225->90234 90237 41ec2d 90225->90237 90225->90250 90230 41e93d 90226->90230 90231 417f36 __read 67 API calls 90227->90231 90232 417f36 __read 67 API calls 90228->90232 90229->90250 90230->90212 90231->90250 90232->90207 90233 413a88 ___freetlocinfo 67 API calls 90233->90207 90235 41ea7d ReadFile 90234->90235 90242 41eafa 90234->90242 90240 41ea9b GetLastError 90235->90240 90245 41eaa5 90235->90245 90236 41eca5 ReadFile 90238 41ecc4 GetLastError 90236->90238 90246 41ecce 90236->90246 90237->90236 90237->90250 90238->90237 90238->90246 90239 41ebbe MultiByteToWideChar 90241 41ebe2 GetLastError 90239->90241 90239->90250 90240->90234 90240->90245 90241->90219 90243 41eb75 90242->90243 90244 41eb68 90242->90244 90242->90250 90251 41eb32 90242->90251 90243->90251 90252 41ebac 90243->90252 90247 417f23 __wctomb_s_l 67 API calls 90244->90247 90245->90234 90248 423462 __lseeki64_nolock 69 API calls 90245->90248 90246->90237 90249 423462 __lseeki64_nolock 69 API calls 90246->90249 90247->90250 90248->90245 90249->90246 90250->90207 90250->90233 90251->90239 90253 423462 __lseeki64_nolock 69 API calls 90252->90253 90254 41ebbb 90253->90254 90254->90239 90255->90137 90256->90154 90257->90141 90258->90147 90260->90148 90261->90147 90262->90158 90263->90157 90264->90154 90266 416fb6 __malloc_crt 67 API calls 90265->90266 90267 423615 90266->90267 90267->90167 90268->90164 90273 414cef GetSystemTimeAsFileTime __aulldiv 90270->90273 90272 4431ef 90272->89774 90273->90272 90274->89782 90276->89787 90281 4523e1 _wcscpy 90277->90281 90278 44afdc GetSystemTimeAsFileTime 90278->90281 90279 4151b0 81 API calls __fread_nolock 90279->90281 90280 452553 90280->89704 90280->89705 90281->90278 90281->90279 90281->90280 90282 41557c 105 API calls _fseek 90281->90282 90282->90281 90284 44b1b4 90283->90284 90285 44b1a6 90283->90285 90287 44b1ca 90284->90287 90288 44b1c2 90284->90288 90289 414e06 138 API calls 90284->90289 90286 414e06 138 API calls 90285->90286 90286->90284 90318 4352d1 81 API calls 2 library calls 90287->90318 90288->89731 90291 44b2c1 90289->90291 90291->90287 90292 44b2cf 90291->90292 90294 44b2dc 90292->90294 90297 414e94 __fcloseall 106 API calls 90292->90297 90293 44b20d 90295 44b211 90293->90295 90296 44b23b 90293->90296 90294->89731 90299 44b21e 90295->90299 90301 414e94 __fcloseall 106 API calls 90295->90301 90319 43526e 90296->90319 90297->90294 90302 44b22e 90299->90302 90305 414e94 __fcloseall 106 API calls 90299->90305 90300 44b242 90303 44b270 90300->90303 90304 44b248 90300->90304 90301->90299 90302->89731 90329 44b0af 111 API calls 90303->90329 90306 44b255 90304->90306 90309 414e94 __fcloseall 106 API calls 90304->90309 90305->90302 90310 44b265 90306->90310 90312 414e94 __fcloseall 106 API calls 90306->90312 90308 44b276 90330 43522c 67 API calls ___freetlocinfo 90308->90330 90309->90306 90310->89731 90312->90310 90313 44b27c 90314 44b289 90313->90314 90315 414e94 __fcloseall 106 API calls 90313->90315 90316 44b299 90314->90316 90317 414e94 __fcloseall 106 API calls 90314->90317 90315->90314 90316->89731 90317->90316 90318->90293 90320 4138ba _malloc 67 API calls 90319->90320 90321 43527d 90320->90321 90322 4138ba _malloc 67 API calls 90321->90322 90323 43528d 90322->90323 90324 4138ba _malloc 67 API calls 90323->90324 90325 43529d 90324->90325 90327 4352bc 90325->90327 90331 43522c 67 API calls ___freetlocinfo 90325->90331 90327->90300 90328 4352c8 90328->90300 90329->90308 90330->90313 90331->90328 90332->89620 90333->89622 90334->89641 90335->89641 90336->89641 90337->89634 90338->89641 90339->89641 90340->89645 90341->89654 90343->89656 90344->89545 90346 410148 SHGetDesktopFolder 90345->90346 90349 4101a3 _wcscpy 90345->90349 90347 41015a _wcscpy 90346->90347 90346->90349 90348 41018a SHGetPathFromIDListW 90347->90348 90347->90349 90348->90349 90349->89549 90350->89551 90352 40f5e0 152 API calls 90351->90352 90353 40f417 90352->90353 90354 42ca37 90353->90354 90356 40f42c 90353->90356 90357 42ca1f 90353->90357 90355 452574 140 API calls 90354->90355 90360 42ca50 90355->90360 90396 4037e0 139 API calls 7 library calls 90356->90396 90397 43717f 110 API calls _printf 90357->90397 90363 42ca76 90360->90363 90364 42ca54 90360->90364 90361 40f446 90361->89548 90362 42ca2d 90362->90354 90365 41171a 75 API calls 90363->90365 90366 434fe1 106 API calls 90364->90366 90381 42cacc moneypunct 90365->90381 90367 42ca5e 90366->90367 90398 43717f 110 API calls _printf 90367->90398 90369 42ccc3 90371 413a88 ___freetlocinfo 67 API calls 90369->90371 90370 42ca6c 90370->90363 90372 42cccd 90371->90372 90373 434fe1 106 API calls 90372->90373 90374 42ccda 90373->90374 90378 401b70 75 API calls 90378->90381 90381->90369 90381->90378 90382 402cc0 90381->90382 90390 4026a0 90381->90390 90399 445051 75 API calls _realloc 90381->90399 90400 44c80c 87 API calls 3 library calls 90381->90400 90401 44b408 75 API calls 90381->90401 90383 402d71 90382->90383 90384 402cd2 moneypunct _realloc 90382->90384 90386 41171a 75 API calls 90383->90386 90385 41171a 75 API calls 90384->90385 90387 402cd9 90385->90387 90386->90384 90388 41171a 75 API calls 90387->90388 90389 402cff 90387->90389 90388->90389 90389->90381 90391 4026af 90390->90391 90394 40276b 90390->90394 90392 41171a 75 API calls 90391->90392 90391->90394 90395 4026ee moneypunct 90391->90395 90392->90395 90393 41171a 75 API calls 90393->90395 90394->90381 90395->90393 90395->90394 90396->90361 90397->90362 90398->90370 90399->90381 90400->90381 90401->90381 90402->89558 90403->89559 90405 401bfb 90404->90405 90425 401cde 90404->90425 90427 4013a0 90405->90427 90408 42a9a0 LoadStringW 90411 42a9bb 90408->90411 90409 401c18 90410 4021e0 75 API calls 90409->90410 90412 401c2d 90410->90412 90433 40df50 75 API calls 90411->90433 90414 401c3a 90412->90414 90415 42a9cd 90412->90415 90414->90411 90416 401c44 90414->90416 90434 40d3b0 75 API calls 2 library calls 90415->90434 90432 40d3b0 75 API calls 2 library calls 90416->90432 90419 42a9dc 90420 401c53 _memset _wcscpy _wcsncpy 90419->90420 90421 42a9f0 90419->90421 90424 401cc2 Shell_NotifyIconW 90420->90424 90435 40d3b0 75 API calls 2 library calls 90421->90435 90423 42a9fe 90424->90425 90425->89570 90426->89568 90428 41171a 75 API calls 90427->90428 90429 4013c4 90428->90429 90430 401380 75 API calls 90429->90430 90431 4013d3 90430->90431 90431->90408 90431->90409 90432->90420 90433->90420 90434->90419 90435->90423 90436 444343 90439 444326 90436->90439 90438 44434e WriteFile 90440 444340 90439->90440 90441 4442c7 90439->90441 90440->90438 90446 40e190 SetFilePointerEx 90441->90446 90443 4442e0 SetFilePointerEx 90447 40e190 SetFilePointerEx 90443->90447 90445 4442ff 90445->90438 90446->90443 90447->90445 90448 46d22f 90451 46d098 90448->90451 90450 46d241 90452 46d0b5 90451->90452 90453 46d115 90452->90453 90454 46d0b9 90452->90454 90502 45c216 78 API calls 90453->90502 90455 41171a 75 API calls 90454->90455 90457 46d0c0 90455->90457 90459 46d0cc 90457->90459 90499 40d940 76 API calls 90457->90499 90458 46d126 90460 46d0f8 90458->90460 90466 46d142 90458->90466 90464 453063 111 API calls 90459->90464 90461 4092c0 VariantClear 90460->90461 90463 46d0fd 90461->90463 90463->90450 90465 46d0dd 90464->90465 90500 40dfa0 83 API calls 90465->90500 90467 46d1c8 90466->90467 90471 46d158 90466->90471 90507 4676a3 78 API calls 90467->90507 90469 46d0ea 90469->90466 90473 46d0ee 90469->90473 90472 453063 111 API calls 90471->90472 90478 46d15e 90472->90478 90473->90460 90501 44ade5 CloseHandle moneypunct 90473->90501 90474 46d1ce 90508 4444c2 SetFilePointerEx SetFilePointerEx WriteFile 90474->90508 90475 46d18d 90503 467fce 82 API calls 90475->90503 90477 46d196 90482 4013a0 75 API calls 90477->90482 90478->90475 90478->90477 90481 46d194 90489 46d224 90481->90489 90495 40d900 90481->90495 90484 46d1a2 90482->90484 90483 46d1e7 90483->90481 90486 4092c0 VariantClear 90483->90486 90504 40df50 75 API calls 90484->90504 90486->90481 90487 46d1ac 90505 40d3b0 75 API calls 2 library calls 90487->90505 90489->90450 90490 46d1b8 90506 467fce 82 API calls 90490->90506 90493 46d216 90509 44ade5 CloseHandle moneypunct 90493->90509 90496 40d917 90495->90496 90497 40d909 90495->90497 90496->90497 90498 40d91c CloseHandle 90496->90498 90497->90493 90498->90493 90499->90459 90500->90469 90501->90460 90502->90458 90503->90481 90504->90487 90505->90490 90506->90481 90507->90474 90508->90483 90509->90489 90510 42919b 90515 40ef10 90510->90515 90513 411421 __cinit 74 API calls 90514 4291aa 90513->90514 90516 41171a 75 API calls 90515->90516 90517 40ef17 90516->90517 90518 42ad48 90517->90518 90523 40ef40 74 API calls __cinit 90517->90523 90520 40ef2a 90524 40e470 90520->90524 90523->90520 90525 40c060 75 API calls 90524->90525 90526 40e483 GetVersionExW 90525->90526 90527 4021e0 75 API calls 90526->90527 90528 40e4bb 90527->90528 90550 40e600 90528->90550 90535 42accc 90536 42ad28 GetSystemInfo 90535->90536 90540 42ad38 GetSystemInfo 90536->90540 90537 40e557 GetCurrentProcess 90570 40ee30 LoadLibraryA GetProcAddress 90537->90570 90538 40e56c 90538->90540 90563 40eee0 90538->90563 90543 40e5c9 90567 40eea0 90543->90567 90546 40e5e0 90548 40e5f1 FreeLibrary 90546->90548 90549 40e5f4 90546->90549 90547 40e5dd FreeLibrary 90547->90546 90548->90549 90549->90513 90551 40e60b 90550->90551 90552 40c740 75 API calls 90551->90552 90553 40e4c2 90552->90553 90554 40e620 90553->90554 90555 40e62a 90554->90555 90556 42ac93 90555->90556 90557 40c740 75 API calls 90555->90557 90558 40e4ce 90557->90558 90558->90535 90559 40ee70 90558->90559 90560 40e551 90559->90560 90561 40ee76 LoadLibraryA 90559->90561 90560->90537 90560->90538 90561->90560 90562 40ee87 GetProcAddress 90561->90562 90562->90560 90564 40e5bf 90563->90564 90565 40eee6 LoadLibraryA 90563->90565 90564->90536 90564->90543 90565->90564 90566 40eef7 GetProcAddress 90565->90566 90566->90564 90571 40eec0 LoadLibraryA GetProcAddress 90567->90571 90569 40e5d3 GetNativeSystemInfo 90569->90546 90569->90547 90570->90538 90571->90569 90572 403b3b8 90586 4039008 90572->90586 90574 403b446 90589 403b2a8 90574->90589 90576 403b46f CreateFileW 90578 403b4c3 90576->90578 90582 403b4be 90576->90582 90579 403b4da VirtualAlloc 90578->90579 90578->90582 90580 403b4f8 ReadFile 90579->90580 90579->90582 90581 403b513 90580->90581 90580->90582 90583 403a2a8 13 API calls 90581->90583 90584 403b546 90583->90584 90585 403b569 ExitProcess 90584->90585 90585->90582 90592 403c478 GetPEB 90586->90592 90588 4039693 90588->90574 90590 403b2b1 Sleep 90589->90590 90591 403b2bf 90590->90591 90593 403c4a2 90592->90593 90593->90588 90594 40116e 90595 401119 DefWindowProcW 90594->90595

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentDirectoryW.KERNEL32(00000104,?,00000001,?,00000000), ref: 0040D6E5
                                              • Part of subcall function 00401F80: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,00000104,?,?,?,?,00000000), ref: 00401FAD
                                              • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 00402078
                                              • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 0040208E
                                              • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020A4
                                              • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020BA
                                              • Part of subcall function 00401F80: _wcscpy.LIBCMT ref: 004020EF
                                            • IsDebuggerPresent.KERNEL32(?), ref: 0040D6F1
                                            • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,00000104,?,004A7CF8,004A7CFC), ref: 0040D763
                                              • Part of subcall function 00401440: GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00401483
                                            • SetCurrentDirectoryW.KERNEL32(?,00000001,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,00000004), ref: 0040D7D6
                                            • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,004846D6,00000010), ref: 00431AAB
                                            • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,00000004), ref: 00431B0E
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,00000004), ref: 00431B3F
                                            • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 00431B8B
                                            • ShellExecuteW.SHELL32(00000000), ref: 00431B92
                                              • Part of subcall function 004101F0: GetSysColorBrush.USER32(0000000F), ref: 004101F9
                                              • Part of subcall function 004101F0: LoadCursorW.USER32(00000000,00007F00), ref: 00410209
                                              • Part of subcall function 004101F0: LoadIconW.USER32(?,00000063), ref: 0041021F
                                              • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A4), ref: 00410232
                                              • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A2), ref: 00410245
                                              • Part of subcall function 004101F0: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
                                              • Part of subcall function 004101F0: RegisterClassExW.USER32 ref: 004102C6
                                              • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
                                              • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
                                              • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 00410454
                                              • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 0041045E
                                              • Part of subcall function 0040E1E0: _memset.LIBCMT ref: 0040E202
                                              • Part of subcall function 0040E1E0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memset_wcscpy
                                            • String ID: @GH$@GH$C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                            • API String ID: 2493088469-2082501298
                                            • Opcode ID: ba2e87c3f8820592b330de56266d8528cb530a4dab1fa245838381ec475db17a
                                            • Instruction ID: f6e0ab4c143dd9a1f797559286fb6c41f0380d60009eb7dc722615656bf0e84e
                                            • Opcode Fuzzy Hash: ba2e87c3f8820592b330de56266d8528cb530a4dab1fa245838381ec475db17a
                                            • Instruction Fuzzy Hash: 0341F731618341ABD320F7A19C49BAF3BA4AB96704F04493FF941672D1DBBC9949C72E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 200 40e470-40e500 call 40c060 GetVersionExW call 4021e0 call 40e600 call 40e620 209 40e506-40e509 200->209 210 42accc-42acd1 200->210 213 40e540-40e555 call 40ee70 209->213 214 40e50b-40e51c 209->214 211 42acd3-42acdb 210->211 212 42acdd-42ace0 210->212 216 42ad12-42ad20 211->216 217 42ace2-42aceb 212->217 218 42aced-42acf0 212->218 231 40e557-40e573 GetCurrentProcess call 40ee30 213->231 232 40e579-40e5a8 213->232 219 40e522-40e525 214->219 220 42ac9b-42aca7 214->220 230 42ad28-42ad2d GetSystemInfo 216->230 217->216 218->216 225 42acf2-42ad06 218->225 219->213 221 40e527-40e537 219->221 223 42acb2-42acba 220->223 224 42aca9-42acad 220->224 228 42acbf-42acc7 221->228 229 40e53d 221->229 223->213 224->213 226 42ad08-42ad0c 225->226 227 42ad0e 225->227 226->216 227->216 228->213 229->213 234 42ad38-42ad3d GetSystemInfo 230->234 231->232 242 40e575 231->242 232->234 235 40e5ae-40e5c3 call 40eee0 232->235 235->230 240 40e5c9-40e5db call 40eea0 GetNativeSystemInfo 235->240 244 40e5e0-40e5ef 240->244 245 40e5dd-40e5de FreeLibrary 240->245 242->232 246 40e5f1-40e5f2 FreeLibrary 244->246 247 40e5f4-40e5ff 244->247 245->244 246->247
                                            APIs
                                            • GetVersionExW.KERNEL32 ref: 0040E495
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            • GetCurrentProcess.KERNEL32(?,?), ref: 0040E560
                                            • GetNativeSystemInfo.KERNELBASE(?,?), ref: 0040E5D3
                                            • FreeLibrary.KERNEL32(?), ref: 0040E5DE
                                            • FreeLibrary.KERNEL32(?), ref: 0040E5F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_wcslen
                                            • String ID: pMH
                                            • API String ID: 2923339712-2522892712
                                            • Opcode ID: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                            • Instruction ID: 31d199e0849a18b4fe3a20375a839c17b1fda7a8e5a404adfed2e153d323e8b3
                                            • Opcode Fuzzy Hash: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                            • Instruction Fuzzy Hash: D4612E71508792AEC311CB69C44425ABFE07B6A308F580E6EE48483A42D379E568C7AB
                                            APIs
                                            • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EB55,0040D86E), ref: 0040EB7B
                                            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EB8D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: IsThemeActive$uxtheme.dll
                                            • API String ID: 2574300362-3542929980
                                            • Opcode ID: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                            • Instruction ID: e8120cabfd18d8fe06d2f96d8b82b2b5a4bcadd10797c678d2963416b1e4c3b8
                                            • Opcode Fuzzy Hash: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                            • Instruction Fuzzy Hash: 05D0C9B49407039AD7306F72C918B0A7BE4AB50342F204C3EF996A1694DBBCD0508B28

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00410C44
                                            • __wsplitpath.LIBCMT ref: 00410C61
                                              • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                            • _wcsncat.LIBCMT ref: 00410C78
                                            • __wmakepath.LIBCMT ref: 00410C94
                                              • Part of subcall function 00413E3C: __wmakepath_s.LIBCMT ref: 00413E52
                                              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                            • _wcscpy.LIBCMT ref: 00410CCC
                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00020019,?), ref: 00410CE9
                                            • RegQueryValueExW.ADVAPI32 ref: 00429BE4
                                            • _wcscat.LIBCMT ref: 00429C43
                                            • _wcslen.LIBCMT ref: 00429C55
                                            • _wcslen.LIBCMT ref: 00429C66
                                            • _wcscat.LIBCMT ref: 00429C80
                                            • _wcsncpy.LIBCMT ref: 00429CC0
                                            • RegCloseKey.ADVAPI32(?), ref: 00429CDE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcscat_wcslen$CloseException@8FileModuleNameOpenQueryThrowValue__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpystd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                            • String ID: Include$Software\AutoIt v3\AutoIt$\
                                            • API String ID: 1004883554-2276155026
                                            • Opcode ID: d7f6643cad26fd3001d91627fc5ef1af4f656d40d4c5ca14c02d7ab544e78cf5
                                            • Instruction ID: ef4714a7fd58501e566ba693257e1f196c1b97611c18bc9c35ab262cfa7686fb
                                            • Opcode Fuzzy Hash: d7f6643cad26fd3001d91627fc5ef1af4f656d40d4c5ca14c02d7ab544e78cf5
                                            • Instruction Fuzzy Hash: B961B3B1508340DFC300EF65EC8599BBBE8FB99704F44882EF544C3261EBB59948CB5A

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __amsg_exit$_fast_error_exit$CommandInitializeLine__cinit__ioinit__mtinit__wsetargv__wsetenvp__wwincmdln
                                            • String ID:
                                            • API String ID: 2477803136-0
                                            • Opcode ID: 5c6ad9204277a855c32b49e0d8ca3a5fd5782e976c2a5896ff1cb7bad4d5bdf3
                                            • Instruction ID: 5d71fe406d9f608d9de966b229f2038f561e79c4b175df4472a1e640f9164680
                                            • Opcode Fuzzy Hash: 5c6ad9204277a855c32b49e0d8ca3a5fd5782e976c2a5896ff1cb7bad4d5bdf3
                                            • Instruction Fuzzy Hash: 6A21A671D00315A9DB14BBB2A9467EE2664AF1074CF1144AFF9056A2D3EEBCC8C1461D

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __fread_nolock$_fseek_wcscpy
                                            • String ID: FILE
                                            • API String ID: 3888824918-3121273764
                                            • Opcode ID: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                            • Instruction ID: c0f9aeb359a44d31a21a8716142a7f32772eb03c7b5129f1ec28ea3a2d041f76
                                            • Opcode Fuzzy Hash: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                            • Instruction Fuzzy Hash: D541EFB1504300BBD310EB55CC81FEB73A9AFC8718F54491EFA8457181F679E644C7AA

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32 ref: 00410326
                                            • RegisterClassExW.USER32 ref: 00410359
                                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                            • InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                            • LoadIconW.USER32(00400000,000000A9), ref: 004103B1
                                            • ImageList_ReplaceIcon.COMCTL32(00BA3DD8,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                            • API String ID: 2914291525-1005189915
                                            • Opcode ID: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                            • Instruction ID: c8c51aded5b6d43d10953d3ded2c15c159303f3bf9a059b11759766ceadcbce4
                                            • Opcode Fuzzy Hash: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                            • Instruction Fuzzy Hash: 9F2129B4518301AFD340DF64D888B4EBFF4FB89704F008A2EF685962A0E7B58144CF5A

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 004101F9
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00410209
                                            • LoadIconW.USER32(?,00000063), ref: 0041021F
                                            • LoadIconW.USER32(?,000000A4), ref: 00410232
                                            • LoadIconW.USER32(?,000000A2), ref: 00410245
                                            • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
                                            • RegisterClassExW.USER32 ref: 004102C6
                                              • Part of subcall function 004102F0: GetSysColorBrush.USER32 ref: 00410326
                                              • Part of subcall function 004102F0: RegisterClassExW.USER32 ref: 00410359
                                              • Part of subcall function 004102F0: RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                              • Part of subcall function 004102F0: InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                              • Part of subcall function 004102F0: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                              • Part of subcall function 004102F0: LoadIconW.USER32(00400000,000000A9), ref: 004103B1
                                              • Part of subcall function 004102F0: ImageList_ReplaceIcon.COMCTL32(00BA3DD8,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                            • String ID: #$0$PGH
                                            • API String ID: 423443420-3673556320
                                            • Opcode ID: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                            • Instruction ID: 6be78a7d21e01e6533eb66d2751721d4fd39e3055bf34e10baa21603515e7cea
                                            • Opcode Fuzzy Hash: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                            • Instruction Fuzzy Hash: 60216DB5A18300AFD310CF59EC84A4A7FE4FB99710F00497FF648972A0D7B599408B99

                                            Control-flow Graph

                                            APIs
                                            • _fseek.LIBCMT ref: 004525DA
                                              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                              • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                              • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                            • __fread_nolock.LIBCMT ref: 00452618
                                            • __fread_nolock.LIBCMT ref: 00452629
                                            • __fread_nolock.LIBCMT ref: 00452644
                                            • __fread_nolock.LIBCMT ref: 00452661
                                            • _fseek.LIBCMT ref: 0045267D
                                            • _malloc.LIBCMT ref: 00452689
                                            • _malloc.LIBCMT ref: 00452696
                                            • __fread_nolock.LIBCMT ref: 004526A7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __fread_nolock$_fseek_malloc_wcscpy
                                            • String ID:
                                            • API String ID: 1911931848-0
                                            • Opcode ID: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                            • Instruction ID: daf5751c9f96f1f9c2235ce4d63c31b1673d17b5fb5ed0b9a51dc370059b243a
                                            • Opcode Fuzzy Hash: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                            • Instruction Fuzzy Hash: 47514CB1A08340AFD310DF5AD881A9BF7E9FFC8704F40492EF68887241D77AE5448B5A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 290 40f450-40f45c call 425210 293 40f460-40f478 290->293 293->293 294 40f47a-40f4a8 call 413990 call 410f70 293->294 299 40f4b0-40f4d1 call 4151b0 294->299 302 40f531 299->302 303 40f4d3-40f4da 299->303 304 40f536-40f540 302->304 305 40f4dc-40f4de 303->305 306 40f4fd-40f517 call 41557c 303->306 308 40f4e0-40f4e2 305->308 309 40f51c-40f51f 306->309 310 40f4e6-40f4ed 308->310 309->299 311 40f521-40f52c 310->311 312 40f4ef-40f4f2 310->312 315 40f543-40f54e 311->315 316 40f52e-40f52f 311->316 313 42937a-4293a0 call 41557c call 4151b0 312->313 314 40f4f8-40f4fb 312->314 326 4293a5-4293c3 call 4151d0 313->326 314->306 314->308 318 40f550-40f553 315->318 319 40f555-40f560 315->319 316->312 318->312 321 429372 319->321 322 40f566-40f571 319->322 321->313 324 429361-429367 322->324 325 40f577-40f57a 322->325 324->310 327 42936d 324->327 325->312 326->304 327->321
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __fread_nolock_fseek_strcat
                                            • String ID: AU3!$EA06
                                            • API String ID: 3818483258-2658333250
                                            • Opcode ID: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                            • Instruction ID: a326fe91d6bb541f17a8cee8b09d92be642ba4032c5aa5fe266a96c6f27d1a6c
                                            • Opcode Fuzzy Hash: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                            • Instruction Fuzzy Hash: 2B416C7160C340ABC331DA24C841AEB77A59B95308F68087EF5C597683E578E44A876B

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 330 410130-410142 SHGetMalloc 331 410148-410158 SHGetDesktopFolder 330->331 332 42944f-429459 call 411691 330->332 333 4101d1-4101e0 331->333 334 41015a-410188 call 411691 331->334 333->332 340 4101e6-4101ee 333->340 342 4101c5-4101ce 334->342 343 41018a-4101a1 SHGetPathFromIDListW 334->343 342->333 344 4101a3-4101b1 call 411691 343->344 345 4101b4-4101c0 343->345 344->345 345->342
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcscpy$DesktopFolderFromListMallocPath
                                            • String ID: C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe
                                            • API String ID: 192938534-3078437215
                                            • Opcode ID: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                            • Instruction ID: 2fe23ff91bf644c1e681f842d3c1e96d6f0f177144f23c1ad52f1bdc7517ad48
                                            • Opcode Fuzzy Hash: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                            • Instruction Fuzzy Hash: 822179B5604211AFC210EB64DC84DABB3ECEFC8704F14891DF94987210E739ED46CBA6

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 348 403b5c8-403b676 call 4039008 351 403b67d-403b6a3 call 403c4d8 CreateFileW 348->351 354 403b6a5 351->354 355 403b6aa-403b6ba 351->355 356 403b7f5-403b7f9 354->356 360 403b6c1-403b6db VirtualAlloc 355->360 361 403b6bc 355->361 358 403b83b-403b83e 356->358 359 403b7fb-403b7ff 356->359 362 403b841-403b848 358->362 363 403b801-403b804 359->363 364 403b80b-403b80f 359->364 367 403b6e2-403b6f9 ReadFile 360->367 368 403b6dd 360->368 361->356 369 403b84a-403b855 362->369 370 403b89d-403b8b2 362->370 363->364 365 403b811-403b81b 364->365 366 403b81f-403b823 364->366 365->366 373 403b833 366->373 374 403b825-403b82f 366->374 375 403b700-403b740 VirtualAlloc 367->375 376 403b6fb 367->376 368->356 377 403b857 369->377 378 403b859-403b865 369->378 371 403b8c2-403b8ca 370->371 372 403b8b4-403b8bf VirtualFree 370->372 372->371 373->358 374->373 379 403b742 375->379 380 403b747-403b762 call 403c728 375->380 376->356 377->370 381 403b867-403b877 378->381 382 403b879-403b885 378->382 379->356 388 403b76d-403b777 380->388 386 403b89b 381->386 383 403b892-403b898 382->383 384 403b887-403b890 382->384 383->386 384->386 386->362 389 403b7aa-403b7be call 403c538 388->389 390 403b779-403b7a8 call 403c728 388->390 396 403b7c2-403b7c6 389->396 397 403b7c0 389->397 390->388 398 403b7d2-403b7d6 396->398 399 403b7c8-403b7cc CloseHandle 396->399 397->356 400 403b7e6-403b7ef 398->400 401 403b7d8-403b7e3 VirtualFree 398->401 399->398 400->351 400->356 401->400
                                            APIs
                                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0403B699
                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0403B8BF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1687797561.0000000004039000.00000040.00000020.00020000.00000000.sdmp, Offset: 04039000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_4039000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CreateFileFreeVirtual
                                            • String ID:
                                            • API String ID: 204039940-0
                                            • Opcode ID: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                            • Instruction ID: 12605e44f58df2081289f4d1a7cd3f9fe60412ebb95dda9eaa39c2ae59faf290
                                            • Opcode Fuzzy Hash: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                            • Instruction Fuzzy Hash: 57A11774E00209EBDB14CFA4C898BEEBBB9FF48309F208559E501BB281D775AA41CF55

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 402 414f10-414f2c 403 414f4f 402->403 404 414f2e-414f31 402->404 405 414f51-414f55 403->405 404->403 406 414f33-414f35 404->406 407 414f37-414f46 call 417f23 406->407 408 414f56-414f5b 406->408 416 414f47-414f4c call 417ebb 407->416 409 414f6a-414f6d 408->409 410 414f5d-414f68 408->410 413 414f7a-414f7c 409->413 414 414f6f-414f77 call 4131f0 409->414 410->409 412 414f8b-414f9e 410->412 419 414fa0-414fa6 412->419 420 414fa8 412->420 413->407 418 414f7e-414f89 413->418 414->413 416->403 418->407 418->412 421 414faf-414fb1 419->421 420->421 424 4150a1-4150a4 421->424 425 414fb7-414fbe 421->425 424->405 427 414fc0-414fc5 425->427 428 415004-415007 425->428 427->428 429 414fc7 427->429 430 415071-415072 call 41e6b1 428->430 431 415009-41500d 428->431 432 415102 429->432 433 414fcd-414fd1 429->433 442 415077-41507b 430->442 435 41500f-415018 431->435 436 41502e-415035 431->436 437 415106-41510f 432->437 440 414fd3 433->440 441 414fd5-414fd8 433->441 443 415023-415028 435->443 444 41501a-415021 435->444 438 415037 436->438 439 415039-41503c 436->439 437->405 438->439 445 415042-41504e call 41453a call 41ed9e 439->445 446 4150d5-4150d9 439->446 440->441 447 4150a9-4150af 441->447 448 414fde-414fff call 41ee9b 441->448 442->437 449 415081-415085 442->449 450 41502a-41502c 443->450 444->450 470 415053-415058 445->470 455 4150eb-4150fd call 417f23 446->455 456 4150db-4150e8 call 4131f0 446->456 451 4150b1-4150bd call 4131f0 447->451 452 4150c0-4150d0 call 417f23 447->452 464 415099-41509b 448->464 449->446 457 415087-415096 449->457 450->439 451->452 452->416 455->416 456->455 457->464 464->424 464->425 471 415114-415118 470->471 472 41505e-415061 470->472 471->437 472->432 473 415067-41506f 472->473 473->464
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                            • String ID:
                                            • API String ID: 3886058894-0
                                            • Opcode ID: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                            • Instruction ID: 085ef53bf2cba992f8731f00f2d52beda6aca72a1b803249d76dffc069a60243
                                            • Opcode Fuzzy Hash: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                            • Instruction Fuzzy Hash: CA510830900604EFCB208FA9C8445DFBBB5EFC5324F24825BF82596290D7799ED2CB99

                                            Control-flow Graph

                                            APIs
                                            • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042A9B0
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            • _memset.LIBCMT ref: 00401C62
                                            • _wcsncpy.LIBCMT ref: 00401CA1
                                            • _wcscpy.LIBCMT ref: 00401CBD
                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: IconLoadNotifyShell_String_memset_wcscpy_wcslen_wcsncpy
                                            • String ID: Line:
                                            • API String ID: 1620655955-1585850449
                                            • Opcode ID: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                            • Instruction ID: a4e7cf3abc31881c2b93aaae0beefbbd48c64772eea77d32b53e92a0700a02c6
                                            • Opcode Fuzzy Hash: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                            • Instruction Fuzzy Hash: 7431D47151C301ABD324EB11DC41BDB77E8AF94314F04493FF989521A1DB78AA49C79B

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 507 4103e0-410461 CreateWindowExW * 2 ShowWindow * 2
                                            APIs
                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
                                            • ShowWindow.USER32(?,00000000), ref: 00410454
                                            • ShowWindow.USER32(?,00000000), ref: 0041045E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$CreateShow
                                            • String ID: AutoIt v3$edit
                                            • API String ID: 1584632944-3779509399
                                            • Opcode ID: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                            • Instruction ID: daa3d4afae2654ee996124117597f48fa5c574a0ac4b96d00400a8ba476d7f73
                                            • Opcode Fuzzy Hash: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                            • Instruction Fuzzy Hash: F3F0A975BE4310BAF6609754AC43F592B59A765F00F3445ABB700BF1D0D6E478408B9C

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 508 403b3b8-403b4bc call 4039008 call 403b2a8 CreateFileW 515 403b4c3-403b4d3 508->515 516 403b4be 508->516 519 403b4d5 515->519 520 403b4da-403b4f4 VirtualAlloc 515->520 517 403b573-403b578 516->517 519->517 521 403b4f6 520->521 522 403b4f8-403b50f ReadFile 520->522 521->517 523 403b513-403b54d call 403b2e8 call 403a2a8 522->523 524 403b511 522->524 529 403b569-403b571 ExitProcess 523->529 530 403b54f-403b564 call 403b338 523->530 524->517 529->517 530->529
                                            APIs
                                              • Part of subcall function 0403B2A8: Sleep.KERNELBASE(000001F4), ref: 0403B2B9
                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0403B4B2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1687797561.0000000004039000.00000040.00000020.00020000.00000000.sdmp, Offset: 04039000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_4039000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CreateFileSleep
                                            • String ID: CH066NFTLR6UL
                                            • API String ID: 2694422964-3244617542
                                            • Opcode ID: 74b6bad96140111a456176683a70abc06676fcc324502e119fe0dbf133246306
                                            • Instruction ID: 7e9856f3ddeb28e712ca8b3f86ad91d63b39fde319ed8441326be78c304a876e
                                            • Opcode Fuzzy Hash: 74b6bad96140111a456176683a70abc06676fcc324502e119fe0dbf133246306
                                            • Instruction Fuzzy Hash: BF519271E14249EBEF10DBA4C804BEFBBB8AF54305F004199E608BB2C1DB792B45CB65
                                            APIs
                                            • __lock.LIBCMT ref: 00413AA6
                                              • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
                                              • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
                                              • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
                                            • ___sbh_find_block.LIBCMT ref: 00413AB1
                                            • ___sbh_free_block.LIBCMT ref: 00413AC0
                                            • RtlFreeHeap.NTDLL(00000000,00411739,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
                                            • GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                            • String ID:
                                            • API String ID: 2714421763-0
                                            • Opcode ID: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                            • Instruction ID: 54fb22c17cbd059cfb8714ef359fce415cc636064f476ff80f42ef981757bf49
                                            • Opcode Fuzzy Hash: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                            • Instruction Fuzzy Hash: 7401A731A08301BADF206F71AC09BDF3B64AF00759F10052FF544A6182DB7D9AC19B9C
                                            APIs
                                              • Part of subcall function 0040F580: _wcslen.LIBCMT ref: 0040F58A
                                              • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0040F5A3
                                              • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,-00000010,00000001,?,?,?,?), ref: 0040F5CC
                                            • _strcat.LIBCMT ref: 0040F603
                                              • Part of subcall function 0040F6A0: _memset.LIBCMT ref: 0040F6A8
                                              • Part of subcall function 0040F6D0: _strlen.LIBCMT ref: 0040F6D8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$_memset_strcat_strlen_wcslen
                                            • String ID: HH
                                            • API String ID: 1194219731-2761332787
                                            • Opcode ID: 6830d432ce0edc537904fcc81a92ccb4243d6e1eaca554fb6fd30da9042373f9
                                            • Instruction ID: 1fd31f67f6889806bd2ce24d6488871f5ee50ddf162d20410a363c4a19aba518
                                            • Opcode Fuzzy Hash: 6830d432ce0edc537904fcc81a92ccb4243d6e1eaca554fb6fd30da9042373f9
                                            • Instruction Fuzzy Hash: 022158B260825067C724EF7A9C8266EF7D8AF85308F148C3FF554D2282F638D555879A
                                            APIs
                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 0403AAD5
                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0403AAF9
                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0403AB1B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1687797561.0000000004039000.00000040.00000020.00020000.00000000.sdmp, Offset: 04039000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_4039000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                            • String ID:
                                            • API String ID: 2438371351-0
                                            • Opcode ID: fc310a6135c3389c0587bc6629e9838c2c50d5be0bfc8bfa2df8a04cac11b1e3
                                            • Instruction ID: cb05ec8f5d8f2f429521daa8b9e6d837749afabec59bae85f09a98ea672842d5
                                            • Opcode Fuzzy Hash: fc310a6135c3389c0587bc6629e9838c2c50d5be0bfc8bfa2df8a04cac11b1e3
                                            • Instruction Fuzzy Hash: 60620B30A142189BEB24CFA4C840BDEB776EF58705F1091A9D14DFB290E779AE81CF59
                                            APIs
                                            • _memset.LIBCMT ref: 0040E202
                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: IconNotifyShell__memset
                                            • String ID:
                                            • API String ID: 928536360-0
                                            • Opcode ID: 27b28fb85d639681eb8fd2a3c2bcd9dc0bb82ef5f5c365fc5a47124cd6911170
                                            • Instruction ID: 9c6d99eda8392314e00a4319cd3b9f491a6d528882fc0aac3328a2d60ab56ec1
                                            • Opcode Fuzzy Hash: 27b28fb85d639681eb8fd2a3c2bcd9dc0bb82ef5f5c365fc5a47124cd6911170
                                            • Instruction Fuzzy Hash: FC318170608701DFD320DF25D845B97BBF8BB45304F00486EE99A93380E778A958CF5A
                                            APIs
                                            • _malloc.LIBCMT ref: 00411734
                                              • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                              • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                              • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                            • std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                              • Part of subcall function 004116B0: std::exception::exception.LIBCMT ref: 004116BC
                                            • std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                            • __CxxThrowException@8.LIBCMT ref: 00411779
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                            • String ID:
                                            • API String ID: 1411284514-0
                                            • Opcode ID: ca7221cdd9cc9326792a0c346bb7c35cd30f9974032eaa45b6addcc39664c516
                                            • Instruction ID: c554e94cc15d94fff19a40754e7570613bf3612ee9c26c673f8185df9075a277
                                            • Opcode Fuzzy Hash: ca7221cdd9cc9326792a0c346bb7c35cd30f9974032eaa45b6addcc39664c516
                                            • Instruction Fuzzy Hash: 6FF0E23550060A66CF08B723EC06ADE3B649F11798B10403BFA20552F2DF6DADC9865C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                            • Instruction ID: a1f682be926937ece900e9fcc50ccc13891f43ead78ba7c6857800eee9f0599c
                                            • Opcode Fuzzy Hash: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                            • Instruction Fuzzy Hash: EC81D2756043009FC310EF65C985B6AB7E4EF84315F008D2EF988AB392D779E909CB96
                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(80000001,0040F0EE,00000000,00000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F132
                                            • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F14F
                                            • RegCloseKey.KERNELBASE(00000000,?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F159
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID:
                                            • API String ID: 3677997916-0
                                            • Opcode ID: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                            • Instruction ID: 6acd5c45b0bc896a902747136fbadff1bb775023c46fd22fba7b324c5144c726
                                            • Opcode Fuzzy Hash: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                            • Instruction Fuzzy Hash: 60F0BDB0204202ABD614DF54DD88E6BB7F9EF88704F10492DB585D7250D7B4A804CB26
                                            APIs
                                            • _malloc.LIBCMT ref: 00435278
                                              • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                              • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                              • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                            • _malloc.LIBCMT ref: 00435288
                                            • _malloc.LIBCMT ref: 00435298
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _malloc$AllocateHeap
                                            • String ID:
                                            • API String ID: 680241177-0
                                            • Opcode ID: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                            • Instruction ID: 30b75876ff52ae1c35022de4a6700901ba1db26c97f4d16f7fcf584af9a5a73f
                                            • Opcode Fuzzy Hash: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                            • Instruction Fuzzy Hash: E5F0A0B1500F0046E660AB3198457C7A2E09B14307F00186FB6855618ADA7C69C4CEAC
                                            APIs
                                            • _wcslen.LIBCMT ref: 00401B71
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                            • String ID: @EXITCODE
                                            • API String ID: 580348202-3436989551
                                            • Opcode ID: 48d001a4b96ee351bc7679959485890c1c6d832d60c6cde5ea273d4c8ab31dfe
                                            • Instruction ID: 288ad252d7dad0c090ff8240dee62855692e698d70424b42c0a66861a7771545
                                            • Opcode Fuzzy Hash: 48d001a4b96ee351bc7679959485890c1c6d832d60c6cde5ea273d4c8ab31dfe
                                            • Instruction Fuzzy Hash: 73F06DF2A002025BD7649B35DC0276776E4AB44704F18C83EE14AC7791F6BDE8829B15
                                            APIs
                                            • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0040DFD2,?,00000001,00403843,?), ref: 0040F00A
                                            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000004,00000080,00000000,?,0040DFD2,?,00000001,00403843,?), ref: 004299D9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                                            • Instruction ID: 855a981e3d87b0586b227f36a287a9e63fe5cd358b5bfab8de368ff291d46a89
                                            • Opcode Fuzzy Hash: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                                            • Instruction Fuzzy Hash: 67011D703803107AF2311F28AD5BF5632546B44B24F244B39FBD5BE2E2D2F86885970C
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __lock_file_memset
                                            • String ID:
                                            • API String ID: 26237723-0
                                            • Opcode ID: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                            • Instruction ID: c8a12bf2a45d0ac11074f8cac28b928f9e20b60047ac9024d749846706a082ab
                                            • Opcode Fuzzy Hash: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                            • Instruction Fuzzy Hash: 32012971C00609FBCF22AF65DC029DF3B31AF44714F04815BF82416261D7798AA2DF99
                                            APIs
                                              • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                              • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                            • __lock_file.LIBCMT ref: 00414EE4
                                              • Part of subcall function 00415965: __lock.LIBCMT ref: 0041598A
                                            • __fclose_nolock.LIBCMT ref: 00414EEE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __decode_pointer__fclose_nolock__getptd_noexit__lock__lock_file
                                            • String ID:
                                            • API String ID: 717694121-0
                                            • Opcode ID: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                            • Instruction ID: 225a509e04b880138f2478077c57af59103cae2c072c29012e7845c0956b1514
                                            • Opcode Fuzzy Hash: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                            • Instruction Fuzzy Hash: DEF06270D0470499C721BB6A9802ADE7AB0AFC1338F21864FE479A72D1C77C46C29F5D
                                            APIs
                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 0403AAD5
                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0403AAF9
                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0403AB1B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1687797561.0000000004039000.00000040.00000020.00020000.00000000.sdmp, Offset: 04039000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_4039000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                            • String ID:
                                            • API String ID: 2438371351-0
                                            • Opcode ID: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                                            • Instruction ID: d3d071cf711e8041e9d99cc10d344fa7d10acd1f982346602af3bc8344ea4f30
                                            • Opcode Fuzzy Hash: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                                            • Instruction Fuzzy Hash: 3B12EE24E24658C6EB24DF60D8507DEB272EF68301F1090E9910DEB3A4E77A5E81CF5A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction ID: fb1d736feddc8336b94c661b4f3a99b04f66f7614ca83ae43ac4a02a862e88ab
                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction Fuzzy Hash: 1331D574A00105DFC718DF99E490AAAFBA6FB49304B2486A6E409CB751D774EDC1CBC5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a12857963b59ba27d86be744ec8e6ce9272b51880a9e98fb69d1fc4369ccfb77
                                            • Instruction ID: 573dba848690e0cdfd4c9be45b5663ff9194aa529e9341154cf92adfcd841cf8
                                            • Opcode Fuzzy Hash: a12857963b59ba27d86be744ec8e6ce9272b51880a9e98fb69d1fc4369ccfb77
                                            • Instruction Fuzzy Hash: 5E11C374200200ABC7249FAAD8D5F2A73A5AF45304B244C6FE845E7392D73CEC81EB5E
                                            APIs
                                            • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ProcWindow
                                            • String ID:
                                            • API String ID: 181713994-0
                                            • Opcode ID: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                            • Instruction ID: 72bdf1ad184d721e15e17473fba0dc1faec6c1a9a9d1f3fcb71c15abd8c9f185
                                            • Opcode Fuzzy Hash: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                            • Instruction Fuzzy Hash: FDF05436700118A7DF38995CE89ACFF632AD7ED350F418227FD152B3A6813C5C41966E
                                            APIs
                                            • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041AA46
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CreateHeap
                                            • String ID:
                                            • API String ID: 10892065-0
                                            • Opcode ID: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                            • Instruction ID: 99ddfbee892492b32903703907324a593b21f4d4a70cf9c354be63060b8faba1
                                            • Opcode Fuzzy Hash: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                            • Instruction Fuzzy Hash: 56D05E325543449EDF009F71AC087663FDCE788395F008836BC1CC6150E778C950CA08
                                            APIs
                                              • Part of subcall function 00444326: SetFilePointerEx.KERNEL32(00000000,00000001,00000000,00000000,00000001,?,?,0044434E,?,?,00429A83,?,00487174,00000003,0040DFEE,?), ref: 004442F3
                                            • WriteFile.KERNELBASE(?,?,00000001,?,00000000,?,?,00429A83,?,00487174,00000003,0040DFEE,?,?,00000001,00403843), ref: 00444362
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: File$PointerWrite
                                            • String ID:
                                            • API String ID: 539440098-0
                                            • Opcode ID: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                                            • Instruction ID: 4a339a6eb5dfef6003722c1615037f540bc53d76d7f4c43935d02bdd90bbdfc9
                                            • Opcode Fuzzy Hash: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                                            • Instruction Fuzzy Hash: 7CE09275104311AFD250DF54D944F9BB3F8AF88714F108D0EF59587241D7B4A9848BA6
                                            APIs
                                            • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ProcWindow
                                            • String ID:
                                            • API String ID: 181713994-0
                                            • Opcode ID: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                            • Instruction ID: 4c36cba44089d0e03573cc5e8dee84df23505be31ebc2729507753268ee0d302
                                            • Opcode Fuzzy Hash: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                            • Instruction Fuzzy Hash: C3C08C72100008BB8700DE04EC44CFBB72CEBD8310700C20BBC0586201C230885097A1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __wfsopen
                                            • String ID:
                                            • API String ID: 197181222-0
                                            • Opcode ID: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                            • Instruction ID: 6225ca515e7db1e5d7746fb8cf1e0ad45b41b4d1817cc5a1d8a93eb941133566
                                            • Opcode Fuzzy Hash: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                            • Instruction Fuzzy Hash: EDC09B7644010C77CF122943FC02E453F1997C0764F044011FB1C1D561D577D5619589
                                            APIs
                                            • CloseHandle.KERNELBASE(00000000,?,0040DF8E), ref: 0040D91D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CloseHandle
                                            • String ID:
                                            • API String ID: 2962429428-0
                                            • Opcode ID: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                                            • Instruction ID: 397672216df932ca6c22f29d52987cd2165f63c791f69eb8015935d900cfb6d9
                                            • Opcode Fuzzy Hash: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                                            • Instruction Fuzzy Hash: 16E0DEB5900B019EC7318F6AE544416FBF8AEE46213248E2FD4E6D2A64D3B4A5898F54
                                            APIs
                                            • Sleep.KERNELBASE(000001F4), ref: 0403B2B9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1687797561.0000000004039000.00000040.00000020.00020000.00000000.sdmp, Offset: 04039000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_4039000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                            • Instruction ID: 7f6d27cdca96ba16461a99cc820653cc957b0598cc73ebe2d2cf3dcbf33aa55d
                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                            • Instruction Fuzzy Hash: B6E0E67494010DDFDB00DFB4D54969D7FB4EF04302F100665FD11E2280D6309D50CA62
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PF$PF$"DF$$JG$&F$&F$'HG$'|G$*"D$*nF$*vG$+%F$0wE$4rE$5CG$6MG$6NF$6tE$7eF$<HF$<G$ApG$BnE$DvE$F)G$GSG$IqE$K@G$LbF$MdF$MuE$NgF$O*F$PIF$QbG$R+F$RnG$YlE$YtG$Z9G$ZPG$^[F$^oE$_7G$_?G$b"D$fH$i}G$j)F$kQG$lE$rTG$vjE$}eE$~mE$*F$.F$3G$_G$`F$mE$pE$wG
                                            • API String ID: 0-4260964411
                                            • Opcode ID: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                            • Instruction ID: b1e67458769bbea4a86cd8903524db5b6e79558e2e7ab8c51025fc7bd56032a7
                                            • Opcode Fuzzy Hash: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                            • Instruction Fuzzy Hash: 118366F1905B409FC351DFAAF984605BAE1F3AA3157A2857FC5088B731D7B8194A8F4C
                                            APIs
                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C158
                                            • DefDlgProcW.USER32(?,0000004E,?,?,004A83D8,?,004A83D8,?), ref: 0047C173
                                            • GetKeyState.USER32(00000011), ref: 0047C1A4
                                            • GetKeyState.USER32(00000009), ref: 0047C1AD
                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C1C0
                                            • GetKeyState.USER32(00000010), ref: 0047C1CA
                                            • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C1DE
                                            • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C20A
                                            • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C22D
                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047C2D6
                                            • SendMessageW.USER32 ref: 0047C2FB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$State$LongProcWindow
                                            • String ID: @GUI_DRAGID$F
                                            • API String ID: 1562745308-4164748364
                                            • Opcode ID: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                            • Instruction ID: f40edf6d5039c675f00343e7880f865f139be9e64e9b8d530a61de5f06f6045f
                                            • Opcode Fuzzy Hash: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                            • Instruction Fuzzy Hash: C6429F702042019FD714CF54C884FAB77A5EB89B04F548A6EFA48AB291DBB4EC45CB5A
                                            APIs
                                            • GetForegroundWindow.USER32(00000000,?,?,004448AF,?), ref: 004375B3
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004375D8
                                            • IsIconic.USER32(?), ref: 004375E1
                                            • ShowWindow.USER32(?,00000009,?,?,004448AF,?), ref: 004375EE
                                            • SetForegroundWindow.USER32(?), ref: 004375FD
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00437615
                                            • GetCurrentThreadId.KERNEL32 ref: 00437619
                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00437624
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437632
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437638
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 0043763E
                                            • SetForegroundWindow.USER32(?), ref: 00437645
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437654
                                            • keybd_event.USER32(00000012,00000000), ref: 0043765D
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043766B
                                            • keybd_event.USER32(00000012,00000000), ref: 00437674
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437682
                                            • keybd_event.USER32(00000012,00000000), ref: 0043768B
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437699
                                            • keybd_event.USER32(00000012,00000000), ref: 004376A2
                                            • SetForegroundWindow.USER32(?), ref: 004376AD
                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376CD
                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D3
                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 3778422247-2988720461
                                            • Opcode ID: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                            • Instruction ID: 6108fbe056c1a000d5481f33e03d330ccc862392245923d3170deea12ea07584
                                            • Opcode Fuzzy Hash: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                            • Instruction Fuzzy Hash: AC31A4712803157FE6245BA59D0EF7F3F9CEB48B51F10082EFA02EA1D1DAE458009B79
                                            APIs
                                            • _memset.LIBCMT ref: 0044621B
                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 00446277
                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0044628A
                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004462A4
                                            • GetProcessWindowStation.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462BD
                                            • SetProcessWindowStation.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462C8
                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004462E4
                                            • _wcslen.LIBCMT ref: 0044639E
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                            • _wcsncpy.LIBCMT ref: 004463C7
                                            • LoadUserProfileW.USERENV(?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 004463E7
                                            • CreateEnvironmentBlock.USERENV(?,?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 00446408
                                            • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,?,00000000,?,?,00000000,?), ref: 00446446
                                            • UnloadUserProfile.USERENV(?,?,?,?,?,?,?), ref: 00446483
                                            • CloseWindowStation.USER32(00000000,?,?,?,?), ref: 00446497
                                            • CloseDesktop.USER32(00000000,?,?,?,?), ref: 0044649E
                                            • SetProcessWindowStation.USER32(?,?,?,?,?), ref: 004464A9
                                            • CloseHandle.KERNEL32(?,?,?,?,?), ref: 004464B4
                                            • DestroyEnvironmentBlock.USERENV(?,?,?,?,?,?), ref: 004464C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_memset_wcslen_wcsncpy
                                            • String ID: $default$winsta0
                                            • API String ID: 2173856841-1027155976
                                            • Opcode ID: 8783c105518f9fa52f5c80a6299cf7ec7b6e28c011eada52347f54b488ad9e21
                                            • Instruction ID: eafd5d154f9bcf2590b8f8eb1e0f3d39b01f77f2fd200ee1cb9c7344d9c52646
                                            • Opcode Fuzzy Hash: 8783c105518f9fa52f5c80a6299cf7ec7b6e28c011eada52347f54b488ad9e21
                                            • Instruction Fuzzy Hash: DD819170208341AFE724DF65C848B6FBBE8AF89744F04491DF69097291DBB8D805CB6B
                                            APIs
                                            • _wcslen.LIBCMT ref: 00409A61
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                            • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                            • String ID: 0vH$4RH
                                            • API String ID: 1143807570-2085553193
                                            • Opcode ID: 448372cbc2a04de0c58b15acec820b8f3e335fdb8b2659cade4efb497aaa83ea
                                            • Instruction ID: 7c8f52bff4b3ea9a641e6aac08ab5e1c8beb32691f0f21fab5f23224d73a3634
                                            • Opcode Fuzzy Hash: 448372cbc2a04de0c58b15acec820b8f3e335fdb8b2659cade4efb497aaa83ea
                                            • Instruction Fuzzy Hash: 34238170A043109FD724DF25D480A6BB7E1BF89304F54896EE84A9B391D739EC46CB9B
                                            APIs
                                              • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,?,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,004A8E80,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,0040F3D2), ref: 0040FFCA
                                              • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A45
                                              • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A6C
                                              • Part of subcall function 00436A1D: __wcsicoll.LIBCMT ref: 00436A93
                                              • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                            • _wcscat.LIBCMT ref: 0044BD96
                                            • _wcscat.LIBCMT ref: 0044BDBF
                                            • __wsplitpath.LIBCMT ref: 0044BDEC
                                            • FindFirstFileW.KERNEL32(?,?), ref: 0044BE04
                                            • _wcscpy.LIBCMT ref: 0044BE73
                                            • _wcscat.LIBCMT ref: 0044BE85
                                            • _wcscat.LIBCMT ref: 0044BE97
                                            • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC3
                                            • DeleteFileW.KERNEL32(?), ref: 0044BED5
                                            • MoveFileW.KERNEL32(?,?), ref: 0044BEF5
                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0C
                                            • DeleteFileW.KERNEL32(?), ref: 0044BF17
                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2E
                                            • FindClose.KERNEL32(00000000), ref: 0044BF35
                                            • MoveFileW.KERNEL32(?,?), ref: 0044BF51
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF66
                                            • FindClose.KERNEL32(00000000), ref: 0044BF7E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                            • String ID: \*.*
                                            • API String ID: 2188072990-1173974218
                                            • Opcode ID: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                            • Instruction ID: 14f7055b3521afb04026f42b490306401b0ba37f80ed0ea0ca267746d8cc4687
                                            • Opcode Fuzzy Hash: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                            • Instruction Fuzzy Hash: CA5166B2008344AAD720DBA4DC44FDF73E8AB85314F448D1EF68982141EB79D64CCBAA
                                            APIs
                                            • __invoke_watson.LIBCMT ref: 004203A4
                                              • Part of subcall function 00417D93: _memset.LIBCMT ref: 00417DBB
                                              • Part of subcall function 00417D93: IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 00417E6F
                                              • Part of subcall function 00417D93: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000314), ref: 00417E79
                                              • Part of subcall function 00417D93: UnhandledExceptionFilter.KERNEL32(?,?,?,00000314), ref: 00417E86
                                              • Part of subcall function 00417D93: GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 00417EA1
                                              • Part of subcall function 00417D93: TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 00417EA8
                                            • __get_daylight.LIBCMT ref: 004203B0
                                            • __invoke_watson.LIBCMT ref: 004203BF
                                            • __get_daylight.LIBCMT ref: 004203CB
                                            • __invoke_watson.LIBCMT ref: 004203DA
                                            • ____lc_codepage_func.LIBCMT ref: 004203E2
                                            • _strlen.LIBCMT ref: 00420442
                                            • __malloc_crt.LIBCMT ref: 00420449
                                            • _strlen.LIBCMT ref: 0042045F
                                            • _strcpy_s.LIBCMT ref: 0042046D
                                            • __invoke_watson.LIBCMT ref: 00420482
                                            • GetTimeZoneInformation.KERNEL32(00496C28), ref: 004204AA
                                            • WideCharToMultiByte.KERNEL32(?,?,00496C2C,?,?,0000003F,?,?), ref: 00420528
                                            • WideCharToMultiByte.KERNEL32(?,?,00496C80,000000FF,?,0000003F,?,?,?,00496C2C,?,?,0000003F,?,?), ref: 0042055C
                                              • Part of subcall function 00413A88: __lock.LIBCMT ref: 00413AA6
                                              • Part of subcall function 00413A88: ___sbh_find_block.LIBCMT ref: 00413AB1
                                              • Part of subcall function 00413A88: ___sbh_free_block.LIBCMT ref: 00413AC0
                                              • Part of subcall function 00413A88: RtlFreeHeap.NTDLL(00000000,00411739,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
                                              • Part of subcall function 00413A88: GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                            • __invoke_watson.LIBCMT ref: 004205CC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __invoke_watson$ByteCharExceptionFilterMultiProcessUnhandledWide__get_daylight_strlen$CurrentDebuggerErrorFreeHeapInformationLastPresentTerminateTimeZone____lc_codepage_func___sbh_find_block___sbh_free_block__lock__malloc_crt_memset_strcpy_s
                                            • String ID: S\
                                            • API String ID: 4084823496-393906132
                                            • Opcode ID: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                            • Instruction ID: b357f19af7064e56bcdb8625987f67de7edc2332d57e558cb2e7b84f91b73af7
                                            • Opcode Fuzzy Hash: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                            • Instruction Fuzzy Hash: 6A91D371E00125AFDB20EF65EC819AE7BE9EF55300B95003BF540A7253DA3C89828F5C
                                            APIs
                                            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00434D75
                                            • __swprintf.LIBCMT ref: 00434D91
                                            • _wcslen.LIBCMT ref: 00434D9B
                                            • _wcslen.LIBCMT ref: 00434DB0
                                            • _wcslen.LIBCMT ref: 00434DC5
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00434DD7
                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00434E0A
                                            • _memset.LIBCMT ref: 00434E27
                                            • _wcslen.LIBCMT ref: 00434E3C
                                            • _wcsncpy.LIBCMT ref: 00434E6F
                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00434EA9
                                            • CloseHandle.KERNEL32(00000000), ref: 00434EB4
                                            • RemoveDirectoryW.KERNEL32(?), ref: 00434EBB
                                            • CloseHandle.KERNEL32(00000000), ref: 00434ECE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcslen$CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                            • String ID: :$\$\??\%s
                                            • API String ID: 302090198-3457252023
                                            • Opcode ID: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                            • Instruction ID: 730b2dca1b6b09bd6b76555d3316dee95f4818bcffb97f26f8f03165767cfd2f
                                            • Opcode Fuzzy Hash: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                            • Instruction Fuzzy Hash: 30416676604340ABE330EB64DC49FEF73E8AFD8714F00891EF649921D1E7B4A645876A
                                            APIs
                                              • Part of subcall function 00444233: _wcslen.LIBCMT ref: 0044424E
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0046449E
                                            • GetLastError.KERNEL32 ref: 004644B4
                                            • GetCurrentThread.KERNEL32 ref: 004644C8
                                            • OpenThreadToken.ADVAPI32(00000000), ref: 004644CF
                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004644E0
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 004644E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
                                            • String ID: SeDebugPrivilege
                                            • API String ID: 1312810259-2896544425
                                            • Opcode ID: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                            • Instruction ID: c3f5e6af55eb0da9fa74db60d4f5a84adac3a89a74612fbe59a223ef38337450
                                            • Opcode Fuzzy Hash: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                            • Instruction Fuzzy Hash: 0E51A171200201AFD710DF65DD85F5BB7A8AB84704F10892EFB44DB2C1D7B8E844CBAA
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403871
                                            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403887
                                            • __wsplitpath.LIBCMT ref: 004038B2
                                              • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                            • _wcscpy.LIBCMT ref: 004038C7
                                            • _wcscat.LIBCMT ref: 004038DC
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 004038EC
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                              • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,0040397D,?,?,00000010), ref: 00403F54
                                              • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,00000010), ref: 00403F8B
                                            • _wcscpy.LIBCMT ref: 004039C2
                                            • _wcslen.LIBCMT ref: 00403A53
                                            • _wcslen.LIBCMT ref: 00403AAA
                                            Strings
                                            • Unterminated string, xrefs: 0042B9BA
                                            • Error opening the file, xrefs: 0042B8AC
                                            • #include depth exceeded. Make sure there are no recursive includes, xrefs: 0042B87B
                                            • _, xrefs: 00403B48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpy$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_wcscatstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                            • API String ID: 4115725249-188983378
                                            • Opcode ID: e410348e96554644cb024ebf95e8b2d2088fffc0e8404256067a24ee959a0054
                                            • Instruction ID: dca64db042171ec5605b2d10b6a92a42a2076cc25022adee7b8115af8a15fc96
                                            • Opcode Fuzzy Hash: e410348e96554644cb024ebf95e8b2d2088fffc0e8404256067a24ee959a0054
                                            • Instruction Fuzzy Hash: 16D1D5B15083019AD710EF65C841AEB77E8AF95308F04492FF5C563292DB78DA49C7AB
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?), ref: 00434C12
                                            • GetFileAttributesW.KERNEL32(?), ref: 00434C4F
                                            • SetFileAttributesW.KERNEL32(?,?), ref: 00434C65
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00434C77
                                            • FindClose.KERNEL32(00000000), ref: 00434C88
                                            • FindClose.KERNEL32(00000000), ref: 00434C9C
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00434CB7
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00434CFE
                                            • SetCurrentDirectoryW.KERNEL32(0048A090), ref: 00434D22
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00434D2A
                                            • FindClose.KERNEL32(00000000), ref: 00434D35
                                            • FindClose.KERNEL32(00000000), ref: 00434D43
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                            • String ID: *.*
                                            • API String ID: 1409584000-438819550
                                            • Opcode ID: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                            • Instruction ID: 399dbb17912f16e5170155dcc5475d9346bc7ba5aa4a4c8a0ea4d4714b2c7a66
                                            • Opcode Fuzzy Hash: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                            • Instruction Fuzzy Hash: 4141D8726042086BD710EF64DC45AEFB3A8AAC9311F14592FFD54C3280EB79E915C7B9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Timetime$Sleep
                                            • String ID: BUTTON
                                            • API String ID: 4176159691-3405671355
                                            • Opcode ID: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                            • Instruction ID: 32c89cc89acb3c111fc3cc5f781edb0c57d51ec263d79eeef99f8852f1a29925
                                            • Opcode Fuzzy Hash: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                            • Instruction Fuzzy Hash: CB21B7723843016BE330DB74FD4DF5A7B94A7A5B51F244876F600E6290D7A5D442876C
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,74DE8FB0,74DE8FB0,?,?,00000000), ref: 00442E40
                                            • FindNextFileW.KERNEL32(00000000,?,?,00000000), ref: 00442EA4
                                            • FindClose.KERNEL32(00000000,?,00000000), ref: 00442EB5
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00442ED1
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00442EF0
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00442F3B
                                            • SetCurrentDirectoryW.KERNEL32(0048A090,?,?,?,00000000), ref: 00442F6D
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00442F75
                                            • FindClose.KERNEL32(00000000), ref: 00442F80
                                              • Part of subcall function 00436D2D: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000,74DF3220,00000000,00000000,00442E95,?,?,?), ref: 00436D4F
                                            • FindClose.KERNEL32(00000000,?,?,?,00000000), ref: 00442F92
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                            • String ID: *.*
                                            • API String ID: 2640511053-438819550
                                            • Opcode ID: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
                                            • Instruction ID: 5fd3b3f399b1dfd6b0a62b5043663bf11a2259675d3c80dc16c90576bc2ddb84
                                            • Opcode Fuzzy Hash: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
                                            • Instruction Fuzzy Hash: 0F41E8326083046BD620FA64DD85BEFB3A89BC5311F54492FF95483280E7FEA50D8779
                                            APIs
                                              • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004392DE
                                              • Part of subcall function 004392BC: GetLastError.KERNEL32 ref: 004392E4
                                              • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0043930B
                                              • Part of subcall function 0043928B: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004392A5
                                            • GetSecurityDescriptorDacl.ADVAPI32(?,00000004,?,?,?,?), ref: 00445E4B
                                            • _memset.LIBCMT ref: 00445E61
                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00445E83
                                            • GetLengthSid.ADVAPI32(?), ref: 00445E92
                                            • GetAce.ADVAPI32(?,00000000,?,?,00000018), ref: 00445EDE
                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00445EFB
                                            • GetLengthSid.ADVAPI32(?,?,00000018), ref: 00445F11
                                            • GetLengthSid.ADVAPI32(?,00000008,?,?,00000000,?,00000000), ref: 00445F39
                                            • CopySid.ADVAPI32(00000000,?,00000000,?,00000000), ref: 00445F40
                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?,?,00000000,?,00000000), ref: 00445F6E
                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000000,?,00000000), ref: 00445F8B
                                            • SetUserObjectSecurity.USER32(?,?,?), ref: 00445FA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast_memset
                                            • String ID:
                                            • API String ID: 3490752873-0
                                            • Opcode ID: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                            • Instruction ID: 491154c1e478dcf6c9ac3cbca3c2c9e2645d4ee7bbdc2abf5fae4ada557f6fe4
                                            • Opcode Fuzzy Hash: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                            • Instruction Fuzzy Hash: 85519D71108301ABD610DF61CD84E6FB7E9AFC9B04F04491EFA869B242D778E909C76B
                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 0047AA03
                                            • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AA27
                                            • CoCreateInstance.OLE32(?,00000000,00000005,004829C0,?), ref: 0047AAAA
                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0047AB6B
                                            • _memset.LIBCMT ref: 0047AB7C
                                            • _wcslen.LIBCMT ref: 0047AC68
                                            • _memset.LIBCMT ref: 0047ACCD
                                            • CoCreateInstanceEx.OLE32 ref: 0047AD06
                                            • CoSetProxyBlanket.OLE32(004829D0,?,?,?,?,?,?,00000800), ref: 0047AD53
                                            Strings
                                            • NULL Pointer assignment, xrefs: 0047AD84
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CreateInitializeInstance_memset$BlanketFromProgProxySecurity_wcslen
                                            • String ID: NULL Pointer assignment
                                            • API String ID: 1588287285-2785691316
                                            • Opcode ID: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                                            • Instruction ID: 16786b45dbc5194aa398acfc0f0ff3b91b98a178c64a073a91da7f4e0cb75f58
                                            • Opcode Fuzzy Hash: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                                            • Instruction Fuzzy Hash: 54B10DB15083409FD320EF65C881B9FB7E8BBC8744F108E2EF58997291D7759948CB66
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004364B9
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 004364C0
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004364D6
                                            • AdjustTokenPrivileges.ADVAPI32 ref: 004364FE
                                            • GetLastError.KERNEL32 ref: 00436504
                                            • ExitWindowsEx.USER32(?,00000000), ref: 00436527
                                            • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000001), ref: 00436557
                                            • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 0043656A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                            • String ID: SeShutdownPrivilege
                                            • API String ID: 2938487562-3733053543
                                            • Opcode ID: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                            • Instruction ID: b625d7910520021a286729d09db348b3c4b0b131b75d5259d4bd29649b467962
                                            • Opcode Fuzzy Hash: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                            • Instruction Fuzzy Hash: E021D5B02803017FF7149B64DD4AF6B3398EB48B10F948829FE09852D2D6BDE844973D
                                            APIs
                                            • __swprintf.LIBCMT ref: 00436162
                                            • __swprintf.LIBCMT ref: 00436176
                                              • Part of subcall function 0041353A: __woutput_l.LIBCMT ref: 0041358F
                                            • __wcsicoll.LIBCMT ref: 00436185
                                            • FindResourceW.KERNEL32(?,?,0000000E), ref: 004361A6
                                            • LoadResource.KERNEL32(?,00000000), ref: 004361AE
                                            • LockResource.KERNEL32(00000000), ref: 004361B5
                                            • FindResourceW.KERNEL32(?,?,00000003), ref: 004361DA
                                            • LoadResource.KERNEL32(?,00000000), ref: 004361E4
                                            • SizeofResource.KERNEL32(?,00000000), ref: 004361F0
                                            • LockResource.KERNEL32(?), ref: 004361FD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll__woutput_l
                                            • String ID:
                                            • API String ID: 2406429042-0
                                            • Opcode ID: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                            • Instruction ID: 79d88324f8a28cdfdddc37bd7103cac5134eefaeeaedb246b69d205017f9fa0d
                                            • Opcode Fuzzy Hash: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                            • Instruction Fuzzy Hash: 82313432104210BFD700EF64ED88EAF77A9FB89304F00882BFA4196150E778D940CB68
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D522
                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D593
                                            • GetLastError.KERNEL32 ref: 0045D59D
                                            • SetErrorMode.KERNEL32(?), ref: 0045D629
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Error$Mode$DiskFreeLastSpace
                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                            • API String ID: 4194297153-14809454
                                            • Opcode ID: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                            • Instruction ID: 49a1caac5541b587bc648ef7caa6256b54369420b38b3993b587487a6931f65b
                                            • Opcode Fuzzy Hash: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                            • Instruction Fuzzy Hash: BA31AD75A083009FC310EF55D98090BB7E1AF89315F448D6FF94997362D778E9068B6A
                                            APIs
                                            • MkParseDisplayName.OLE32(?,00000000,?,?), ref: 0047AF0F
                                              • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                            • OleInitialize.OLE32(00000000), ref: 0047AE06
                                              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                            • _wcslen.LIBCMT ref: 0047AE18
                                            • CreateBindCtx.OLE32(00000000,?), ref: 0047AEC2
                                            • CLSIDFromProgID.OLE32(00000000,?,?), ref: 0047AFCC
                                            • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0047AFF9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CopyVariant$_wcslen$ActiveBindCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcscpy
                                            • String ID: HH
                                            • API String ID: 1915432386-2761332787
                                            • Opcode ID: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                                            • Instruction ID: 7e3b4e38c6064d991530b19baaff212313fd3e9d55f264e0ba959e8ba912c45c
                                            • Opcode Fuzzy Hash: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                                            • Instruction Fuzzy Hash: 6C915C71604301ABD710EB65CC85F9BB3E8AFC8714F10892EF64597291EB78E909CB5A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: DEFINE$`$h$h
                                            • API String ID: 0-4194577831
                                            • Opcode ID: 53b7279d5b659778b651e94439d899c69cc4b33ac19e6b5c077e56500386ae31
                                            • Instruction ID: b1cbab3e2140d6a963e4b85c5b61650905c2e88cbb7a9c7ccaf19de07e543520
                                            • Opcode Fuzzy Hash: 53b7279d5b659778b651e94439d899c69cc4b33ac19e6b5c077e56500386ae31
                                            • Instruction Fuzzy Hash: 9802A1715083818FE725CF29C88076BBBE2BFD5304F28896EE89587342D779D849CB56
                                            APIs
                                            • socket.WSOCK32(00000002,00000001,00000006,?,00000000), ref: 004648B0
                                            • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,?,00000000), ref: 004648BE
                                            • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648DA
                                            • WSAGetLastError.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648E6
                                            • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000005,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 0046492D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ErrorLast$bindclosesocketsocket
                                            • String ID:
                                            • API String ID: 2609815416-0
                                            • Opcode ID: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
                                            • Instruction ID: d240999dee57073d64b91b26c15bb406cb7727aead8f71c00845428af50f987f
                                            • Opcode Fuzzy Hash: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
                                            • Instruction Fuzzy Hash: C731CB712002009BD710FF2ADC81B6BB3E8EF85724F144A5FF594A72D2D779AC85876A
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00437043
                                            • Process32FirstW.KERNEL32(00000000,00000002), ref: 00437050
                                            • Process32NextW.KERNEL32(00000000,?), ref: 00437075
                                            • __wsplitpath.LIBCMT ref: 004370A5
                                              • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                            • _wcscat.LIBCMT ref: 004370BA
                                            • __wcsicoll.LIBCMT ref: 004370C8
                                            • CloseHandle.KERNEL32(00000000,?), ref: 00437105
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                            • String ID:
                                            • API String ID: 2547909840-0
                                            • Opcode ID: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                            • Instruction ID: d866d71778569fbbd99b025f777f77cc3db9ba9c83dfb601fa45888e96c7797d
                                            • Opcode Fuzzy Hash: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                            • Instruction Fuzzy Hash: 9C21A7B20083819BD735DB55C881BEFB7E8BB99304F00491EF5C947241EB79A589CB6A
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,00000000), ref: 0045217E
                                            • Sleep.KERNEL32(0000000A,?,?,00000000), ref: 004521B2
                                            • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 004522AC
                                            • FindClose.KERNEL32(?,?,00000000), ref: 004522C3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextSleep_wcslen
                                            • String ID: *.*
                                            • API String ID: 2693929171-438819550
                                            • Opcode ID: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                            • Instruction ID: e6452ff64139cddd5fd774ab19bf2199aa97b2a19dc0f7115334900b47d689b2
                                            • Opcode Fuzzy Hash: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                            • Instruction Fuzzy Hash: BD419D756083409FC314DF25C984A9FB7E4BF86305F04491FF98993291DBB8E949CB5A
                                            APIs
                                            • OpenClipboard.USER32(?), ref: 0046C635
                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
                                            • GetClipboardData.USER32(0000000D), ref: 0046C64F
                                            • CloseClipboard.USER32 ref: 0046C65D
                                            • GlobalLock.KERNEL32(00000000), ref: 0046C688
                                            • CloseClipboard.USER32 ref: 0046C692
                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
                                            • GetClipboardData.USER32(00000001), ref: 0046C6DD
                                            • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
                                            • CloseClipboard.USER32 ref: 0046C866
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
                                            • String ID: HH
                                            • API String ID: 589737431-2761332787
                                            • Opcode ID: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
                                            • Instruction ID: 5556deb4c8197336e1b92b5e2a85e957832ef7964462d916cb468ff193882e13
                                            • Opcode Fuzzy Hash: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
                                            • Instruction Fuzzy Hash: 7301F5762042005FC300AFB9ED45B6A7BA4EF59704F04097FF980A72C1EBB1E915C7AA
                                            APIs
                                            • __wcsicoll.LIBCMT ref: 0043643C
                                            • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 00436452
                                            • __wcsicoll.LIBCMT ref: 00436466
                                            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043647C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __wcsicollmouse_event
                                            • String ID: DOWN
                                            • API String ID: 1033544147-711622031
                                            • Opcode ID: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                            • Instruction ID: 8a73d33e481528181e274ae5662561dddcd8f7088196b39fde8242b6fe69d79f
                                            • Opcode Fuzzy Hash: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                            • Instruction Fuzzy Hash: 75E0927558872039FC4036253C02FFB174CAB66796F018116FE00D1291EA586D865BBD
                                            APIs
                                              • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                            • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 00474213
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00474233
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ErrorLastinet_addrsocket
                                            • String ID:
                                            • API String ID: 4170576061-0
                                            • Opcode ID: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
                                            • Instruction ID: 44a7e99483396e6262e636993c5e510db402c36a24f0b6146f21617b09e75fab
                                            • Opcode Fuzzy Hash: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
                                            • Instruction Fuzzy Hash: B6412C7164030067E720BB3A8C83F5A72D89F40728F144D5EF954BB2C3D6BAAD45475D
                                            APIs
                                            • GetCursorPos.USER32(004A83D8), ref: 0045636A
                                            • ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                            • GetAsyncKeyState.USER32(?), ref: 004563D0
                                            • GetAsyncKeyState.USER32(?), ref: 004563DC
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00456430
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AsyncState$ClientCursorLongScreenWindow
                                            • String ID:
                                            • API String ID: 3539004672-0
                                            • Opcode ID: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                            • Instruction ID: 0eacbf52c9ff4b21db6d2500407d28a57be55752a0539e191fb639d8ee6a043b
                                            • Opcode Fuzzy Hash: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                            • Instruction Fuzzy Hash: 8E416071108341ABD724DF55CD84EBBB7E9EF86725F540B0EB8A543281C734A848CB6A
                                            APIs
                                              • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                            • IsWindowVisible.USER32 ref: 00477314
                                            • IsWindowEnabled.USER32 ref: 00477324
                                            • GetForegroundWindow.USER32(?,?,?,00000001,?,?), ref: 00477331
                                            • IsIconic.USER32 ref: 0047733F
                                            • IsZoomed.USER32 ref: 0047734D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                            • String ID:
                                            • API String ID: 292994002-0
                                            • Opcode ID: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                            • Instruction ID: c753cb395bd8887e5e04db90522a3107d7308fd2cfa588f53a4db7a4177bc043
                                            • Opcode Fuzzy Hash: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                            • Instruction Fuzzy Hash: 351172327041119BE3209B26DD05B9FB7A8AF91310F05882EFC49E7250D7B8EC42D7A9
                                            APIs
                                            • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000,74DF3220,00000000,00000000,00442E95,?,?,?), ref: 00436D4F
                                            • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000), ref: 00436D8C
                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 00436D93
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: File$CloseCreateHandleTime
                                            • String ID:
                                            • API String ID: 3397143404-0
                                            • Opcode ID: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                            • Instruction ID: bce1a9391340f9688fe0750810cd2cb1b104417d8b3c1e96578cdf6de8724fbd
                                            • Opcode Fuzzy Hash: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                            • Instruction Fuzzy Hash: A4F0C83634132077E5301A69AC8DFCF276CABDAB32F20452EF741A61C083D51445977D
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _strncmp
                                            • String ID: ACCEPT$^$h
                                            • API String ID: 909875538-4263704089
                                            • Opcode ID: a6541d7913cd7701a75e3a8dc778404717b64597fc065691f0327c8a2e2ba149
                                            • Instruction ID: 72a2cba82410d8b1d90f72ff5cad5771b474d57714a55a9933f2c727144888ce
                                            • Opcode Fuzzy Hash: a6541d7913cd7701a75e3a8dc778404717b64597fc065691f0327c8a2e2ba149
                                            • Instruction Fuzzy Hash: AE22A0746083818FE725CF29C48076BBBE2BFC9304F24896EE8D587351D779984ACB56
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045C9BE
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0045CA1B
                                            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CA4A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Find$File$CloseFirstNext
                                            • String ID:
                                            • API String ID: 3541575487-0
                                            • Opcode ID: 14602e3ddb85434cb4a191148b4ac58dc13c9e22f939418703ff5d8e88b69fcb
                                            • Instruction ID: 18858b47483a38653cd59612877c1399ad483e9f26b014a4aa46912757e3bc7b
                                            • Opcode Fuzzy Hash: 14602e3ddb85434cb4a191148b4ac58dc13c9e22f939418703ff5d8e88b69fcb
                                            • Instruction Fuzzy Hash: EC41CE756003009FC720EF79D880A9BB3E4FF89315F208A6EED698B391D775A844CB95
                                            APIs
                                            • GetFileAttributesW.KERNEL32(00000001,00000000), ref: 00436AEF
                                            • FindFirstFileW.KERNEL32(00000001,?), ref: 00436B00
                                            • FindClose.KERNEL32(00000000), ref: 00436B13
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: FileFind$AttributesCloseFirst
                                            • String ID:
                                            • API String ID: 48322524-0
                                            • Opcode ID: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                            • Instruction ID: 417b6d6de692ea6945bae3bf725251b28653fd5bce93257cef0f58e2a105c1b1
                                            • Opcode Fuzzy Hash: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                            • Instruction Fuzzy Hash: 23E02236804418678600AB7CAC0C4EE779CDB0A335F100B96FE38C21D0D775A9408FEA
                                            APIs
                                            • __time64.LIBCMT ref: 004433A2
                                              • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                              • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Time$FileSystem__aulldiv__time64
                                            • String ID: rJ
                                            • API String ID: 2893107130-1865492326
                                            • Opcode ID: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                            • Instruction ID: ebc1a5536eae3429eadb0b33e849de59894c076497330b79c1ff8485d89898ec
                                            • Opcode Fuzzy Hash: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                            • Instruction Fuzzy Hash: B721A2336205108BF321CF36CC41652B7E7EBE0314F268A6AE4A5973C5CA797906CB98
                                            APIs
                                            • __time64.LIBCMT ref: 004433A2
                                              • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                              • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Time$FileSystem__aulldiv__time64
                                            • String ID: rJ
                                            • API String ID: 2893107130-1865492326
                                            • Opcode ID: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                            • Instruction ID: 4b4e0c3debee0a45c2bc781276f994e79ac96c452fb6cf924f1e6ade5adf298d
                                            • Opcode Fuzzy Hash: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                            • Instruction Fuzzy Hash: E82187336345108BF321CF36CC4165277E3EBE0314B258B6AD4A5973C5CA797906CB88
                                            APIs
                                            • InternetQueryDataAvailable.WININET(?,?,?,?,00000000,00000000), ref: 004428C2
                                            • InternetReadFile.WININET(?,00000000,?,?), ref: 004428F9
                                              • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                            • String ID:
                                            • API String ID: 901099227-0
                                            • Opcode ID: 0771251b70b9bd68c35fac6f7da5b5f16004994504cb59d35d549d3fc14a9ba4
                                            • Instruction ID: 2c15810e60b1cb59304632cc8162977c32d0240baa2dcf3c2cd6ef22f942a6bb
                                            • Opcode Fuzzy Hash: 0771251b70b9bd68c35fac6f7da5b5f16004994504cb59d35d549d3fc14a9ba4
                                            • Instruction Fuzzy Hash: 452174B12043016BF220EF56DD45FAFB3E8ABD4715F40492EF285A6180D7B8E949C76A
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DDA1
                                            • FindClose.KERNEL32(00000000), ref: 0045DDDD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID:
                                            • API String ID: 2295610775-0
                                            • Opcode ID: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                            • Instruction ID: 3577cc1601137e614a3334ffa73c6d258275d41fe8d72aaca367a27ef3e2a016
                                            • Opcode Fuzzy Hash: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                            • Instruction Fuzzy Hash: DE11E5766002049FD710EF6ADC89A5AF7E5EF84325F10892EF958D7281CB75E8048B94
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0vH$HH
                                            • API String ID: 0-728391547
                                            • Opcode ID: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                            • Instruction ID: 538a6706abcc28c04bdc151be30d2aa4e2083a8dfdfa6c30a7857f36827e6882
                                            • Opcode Fuzzy Hash: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                            • Instruction Fuzzy Hash: 60E1BE725143109FC310EF25C881A9FB7E5AFC4708F108D2EF589AB281D779E946CB9A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _memset
                                            • String ID:
                                            • API String ID: 2102423945-0
                                            • Opcode ID: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                            • Instruction ID: fac722ae1e10b3ad9494cda40f9fb3e9e62b3c26aea04ddfc6562ea9d2065ebb
                                            • Opcode Fuzzy Hash: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                            • Instruction Fuzzy Hash: C512B4B7B983194FDB48DEE4DCC169573E1FB98304F09A43C9A15C7306F6E8AA094794
                                            APIs
                                            • DefDlgProcW.USER32(?,?,?,?,004A83D8,?), ref: 0047E22C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Proc
                                            • String ID:
                                            • API String ID: 2346855178-0
                                            • Opcode ID: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                            • Instruction ID: e1c03c818efbd3cbf3664a0c3e659178dbc9a05004c0f073233894ce1d713c90
                                            • Opcode Fuzzy Hash: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                            • Instruction Fuzzy Hash: 4EB1E63330602429E114916BBC88EBFBB9CD7D677BB208B7FF142C1582DB5B6425A179
                                            APIs
                                            • BlockInput.USER32(00000001), ref: 0045A272
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: BlockInput
                                            • String ID:
                                            • API String ID: 3456056419-0
                                            • Opcode ID: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                            • Instruction ID: 5d782454ef4d0180448527013755d2523f66e5fc327f68786c1d80a86620ac83
                                            • Opcode Fuzzy Hash: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                            • Instruction Fuzzy Hash: D2E04F752043019BC700EF71C545A5BB7E4AF94314F108C6EF845A7351D775AC45CB66
                                            APIs
                                            • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 0043918E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: LogonUser
                                            • String ID:
                                            • API String ID: 1244722697-0
                                            • Opcode ID: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                            • Instruction ID: 63114e5cfb2c4979e73f5d19eacf740c811f86df1a08bc2cb556a5e36cce81ff
                                            • Opcode Fuzzy Hash: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                            • Instruction Fuzzy Hash: 8DD0ECB52686066FD204CB24D846E2B77E9A7C4701F008A0CB196D2280C670D805CA32
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                            • Instruction ID: 8011c19b6c32d183c263453b2018abc548473ce9ed5616c99acac4896e71f792
                                            • Opcode Fuzzy Hash: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                            • Instruction Fuzzy Hash: F6E08C322083058FC310EF55F8405ABB390EB94311F004C3FE64AA2191DA79920EDFAB
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(Function_00021FEC), ref: 00422033
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                            • Instruction ID: 3275b40964251646410af8875a24301f93fa315c26af6adae0ca3d0f7a721f84
                                            • Opcode Fuzzy Hash: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                            • Instruction Fuzzy Hash: CD9002743511144A4A011BB16E5D90925D46A586067920875B411C4064DB9840019619
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                            • Instruction ID: b3f199f19983f506b623bfe7955a95149e6efe4e98ce3416cc40fa12ddcf4508
                                            • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                            • Instruction Fuzzy Hash: 46D19073C0A9B30A8735812D42582BFEE626FD578131EC3E29CD07F38AD26B5DA195D4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                            • Instruction ID: c47bdb3f9c9e38c5d46ddb9e43dedaf70276048770aeb58bd274f21c588a824b
                                            • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                            • Instruction Fuzzy Hash: 1CD19073D1A9B30A8735852D42581AFEE626FD578031EC3E2CCD07F38AD16B5DA191D4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                            • Instruction ID: ac15b8da1a4b082d71a0b082c8349c97121379a14580263daf363e6ab8f75410
                                            • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                            • Instruction Fuzzy Hash: 87C18173C0A9B30A8736812D42641AFEE626FD579031FC3E2CCD47F38A91AB5DA195D4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                            • Instruction ID: aa957cafbedeae1199dea6a597ba911d219650f283d164fb65797e90308ef47b
                                            • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                            • Instruction Fuzzy Hash: 5FC18E73D0A9B30A8735812D42581AFEE626FD578031EC3E28CE46F38ED26F5DA195D4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1687797561.0000000004039000.00000040.00000020.00020000.00000000.sdmp, Offset: 04039000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_4039000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                            • Instruction ID: 4809c90bdf1914e537a8c117b843eca12aa2ab46fa03164c3691758589c029ff
                                            • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                            • Instruction Fuzzy Hash: 4A41C171D1051CEBDF48CFADC991AAEBBF2AF88201F548299D516BB345D730AB41DB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1687797561.0000000004039000.00000040.00000020.00020000.00000000.sdmp, Offset: 04039000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_4039000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                            • Instruction ID: 7552036593ce1d6c0393af64a724a1d4870124219e12dbce52af953fbd9d5a23
                                            • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                            • Instruction Fuzzy Hash: A2019279A04209EFDB44DF98C5909AEFBF9FB48310F208599D809E7301D730AE51DB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1687797561.0000000004039000.00000040.00000020.00020000.00000000.sdmp, Offset: 04039000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_4039000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                            • Instruction ID: 70a9beb5507dd9bb46891fc814e00e9dfcdd2e550ba315f309ddad57b4ac2480
                                            • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                            • Instruction Fuzzy Hash: 71019279A04209EFDB58DF98C5909AEFBF9FB88310F208599D819E7705D730AE51DB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                            • Instruction ID: b8cfd58d412160527e66ace840abba843d94ac3f5b06779728c9fe736b8606cc
                                            • Opcode Fuzzy Hash: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                            • Instruction Fuzzy Hash: ECD012F621844146F33144D866C0BD100437344310FB58C276005CEBC1C0DDECD6C229
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1687797561.0000000004039000.00000040.00000020.00020000.00000000.sdmp, Offset: 04039000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_4039000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                            • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                            • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                            • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                            APIs
                                            • DeleteObject.GDI32(?), ref: 004593D7
                                            • DeleteObject.GDI32(?), ref: 004593F1
                                            • DestroyWindow.USER32(?), ref: 00459407
                                            • GetDesktopWindow.USER32 ref: 0045942A
                                            • GetWindowRect.USER32(00000000), ref: 00459431
                                            • SetRect.USER32(50000001,00000000,00000000,000001F4,?), ref: 00459568
                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00459577
                                            • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,?,?,50000001,?,?,00000000,00000000), ref: 004595BB
                                            • GetClientRect.USER32(00000000,?), ref: 004595C8
                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 00459615
                                            • CreateFileW.KERNEL32(00000000,?,80000000,00000000,00000000,00000003,00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459635
                                            • GetFileSize.KERNEL32(00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459654
                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 0045965F
                                            • GlobalLock.KERNEL32(00000000), ref: 00459668
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459678
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0045967F
                                            • CloseHandle.KERNEL32(00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459686
                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,50000001,?,?,00000000,00000000,00000000), ref: 00459694
                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,000001F4), ref: 004596AD
                                            • GlobalFree.KERNEL32(00000000), ref: 004596C0
                                            • CopyImage.USER32(000000FF,00000000,00000000,00000000,00002000), ref: 004596EF
                                            • SendMessageW.USER32(00000000,00000172,00000000,000000FF), ref: 00459712
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,50000001,?,?,00000000,00000000,00000000), ref: 0045973D
                                            • ShowWindow.USER32(?,00000004,?,50000001,?,?,00000000,00000000,00000000), ref: 0045974B
                                            • CreateWindowExW.USER32(00000000,static,00000000,?,?,0000000B,0000000B,?,?,?,00000000,00000000), ref: 0045979C
                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004597AD
                                            • GetStockObject.GDI32(00000011), ref: 004597B7
                                            • SelectObject.GDI32(00000000,00000000), ref: 004597BF
                                            • GetTextFaceW.GDI32(00000000,00000040,00000190,?,50000001,?,?,00000000,00000000,00000000), ref: 004597CD
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004597D6
                                            • DeleteDC.GDI32(00000000), ref: 004597E1
                                            • _wcslen.LIBCMT ref: 00459800
                                            • _wcscpy.LIBCMT ref: 0045981F
                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 004598BB
                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004598D0
                                            • GetDC.USER32(?), ref: 004598DE
                                            • SelectObject.GDI32(00000000,?), ref: 004598EE
                                            • SelectObject.GDI32(00000000,?), ref: 00459919
                                            • ReleaseDC.USER32(?,00000000), ref: 00459925
                                            • MoveWindow.USER32(?,0000000B,?,?,?,00000001), ref: 00459943
                                            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 00459951
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                            • String ID: $AutoIt v3$DISPLAY$static
                                            • API String ID: 4040870279-2373415609
                                            • Opcode ID: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                            • Instruction ID: fce7466cc8f2b4b34a2e278d60cb4f704f90ff1017bfb666dbfc83d8aba9d67a
                                            • Opcode Fuzzy Hash: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                            • Instruction Fuzzy Hash: 3F028C70204301EFD714DF64DE89F2BB7A8AB84705F104A2DFA45AB2D2D7B4E805CB69
                                            APIs
                                            • GetSysColor.USER32(00000012), ref: 00441E64
                                            • SetTextColor.GDI32(?,?), ref: 00441E6C
                                            • GetSysColorBrush.USER32(0000000F), ref: 00441E83
                                            • GetSysColor.USER32(0000000F), ref: 00441E8F
                                            • SetBkColor.GDI32(?,?), ref: 00441EAA
                                            • SelectObject.GDI32(?,?), ref: 00441EBA
                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00441EF0
                                            • GetSysColor.USER32(00000010), ref: 00441EF8
                                            • CreateSolidBrush.GDI32(00000000), ref: 00441EFF
                                            • FrameRect.USER32(?,?,00000000), ref: 00441F10
                                            • DeleteObject.GDI32(?), ref: 00441F1B
                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 00441F75
                                            • FillRect.USER32(?,?,?), ref: 00441FB6
                                              • Part of subcall function 00433D5C: GetSysColor.USER32(0000000E), ref: 00433D81
                                              • Part of subcall function 00433D5C: SetTextColor.GDI32(?,00000000), ref: 00433D89
                                              • Part of subcall function 00433D5C: GetSysColorBrush.USER32(0000000F), ref: 00433DBF
                                              • Part of subcall function 00433D5C: GetSysColor.USER32(0000000F), ref: 00433DCB
                                              • Part of subcall function 00433D5C: GetSysColor.USER32(00000011), ref: 00433DEB
                                              • Part of subcall function 00433D5C: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                              • Part of subcall function 00433D5C: SelectObject.GDI32(?,00000000), ref: 00433E0D
                                              • Part of subcall function 00433D5C: SetBkColor.GDI32(?,?), ref: 00433E19
                                              • Part of subcall function 00433D5C: SelectObject.GDI32(?,?), ref: 00433E29
                                              • Part of subcall function 00433D5C: InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
                                              • Part of subcall function 00433D5C: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                              • Part of subcall function 00433D5C: GetWindowLongW.USER32 ref: 00433E8A
                                              • Part of subcall function 00433D5C: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                            • String ID:
                                            • API String ID: 69173610-0
                                            • Opcode ID: 930605f3cd1c335a452d6420eef3f3c10f8d3d9e6664604232036969332d5250
                                            • Instruction ID: 0b0c06e318eae1aa70623bc76f746578ebcda4f465cb69034399d4c57c44293d
                                            • Opcode Fuzzy Hash: 930605f3cd1c335a452d6420eef3f3c10f8d3d9e6664604232036969332d5250
                                            • Instruction Fuzzy Hash: BBB14D71508300AFD314DF64DD88A6FB7F8FB88720F504A2DF996922A0D774E845CB66
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                            • API String ID: 1038674560-3360698832
                                            • Opcode ID: 87a66eadcaf8420a9e8e1157d1f7c7fd58aef90dc088af7a86e197dee8fb1ec4
                                            • Instruction ID: b6083b7aed1673b33e689ff2aa7e8f17f47d7310e90ec65f4167159f85ee96f3
                                            • Opcode Fuzzy Hash: 87a66eadcaf8420a9e8e1157d1f7c7fd58aef90dc088af7a86e197dee8fb1ec4
                                            • Instruction Fuzzy Hash: 5A611471B4071076EA306A229C46FAB735CDF14345F50052FFC01A628BE7ADDA4A86EE
                                            APIs
                                            • GetSysColor.USER32(0000000E), ref: 00433D81
                                            • SetTextColor.GDI32(?,00000000), ref: 00433D89
                                            • GetSysColor.USER32(00000012), ref: 00433DA3
                                            • SetTextColor.GDI32(?,?), ref: 00433DAB
                                            • GetSysColorBrush.USER32(0000000F), ref: 00433DBF
                                            • GetSysColor.USER32(0000000F), ref: 00433DCB
                                            • CreateSolidBrush.GDI32(?), ref: 00433DD4
                                            • GetSysColor.USER32(00000011), ref: 00433DEB
                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                            • SelectObject.GDI32(?,00000000), ref: 00433E0D
                                            • SetBkColor.GDI32(?,?), ref: 00433E19
                                            • SelectObject.GDI32(?,?), ref: 00433E29
                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                            • GetWindowLongW.USER32 ref: 00433E8A
                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                            • GetWindowTextW.USER32(00000000,00000000,00000105), ref: 00433EE1
                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 00433F13
                                            • DrawFocusRect.USER32(?,?), ref: 00433F1F
                                            • GetSysColor.USER32(00000011), ref: 00433F2E
                                            • SetTextColor.GDI32(?,00000000), ref: 00433F36
                                            • DrawTextW.USER32(?,?,000000FF,?,?), ref: 00433F4E
                                            • SelectObject.GDI32(?,?), ref: 00433F63
                                            • DeleteObject.GDI32(?), ref: 00433F70
                                            • SelectObject.GDI32(?,?), ref: 00433F78
                                            • DeleteObject.GDI32(00000000), ref: 00433F7B
                                            • SetTextColor.GDI32(?,?), ref: 00433F83
                                            • SetBkColor.GDI32(?,?), ref: 00433F8F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                            • String ID:
                                            • API String ID: 1582027408-0
                                            • Opcode ID: 697ef1e2b469c7a94178de5208286552364449c38c8500f3df1fcdb24db8d4eb
                                            • Instruction ID: aa454ab644ffbff4d2185aee23397a25bdbdaef3ad5a75b83a3ebbbeed3afe32
                                            • Opcode Fuzzy Hash: 697ef1e2b469c7a94178de5208286552364449c38c8500f3df1fcdb24db8d4eb
                                            • Instruction Fuzzy Hash: 53710570508340AFD304DF68DD88A6FBBF9FF89711F104A2DFA5592290D7B4E9418B6A
                                            APIs
                                            • OpenClipboard.USER32(?), ref: 0046C635
                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
                                            • GetClipboardData.USER32(0000000D), ref: 0046C64F
                                            • CloseClipboard.USER32 ref: 0046C65D
                                            • GlobalLock.KERNEL32(00000000), ref: 0046C688
                                            • CloseClipboard.USER32 ref: 0046C692
                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
                                            • GetClipboardData.USER32(00000001), ref: 0046C6DD
                                            • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
                                            • CloseClipboard.USER32 ref: 0046C866
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
                                            • String ID: HH
                                            • API String ID: 589737431-2761332787
                                            • Opcode ID: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
                                            • Instruction ID: ccec0c76267f611a980a6192e38ed766f4c6ddce8b7f15b38bc446a2cb1d96e7
                                            • Opcode Fuzzy Hash: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
                                            • Instruction Fuzzy Hash: 4D61E5722003019BD310EF65DD86B5E77A8EF54715F00483EFA41E72D1EBB5D9048BAA
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 00456692
                                            • GetDesktopWindow.USER32 ref: 004566AA
                                            • GetWindowRect.USER32(00000000), ref: 004566B1
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0045670D
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00456720
                                            • DestroyWindow.USER32(?), ref: 00456731
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456779
                                            • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00456797
                                            • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567C0
                                            • SendMessageW.USER32(?,00000421,?,?), ref: 004567D8
                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004567EE
                                            • IsWindowVisible.USER32(?), ref: 00456812
                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 0045682E
                                            • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 00456843
                                            • GetWindowRect.USER32(?,?), ref: 0045685C
                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00456880
                                            • GetMonitorInfoW.USER32 ref: 00456894
                                            • CopyRect.USER32(?,?), ref: 004568A8
                                            • SendMessageW.USER32(?,00000412,00000000), ref: 0045690A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$MessageSend$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                            • String ID: ($,$tooltips_class32
                                            • API String ID: 541082891-3320066284
                                            • Opcode ID: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                            • Instruction ID: 3987ef5f26dee50c6234681dd74380f3ee0746d74ffcadc96223edc745891050
                                            • Opcode Fuzzy Hash: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                            • Instruction Fuzzy Hash: 33B18EB0604341AFD714DF64C984B6BB7E5EF88704F408D2DF989A7292D778E848CB5A
                                            APIs
                                            • _wcslen.LIBCMT ref: 00454DCF
                                            • _wcslen.LIBCMT ref: 00454DE2
                                            • __wcsicoll.LIBCMT ref: 00454DEF
                                            • _wcslen.LIBCMT ref: 00454E04
                                            • __wcsicoll.LIBCMT ref: 00454E11
                                            • _wcslen.LIBCMT ref: 00454E24
                                            • __wcsicoll.LIBCMT ref: 00454E31
                                              • Part of subcall function 004115D0: __wcsicmp_l.LIBCMT ref: 00411657
                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00454E65
                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,?,?,?,?,?,?,?,00000000), ref: 00454E79
                                            • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454EB7
                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00454EFB
                                            • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454F2C
                                            • FreeLibrary.KERNEL32(00000000), ref: 00454F37
                                            • ExtractIconExW.SHELL32(?,00000000,00000000,?,00000001), ref: 00454F94
                                            • DestroyIcon.USER32(?), ref: 00454FA2
                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00454FC0
                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00454FCC
                                            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00454FF1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
                                            • String ID: .dll$.exe$.icl
                                            • API String ID: 2511167534-1154884017
                                            • Opcode ID: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                            • Instruction ID: 777b7c61fe84a0ac0f88e3bb9536c5d4e291b97e4b5026f6b39318954af55ba4
                                            • Opcode Fuzzy Hash: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                            • Instruction Fuzzy Hash: D461D9711043016AE620DF659D85F7B73ECEF84B0AF00481EFE81D5182E7B9A989C77A
                                            APIs
                                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00436B4E
                                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000), ref: 00436B73
                                            • _wcslen.LIBCMT ref: 00436B79
                                            • _wcscpy.LIBCMT ref: 00436B9F
                                            • _wcscat.LIBCMT ref: 00436BC0
                                            • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00436BE7
                                            • _wcscat.LIBCMT ref: 00436C2A
                                            • _wcscat.LIBCMT ref: 00436C31
                                            • __wcsicoll.LIBCMT ref: 00436C4B
                                            • _wcsncpy.LIBCMT ref: 00436C62
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                            • API String ID: 1503153545-1459072770
                                            • Opcode ID: 4bf5914395717010b0ea9e2d69638f6034391d2624482ee6cf2f9dbb9f61e865
                                            • Instruction ID: f4118b49cd66f9fee818cdfc0bae26735a4a754b0a3131160812af9443992caa
                                            • Opcode Fuzzy Hash: 4bf5914395717010b0ea9e2d69638f6034391d2624482ee6cf2f9dbb9f61e865
                                            • Instruction Fuzzy Hash: B54115B264020137D200B7269C83EFF735CDE99715F54091FFE45A2253FA2EA69642BE
                                            APIs
                                              • Part of subcall function 004431E0: __time64.LIBCMT ref: 004431EA
                                            • _fseek.LIBCMT ref: 004527FC
                                            • __wsplitpath.LIBCMT ref: 0045285C
                                            • _wcscpy.LIBCMT ref: 00452871
                                            • _wcscat.LIBCMT ref: 00452886
                                            • __wsplitpath.LIBCMT ref: 004528B0
                                            • _wcscat.LIBCMT ref: 004528C8
                                            • _wcscat.LIBCMT ref: 004528DD
                                            • __fread_nolock.LIBCMT ref: 00452914
                                            • __fread_nolock.LIBCMT ref: 00452925
                                            • __fread_nolock.LIBCMT ref: 00452944
                                            • __fread_nolock.LIBCMT ref: 00452955
                                            • __fread_nolock.LIBCMT ref: 00452976
                                            • __fread_nolock.LIBCMT ref: 00452987
                                            • __fread_nolock.LIBCMT ref: 00452998
                                            • __fread_nolock.LIBCMT ref: 004529A9
                                              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                              • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                              • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                            • __fread_nolock.LIBCMT ref: 00452A39
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                            • String ID:
                                            • API String ID: 2054058615-0
                                            • Opcode ID: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                            • Instruction ID: 66779ec6e5012556871fefb3c18d5d4f0449fb8b445ab61f685bb60241e2a5ae
                                            • Opcode Fuzzy Hash: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                            • Instruction Fuzzy Hash: 16C14EB2508340ABD320DF65C881EEBB7E8EFC9714F444D2FF68987241E6799544CBA6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0
                                            • API String ID: 0-4108050209
                                            • Opcode ID: 832d7dfe82571d46151d64c4ba74b7ae12496bc5cddea04242c0c379dd164914
                                            • Instruction ID: a4e6889c8706d2a682ad3cc8acca51b009283e1ae9b51da70db0806919efebf9
                                            • Opcode Fuzzy Hash: 832d7dfe82571d46151d64c4ba74b7ae12496bc5cddea04242c0c379dd164914
                                            • Instruction Fuzzy Hash: 95C104723403416BF3209B64DC46FBBB794EB95321F04453FFA45D62C1EBBA9409876A
                                            APIs
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                            • GetWindowRect.USER32(?,?), ref: 004701EA
                                            • GetClientRect.USER32(?,?), ref: 004701FA
                                            • GetSystemMetrics.USER32(00000007), ref: 00470202
                                            • GetSystemMetrics.USER32(00000008), ref: 00470216
                                            • GetSystemMetrics.USER32(00000004), ref: 00470238
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047026B
                                            • GetSystemMetrics.USER32(00000007), ref: 00470273
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004702A0
                                            • GetSystemMetrics.USER32(00000008), ref: 004702A8
                                            • GetSystemMetrics.USER32(00000004), ref: 004702CF
                                            • SetRect.USER32(?,00000000,00000000,?,?), ref: 004702F1
                                            • AdjustWindowRectEx.USER32(?,?,00000000,000000FF), ref: 00470304
                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 0047033E
                                            • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00470356
                                            • GetClientRect.USER32(?,?), ref: 00470371
                                            • GetStockObject.GDI32(00000011), ref: 00470391
                                            • SendMessageW.USER32(?,00000030,00000000), ref: 0047039D
                                            • SetTimer.USER32(00000000,00000000,00000028,Function_00061E7F), ref: 004703C4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                            • String ID: AutoIt v3 GUI
                                            • API String ID: 867697134-248962490
                                            • Opcode ID: 0d702e1f111dc4b461eb7f98f3a5a74387d5f37c8fb6fd827a42ca67ae032642
                                            • Instruction ID: 96ed3905d942d8c5c267f8207effb08aff50268186fc7250a269a1908d1679c9
                                            • Opcode Fuzzy Hash: 0d702e1f111dc4b461eb7f98f3a5a74387d5f37c8fb6fd827a42ca67ae032642
                                            • Instruction Fuzzy Hash: 27B19F71205301AFD324DF68DD45B6BB7E4FB88710F108A2EFA9587290DBB5E844CB5A
                                            APIs
                                            • SetWindowPos.USER32(004A83D8,00000000,00000000,00000000,00000000,00000000,00000013,004A83D8,?,?), ref: 0044880A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window
                                            • String ID: 0
                                            • API String ID: 2353593579-4108050209
                                            • Opcode ID: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                            • Instruction ID: 13976ff69904029c6bcd7d6129a783336058688c161485e0dcc644b2654616cc
                                            • Opcode Fuzzy Hash: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                            • Instruction Fuzzy Hash: 94B19DB02443419FF324CF14C889BABBBE4EB89744F14491EF991972D1DBB8E845CB5A
                                            APIs
                                            • GetSysColor.USER32 ref: 0044A11D
                                            • GetClientRect.USER32(?,?), ref: 0044A18D
                                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A1A6
                                            • GetWindowDC.USER32(?), ref: 0044A1B3
                                            • GetPixel.GDI32(00000000,?,?), ref: 0044A1C6
                                            • ReleaseDC.USER32(?,00000000), ref: 0044A1D6
                                            • GetSysColor.USER32(0000000F), ref: 0044A1EC
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0044A207
                                            • GetSysColor.USER32(0000000F), ref: 0044A216
                                            • GetSysColor.USER32(00000005), ref: 0044A21E
                                            • GetWindowDC.USER32 ref: 0044A277
                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A28A
                                            • GetPixel.GDI32(00000000,?,00000000), ref: 0044A29F
                                            • GetPixel.GDI32(00000000,00000000,?), ref: 0044A2B4
                                            • GetPixel.GDI32(00000000,?,?), ref: 0044A2D0
                                            • ReleaseDC.USER32(?,00000000), ref: 0044A2D8
                                            • SetTextColor.GDI32(00000000,?), ref: 0044A2F6
                                            • SetBkMode.GDI32(00000000,00000001), ref: 0044A30A
                                            • GetStockObject.GDI32(00000005), ref: 0044A312
                                            • SetBkColor.GDI32(00000000,00000000), ref: 0044A328
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                            • String ID:
                                            • API String ID: 1744303182-0
                                            • Opcode ID: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                            • Instruction ID: f407f88e1fc9bdd08975b2e96734b256c85d8f08b0ead5e1f8dbf5832e348edb
                                            • Opcode Fuzzy Hash: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                            • Instruction Fuzzy Hash: AD6148315442016BE3209B388C88BBFB7A4FB49324F54079EF9A8973D0D7B99C51D76A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __wcsicoll$__wcsnicmp
                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                            • API String ID: 790654849-1810252412
                                            • Opcode ID: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                            • Instruction ID: 1b62209f2aa4de5792947d5a3aa61dcd1c874d3672784017b8f4b2c72f71c34c
                                            • Opcode Fuzzy Hash: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                            • Instruction Fuzzy Hash: 7A3193B1644301A7CA00FA61DC83F5B73A85F54759F100A3FB955B61D6FA6CEA0C862F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: >>>AUTOIT SCRIPT<<<$\
                                            • API String ID: 0-1896584978
                                            • Opcode ID: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
                                            • Instruction ID: e6fbcda15cb9520e0e34bfac0f9750edaedb1b44b840e2dcfb1a2c219c195b9a
                                            • Opcode Fuzzy Hash: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
                                            • Instruction Fuzzy Hash: 907186B2504300ABC720EB65C885FEBB3E8AF94714F148D1FF58997142E679E648C75A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: InitVariant
                                            • String ID:
                                            • API String ID: 1927566239-0
                                            • Opcode ID: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                            • Instruction ID: b17386a2766a1a739d91313a8bf0106a5dd250ff49ec0cac6ee5761d63536315
                                            • Opcode Fuzzy Hash: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                            • Instruction Fuzzy Hash: 87A1F5766146019FC300EF65D88499FB7AAFF85315F408D3EFA49C3211D77AD4098BAA
                                            APIs
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            • GetForegroundWindow.USER32(?,?), ref: 0046D7C1
                                            • GetForegroundWindow.USER32 ref: 0046DBA4
                                            • IsWindow.USER32(?), ref: 0046DBDE
                                            • GetDesktopWindow.USER32 ref: 0046DCB5
                                            • EnumChildWindows.USER32(00000000), ref: 0046DCBC
                                            • EnumWindows.USER32(00460772,?), ref: 0046DCC4
                                              • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop
                                            • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                            • API String ID: 1322021666-1919597938
                                            • Opcode ID: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                            • Instruction ID: 252cd24da08a8cddfda52e39780f3f39bafd894638fb43d2866a45805a666b3e
                                            • Opcode Fuzzy Hash: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                            • Instruction Fuzzy Hash: 96F1C571D143409BCB00EF61C881EAB73A4BF95308F44496FF9456B286E77DE909CB6A
                                            APIs
                                            • GetLocalTime.KERNEL32(?), ref: 0045DED4
                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045DEE4
                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0045DEF0
                                            • _wcsncpy.LIBCMT ref: 0045DF0F
                                            • __wsplitpath.LIBCMT ref: 0045DF54
                                            • _wcscat.LIBCMT ref: 0045DF6C
                                            • _wcscat.LIBCMT ref: 0045DF7E
                                            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0045DF93
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFA7
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFE5
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFFB
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E00D
                                            • _wcscpy.LIBCMT ref: 0045E019
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0045E05F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$Time$File$Local_wcscat$System__wsplitpath_wcscpy_wcsncpy
                                            • String ID: *.*
                                            • API String ID: 3201719729-438819550
                                            • Opcode ID: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                                            • Instruction ID: 9ef8ac46b2ec3f8a2b66e183c5d6435db2730cdd54c1860218fefef83dfd89d7
                                            • Opcode Fuzzy Hash: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                                            • Instruction Fuzzy Hash: D061A7B25043049BC724EF65C881E9FB3E8AF94704F048E1EF98987241DB79E949CB96
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __wcsicoll$IconLoad
                                            • String ID: blank$info$question$stop$warning
                                            • API String ID: 2485277191-404129466
                                            • Opcode ID: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                            • Instruction ID: 3fdcc892c2a25cebf9aff257507665a297d4e16c4260cb8f6e9492a672fb13e0
                                            • Opcode Fuzzy Hash: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                            • Instruction Fuzzy Hash: CB2128B6B08301A7D610A725BC05FDF27489FA8365F004C2BF941E2283F3A8A45583BD
                                            APIs
                                            • CompareStringW.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428611
                                            • GetLastError.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428627
                                            • strncnt.LIBCMT ref: 00428646
                                            • strncnt.LIBCMT ref: 0042865A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: strncnt$CompareErrorLastString
                                            • String ID:
                                            • API String ID: 1776594460-0
                                            • Opcode ID: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                            • Instruction ID: 056e5a993d73ec50dc3c8e072878bb631c9b69e1f80941a2a69bbd8adeb14d7f
                                            • Opcode Fuzzy Hash: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                            • Instruction Fuzzy Hash: 0DA1B131B01225AFDF219F61EC41AAF7BB6AF94340FA4402FF81196251DF3D8891CB58
                                            APIs
                                            • LoadIconW.USER32(?,00000063), ref: 004545DA
                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004545EC
                                            • SetWindowTextW.USER32(?,?), ref: 00454606
                                            • GetDlgItem.USER32(?,000003EA), ref: 0045461F
                                            • SetWindowTextW.USER32(00000000,?), ref: 00454626
                                            • GetDlgItem.USER32(?,000003E9), ref: 00454637
                                            • SetWindowTextW.USER32(00000000,?), ref: 0045463E
                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00454663
                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 0045467D
                                            • GetWindowRect.USER32(?,?), ref: 00454688
                                            • SetWindowTextW.USER32(?,?), ref: 004546FD
                                            • GetDesktopWindow.USER32 ref: 00454708
                                            • GetWindowRect.USER32(00000000), ref: 0045470F
                                            • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 00454760
                                            • GetClientRect.USER32(?,?), ref: 0045476F
                                            • PostMessageW.USER32(?,00000005,00000000,?), ref: 0045479E
                                            • SetTimer.USER32(?,0000040A,?,00000000), ref: 004547E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                            • String ID:
                                            • API String ID: 3869813825-0
                                            • Opcode ID: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                            • Instruction ID: 4e77de65cc6986e78e6be143d0a4b9e7f39e78804b6f4fc71fe9e35dfcfd5046
                                            • Opcode Fuzzy Hash: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                            • Instruction Fuzzy Hash: 8C616D71604701AFD320DF68CD88F2BB7E8AB88709F004E1DF98697691D7B8E849CB55
                                            APIs
                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00458D2D
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00458D3A
                                            • LoadCursorW.USER32(00000000,00007F03), ref: 00458D47
                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00458D54
                                            • LoadCursorW.USER32(00000000,00007F01), ref: 00458D61
                                            • LoadCursorW.USER32(00000000,00007F81), ref: 00458D6E
                                            • LoadCursorW.USER32(00000000,00007F88), ref: 00458D7B
                                            • LoadCursorW.USER32(00000000,00007F80), ref: 00458D88
                                            • LoadCursorW.USER32(00000000,00007F86), ref: 00458D95
                                            • LoadCursorW.USER32(00000000,00007F83), ref: 00458DA2
                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00458DAF
                                            • LoadCursorW.USER32(00000000,00007F82), ref: 00458DBC
                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00458DC9
                                            • LoadCursorW.USER32(00000000,00007F04), ref: 00458DD6
                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00458DE3
                                            • LoadCursorW.USER32(00000000,00007F89), ref: 00458DF0
                                            • GetCursorInfo.USER32 ref: 00458E03
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Cursor$Load$Info
                                            • String ID:
                                            • API String ID: 2577412497-0
                                            • Opcode ID: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                            • Instruction ID: 36b4ee280ed0253346847529aeb00c95e660e1b7f2a6688567eec4957a26740b
                                            • Opcode Fuzzy Hash: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                            • Instruction Fuzzy Hash: D9311671E4C3156AE7509F758C5AB1BBEE0AF40B54F004D2FF2889F2D1DAB9E4448B86
                                            APIs
                                            • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 004696CC
                                            • GetFocus.USER32 ref: 004696E0
                                            • GetDlgCtrlID.USER32(00000000), ref: 004696EB
                                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046973F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessagePost$CtrlFocus
                                            • String ID: 0
                                            • API String ID: 1534620443-4108050209
                                            • Opcode ID: 3dab727c688772619e9efc5d23afb6fcae73775eddc560d175f3e695e52b8611
                                            • Instruction ID: 7d80af5808d25915b866e76daf530f36ef8b085de22dc1c7fc8dbb607ae8adb7
                                            • Opcode Fuzzy Hash: 3dab727c688772619e9efc5d23afb6fcae73775eddc560d175f3e695e52b8611
                                            • Instruction Fuzzy Hash: 1591E1B1604301ABD710DF14D884BABB7A8FB89714F004A1EF99497391E7B4DC49CBAB
                                            APIs
                                            • _memset.LIBCMT ref: 00468107
                                            • GetMenuItemInfoW.USER32(?,00000007,00000000,?), ref: 00468190
                                            • GetMenuItemCount.USER32(?), ref: 00468227
                                            • DeleteMenu.USER32(?,00000005,00000000), ref: 004682B8
                                            • DeleteMenu.USER32(?,00000004,00000000), ref: 004682C1
                                            • DeleteMenu.USER32(?,00000006,00000000,?,00000004,00000000), ref: 004682CA
                                            • DeleteMenu.USER32(00000000,00000003,00000000,?,00000006,00000000,?,00000004,00000000), ref: 004682D3
                                            • GetMenuItemCount.USER32 ref: 004682DC
                                            • SetMenuItemInfoW.USER32 ref: 00468317
                                            • GetCursorPos.USER32(00000000), ref: 00468322
                                            • SetForegroundWindow.USER32(?), ref: 0046832D
                                            • TrackPopupMenuEx.USER32(?,00000000,00000000,00000006,?,00000000,?,?,00000006,00000000,?,00000004,00000000), ref: 00468345
                                            • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468352
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                            • String ID: 0
                                            • API String ID: 3993528054-4108050209
                                            • Opcode ID: 96134d5ccf85dd2c353584f61e992c1258bc53944db1005dc2f45aa542165571
                                            • Instruction ID: a450cccb4b36e122d1eca3afa35c85d1e57e2007e4dd5bc50ce81cada7f4397f
                                            • Opcode Fuzzy Hash: 96134d5ccf85dd2c353584f61e992c1258bc53944db1005dc2f45aa542165571
                                            • Instruction Fuzzy Hash: 3C71C070648301ABE3309B14CC49F5BB7E8BF86724F244B0EF5A5563D1DBB9A8458B1B
                                            APIs
                                            • DragQueryPoint.SHELL32(?,?), ref: 0046F2DA
                                              • Part of subcall function 00441CB4: ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                              • Part of subcall function 00441CB4: GetWindowRect.USER32(?,?), ref: 00441D5A
                                              • Part of subcall function 00441CB4: PtInRect.USER32(?,?,?), ref: 00441D6F
                                            • SendMessageW.USER32(?), ref: 0046F34C
                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0046F355
                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0046F37F
                                            • _wcscat.LIBCMT ref: 0046F3BC
                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0046F3D1
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0046F3E3
                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F3F1
                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F40E
                                            • DragFinish.SHELL32(?), ref: 0046F414
                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0046F4FC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                            • API String ID: 4085615965-3440237614
                                            • Opcode ID: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                            • Instruction ID: d92027b63b9478c52a8b17f069484fb886a707b260a555cedefccfc898d4b85d
                                            • Opcode Fuzzy Hash: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                            • Instruction Fuzzy Hash: 596170716043009BD700EF54D885E5FB7A8FFC9714F104A2EF99097291D7B8A949CBAA
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                            • API String ID: 3832890014-4202584635
                                            • Opcode ID: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                            • Instruction ID: bf73cd225697d97a5a257e466bf5c8c79b4efa22739c650e03c6b1f9c6e9338c
                                            • Opcode Fuzzy Hash: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                            • Instruction Fuzzy Hash: 1D01616160562122FE11322A7C03BDF15898F5139AF14447BFC05F1282FF4DDA8692EE
                                            APIs
                                            • _memset.LIBCMT ref: 004669C4
                                            • _wcsncpy.LIBCMT ref: 00466A21
                                            • _wcsncpy.LIBCMT ref: 00466A4D
                                              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                            • _wcstok.LIBCMT ref: 00466A90
                                              • Part of subcall function 004142A3: __getptd.LIBCMT ref: 004142A9
                                            • _wcstok.LIBCMT ref: 00466B3F
                                            • _wcscpy.LIBCMT ref: 00466BC8
                                            • GetOpenFileNameW.COMDLG32(00000058), ref: 00466CFE
                                            • _wcslen.LIBCMT ref: 00466D1D
                                            • _memset.LIBCMT ref: 00466BEE
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            • _wcslen.LIBCMT ref: 00466D4B
                                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00466D9E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcslen$FileName_memset_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                            • String ID: X$HH
                                            • API String ID: 3021350936-1944015008
                                            • Opcode ID: b06cb37d3db4ad53d3a41f94d3d7a052046d00add24c9c6de48b5fd017d77e84
                                            • Instruction ID: 73e83d7ea4d12cbe09e247b0b8120e99e9ae8af51722f6ce2f45a1bbad6557a4
                                            • Opcode Fuzzy Hash: b06cb37d3db4ad53d3a41f94d3d7a052046d00add24c9c6de48b5fd017d77e84
                                            • Instruction Fuzzy Hash: D1C1B2715043408BC714EF65C981A9FB3E4BF84304F15892FF949AB292EB78E905CB9B
                                            APIs
                                            • _memset.LIBCMT ref: 0045F4AE
                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F519
                                            • SetMenuItemInfoW.USER32(00000008,00000004,00000000,?), ref: 0045F556
                                            • Sleep.KERNEL32(000001F4,?,?,00000000,?), ref: 0045F568
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: InfoItemMenu$Sleep_memset
                                            • String ID: 0
                                            • API String ID: 1504565804-4108050209
                                            • Opcode ID: d1fae1760d081b6b8cddc0049297ea6fd0734e9abca2e90a1ac85592b3d85e38
                                            • Instruction ID: 9e8996cb251b45e9fd8013479734a73363ce4640cf951279a7d2fdadd0934edb
                                            • Opcode Fuzzy Hash: d1fae1760d081b6b8cddc0049297ea6fd0734e9abca2e90a1ac85592b3d85e38
                                            • Instruction Fuzzy Hash: E171E3711043406BD3109F54DD48FABBBE8EBD5306F04086FFD8587252D6B9A94EC76A
                                            APIs
                                            • DestroyWindow.USER32(?,004A83D8,?), ref: 00455800
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 00455847
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$CreateDestroy
                                            • String ID: ,$tooltips_class32
                                            • API String ID: 1109047481-3856767331
                                            • Opcode ID: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                            • Instruction ID: af4df8b80438f92fd5356fe82daba85812243c44dff517d7eb602cf52e2cfce3
                                            • Opcode Fuzzy Hash: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                            • Instruction Fuzzy Hash: BF719075244704AFE320DB28CC85F7B77E4EB89700F50491EFA8197391E6B5E905CB59
                                            APIs
                                            • _wcsncpy.LIBCMT ref: 0045CCFA
                                            • __wsplitpath.LIBCMT ref: 0045CD3C
                                            • _wcscat.LIBCMT ref: 0045CD51
                                            • _wcscat.LIBCMT ref: 0045CD63
                                            • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,00000104,?), ref: 0045CD78
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000104,?), ref: 0045CD8C
                                              • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                            • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDD0
                                            • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDE6
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDF8
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0045CE08
                                            • _wcscpy.LIBCMT ref: 0045CE14
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CE5A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                            • String ID: *.*
                                            • API String ID: 1153243558-438819550
                                            • Opcode ID: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                            • Instruction ID: 4b7f18f3392d5c51d0b0bcfc25b88d1348604f1c1aa494fd035d881d108a9fe9
                                            • Opcode Fuzzy Hash: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                            • Instruction Fuzzy Hash: 0561E5B61043419FD731EF54C885AEBB7E4EB84305F44882FED8983242D67D998E879E
                                            APIs
                                            • _memset.LIBCMT ref: 00455127
                                            • GetMenuItemInfoW.USER32 ref: 00455146
                                            • DeleteMenu.USER32(?,?,00000000), ref: 004551B2
                                            • DeleteMenu.USER32(?,?,00000000), ref: 004551C8
                                            • GetMenuItemCount.USER32(?), ref: 004551D9
                                            • SetMenu.USER32(?,00000000), ref: 004551E7
                                            • DestroyMenu.USER32(?,?,00000000), ref: 004551F4
                                            • DrawMenuBar.USER32 ref: 00455207
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow_memset
                                            • String ID: 0
                                            • API String ID: 1663942905-4108050209
                                            • Opcode ID: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                            • Instruction ID: b4bdd7d0bd4ee66815c45afb4cba49e6688c1fb7c5fb2b704b87d0eb3faa17d4
                                            • Opcode Fuzzy Hash: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                            • Instruction Fuzzy Hash: F4413B70600A01AFD715DF24D9A8B6B77A8BF44302F40891DFD49CB292DB78EC44CBA9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __get_daylight__invoke_watson$__gmtime64_s$__getptd_noexit
                                            • String ID:
                                            • API String ID: 1481289235-0
                                            • Opcode ID: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                            • Instruction ID: 11750150b5911b8a2d77b888e51b7102539fbc40f42687a9f62e69b5342e6946
                                            • Opcode Fuzzy Hash: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                            • Instruction Fuzzy Hash: 8461B372B00B15DBD724AB69DC81AEB73E99F84324F14452FF011D7682EB78DA808B58
                                            APIs
                                            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 0046FB61
                                            • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 0046FB7A
                                            • SendMessageW.USER32 ref: 0046FBAF
                                            • SendMessageW.USER32 ref: 0046FBE2
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001), ref: 0046FC1B
                                            • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0046FC3E
                                            • ImageList_Create.COMCTL32(00000020,00000020,00000021,?,00000001), ref: 0046FC51
                                            • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 0046FC73
                                            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FC97
                                            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FCA5
                                            • SendMessageW.USER32 ref: 0046FD00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$IconImageList_$CreateExtractReplace
                                            • String ID:
                                            • API String ID: 2632138820-0
                                            • Opcode ID: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                            • Instruction ID: f8b2170a3f6480226351c2682443129a31dd3945ebd2779c8b18a40e734619f9
                                            • Opcode Fuzzy Hash: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                            • Instruction Fuzzy Hash: A461BF70208305AFD320DF14DC85F5BB7E4FB89B14F10492EFA85972D1E7B4A8498B66
                                            APIs
                                            • LoadCursorW.USER32(00000000,00007F89), ref: 00433BC7
                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00433BDE
                                            • LoadCursorW.USER32(00000000,00007F03), ref: 00433BF5
                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00433C0C
                                            • LoadCursorW.USER32(00000000,00007F01), ref: 00433C23
                                            • LoadCursorW.USER32(00000000,00007F88), ref: 00433C3A
                                            • LoadCursorW.USER32(00000000,00007F86), ref: 00433C51
                                            • LoadCursorW.USER32(00000000,00007F83), ref: 00433C68
                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00433C7F
                                            • LoadCursorW.USER32(00000000,00007F82), ref: 00433C96
                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00433CAD
                                            • LoadCursorW.USER32(00000000,00007F04), ref: 00433CC4
                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00433CDB
                                            • LoadCursorW.USER32(00000000,00000000), ref: 00433CEF
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00433D06
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CursorLoad
                                            • String ID:
                                            • API String ID: 3238433803-0
                                            • Opcode ID: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                            • Instruction ID: acd63d7325575073817552101614e6badc0a76bef24473f745c9da0ba21645f6
                                            • Opcode Fuzzy Hash: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                            • Instruction Fuzzy Hash: 6D310E3058C302FFE7504F50EE0AB1C36A0BB48B47F008C7DF64AA62E0E6F055009B9A
                                            APIs
                                            • GetClassNameW.USER32(?,?,00000100), ref: 00460AF5
                                            • _wcslen.LIBCMT ref: 00460B00
                                            • __swprintf.LIBCMT ref: 00460B9E
                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00460C11
                                            • GetClassNameW.USER32(?,?,00000400), ref: 00460C8E
                                            • GetDlgCtrlID.USER32(?), ref: 00460CE6
                                            • GetWindowRect.USER32(?,?), ref: 00460D21
                                            • GetParent.USER32(?), ref: 00460D40
                                            • ScreenToClient.USER32(00000000), ref: 00460D47
                                            • GetClassNameW.USER32(?,?,00000100), ref: 00460DBE
                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00460DFB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                            • String ID: %s%u
                                            • API String ID: 1899580136-679674701
                                            • Opcode ID: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                            • Instruction ID: ed0b46c26cbb3f928a943cd91895a09858176ee0e89b0f6962e21683ef9d2041
                                            • Opcode Fuzzy Hash: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                            • Instruction Fuzzy Hash: 3AA1CD722043019BDB14DF54C884BEB73A8FF84714F04892EFD889B245E778E946CBA6
                                            APIs
                                            • CoTaskMemFree.OLE32(?), ref: 0047D6D3
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            • StringFromCLSID.OLE32(?,?), ref: 0047D6B5
                                              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                            • StringFromIID.OLE32(?,?), ref: 0047D7F0
                                            • CoTaskMemFree.OLE32(?), ref: 0047D80A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: FreeFromStringTask_wcslen$_wcscpy
                                            • String ID: 0vH$CLSID\$Interface\$ProgID$ToolBoxBitmap32$inprocserver32$localserver32$HH
                                            • API String ID: 2485709727-934586222
                                            • Opcode ID: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                            • Instruction ID: 9b1d76abf7044590dd80f2c514dab21f357569e7696d0ed80310904c07b122bf
                                            • Opcode Fuzzy Hash: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                            • Instruction Fuzzy Hash: 63714BB5614201AFC304EF25C981D5BB3F8BF88704F108A2EF5599B351DB78E905CB6A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcscpy$Folder_memset$BrowseDesktopFromInitializeListMallocPathUninitialize
                                            • String ID: HH
                                            • API String ID: 3381189665-2761332787
                                            • Opcode ID: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                            • Instruction ID: 9856a5a3be2a6f4b6f15ab218c20ab076772672eb14c4daba281b2e598c2a196
                                            • Opcode Fuzzy Hash: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                            • Instruction Fuzzy Hash: E1619AB59043009FC320EF65C88499BB7E9BFC8704F048E1EF98987252D775E849CB6A
                                            APIs
                                            • GetDC.USER32(00000000), ref: 00434585
                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00434590
                                            • CreateCompatibleDC.GDI32(00000000), ref: 0043459B
                                            • SelectObject.GDI32(00000000,?), ref: 004345A9
                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00434618
                                            • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00434665
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                            • String ID: (
                                            • API String ID: 3300687185-3887548279
                                            • Opcode ID: f1a61bd92dc1e5bf4a907c179000b9c6a14a2e3466c3eeb116f883cf8bb2fa69
                                            • Instruction ID: a007e7ec8c3f390601fcb6226b5fc218b62818acb39bbc9fe8cd9ddeb27b86ed
                                            • Opcode Fuzzy Hash: f1a61bd92dc1e5bf4a907c179000b9c6a14a2e3466c3eeb116f883cf8bb2fa69
                                            • Instruction Fuzzy Hash: E4514871508345AFD310CF69C884B6BBBE9EF8A310F14881DFA9687390D7B5E844CB66
                                            APIs
                                            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E463
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E480
                                            • __swprintf.LIBCMT ref: 0045E4D9
                                            • _printf.LIBCMT ref: 0045E595
                                            • _printf.LIBCMT ref: 0045E5B7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: LoadString_printf$__swprintf_wcslen
                                            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR $HH
                                            • API String ID: 3590180749-2894483878
                                            • Opcode ID: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                            • Instruction ID: 42a5c2f6345f2e10047da6565a111f96cfad8617a22bea28fc44504b1d19b7ce
                                            • Opcode Fuzzy Hash: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                            • Instruction Fuzzy Hash: 9F51A171518345ABD324EF91CC41DAF77A8AF84754F04093FF94463292EB78EE488B6A
                                            APIs
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0046F911
                                            • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 0046F929
                                            • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 0046F942
                                            • DeleteObject.GDI32(?), ref: 0046F950
                                            • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,00000000,00000000,00000000,00002010,?,000000F0), ref: 0046F95E
                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9A8
                                            • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 0046F9C1
                                            • DeleteObject.GDI32(?), ref: 0046F9CF
                                            • DestroyIcon.USER32(?,?,000000F7,00000001,00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9DD
                                            • ExtractIconExW.SHELL32(?,?,?,000000FF,00000001), ref: 0046FA1D
                                            • DestroyIcon.USER32(?), ref: 0046FA4F
                                            • SendMessageW.USER32(?,000000F7,00000001,?), ref: 0046FA5A
                                            • DeleteObject.GDI32(?), ref: 0046FA68
                                            • DestroyIcon.USER32(?,?,000000F7,00000001,?), ref: 0046FA76
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Icon$Destroy$DeleteMessageObjectSend$ImageLoad$ExtractLongWindow
                                            • String ID:
                                            • API String ID: 3412594756-0
                                            • Opcode ID: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                            • Instruction ID: 2b127e2e725f503062080ad48664a75956f0b49bd2ac624c91da1236fc619d99
                                            • Opcode Fuzzy Hash: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                            • Instruction Fuzzy Hash: BD41B575344301ABE7209B65ED45B6B7398EB44711F00083EFA85A7381DBB9E809C76A
                                            APIs
                                              • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
                                              • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                            • GetDriveTypeW.KERNEL32 ref: 0045DA30
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DA76
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DAAB
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DADF
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: SendString$_wcslen$BuffCharDriveLowerType
                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                            • API String ID: 4013263488-4113822522
                                            • Opcode ID: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                            • Instruction ID: 78e8968fe3d68f28a61334a0544e46eb3ade7c09d07056eb4a028b8014bab4f9
                                            • Opcode Fuzzy Hash: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                            • Instruction Fuzzy Hash: 86516E71604300ABD710EF55CC85F5EB3E4AF88714F14496EF985AB2D2D7B8E908CB5A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcslen$_wcsncpy$LocalTime__wcstoi64
                                            • String ID:
                                            • API String ID: 228034949-0
                                            • Opcode ID: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                            • Instruction ID: c9113392db11e6d0b84b7dcaf0f9983ae7bcdcfbf3325debe08446cd55f13bc3
                                            • Opcode Fuzzy Hash: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                            • Instruction Fuzzy Hash: 874194B181435066DA10FF6AC8479DFB3A8EF89314F84495FF945D3162E378E64883AA
                                            APIs
                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,0046FAD5), ref: 004334F4
                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043350F
                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043351A
                                            • GlobalLock.KERNEL32(00000000), ref: 00433523
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433533
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0043353A
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433541
                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043354F
                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,?), ref: 00433568
                                            • GlobalFree.KERNEL32(00000000), ref: 0043357B
                                            • GetObjectW.GDI32(?,00000018,?), ref: 004335A6
                                            • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004335DB
                                            • DeleteObject.GDI32(?), ref: 00433603
                                            • SendMessageW.USER32(?,00000172,00000000,?), ref: 0043361B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                            • String ID:
                                            • API String ID: 3969911579-0
                                            • Opcode ID: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                            • Instruction ID: 5aed18668fdc988692497ed4484016cc97142e8c7c748bcd34b77a3330007e11
                                            • Opcode Fuzzy Hash: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                            • Instruction Fuzzy Hash: 70410471204210AFD710DF64DC88F6BBBE8FB89711F10492DFA45972A0D7B5A941CBAA
                                            APIs
                                            • GetParent.USER32 ref: 00445A8D
                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00445AA0
                                            • __wcsicoll.LIBCMT ref: 00445AC4
                                            • __wcsicoll.LIBCMT ref: 00445AE0
                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445B3D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __wcsicoll$ClassMessageNameParentSend
                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                            • API String ID: 3125838495-3381328864
                                            • Opcode ID: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                            • Instruction ID: 9ea7b4bfd8e333fc3d4c3d1cc69785ca983c3453aa66f955cff8de8c622a02b1
                                            • Opcode Fuzzy Hash: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                            • Instruction Fuzzy Hash: F011E9B1B40301BBFF10B6659C46EAF739CDF94759F00081BFD44E6182F6ACA9458769
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CopyVariant$ErrorLast
                                            • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
                                            • API String ID: 2286883814-4206948668
                                            • Opcode ID: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                                            • Instruction ID: 5c76bcf0434180a49ef26f8382d3619d889c8a8ee3f63882ad125ac36acecb62
                                            • Opcode Fuzzy Hash: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                                            • Instruction Fuzzy Hash: 4EA1F0B1644300ABD620EB25CC81EABB3E9FBC4704F10891EF65987251D779E945CBAA
                                            APIs
                                              • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
                                              • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                            • GetDriveTypeW.KERNEL32(?,?,00000061), ref: 00475EEC
                                            • _wcscpy.LIBCMT ref: 00475F18
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                            • String ID: a$all$cdrom$fixed$network$ramdisk$removable$unknown$HH
                                            • API String ID: 3052893215-4176887700
                                            • Opcode ID: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                            • Instruction ID: 30c0e749cffa51fc832ec364bb88d57898ea161693411a08ebb212f54f1b1ce2
                                            • Opcode Fuzzy Hash: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                            • Instruction Fuzzy Hash: E951E5716047009BC710EF51D981B9BB3D4AB85705F108C2FF948AB382D7B9DE09879B
                                            APIs
                                            • StringFromIID.OLE32(?,?,00000003,?,?,00000000), ref: 004582E5
                                              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            • CoTaskMemFree.OLE32(?,00000000), ref: 00458335
                                            • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 00458351
                                            • RegQueryValueExW.ADVAPI32 ref: 00458381
                                            • CLSIDFromString.OLE32(00000000,?), ref: 004583AF
                                            • RegQueryValueExW.ADVAPI32 ref: 004583E8
                                            • LoadRegTypeLib.OLEAUT32(?,?), ref: 00458486
                                              • Part of subcall function 00413F97: __wtof_l.LIBCMT ref: 00413FA1
                                            • RegCloseKey.ADVAPI32(?), ref: 004584BA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: FromQueryStringValue_wcslen$CloseFreeLoadOpenTaskType__wtof_l_wcscpy
                                            • String ID: Version$\TypeLib$interface\
                                            • API String ID: 656856066-939221531
                                            • Opcode ID: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                            • Instruction ID: 73379605cfaaf105ee685c6daddaf2c4824f5dc828714578f474d0d05c7db838
                                            • Opcode Fuzzy Hash: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                            • Instruction Fuzzy Hash: 19513B715083059BD310EF55D944A6FB3E8FFC8B08F004A2DF985A7251EA78DD09CB9A
                                            APIs
                                            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E676
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E69A
                                            • __swprintf.LIBCMT ref: 0045E6EE
                                            • _printf.LIBCMT ref: 0045E7A9
                                            • _printf.LIBCMT ref: 0045E7D2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: LoadString_printf$__swprintf_wcslen
                                            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                            • API String ID: 3590180749-2354261254
                                            • Opcode ID: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                            • Instruction ID: 835382aeb01427732dc6b750cf2ba574ed77461063debdd42288bdc21f9728b4
                                            • Opcode Fuzzy Hash: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                            • Instruction Fuzzy Hash: B051D5715143019BD324FB51CC41EAF77A8AF84354F14093FF94563292DB78AE49CB6A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __swprintf_wcscpy$__i64tow__itow
                                            • String ID: %.15g$0x%p$False$True
                                            • API String ID: 3038501623-2263619337
                                            • Opcode ID: 19a4eb4a0385f4e3e29933f3f54d071d1af3cac5b39b122aee5b24a105b2230c
                                            • Instruction ID: 2d826072eebb3cc9b8b6a8fde8b9da0ebc7f558755c715a4a51c402ed3db85ba
                                            • Opcode Fuzzy Hash: 19a4eb4a0385f4e3e29933f3f54d071d1af3cac5b39b122aee5b24a105b2230c
                                            • Instruction Fuzzy Hash: 5741E5B2504204ABD700EF35EC06EAB73A4EB95304F04892FFD0997282F67DD619976E
                                            APIs
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            • _memset.LIBCMT ref: 00458194
                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004581D6
                                            • RegConnectRegistryW.ADVAPI32(?,80000002,00000000), ref: 004581F4
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,00000000), ref: 00458219
                                            • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,?), ref: 00458248
                                            • CLSIDFromString.OLE32(00000000,?), ref: 00458279
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0045828F
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00458296
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset_wcslen
                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                            • API String ID: 2255324689-22481851
                                            • Opcode ID: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                            • Instruction ID: 0916ae95de1959dc40878de41837780f7e862baf069d4d5c3429810960799c2e
                                            • Opcode Fuzzy Hash: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                            • Instruction Fuzzy Hash: 4A4190725083019BD320EF54C845B5FB7E8AF84714F044D2EFA8577291DBB8E949CB9A
                                            APIs
                                            • RegOpenKeyExW.ADVAPI32(80000000,interface,00000000,00020019,?), ref: 00458513
                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00458538
                                            • RegCloseKey.ADVAPI32(?), ref: 00458615
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,000001FE,interface\), ref: 0045858A
                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000028), ref: 004585A8
                                            • __wcsicoll.LIBCMT ref: 004585D6
                                            • IIDFromString.OLE32(?,?,?,?), ref: 004585EB
                                            • RegCloseKey.ADVAPI32(?), ref: 004585F8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CloseOpen$EnumFromQueryStringValue__wcsicoll_wcslen
                                            • String ID: ($interface$interface\
                                            • API String ID: 2231185022-3327702407
                                            • Opcode ID: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                            • Instruction ID: 2ed788c9a442d2de66cb2a0eaf665167c450c6ff9570aaff4df7cfaf3afbbce1
                                            • Opcode Fuzzy Hash: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                            • Instruction Fuzzy Hash: CE317271204305ABE710DF54DD85F6BB3E8FB84744F10492DF685A6191EAB8E908C76A
                                            APIs
                                            • WSAStartup.WSOCK32(00000101,?), ref: 004365A5
                                            • gethostname.WSOCK32(00000100,00000100,00000101,?), ref: 004365BC
                                            • gethostbyname.WSOCK32(00000101,00000100,00000100,00000101,?), ref: 004365C6
                                            • _wcscpy.LIBCMT ref: 004365F5
                                            • WSACleanup.WSOCK32 ref: 004365FD
                                            • inet_ntoa.WSOCK32(00000100,?), ref: 00436624
                                            • _strcat.LIBCMT ref: 0043662F
                                            • _wcscpy.LIBCMT ref: 00436644
                                            • WSACleanup.WSOCK32(?,?,?,?,?,?,00000100,?), ref: 00436652
                                            • _wcscpy.LIBCMT ref: 00436666
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcscpy$Cleanup$Startup_strcatgethostbynamegethostnameinet_ntoa
                                            • String ID: 0.0.0.0
                                            • API String ID: 2691793716-3771769585
                                            • Opcode ID: 72edaa20f59d4c855ae2a4057bf2e912041bb0bcae33cfe0ba1e7234a9852c49
                                            • Instruction ID: 29d249c793a1599df1911ffab6ed89036a29d54f41df1114d8fa63e2d2305339
                                            • Opcode Fuzzy Hash: 72edaa20f59d4c855ae2a4057bf2e912041bb0bcae33cfe0ba1e7234a9852c49
                                            • Instruction Fuzzy Hash: 5C21D4726003016BD620FB269C42FFF33A89FD4318F54492FF64456242EABDD58983AB
                                            APIs
                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048C968,0000000C,00416C4D,00000000,00000000,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B24
                                            • __crt_waiting_on_module_handle.LIBCMT ref: 00416B2F
                                              • Part of subcall function 0041177F: Sleep.KERNEL32(000003E8,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 0041178B
                                              • Part of subcall function 0041177F: GetModuleHandleW.KERNEL32(00411739,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00411794
                                            • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00416B58
                                            • GetProcAddress.KERNEL32(00411739,DecodePointer), ref: 00416B68
                                            • __lock.LIBCMT ref: 00416B8A
                                            • InterlockedIncrement.KERNEL32(00EA60FF), ref: 00416B97
                                            • __lock.LIBCMT ref: 00416BAB
                                            • ___addlocaleref.LIBCMT ref: 00416BC9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                            • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                            • API String ID: 1028249917-2843748187
                                            • Opcode ID: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                            • Instruction ID: dfb830706c011728ae11a8c0f52cb2fa371409e71f4acd403326aacb15a29bdd
                                            • Opcode Fuzzy Hash: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                            • Instruction Fuzzy Hash: 4E119671944701AFD720EF76C905B9EBBE0AF00714F10495FE469A6391DB78A580CB1D
                                            APIs
                                            • SendMessageW.USER32(?,00000000,000000FF,?), ref: 0044931D
                                            • SendMessageW.USER32(?,0045BBB0,00000000,00000000), ref: 0044932D
                                            • CharNextW.USER32(?,?,?,?,0045BBB0,00000000,00000000,?,?), ref: 00449361
                                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449375
                                            • SendMessageW.USER32(?,00000402,?), ref: 0044941C
                                            • SendMessageW.USER32(004A83D8,000000C2,00000001,?), ref: 004494A0
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449515
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$CharNext
                                            • String ID:
                                            • API String ID: 1350042424-0
                                            • Opcode ID: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                            • Instruction ID: cf19a455924c4199ae2d31ef2e344bdd2865620a2145bd440d1f5c61272ee54d
                                            • Opcode Fuzzy Hash: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                            • Instruction Fuzzy Hash: 5D81B5312083019BE720DF15DC85FBBB7E4EBD9B20F00492EFA54962C0D7B99946D766
                                            APIs
                                            • GetKeyboardState.USER32(?,?,00000000), ref: 00453C0D
                                            • SetKeyboardState.USER32(?), ref: 00453C5A
                                            • GetAsyncKeyState.USER32(000000A0), ref: 00453C82
                                            • GetKeyState.USER32(000000A0), ref: 00453C99
                                            • GetAsyncKeyState.USER32(000000A1), ref: 00453CC9
                                            • GetKeyState.USER32(000000A1), ref: 00453CDA
                                            • GetAsyncKeyState.USER32(00000011), ref: 00453D07
                                            • GetKeyState.USER32(00000011), ref: 00453D15
                                            • GetAsyncKeyState.USER32(00000012), ref: 00453D3F
                                            • GetKeyState.USER32(00000012), ref: 00453D4D
                                            • GetAsyncKeyState.USER32(0000005B), ref: 00453D77
                                            • GetKeyState.USER32(0000005B), ref: 00453D85
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                            • Instruction ID: 09d2c23b2f41f951af40c960ff4fa7a39ed3d74d48f5bb091813d5d41b5bf946
                                            • Opcode Fuzzy Hash: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                            • Instruction Fuzzy Hash: BD5108311497C42AF731EF6048217A7BBE45F52782F488D5EE9C107283E619AB0C976B
                                            APIs
                                            • GetDlgItem.USER32(?,00000001), ref: 00437DD7
                                            • GetWindowRect.USER32(00000000,?), ref: 00437DE9
                                            • MoveWindow.USER32(00000000,0000000A,?,?,?,00000000), ref: 00437E5C
                                            • GetDlgItem.USER32(?,00000002), ref: 00437E70
                                            • GetWindowRect.USER32(00000000,?), ref: 00437E82
                                            • MoveWindow.USER32(00000000,?,00000000,?,?,00000000), ref: 00437EDB
                                            • GetDlgItem.USER32(?,000003E9), ref: 00437EEA
                                            • GetWindowRect.USER32(00000000,?), ref: 00437EFC
                                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00437F46
                                            • GetDlgItem.USER32(?,000003EA), ref: 00437F55
                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 00437F6E
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00437F78
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$ItemMoveRect$Invalidate
                                            • String ID:
                                            • API String ID: 3096461208-0
                                            • Opcode ID: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                            • Instruction ID: 6334a21bf5495bf578199e0a0c43900503e40640961724061e29feeedb49a886
                                            • Opcode Fuzzy Hash: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                            • Instruction Fuzzy Hash: 46511CB16083069FC318DF68DD85A2BB7E9ABC8300F144A2DF985D3391E6B4ED058B95
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                            • String ID:
                                            • API String ID: 136442275-0
                                            • Opcode ID: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                            • Instruction ID: e47e2093bf76b35e8f1fec89578fc46911e8a4506192668d3a16ce6d5165f020
                                            • Opcode Fuzzy Hash: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                            • Instruction Fuzzy Hash: 744124B2408345ABC235E754C885EEF73ECABD8314F44891EB68D42141EB796688C7A7
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B479
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ConnectRegistry_wcslen
                                            • String ID: HH
                                            • API String ID: 535477410-2761332787
                                            • Opcode ID: e91c6bd909ad74ed1928ed0244ed8aa8a8dc52ba60fb0b240039b69f8a910896
                                            • Instruction ID: 7a368be733395892e28f24b11b3b05e85d853a2cd395d98498a1c99032eed9d9
                                            • Opcode Fuzzy Hash: e91c6bd909ad74ed1928ed0244ed8aa8a8dc52ba60fb0b240039b69f8a910896
                                            • Instruction Fuzzy Hash: 63E171B1604200ABC714EF28C981F1BB7E4EF88704F148A1EF685DB381D779E945CB9A
                                            APIs
                                            • GetClassNameW.USER32(?,?,00000400), ref: 004604B5
                                            • GetWindowTextW.USER32(?,?,00000400), ref: 004604F1
                                            • _wcslen.LIBCMT ref: 00460502
                                            • CharUpperBuffW.USER32(?,00000000), ref: 00460510
                                            • GetClassNameW.USER32(?,?,00000400), ref: 00460589
                                            • GetWindowTextW.USER32(?,?,00000400), ref: 004605C2
                                            • GetClassNameW.USER32(?,?,00000400), ref: 00460606
                                            • GetClassNameW.USER32(?,?,00000400), ref: 0046063E
                                            • GetWindowRect.USER32(?,?), ref: 004606AD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen
                                            • String ID: ThumbnailClass
                                            • API String ID: 4123061591-1241985126
                                            • Opcode ID: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                            • Instruction ID: b645ef8d54a60b7d8a856e9fdf4d8999e4c56e3b903fe9b51be5921097eabf2a
                                            • Opcode Fuzzy Hash: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                            • Instruction Fuzzy Hash: 3F91B0715043019FDB14DF24C884BAB77A8EF84715F04896FFD85AA281E778E905CBAB
                                            APIs
                                              • Part of subcall function 00456354: GetCursorPos.USER32(004A83D8), ref: 0045636A
                                              • Part of subcall function 00456354: ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                              • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563D0
                                              • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563DC
                                            • DefDlgProcW.USER32(?,00000205,?,?,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F55F
                                            • ImageList_DragLeave.COMCTL32(00000000,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F57D
                                            • ImageList_EndDrag.COMCTL32 ref: 0046F583
                                            • ReleaseCapture.USER32 ref: 0046F589
                                            • SetWindowTextW.USER32(?,00000000), ref: 0046F620
                                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0046F630
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                            • String ID: @GUI_DRAGFILE$@GUI_DROPID$HH
                                            • API String ID: 2483343779-2060113733
                                            • Opcode ID: b963958ab96ed52e1c3ab3b45c628991f908dc465e455618a5f6fc8545d443fb
                                            • Instruction ID: 4b94e37398fb4c0e8bf176de98e3888209b69965db7f8e5b86c8cb252d1f017b
                                            • Opcode Fuzzy Hash: b963958ab96ed52e1c3ab3b45c628991f908dc465e455618a5f6fc8545d443fb
                                            • Instruction Fuzzy Hash: EB5106716043119BD700DF18DC85FAF77A5EB89310F04492EF941973A2DB789D49CBAA
                                            APIs
                                            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 0046FD8A
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,004A83D8,?), ref: 0046FDF0
                                            • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 0046FE0E
                                            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,004A83D8,?), ref: 0046FE20
                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 0046FEA5
                                            • SendMessageW.USER32(?,0000113F,00000000,?), ref: 0046FEDF
                                            • GetClientRect.USER32(?,?), ref: 0046FEF2
                                            • RedrawWindow.USER32(?,?,00000000,00000000), ref: 0046FF02
                                            • DestroyIcon.USER32(?), ref: 0046FFCC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                            • String ID: 2
                                            • API String ID: 1331449709-450215437
                                            • Opcode ID: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                            • Instruction ID: e79942d1a0196d9b5e30c5c178d8ccafd59c9ae1e7fac48b8759c586c5a3b44e
                                            • Opcode Fuzzy Hash: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                            • Instruction Fuzzy Hash: EB51AC702043019FD320CF44D885BAABBE5FB88700F04487EE684872A2D7B5A849CB5A
                                            APIs
                                            • DestroyWindow.USER32(?,?,?,?,?,?,00000000,static,00000000,00000000,?,?,00000000,00000000,?,00000000), ref: 00450EE1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: DestroyWindow
                                            • String ID: static
                                            • API String ID: 3375834691-2160076837
                                            • Opcode ID: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                                            • Instruction ID: 4605c95b1b006c90d65e271c0fdf07f62d21d56273c2870bf7f2e3decf5281c5
                                            • Opcode Fuzzy Hash: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                                            • Instruction Fuzzy Hash: 4531B572200300BBD7109B64DC45F6BB3A8EBC9711F204A2EFA50D72C0D7B4E8048B69
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000008,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439409
                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 0043940C
                                            • GetCurrentProcess.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?), ref: 0043941D
                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 00439420
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 0043945B
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00439474
                                            • _memcmp.LIBCMT ref: 004394A9
                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004394F8
                                            Strings
                                            • SeAssignPrimaryTokenPrivilege, xrefs: 00439455
                                            • SeIncreaseQuotaPrivilege, xrefs: 0043946A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
                                            • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
                                            • API String ID: 1446985595-805462909
                                            • Opcode ID: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                            • Instruction ID: 628aaead06b6f58e004e5b45c2ed9710a22b4d2b921ab75b424857e8fd72c9d6
                                            • Opcode Fuzzy Hash: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                            • Instruction Fuzzy Hash: DB31A371508312ABC710DF21CD41AAFB7E8FB99704F04591EF98193240E7B8DD4ACBAA
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D848
                                            • GetDriveTypeW.KERNEL32(?,?), ref: 0045D8A3
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D94A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DriveType
                                            • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$HH
                                            • API String ID: 2907320926-41864084
                                            • Opcode ID: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                            • Instruction ID: d4cab332979e247f8c2da9788294718902473fa09eb5ff996f03d25688ce9cbb
                                            • Opcode Fuzzy Hash: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                            • Instruction Fuzzy Hash: C7318B75A083008FC310EF65E48481EB7A1AFC8315F648D2FF945A7362C779D9068BAB
                                            APIs
                                            • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 004672E6
                                            • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046735D
                                            • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467375
                                            • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004673ED
                                            • SafeArrayGetVartype.OLEAUT32(CE8B7824,?), ref: 00467418
                                            • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467445
                                            • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046746A
                                            • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 00467559
                                            • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 0046748A
                                              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                            • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467571
                                            • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004675E4
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Data$AccessUnaccess$Exception@8ThrowVartype_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                            • String ID:
                                            • API String ID: 1932665248-0
                                            • Opcode ID: 16f99e80be173eecdd1bb573f6b7f825babaa5351af7cc3efc94bb11c862a2f8
                                            • Instruction ID: 42a0e90c8bf2b482c85e144861ec280134e9fb1dbd9e00a0d693b148f8e5f150
                                            • Opcode Fuzzy Hash: 16f99e80be173eecdd1bb573f6b7f825babaa5351af7cc3efc94bb11c862a2f8
                                            • Instruction Fuzzy Hash: E8B1BF752082009FD304DF29C884B6B77E5FF98318F14496EE98587362E779E885CB6B
                                            APIs
                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00448182
                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00448185
                                            • GetWindowLongW.USER32(?,000000F0), ref: 004481A7
                                            • _memset.LIBCMT ref: 004481BA
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481CC
                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0044824E
                                            • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482A4
                                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482BE
                                            • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482E3
                                            • SendMessageW.USER32(?,0000101E,00000001,00000000), ref: 004482FC
                                            • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448317
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow_memset
                                            • String ID:
                                            • API String ID: 830647256-0
                                            • Opcode ID: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                            • Instruction ID: 69fd08a602074ed3d664547bad3ac5a94a9e6c02d61aa1d07dc3907ec7ad0976
                                            • Opcode Fuzzy Hash: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                            • Instruction Fuzzy Hash: 41616F70208341AFE310DF54C881FABB7A4FF89704F14465EFA909B2D1DBB5A945CB56
                                            APIs
                                              • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                            • DestroyAcceleratorTable.USER32(?), ref: 0046EA9F
                                            • ImageList_Destroy.COMCTL32(?), ref: 0046EB04
                                            • ImageList_Destroy.COMCTL32(?), ref: 0046EB18
                                            • ImageList_Destroy.COMCTL32(?), ref: 0046EB24
                                            • DeleteObject.GDI32(00000000), ref: 0046EB4F
                                            • DestroyIcon.USER32(00450053), ref: 0046EB67
                                            • DeleteObject.GDI32(D7CB96D5), ref: 0046EB7F
                                            • DestroyWindow.USER32(00650073), ref: 0046EB97
                                            • DestroyIcon.USER32(?), ref: 0046EBBF
                                            • DestroyIcon.USER32(?), ref: 0046EBCD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateRectTableWindow
                                            • String ID:
                                            • API String ID: 802431696-0
                                            • Opcode ID: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                            • Instruction ID: 42d633cefbe7d7192e7a113645d0a532909e6831d49db23f2259be933aabe8c6
                                            • Opcode Fuzzy Hash: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                            • Instruction Fuzzy Hash: 17513178600202DFDB14DF26D894E2A77E9FB4AB14B54446EE502CB361EB38EC41CB5E
                                            APIs
                                            • GetKeyboardState.USER32(?,?,?), ref: 00444D8A
                                            • GetAsyncKeyState.USER32(000000A0), ref: 00444E0F
                                            • GetKeyState.USER32(000000A0), ref: 00444E26
                                            • GetAsyncKeyState.USER32(000000A1), ref: 00444E40
                                            • GetKeyState.USER32(000000A1), ref: 00444E51
                                            • GetAsyncKeyState.USER32(00000011), ref: 00444E69
                                            • GetKeyState.USER32(00000011), ref: 00444E77
                                            • GetAsyncKeyState.USER32(00000012), ref: 00444E8F
                                            • GetKeyState.USER32(00000012), ref: 00444E9D
                                            • GetAsyncKeyState.USER32(0000005B), ref: 00444EB5
                                            • GetKeyState.USER32(0000005B), ref: 00444EC3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                            • Instruction ID: c605e69a62dfc64c618b97cb3a1930d242a0674024be490a091b983f03ece729
                                            • Opcode Fuzzy Hash: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                            • Instruction Fuzzy Hash: 6A41C3646087C52DFB31966484017E7FFD16FA2708F58844FD1C5067C2DBAEA9C8C7AA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HH
                                            • API String ID: 0-2761332787
                                            • Opcode ID: 31ff441d28c5e927918bd04bcaff178bc0424bc9c98581a0806166e4fd3f8403
                                            • Instruction ID: 1932890218e454eaab518c2d08cf67ea4bcb6b95680f1d85a47b5a5cee1eebd3
                                            • Opcode Fuzzy Hash: 31ff441d28c5e927918bd04bcaff178bc0424bc9c98581a0806166e4fd3f8403
                                            • Instruction Fuzzy Hash: 99A1A1726043009BD710EF65DC82B6BB3E9ABD4718F008E2EF558E7281D779E9448B5A
                                            APIs
                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004508CB
                                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 004508DB
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,00001036,00000000,?,000000FF,?,SysListView32,004848E8,00000000), ref: 004508FC
                                            • _wcslen.LIBCMT ref: 00450944
                                            • _wcscat.LIBCMT ref: 00450955
                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045096C
                                            • SendMessageW.USER32(?,00001061,?,?), ref: 0045099B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window_wcscat_wcslen
                                            • String ID: -----$SysListView32
                                            • API String ID: 4008455318-3975388722
                                            • Opcode ID: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                            • Instruction ID: 786a3889ee88f98d9b0e9b4b0e1dacf7018a6923f31dd28eeaa3c07ad082d1a6
                                            • Opcode Fuzzy Hash: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                            • Instruction Fuzzy Hash: 17519470504340ABE330DB65C885FABB3E4AF84714F104E1EFA94972D3D6B99989CB65
                                            APIs
                                            • _memset.LIBCMT ref: 00448625
                                            • CreateMenu.USER32 ref: 0044863C
                                            • SetMenu.USER32(?,00000000), ref: 0044864C
                                            • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 004486D6
                                            • IsMenu.USER32(?), ref: 004486EB
                                            • CreatePopupMenu.USER32 ref: 004486F5
                                            • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 00448739
                                            • DrawMenuBar.USER32 ref: 00448742
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                            • String ID: 0
                                            • API String ID: 176399719-4108050209
                                            • Opcode ID: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                            • Instruction ID: 98f94d81d6847d6484dd50bbdc77a0bd9f9f2d632c710d3394220f00cc789bef
                                            • Opcode Fuzzy Hash: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                            • Instruction Fuzzy Hash: 86417675604201AFD700CF68D894A9BBBE4FF89314F14891EFA488B350DBB5A845CFA6
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469277
                                            • GetDlgCtrlID.USER32(00000000), ref: 00469289
                                            • GetParent.USER32 ref: 004692A4
                                            • SendMessageW.USER32(00000000,?,00000111), ref: 004692A7
                                            • GetDlgCtrlID.USER32(00000000), ref: 004692AE
                                            • GetParent.USER32 ref: 004692C7
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 004692CA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 2040099840-1403004172
                                            • Opcode ID: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                            • Instruction ID: ef07326ddff4210f4741e87947fad3c2ec39ee11b6619cfdf8cc81125e1c6f8c
                                            • Opcode Fuzzy Hash: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                            • Instruction Fuzzy Hash: BC21D6716002147BD600AB65CC45DBFB39CEB85324F044A1FF954A73D1DAB8EC0947B9
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469471
                                            • GetDlgCtrlID.USER32(00000000), ref: 00469483
                                            • GetParent.USER32 ref: 0046949E
                                            • SendMessageW.USER32(00000000,?,00000111), ref: 004694A1
                                            • GetDlgCtrlID.USER32(00000000), ref: 004694A8
                                            • GetParent.USER32 ref: 004694C1
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 004694C4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 2040099840-1403004172
                                            • Opcode ID: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                            • Instruction ID: 434b10a17d45167e777e8ea6e726dd6ee4e01267e4a119798c8aa60e835c5cdc
                                            • Opcode Fuzzy Hash: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                            • Instruction Fuzzy Hash: CA21D7756002147BD600BB29CC45EBFB39CEB85314F04492FF984A7291EABCEC0A4779
                                            APIs
                                              • Part of subcall function 004419ED: DeleteObject.GDI32(?), ref: 00441A53
                                            • SendMessageW.USER32(75C123D0,00001001,00000000,00000000), ref: 00448E73
                                            • SendMessageW.USER32(75C123D0,00001026,00000000,00000000), ref: 00448E7E
                                              • Part of subcall function 00441A7A: CreateSolidBrush.GDI32 ref: 00441ACB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                            • String ID:
                                            • API String ID: 3771399671-0
                                            • Opcode ID: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                            • Instruction ID: ebbecaf0548398ae771b9aa28ebf0b72f134f9ffbbfb28b2279bd799396bd9e3
                                            • Opcode Fuzzy Hash: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                            • Instruction Fuzzy Hash: F4510930208300AFE2209F25DD85F6F77EAEB85B14F14091EF994E72D0CBB9E9458769
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: InitVariant$_malloc_wcscpy_wcslen
                                            • String ID:
                                            • API String ID: 3413494760-0
                                            • Opcode ID: afb533e23b19910be0c027df8fa87fd227b592e7e5a0e6e969ae1a59b8da4157
                                            • Instruction ID: 77b59fa0745152fd1b6386ccdd9ca850b9b7f4abb66e551d88b584249de3d357
                                            • Opcode Fuzzy Hash: afb533e23b19910be0c027df8fa87fd227b592e7e5a0e6e969ae1a59b8da4157
                                            • Instruction Fuzzy Hash: F83150B2600746AFC714DF7AC880996FBA8FF88310B44892EE64983641D735F554CBA5
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 004377D7
                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,0045FDE0,?,?,00000001), ref: 004377EB
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 004377F8
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 00437809
                                            • GetWindowThreadProcessId.USER32(?,00000001), ref: 00437819
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043782E
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043783D
                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 0043788D
                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378A1
                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378AC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                            • String ID:
                                            • API String ID: 2156557900-0
                                            • Opcode ID: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                            • Instruction ID: cf5237ead9178137421241ba4763476990ac919c12b5de4495d1c20f4e3090f4
                                            • Opcode Fuzzy Hash: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                            • Instruction Fuzzy Hash: B0316FB1504341AFD768EF28DC88A7BB7A9EF9D310F14182EF44197250D7B89C44CB69
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: 0%d$DOWN$OFF
                                            • API String ID: 3832890014-468733193
                                            • Opcode ID: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                            • Instruction ID: 3901981f80fa7430cd77b89167089bc3925961a07aad88d0cc2f25a35af8916b
                                            • Opcode Fuzzy Hash: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                            • Instruction Fuzzy Hash: B7F1D8614083856DEB21EB21C845BAF7BE85F95309F08092FF98212193D7BCD68DC76B
                                            APIs
                                            • VariantInit.OLEAUT32(00000000), ref: 0045E959
                                            • VariantCopy.OLEAUT32(00000000), ref: 0045E963
                                            • VariantClear.OLEAUT32 ref: 0045E970
                                            • VariantTimeToSystemTime.OLEAUT32 ref: 0045EAEB
                                            • __swprintf.LIBCMT ref: 0045EB1F
                                            • VarR8FromDec.OLEAUT32(?,?), ref: 0045EB61
                                            • VariantInit.OLEAUT32(00000000), ref: 0045EBE7
                                            Strings
                                            • %4d%02d%02d%02d%02d%02d, xrefs: 0045EB19
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Variant$InitTime$ClearCopyFromSystem__swprintf
                                            • String ID: %4d%02d%02d%02d%02d%02d
                                            • API String ID: 43541914-1568723262
                                            • Opcode ID: 59f20d5c687eca5b8ac21bf224ed8e62dc0999386ac77495242af5446a13f09a
                                            • Instruction ID: db8708ae94f177a13b26e6bf0e0b18ed2eb17208bc27bd00c320e315e6f9d40a
                                            • Opcode Fuzzy Hash: 59f20d5c687eca5b8ac21bf224ed8e62dc0999386ac77495242af5446a13f09a
                                            • Instruction Fuzzy Hash: ABC1F4BB1006019BC704AF06D480666F7A1FFD4322F14896FED984B341DB3AE95ED7A6
                                            APIs
                                            • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FE66
                                            • Sleep.KERNEL32(0000000A), ref: 0042FE6E
                                            • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FF5D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: DecrementInterlocked$Sleep
                                            • String ID: 0vH$0vH$4RH0vH$@COM_EVENTOBJ
                                            • API String ID: 2250217261-3412429629
                                            • Opcode ID: 8ee3dc3b90658de1bdba7935e7c509bae4c97cbbd898303c1487c3161a53cb39
                                            • Instruction ID: 990b5f35a06538e4ae7b6c94f393f4a5fafaaf51bfa382c75dcb300f2d234fa3
                                            • Opcode Fuzzy Hash: 8ee3dc3b90658de1bdba7935e7c509bae4c97cbbd898303c1487c3161a53cb39
                                            • Instruction Fuzzy Hash: E0B1C0715083009FC714EF54C990A5FB3E4AF98304F508A2FF495972A2DB78ED4ACB9A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                            • API String ID: 0-1603158881
                                            • Opcode ID: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                            • Instruction ID: 1d39c91c6ba170ccd8bd44326015c92659356e06a413e753493f98454e3169a0
                                            • Opcode Fuzzy Hash: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                            • Instruction Fuzzy Hash: 49A1D3B14043459BCB20EF50CC81BDE37A4AF94348F44891FF9896B182EF79A64DC76A
                                            APIs
                                            • _memset.LIBCMT ref: 00479D1F
                                            • VariantInit.OLEAUT32(?), ref: 00479F06
                                            • VariantClear.OLEAUT32(?), ref: 00479F11
                                            • VariantInit.OLEAUT32(?), ref: 00479DF7
                                              • Part of subcall function 00467626: VariantInit.OLEAUT32(00000000), ref: 00467666
                                              • Part of subcall function 00467626: VariantCopy.OLEAUT32(00000000,00479BD3), ref: 00467670
                                              • Part of subcall function 00467626: VariantClear.OLEAUT32 ref: 0046767D
                                            • VariantClear.OLEAUT32(?), ref: 00479F9C
                                              • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Variant$Copy$ClearInit$ErrorLast_memset
                                            • String ID: F$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                            • API String ID: 665237470-60002521
                                            • Opcode ID: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                                            • Instruction ID: 799f1794578ead7d01377608c22e1fb401aa4fc5ffca8a64c02b8280356d09a3
                                            • Opcode Fuzzy Hash: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                                            • Instruction Fuzzy Hash: 6091B272204341AFD720DF64D880EABB7E9EFC4314F50891EF28987291D7B9AD45C766
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046A84D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ConnectRegistry_wcslen
                                            • String ID: HH
                                            • API String ID: 535477410-2761332787
                                            • Opcode ID: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                            • Instruction ID: 68d8ff7817732ac0dd8275009c421e29eb5870de2046e22f9b94a35ba54c9d9f
                                            • Opcode Fuzzy Hash: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                            • Instruction Fuzzy Hash: FE617FB56083009FD304EF65C981F6BB7E4AF88704F14891EF681A7291D678ED09CB97
                                            APIs
                                            • _memset.LIBCMT ref: 0045F317
                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F367
                                            • IsMenu.USER32(?), ref: 0045F380
                                            • CreatePopupMenu.USER32 ref: 0045F3C5
                                            • GetMenuItemCount.USER32(?), ref: 0045F42F
                                            • InsertMenuItemW.USER32(?,?,00000001,?), ref: 0045F45B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                            • String ID: 0$2
                                            • API String ID: 3311875123-3793063076
                                            • Opcode ID: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                            • Instruction ID: 6c7ab59355789d00cbd42ef361c1bd9312a1bc9220e92816940967e3bd29aecc
                                            • Opcode Fuzzy Hash: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                            • Instruction Fuzzy Hash: E451CF702043409FD710CF69D888B6BBBE4AFA5319F104A3EFD9586292D378994DCB67
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,004A8E80,00000100,00000100,?,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe), ref: 0043719E
                                            • LoadStringW.USER32(00000000), ref: 004371A7
                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004371BD
                                            • LoadStringW.USER32(00000000), ref: 004371C0
                                            • _printf.LIBCMT ref: 004371EC
                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00437208
                                            Strings
                                            • %s (%d) : ==> %s: %s %s, xrefs: 004371E7
                                            • C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe, xrefs: 00437189
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: HandleLoadModuleString$Message_printf
                                            • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe
                                            • API String ID: 220974073-1763831146
                                            • Opcode ID: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                            • Instruction ID: cc9e6972dbc5209964c20f0f7d1f7455a13934f6c555fd98bc0bf92a0502fb90
                                            • Opcode Fuzzy Hash: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                            • Instruction Fuzzy Hash: F7014FB2A543447AE620EB549D06FFB365CABC4B01F444C1EB794A60C0AAF865548BBA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                            • Instruction ID: 20732dcab93056f759d0b04a6df1a57780e33876730225f1fefd21ccf2a16f59
                                            • Opcode Fuzzy Hash: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                            • Instruction Fuzzy Hash: 36519070200301ABD320DF29CC85F5BB7E8EB48715F540A1EF995E7292D7B4E949CB29
                                            APIs
                                              • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,?,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,004A8E80,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,0040F3D2), ref: 0040FFCA
                                              • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                            • lstrcmpiW.KERNEL32(?,?), ref: 0045355E
                                            • MoveFileW.KERNEL32(?,?), ref: 0045358E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                            • String ID:
                                            • API String ID: 978794511-0
                                            • Opcode ID: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                            • Instruction ID: dcad70f49e32ae1adaf0c812d378eb0bba467e0a617048934f4a65f03e3a0b24
                                            • Opcode Fuzzy Hash: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                            • Instruction Fuzzy Hash: 665162B25043406AC724EF61D885ADFB3E8AFC8305F44992EB94992151E73DD34DC767
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                            • Instruction ID: b1e2397247e50d0c7000acf5a2db8631a214b417b603bec0598d849dd48054e0
                                            • Opcode Fuzzy Hash: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                            • Instruction Fuzzy Hash: E54128332402806BE320A75DB8C4ABBFB98E7A2362F50443FF18196520D76678C5D339
                                            APIs
                                            • GetWindowLongW.USER32(?,000000EC), ref: 00455F01
                                            • _memset.LIBCMT ref: 00455F12
                                            • SendMessageW.USER32 ref: 00455F43
                                            • SendMessageW.USER32(?,0000104B,00000000,?), ref: 00455F82
                                            • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00455FF5
                                            • _wcslen.LIBCMT ref: 00455FFC
                                            • _wcslen.LIBCMT ref: 00456018
                                            • CharNextW.USER32(00000000,?,?,?), ref: 00456034
                                            • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00456060
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$_wcslen$CharLongNextWindow_memset
                                            • String ID:
                                            • API String ID: 2321321212-0
                                            • Opcode ID: 9fe44bf13dfe9639860e83451fa7f42e7831dc5b74bf465a4309150460e9ba2c
                                            • Instruction ID: 728fd5b54b682decfcd50b06f9b7fb359c8698431e162ed45c662fcf507213b6
                                            • Opcode Fuzzy Hash: 9fe44bf13dfe9639860e83451fa7f42e7831dc5b74bf465a4309150460e9ba2c
                                            • Instruction Fuzzy Hash: 5D41D172204241ABE3108F68DC45BABB7E4FB84321F004A2EF954D72D1E7B9904A8B66
                                            APIs
                                              • Part of subcall function 0044593E: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 0044595D
                                              • Part of subcall function 0044593E: GetCurrentThreadId.KERNEL32 ref: 00445964
                                              • Part of subcall function 0044593E: AttachThreadInput.USER32(00000000,?,00000001,00478FA7), ref: 0044596B
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D15
                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00445D35
                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445D3F
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D45
                                            • PostMessageW.USER32(00000000,00000100,00000027,00000000), ref: 00445D66
                                            • Sleep.KERNEL32(00000000), ref: 00445D70
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D76
                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00445D8B
                                            • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445D8F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                            • String ID:
                                            • API String ID: 2014098862-0
                                            • Opcode ID: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                            • Instruction ID: b085f3065cf9cd100f04f322da00d4b037e108fc79bf5967fdabce1cd6d2e74b
                                            • Opcode Fuzzy Hash: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                            • Instruction Fuzzy Hash: 7B116971790704B7F620AB958C8AF5A7399EF88B11F20080DF790AB1C1C9F5E4418B7C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressProc_malloc$_strcat_strlen
                                            • String ID: AU3_FreeVar
                                            • API String ID: 2184576858-771828931
                                            • Opcode ID: 10d9e78008ba5b5703de8dc23ed72c3cd296113dc033390a1be7ca980e1f1503
                                            • Instruction ID: c940ad03d776ce5ee908f8b881b33357b51647545ffc53e819ca791e1fdac2da
                                            • Opcode Fuzzy Hash: 10d9e78008ba5b5703de8dc23ed72c3cd296113dc033390a1be7ca980e1f1503
                                            • Instruction Fuzzy Hash: EDA18DB5604205DFC300DF59C480A2AB7E5FFC8319F1489AEE9554B362D739ED89CB8A
                                            APIs
                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D5A
                                            • DestroyWindow.USER32(?), ref: 0042A751
                                            • UnregisterHotKey.USER32(?), ref: 0042A778
                                            • FreeLibrary.KERNEL32(?), ref: 0042A822
                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0042A854
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                            • String ID: close all
                                            • API String ID: 4174999648-3243417748
                                            • Opcode ID: 9f9deb73285226e6ba240568d142da5fec9cf520cd27fc9a3a2cacaca98377aa
                                            • Instruction ID: e23b5dd52123a376b0379481fe8be5d2f02d07e70979f80a1c72d587d5a24a2c
                                            • Opcode Fuzzy Hash: 9f9deb73285226e6ba240568d142da5fec9cf520cd27fc9a3a2cacaca98377aa
                                            • Instruction Fuzzy Hash: FFA17075A102248FCB20EF55CC85B9AB3B8BF44304F5044EEE90967291D779AE85CF9D
                                            APIs
                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AA5A
                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AA8D
                                            • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0044AAF9
                                            • InternetSetOptionW.WININET(00000000,0000001F,?,00000004), ref: 0044AB11
                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB20
                                            • HttpQueryInfoW.WININET(00000000,00000005,?,00000000,00000000), ref: 0044AB61
                                              • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                            • String ID:
                                            • API String ID: 1291720006-3916222277
                                            • Opcode ID: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                            • Instruction ID: 782b6278bf246bef60821ca34847c3ce69a0d92f774604c9678bedd135ce19ea
                                            • Opcode Fuzzy Hash: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                            • Instruction Fuzzy Hash: 9C51E6B12803016BF320EB65CD85FBBB7A8FB89704F00091EF74196181D7B9A548C76A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ErrorLastselect
                                            • String ID: HH
                                            • API String ID: 215497628-2761332787
                                            • Opcode ID: 0de0448ade90d459e176b7eabd0eb7793c39b194d41e4bdd7ff4fb8690f4e17f
                                            • Instruction ID: a252b81ccbce03d1e7b1b0efababa2c0a0929072778302a7b1202b90a7697d70
                                            • Opcode Fuzzy Hash: 0de0448ade90d459e176b7eabd0eb7793c39b194d41e4bdd7ff4fb8690f4e17f
                                            • Instruction Fuzzy Hash: BF51E4726043005BD320EB65DC42F9BB399EB94324F044A2EF558E7281EB79E944C7AA
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __snwprintf__wcsicoll_wcscpy
                                            • String ID: , $$0vH$AUTOITCALLVARIABLE%d$CALLARGARRAY
                                            • API String ID: 1729044348-3708979750
                                            • Opcode ID: e5856c69d37335927e932bb259c431c810e65197c095b32473e915812f67d75c
                                            • Instruction ID: 823d0c4529048d9f890bbf28e75db1a658c609af9319d28fcdda535ef0d13f31
                                            • Opcode Fuzzy Hash: e5856c69d37335927e932bb259c431c810e65197c095b32473e915812f67d75c
                                            • Instruction Fuzzy Hash: E651A571514300ABD610EF65C882ADFB3A4EFC4348F048D2FF54967291D779E949CBAA
                                            APIs
                                              • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,?,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,004A8E80,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,0040F3D2), ref: 0040FFCA
                                            • lstrcmpiW.KERNEL32(?,?), ref: 0044BC04
                                            • MoveFileW.KERNEL32(?,?), ref: 0044BC38
                                            • _wcscat.LIBCMT ref: 0044BCAA
                                            • _wcslen.LIBCMT ref: 0044BCB7
                                            • _wcslen.LIBCMT ref: 0044BCCB
                                            • SHFileOperationW.SHELL32 ref: 0044BD16
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                            • String ID: \*.*
                                            • API String ID: 2326526234-1173974218
                                            • Opcode ID: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                            • Instruction ID: 9e4979448571685848097db6772507fbfe8bfb8d1337cd0032b1ea927bdad9db
                                            • Opcode Fuzzy Hash: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                            • Instruction Fuzzy Hash: 4B3183B14083019AD724EF21C5D5ADFB3E4EFC8304F444D6EB98993251EB39E608D7AA
                                            APIs
                                              • Part of subcall function 00436328: _wcsncpy.LIBCMT ref: 0043633C
                                            • _wcslen.LIBCMT ref: 004366DD
                                            • GetFileAttributesW.KERNEL32(?), ref: 00436700
                                            • GetLastError.KERNEL32 ref: 0043670F
                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00436727
                                            • _wcsrchr.LIBCMT ref: 0043674C
                                              • Part of subcall function 004366BE: CreateDirectoryW.KERNEL32(?,00000000,?,00000000,00000000), ref: 0043678F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                            • String ID: \
                                            • API String ID: 321622961-2967466578
                                            • Opcode ID: 1eb455b432650c328f353f4bd1bc621d200bc06401c5471b489e88a9126e4646
                                            • Instruction ID: 68cadaa88695c7c006562ade17844284f7fc34f8e7e15af3b97584e331f528d6
                                            • Opcode Fuzzy Hash: 1eb455b432650c328f353f4bd1bc621d200bc06401c5471b489e88a9126e4646
                                            • Instruction Fuzzy Hash: 3C2148765003017ADB20A724EC47AFF33989F95764F90993EFD14D6281E779950882AE
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                            • API String ID: 1038674560-2734436370
                                            • Opcode ID: 8fabdde956d602f6b8b7368bcff20dfc7d0b0c72369e2d81c3549115c9808aba
                                            • Instruction ID: f72ce1d64a5a3b865947b719243e4701f1ba8c8209579f194a7ae3ad15c73224
                                            • Opcode Fuzzy Hash: 8fabdde956d602f6b8b7368bcff20dfc7d0b0c72369e2d81c3549115c9808aba
                                            • Instruction Fuzzy Hash: 1B21F87261161067E730B659DCC2BDB63985F65305F04406BF800AA247D6ADA98A83AA
                                            APIs
                                            • EnumProcesses.PSAPI(?,00000800,?,?,00444263,?,?,?), ref: 00436EEC
                                            • OpenProcess.KERNEL32(00000410,00000000,?,?,?), ref: 00436F44
                                            • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00436F59
                                            • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104,00000000,?,00000004,?), ref: 00436F71
                                            • __wsplitpath.LIBCMT ref: 00436FA0
                                            • _wcscat.LIBCMT ref: 00436FB2
                                            • __wcsicoll.LIBCMT ref: 00436FC4
                                            • CloseHandle.KERNEL32(00000000,00000000,?,?,00000104,00000000,?,00000004,?), ref: 00437003
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: EnumProcess$BaseCloseHandleModuleModulesNameOpenProcesses__wcsicoll__wsplitpath_wcscat
                                            • String ID:
                                            • API String ID: 2903788889-0
                                            • Opcode ID: 7292045517b03260f1320f87d3cebc28a29f897dca793e666df8b3a842c294cc
                                            • Instruction ID: e95795bff0e4a6f47310c77509a1ee8dff79588992f1933afd8058d7896a4498
                                            • Opcode Fuzzy Hash: 7292045517b03260f1320f87d3cebc28a29f897dca793e666df8b3a842c294cc
                                            • Instruction Fuzzy Hash: C831A5B5108341ABD725DF54D881EEF73E8BBC8704F00891EF6C587241DBB9AA89C766
                                            APIs
                                            • DeleteObject.GDI32(?), ref: 0044157D
                                            • GetDC.USER32(00000000), ref: 00441585
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00441590
                                            • ReleaseDC.USER32(00000000,00000000), ref: 0044159B
                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,000000FF,000000FF,000000FF,00000001,00000004,00000000,?,00000000,00000000), ref: 004415E9
                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00441601
                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00441639
                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00441659
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                            • String ID:
                                            • API String ID: 3864802216-0
                                            • Opcode ID: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                            • Instruction ID: 4e191e68d33858d232da06d8f8bca50b2e2c885119a5133d865ec5329e905ca2
                                            • Opcode Fuzzy Hash: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                            • Instruction Fuzzy Hash: 1531C172240344BBE7208B14CD49FAB77EDEB88B15F08450DFB44AA2D1DAB4ED808B64
                                            APIs
                                            • _memset.LIBCMT ref: 00401257
                                              • Part of subcall function 00401BE0: _memset.LIBCMT ref: 00401C62
                                              • Part of subcall function 00401BE0: _wcsncpy.LIBCMT ref: 00401CA1
                                              • Part of subcall function 00401BE0: _wcscpy.LIBCMT ref: 00401CBD
                                              • Part of subcall function 00401BE0: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                            • KillTimer.USER32(?,?), ref: 004012B0
                                            • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012BF
                                            • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AA80
                                            • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AACC
                                            • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AB0F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: IconNotifyShell_$Timer_memset$Kill_wcscpy_wcsncpy
                                            • String ID:
                                            • API String ID: 1792922140-0
                                            • Opcode ID: 91f47cbc1f218a7f09512ea68bd6b482f011e20e77652f43937312b7b91c0350
                                            • Instruction ID: 78dbdb20408675f5dda5a176dd8a03fc230073daf987e80dd157250a536ae6f7
                                            • Opcode Fuzzy Hash: 91f47cbc1f218a7f09512ea68bd6b482f011e20e77652f43937312b7b91c0350
                                            • Instruction Fuzzy Hash: 56319670609642BFD319CB24D544B9BFBE8BF85304F04856EF488A3251C7789A19D7AB
                                            APIs
                                            • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                              • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                              • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                              • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                            • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                              • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                            • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                              • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                            • ExitThread.KERNEL32 ref: 0041410F
                                            • GetCurrentThreadId.KERNEL32 ref: 00414115
                                            • __freefls@4.LIBCMT ref: 00414135
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                            • String ID:
                                            • API String ID: 1925773019-0
                                            • Opcode ID: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                            • Instruction ID: d0499dd1a11a7aa3f5f6b81cdb2be0183561266298d4129ec5ef95b8f2f1ff50
                                            • Opcode Fuzzy Hash: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                            • Instruction Fuzzy Hash: 12018430000200ABC704BFB2DD0D9DE7BA9AF95345722886EF90497212DA3CC9C28B5C
                                            APIs
                                            • VariantClear.OLEAUT32(00000038), ref: 004357C3
                                            • VariantClear.OLEAUT32(00000058), ref: 004357C9
                                            • VariantClear.OLEAUT32(00000068), ref: 004357CF
                                            • VariantClear.OLEAUT32(00000078), ref: 004357D5
                                            • VariantClear.OLEAUT32(00000088), ref: 004357DE
                                            • VariantClear.OLEAUT32(00000048), ref: 004357E4
                                            • VariantClear.OLEAUT32(00000098), ref: 004357ED
                                            • VariantClear.OLEAUT32(000000A8), ref: 004357F6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                            • Instruction ID: 4669651a97e20320d925a323ac357da1b1419afffb7c9eb93274aad60c959a81
                                            • Opcode Fuzzy Hash: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                            • Instruction Fuzzy Hash: BDF03CB6400B446AC235EB79DC40BD7B7E86F89200F018E1DE58783514DA78F588CB64
                                            APIs
                                            • WSAStartup.WSOCK32(00000101,?,?), ref: 00464ADE
                                              • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                            • inet_addr.WSOCK32(?,00000000,?,?,00000101,?,?), ref: 00464B1F
                                            • gethostbyname.WSOCK32(?,?,00000000,?,?,00000101,?,?), ref: 00464B29
                                            • _memset.LIBCMT ref: 00464B92
                                            • GlobalAlloc.KERNEL32(00000040,00000040), ref: 00464B9E
                                            • GlobalFree.KERNEL32(00000000), ref: 00464CDE
                                            • WSACleanup.WSOCK32 ref: 00464CE4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memsetgethostbynameinet_addr
                                            • String ID:
                                            • API String ID: 3424476444-0
                                            • Opcode ID: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                            • Instruction ID: 8d90feaebe95447676150adcea4a136074f650e12d33839f26a9dde16614cdb7
                                            • Opcode Fuzzy Hash: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                            • Instruction Fuzzy Hash: A3A17EB1504300AFD710EF65C982F9BB7E8AFC8714F54491EF64497381E778E9058B9A
                                            APIs
                                            • GetSystemMetrics.USER32(0000000F), ref: 00440B7B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MetricsSystem
                                            • String ID:
                                            • API String ID: 4116985748-0
                                            • Opcode ID: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                            • Instruction ID: 1e23dbab6d9439f1299be2c39bdf7de0481ead398f869a6d5eaf0ea33fa99bdf
                                            • Opcode Fuzzy Hash: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                            • Instruction Fuzzy Hash: 8EA19C70608701DBE314CF68C984B6BBBE1FB88704F14491EFA8593251E778F965CB5A
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AC62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ConnectRegistry_wcslen
                                            • String ID:
                                            • API String ID: 535477410-0
                                            • Opcode ID: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                            • Instruction ID: 71109d01e6e71572d3d886d5d9f1e4ab699fb1be984f768d753da2f0a00da466
                                            • Opcode Fuzzy Hash: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                            • Instruction Fuzzy Hash: BBA18EB1204300AFC710EF65C885B1BB7E4BF85704F14896EF685AB292D779E905CB9B
                                            APIs
                                              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                            • _memset.LIBCMT ref: 004538C4
                                            • GetMenuItemInfoW.USER32(?,?), ref: 004538EF
                                            • _wcslen.LIBCMT ref: 00453960
                                            • SetMenuItemInfoW.USER32(00000011,?,00000000,?), ref: 004539C4
                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000,?,?), ref: 004539E0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info_wcslen$Default_memset_wcscpy
                                            • String ID: 0
                                            • API String ID: 3530711334-4108050209
                                            • Opcode ID: c8c2b72c749714a23e45c10816ef9459d7fe91b5f095051f547869ed1843acb9
                                            • Instruction ID: 97d09e0af2b4d046480d7fb626e7fa0667c22e7462995616ff61acde959b3bac
                                            • Opcode Fuzzy Hash: c8c2b72c749714a23e45c10816ef9459d7fe91b5f095051f547869ed1843acb9
                                            • Instruction Fuzzy Hash: 747118F15083015AD714DF65C881B6BB7E4EB98396F04491FFD8082292D7BCDA4CC7AA
                                            APIs
                                            • GetCurrentProcessId.KERNEL32(?), ref: 00473A00
                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00473A0E
                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00473A34
                                            • CloseHandle.KERNEL32(00000000,00000000,?,00000028), ref: 00473C01
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Process$CloseCountersCurrentHandleOpen
                                            • String ID: HH
                                            • API String ID: 3488606520-2761332787
                                            • Opcode ID: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                            • Instruction ID: 2161edc7e7eefe464b48455ffcea7dd3157e2cbe85e131cccd8837112284b0a3
                                            • Opcode Fuzzy Hash: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                            • Instruction Fuzzy Hash: 3581BF71A043019FD320EF69C882B5BF7E4AF84744F108C2EF598AB392D675E945CB96
                                            APIs
                                              • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                              • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                              • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                            • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                            • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                            • LineTo.GDI32(?,?), ref: 004474BF
                                            • CloseFigure.GDI32(?), ref: 004474C6
                                            • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                            • Rectangle.GDI32(?,?), ref: 004474F3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                            • String ID:
                                            • API String ID: 4082120231-0
                                            • Opcode ID: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                            • Instruction ID: e2e17d079c8faeb919f1a119f9aa9df975eabc7d00289576b12f70c1741c819b
                                            • Opcode Fuzzy Hash: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                            • Instruction Fuzzy Hash: BC713AB11083419FD300DF15C884E6BBBE9EFC9708F148A1EF99497351D778A906CBAA
                                            APIs
                                              • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                              • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                              • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                            • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                            • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                            • LineTo.GDI32(?,?), ref: 004474BF
                                            • CloseFigure.GDI32(?), ref: 004474C6
                                            • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                            • Rectangle.GDI32(?,?), ref: 004474F3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                            • String ID:
                                            • API String ID: 4082120231-0
                                            • Opcode ID: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                            • Instruction ID: 71053adf7dd607ae91079c2ca5de7ffea4483cc305881a9741cc2e8bc8d6f2cf
                                            • Opcode Fuzzy Hash: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                            • Instruction Fuzzy Hash: 55613BB51083419FD300DF55CC84E6BBBE9EBC9308F148A1EF99597351D738A906CB6A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AngleCloseEllipseFigureLineMovePixelRectangle
                                            • String ID:
                                            • API String ID: 288456094-0
                                            • Opcode ID: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                            • Instruction ID: d3db7697bfba14f4a3ad6627a8a5faa1010559558ae5e3f89cc6b0bd66950af4
                                            • Opcode Fuzzy Hash: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                            • Instruction Fuzzy Hash: 90514BB51082419FD300DF15CC84E6BBBE9EFC9308F14891EF99497351D734A906CB6A
                                            APIs
                                            • GetParent.USER32(?), ref: 004449B0
                                            • GetKeyboardState.USER32(?), ref: 004449C3
                                            • SetKeyboardState.USER32(?), ref: 00444A0F
                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00444A3F
                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00444A60
                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444AAC
                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444AD1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$Parent
                                            • String ID:
                                            • API String ID: 87235514-0
                                            • Opcode ID: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                            • Instruction ID: 19c159416ad4887e81d4090d30fbb5c505c675cee05c330e2fd8e115592bd25d
                                            • Opcode Fuzzy Hash: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                            • Instruction Fuzzy Hash: B651C5A05487D139F7369234884ABA7BFD55F8A304F08CA4EF1E5156C3D2ECE984C769
                                            APIs
                                            • GetParent.USER32(?), ref: 00444BA9
                                            • GetKeyboardState.USER32(?), ref: 00444BBC
                                            • SetKeyboardState.USER32(?), ref: 00444C08
                                            • PostMessageW.USER32(?,00000100,00000010,?), ref: 00444C35
                                            • PostMessageW.USER32(?,00000100,00000011,?), ref: 00444C53
                                            • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444C9C
                                            • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444CBE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$Parent
                                            • String ID:
                                            • API String ID: 87235514-0
                                            • Opcode ID: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                            • Instruction ID: 4493abccadab05ae7d00f733e1fa63583af0c494729619d74f1516a50adc8d80
                                            • Opcode Fuzzy Hash: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                            • Instruction Fuzzy Hash: A951E4F05097D139F7369364884ABA7BFE46F8A304F088A4EF1D5065C2D2ACE984C769
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                            • Instruction ID: b3b3da583a0ae8cfa3180eda0e634cae40a493ebdfd517dbec9d2fd4fbd82cb1
                                            • Opcode Fuzzy Hash: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                            • Instruction Fuzzy Hash: 1E513A315082909FE321CF14DC89FABBB64FB46320F18456FF895AB2D1D7649C06D7AA
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AA77
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ConnectRegistry_wcslen
                                            • String ID: HH
                                            • API String ID: 535477410-2761332787
                                            • Opcode ID: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                            • Instruction ID: 7b41397762752e7dec08e47bcdb2cb2f58790b6f4670524580eb9da3090621e6
                                            • Opcode Fuzzy Hash: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                            • Instruction Fuzzy Hash: A2516D71208301AFD304EF65C981F5BB7A9BFC4704F40892EF685A7291D678E905CB6B
                                            APIs
                                            • _memset.LIBCMT ref: 00457C34
                                            • _memset.LIBCMT ref: 00457CE8
                                            • ShellExecuteExW.SHELL32(?), ref: 00457D34
                                              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                            • CloseHandle.KERNEL32(?), ref: 00457DDD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _memset$CloseExecuteHandleShell_wcscpy_wcslen
                                            • String ID: <$@
                                            • API String ID: 1325244542-1426351568
                                            • Opcode ID: bce0cc86945754dfb230170ecd4c21a915d6526e7c9b1e7fd723952314da78dd
                                            • Instruction ID: 09e461bdfc47c8bdd671eddb31188d347eda7c51057725e13e77015b5001baed
                                            • Opcode Fuzzy Hash: bce0cc86945754dfb230170ecd4c21a915d6526e7c9b1e7fd723952314da78dd
                                            • Instruction Fuzzy Hash: EA510FB55083009FC710EF61D985A5BB7E4AF84709F00492EFD44AB392DB39ED48CB9A
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(?,?,?,?,?,?,?,?,?,00000002,00000000,00000014), ref: 0047379B
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 004737A8
                                            • __wsplitpath.LIBCMT ref: 004737E1
                                              • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                            • _wcscat.LIBCMT ref: 004737F6
                                            • __wcsicoll.LIBCMT ref: 00473818
                                            • Process32NextW.KERNEL32(00000000,?), ref: 00473844
                                            • CloseHandle.KERNEL32(00000000,00000000,?,?), ref: 00473852
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                            • String ID:
                                            • API String ID: 2547909840-0
                                            • Opcode ID: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                            • Instruction ID: 8efa427203ffd7a45d167e3a64f6abf3f3640219bb0751621114887cb14f0fc1
                                            • Opcode Fuzzy Hash: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                            • Instruction Fuzzy Hash: 4751BB71544304A7D720EF61CC86FDBB3E8AF84748F00492EF58957182E775E645C7AA
                                            APIs
                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 004552B7
                                            • ImageList_Remove.COMCTL32(?,?,?,?), ref: 004552EB
                                            • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004553D3
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                            • String ID:
                                            • API String ID: 2354583917-0
                                            • Opcode ID: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                            • Instruction ID: 19c5dc8500d05a42ca126c51664c70dafe1d1a8ca3b523478e8997b137d6e309
                                            • Opcode Fuzzy Hash: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                            • Instruction Fuzzy Hash: 77519D30204A419FC714DF24C4A4B7A77E5FB49301F4486AEFD9ACB392DB78A849CB54
                                            APIs
                                              • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                            • GetMenu.USER32 ref: 004776AA
                                            • GetMenuItemCount.USER32(00000000), ref: 004776CC
                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004776FB
                                            • _wcslen.LIBCMT ref: 0047771A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Menu$CountItemStringWindow_wcslen
                                            • String ID:
                                            • API String ID: 1823500076-0
                                            • Opcode ID: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                            • Instruction ID: 4b9e656becebfc5f52f27a1d7ad2c07a58398098864d75d3a5ce1c02cc274359
                                            • Opcode Fuzzy Hash: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                            • Instruction Fuzzy Hash: 174117715083019FD320EF25CC45BABB3E8BF88314F10492EF55997252D7B8E9458BA9
                                            APIs
                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0044890A
                                            • SendMessageW.USER32(?,00000469,?,00000000), ref: 00448920
                                            • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                            • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                            • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                            • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                            • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$Enable$Show$MessageMoveSend
                                            • String ID:
                                            • API String ID: 896007046-0
                                            • Opcode ID: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                            • Instruction ID: 0809a8548e22334437b8974569d6adfa08582830463fbdb99c3481629354d751
                                            • Opcode Fuzzy Hash: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                            • Instruction Fuzzy Hash: 63419E746043419FF7248B24C884B6FB7A1FB99305F18886EF98197391DA78A845CB59
                                            APIs
                                            • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                            • SendMessageW.USER32(00A01A68,000000F1,00000000,00000000), ref: 004414C6
                                            • SendMessageW.USER32(00A01A68,000000F1,00000001,00000000), ref: 004414F1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow
                                            • String ID:
                                            • API String ID: 312131281-0
                                            • Opcode ID: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                            • Instruction ID: f6a862a32ccfd92e4f153a1965fa7dc80102ffdb8abe4b8a046001f82176c48d
                                            • Opcode Fuzzy Hash: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                            • Instruction Fuzzy Hash: 2F416A347442019FE720CF58DCC4F6A77A5FB8A754F24416AE5519B3B1CB75AC82CB48
                                            APIs
                                            • _memset.LIBCMT ref: 004484C4
                                            • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 00448562
                                            • IsMenu.USER32(?), ref: 0044857B
                                            • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 004485D0
                                            • DrawMenuBar.USER32 ref: 004485E4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Menu$Item$DrawInfoInsert_memset
                                            • String ID: 0
                                            • API String ID: 3866635326-4108050209
                                            • Opcode ID: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                            • Instruction ID: c1b4c65bd9dbf201e14e83578cc8030a3c247867dd5f1e451e409e2153a24926
                                            • Opcode Fuzzy Hash: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                            • Instruction Fuzzy Hash: 9F417F75604341AFE710CF45C984B6BB7E4FB89304F14881EFA554B391DBB4E849CB5A
                                            APIs
                                            • InterlockedIncrement.KERNEL32 ref: 0047247C
                                            • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472491
                                            • Sleep.KERNEL32(0000000A), ref: 00472499
                                            • InterlockedIncrement.KERNEL32(004A7CAC), ref: 004724A4
                                            • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472599
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Interlocked$DecrementIncrement$Sleep
                                            • String ID: 0vH
                                            • API String ID: 327565842-3662162768
                                            • Opcode ID: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                                            • Instruction ID: 7246262c18bb701d5349304b0e2d21290bf7c9637501dd5a114e6955e8e78370
                                            • Opcode Fuzzy Hash: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                                            • Instruction Fuzzy Hash: 9631D2329082259BD710DF28DD41A8A77A5EB95324F05483EFD08FB251DB78EC498BED
                                            APIs
                                            • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448B16
                                            • GetFocus.USER32 ref: 00448B1C
                                            • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                            • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                            • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                            • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                            • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$Enable$Show$FocusMessageSend
                                            • String ID:
                                            • API String ID: 3429747543-0
                                            • Opcode ID: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                            • Instruction ID: 96ed947056310062a3fa6d2350adc65d304252fdbf70c479ab88671ed4e09c2c
                                            • Opcode Fuzzy Hash: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                            • Instruction Fuzzy Hash: FC31B4706443819BF7248E14C8C4BAFB7D0EB95745F04492EF981A6291DBA89845C719
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D32F
                                            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3B3
                                            • __swprintf.LIBCMT ref: 0045D3CC
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D416
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ErrorMode$InformationVolume__swprintf
                                            • String ID: %lu$HH
                                            • API String ID: 3164766367-3924996404
                                            • Opcode ID: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                            • Instruction ID: e4de0c6df68350460ad5232616e5185c9d799459bd1b640414cfcbd8d86849a8
                                            • Opcode Fuzzy Hash: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                            • Instruction Fuzzy Hash: 85314A716083019BC310EF55D941A5BB7E4FF88704F40892EFA4597292D774EA09CB9A
                                            APIs
                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450E24
                                            • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450E35
                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450E43
                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450E54
                                            • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450E62
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: Msctls_Progress32
                                            • API String ID: 3850602802-3636473452
                                            • Opcode ID: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                            • Instruction ID: b51c377fab27852337593a8f268aff884918310fa347e0537580fa9f3b853d23
                                            • Opcode Fuzzy Hash: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                            • Instruction Fuzzy Hash: 2C2121712543007AE7209A65DC42F5BB3E9AFD8B24F214A0EF754B72D1C6B4F8418B58
                                            APIs
                                            • ImageList_Destroy.COMCTL32(?), ref: 00455451
                                            • ImageList_Destroy.COMCTL32(?), ref: 0045545F
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                            • String ID:
                                            • API String ID: 3985565216-0
                                            • Opcode ID: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                            • Instruction ID: 02eb1b45cc7e926b76574f27881fb1e8d9d372094f4d7b34cf8607babd6cb63d
                                            • Opcode Fuzzy Hash: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                            • Instruction Fuzzy Hash: EA213270200A019FCB20DF65CAD4B2A77A9BF45312F50855EED45CB352DB39EC45CB69
                                            APIs
                                            • ___set_flsgetvalue.LIBCMT ref: 00415737
                                            • __calloc_crt.LIBCMT ref: 00415743
                                            • __getptd.LIBCMT ref: 00415750
                                            • CreateThread.KERNEL32(00000000,?,0041568B,00000000,00000004,00000000), ref: 00415776
                                            • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00415786
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00415791
                                            • __dosmaperr.LIBCMT ref: 004157A9
                                              • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                              • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                            • String ID:
                                            • API String ID: 1269668773-0
                                            • Opcode ID: bb8068f02d799d687f86b9c43e1e9df3108372b57b840b2ce394e22bf251b6d0
                                            • Instruction ID: 083f1b3d72dc2b4e3073d7627409da2efaae6cca9fbdfa2eb2c15b7cb2a145f7
                                            • Opcode Fuzzy Hash: bb8068f02d799d687f86b9c43e1e9df3108372b57b840b2ce394e22bf251b6d0
                                            • Instruction Fuzzy Hash: 4511E672501604EFC720AF76DC868DF7BA4EF80334F21412FF525922D1DB788981966D
                                            APIs
                                              • Part of subcall function 00438FE4: GetProcessHeap.KERNEL32(00000008,0000000C,0043910A,00000000,00000000,00000000,0044646E,?,?,?), ref: 00438FE8
                                              • Part of subcall function 00438FE4: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FEF
                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,0044646E,?,?,?), ref: 00439119
                                            • GetCurrentProcess.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439123
                                            • DuplicateHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043912C
                                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00439138
                                            • GetCurrentProcess.KERNEL32(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439142
                                            • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00439145
                                            • CreateThread.KERNEL32(00000000,00000000,004390C2,00000000,00000000,00000000), ref: 0043915E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                            • String ID:
                                            • API String ID: 1957940570-0
                                            • Opcode ID: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                            • Instruction ID: b388a4287fabc35bf2088fa38ebc9459a42e34e8a642192e1b63b89709cb9be3
                                            • Opcode Fuzzy Hash: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                            • Instruction Fuzzy Hash: 3BF0CD753413007BD220EB65DC86F5BB7A8EBC9B10F118919F6049B1D1C6B4A800CB65
                                            APIs
                                            • ___set_flsgetvalue.LIBCMT ref: 00415690
                                              • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                              • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                              • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                            • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                              • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                            • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                              • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                            • ExitThread.KERNEL32 ref: 004156BD
                                            • __freefls@4.LIBCMT ref: 004156D9
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                            • String ID:
                                            • API String ID: 4166825349-0
                                            • Opcode ID: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                            • Instruction ID: 1015f584654e325efa3cacb901eba7c9ae2b5aefa54885f90b4e6d99173acdac
                                            • Opcode Fuzzy Hash: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                            • Instruction Fuzzy Hash: 14F049745007009BD704BF72DD159DE7B69AF85345761C85FB80897222DA3DC9C1CB9C
                                            APIs
                                            • LoadLibraryA.KERNEL32(advapi32.dll,p#D,0043415E,p#D,?,00442370,?), ref: 00434134
                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00434146
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: RegDeleteKeyExW$advapi32.dll$p#D$p#D
                                            • API String ID: 2574300362-3261711971
                                            • Opcode ID: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                            • Instruction ID: cb82693085896f9455b4638215a98dd7e3cb824177552166877179ce6000b7c2
                                            • Opcode Fuzzy Hash: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                            • Instruction Fuzzy Hash: D8D05EB0400B039FCB105F24D8086AB76F4EB68700F208C2EF989A3750C7B8E8C0CB68
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                            • Instruction ID: be39947db1ffbcb7075193c31d102fc15fe4f6af8d23ce90efbce3d2b6a77a88
                                            • Opcode Fuzzy Hash: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                            • Instruction Fuzzy Hash: 4BF16D71108740AFD210DB59C880EABB7F9EFCA744F10891EF69983261D735AC45CBAA
                                            APIs
                                            • GetClientRect.USER32(?,?), ref: 00433724
                                            • GetWindowRect.USER32(00000000,?), ref: 00433757
                                            • GetClientRect.USER32(0000001D,?), ref: 004337AC
                                            • GetSystemMetrics.USER32(0000000F), ref: 00433800
                                            • GetWindowRect.USER32(?,?), ref: 00433814
                                            • ScreenToClient.USER32(?,?), ref: 00433842
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Rect$Client$Window$MetricsScreenSystem
                                            • String ID:
                                            • API String ID: 3220332590-0
                                            • Opcode ID: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                            • Instruction ID: 40e56d112be44df416332e5c874318f33691c6b0c201ea6c9f9086adb5117cf0
                                            • Opcode Fuzzy Hash: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                            • Instruction Fuzzy Hash: E9A126B42147028AC324CF68C5847ABBBF1FF98715F04991EE9D983360E775E908CB5A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _malloc_wcslen$_strcat_wcscpy
                                            • String ID:
                                            • API String ID: 1612042205-0
                                            • Opcode ID: b8a3413a850b3e9d022a14bc02158d0a95917de16b2476bc53e0af5cb97ab780
                                            • Instruction ID: 39b6431fb86a1cae222df6ecce28f21653e085caad8de22f1e35678e4483a9b6
                                            • Opcode Fuzzy Hash: b8a3413a850b3e9d022a14bc02158d0a95917de16b2476bc53e0af5cb97ab780
                                            • Instruction Fuzzy Hash: CD613B70504202EFCB10EF29D58096AB3E5FF48305B50496EF8859B306D738EE59DB9A
                                            APIs
                                            • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C588
                                            • SetKeyboardState.USER32(00000080), ref: 0044C59B
                                            • PostMessageW.USER32(?,00000104,?,?), ref: 0044C5EC
                                            • PostMessageW.USER32(?,00000100,?,?), ref: 0044C610
                                            • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C637
                                            • SendInput.USER32 ref: 0044C6E2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$InputSend
                                            • String ID:
                                            • API String ID: 2221674350-0
                                            • Opcode ID: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                            • Instruction ID: 3a634557d1668dba9f4fbb3ffee1259adddcddb7f3fce46f2ce6721246940f3b
                                            • Opcode Fuzzy Hash: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                            • Instruction Fuzzy Hash: A24148725053486AF760EF209C80BFFBB98EF95324F04151FFDC412281D66E984987BA
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcscpy$_wcscat
                                            • String ID:
                                            • API String ID: 2037614760-0
                                            • Opcode ID: 43efba16cd806b31402fe34b2becc3a5af32a5b4a383a164d4ea5773e04486ac
                                            • Instruction ID: 871aa96d6b0d5f43eceffdadd72b032f7becd6ba50fbda5e2bca5dd503650597
                                            • Opcode Fuzzy Hash: 43efba16cd806b31402fe34b2becc3a5af32a5b4a383a164d4ea5773e04486ac
                                            • Instruction Fuzzy Hash: 7D41BD31901A256BDE317F55D880BBB7358DFA1314F84006FF98247313EA6E5892C6BE
                                            APIs
                                            • BeginPaint.USER32(00000000,?,004A83D8,?), ref: 00447B9D
                                            • GetWindowRect.USER32(?,?), ref: 00447C1B
                                            • ScreenToClient.USER32(?,?), ref: 00447C39
                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                            • EndPaint.USER32(?,?), ref: 00447CD1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                            • String ID:
                                            • API String ID: 4189319755-0
                                            • Opcode ID: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                            • Instruction ID: de699fe3e67e71f806f86ee7feca1bcffcb0489daa19151882f3061068cc4b26
                                            • Opcode Fuzzy Hash: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                            • Instruction Fuzzy Hash: D14182705043019FE320DF15C8C8F7B7BA8EB89724F04466EF9548B391DB74A846CB69
                                            APIs
                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B490
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4C2
                                            • EnterCriticalSection.KERNEL32(00000000), ref: 0044B4E3
                                            • LeaveCriticalSection.KERNEL32(00000000), ref: 0044B5A0
                                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B5BB
                                              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5D1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                            • String ID:
                                            • API String ID: 1726766782-0
                                            • Opcode ID: d1f4c8b32701f3515452156a35d83f93081eba70680028f938022ee8972e20b1
                                            • Instruction ID: bf52b5dc2e344941501510e432fc863898df75637e45487ca8cd05157db66b41
                                            • Opcode Fuzzy Hash: d1f4c8b32701f3515452156a35d83f93081eba70680028f938022ee8972e20b1
                                            • Instruction Fuzzy Hash: 09415C75104701AFD320EF26D845EABB3F8EF88708F008E2DF59A92650D774E945CB6A
                                            APIs
                                            • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 004410F9
                                            • EnableWindow.USER32(?,00000000), ref: 0044111A
                                            • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 00441183
                                            • ShowWindow.USER32(?,00000004,?,?,?,00448962,004A83D8,?,?), ref: 00441192
                                            • EnableWindow.USER32(?,00000001), ref: 004411B3
                                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 004411D5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$Show$Enable$MessageSend
                                            • String ID:
                                            • API String ID: 642888154-0
                                            • Opcode ID: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                            • Instruction ID: 824eeaafe1f931a994963cd163acc5b0ce47b26168a6fd4ee38d593e4569daee
                                            • Opcode Fuzzy Hash: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                            • Instruction Fuzzy Hash: 14417770604245DFE725CF14C984FA6B7E5BF89300F1886AEE6859B3B2CB74A881CB55
                                            APIs
                                            • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 004490E3
                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004490F8
                                            • SendMessageW.USER32(00000000,0000111E,00000000,?), ref: 0044910D
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00449124
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0044912F
                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0044913C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow$InvalidateRect
                                            • String ID:
                                            • API String ID: 1976402638-0
                                            • Opcode ID: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                            • Instruction ID: 8b80d2acd15126bdfc8b54909556444574c0e56a9806921f1e0b477f33817628
                                            • Opcode Fuzzy Hash: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                            • Instruction Fuzzy Hash: F231B476244202AFF224DF04DC89FBBB7A9F785321F14492EF291973D0CA75AC469729
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 00442597
                                              • Part of subcall function 004344B7: GetWindowRect.USER32(?,?), ref: 004344D3
                                            • GetDesktopWindow.USER32 ref: 004425BF
                                            • GetWindowRect.USER32(00000000), ref: 004425C6
                                            • mouse_event.USER32(00008001,?,?,?,?), ref: 004425F5
                                              • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                            • GetCursorPos.USER32(?), ref: 00442624
                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00442690
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                            • String ID:
                                            • API String ID: 4137160315-0
                                            • Opcode ID: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                            • Instruction ID: 1581b522c3ee05a339ffa1fd07f9e8cd23967deed6539873686ea33d82c69dd2
                                            • Opcode Fuzzy Hash: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                            • Instruction Fuzzy Hash: 7C31C1B2104306ABD310DF54CD85E6BB7E9FB98304F004A2EF94597281E675E9058BA6
                                            APIs
                                            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044886C
                                            • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                            • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                            • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                            • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                            • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$Enable$Show$MessageSend
                                            • String ID:
                                            • API String ID: 1871949834-0
                                            • Opcode ID: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                            • Instruction ID: fbfed122d4da650e42f877d7e8bff2bfe9b33138fa51555fe8345b8bcc16d821
                                            • Opcode Fuzzy Hash: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                            • Instruction Fuzzy Hash: A731F3B07443819BF7248E14C8C4BAFB7D0AB95345F08482EF981A63D1DBAC9846872A
                                            APIs
                                            • _memset.LIBCMT ref: 0044961A
                                            • SendMessageW.USER32 ref: 0044964A
                                              • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 004496AC
                                            • _wcslen.LIBCMT ref: 004496BA
                                            • _wcslen.LIBCMT ref: 004496C7
                                            • SendMessageW.USER32(?,00001074,?,?), ref: 004496FD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$_wcslen$_memset_wcspbrk
                                            • String ID:
                                            • API String ID: 1624073603-0
                                            • Opcode ID: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                            • Instruction ID: 7e49a266cf7116299f7bc8659d1ce07b00adedb8b3f1b428e1954e4b11147a1e
                                            • Opcode Fuzzy Hash: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                            • Instruction Fuzzy Hash: B631CA71508300AAE720DF15DC81BEBB7D4EBD4720F504A1FFA54862D0EBBAD945C7A6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                            • Instruction ID: 0263b137e1f68684b0dae4bb7f633391a2f723f0f4072b7ce39308acd6c8c458
                                            • Opcode Fuzzy Hash: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                            • Instruction Fuzzy Hash: 31219272245110ABE7108B68DCC4B6F7798EB96374F240A3AF512C61E1EA7998C1C769
                                            APIs
                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004555AD
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: DestroyWindow$DeleteObject$IconMove
                                            • String ID:
                                            • API String ID: 1640429340-0
                                            • Opcode ID: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                            • Instruction ID: 2ee25f48dcb0ad8048bc4d9c922f6cac320a9d705fdb810e808868a6102f62dc
                                            • Opcode Fuzzy Hash: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                            • Instruction Fuzzy Hash: 05312770200A419FD724DF24C998B3A73F9FB44312F4485AAE945CB266E778EC49CB69
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __fileno__setmode$DebugOutputString_fprintf
                                            • String ID:
                                            • API String ID: 3354276064-0
                                            • Opcode ID: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                                            • Instruction ID: 1e9a75ed7ce68f0ee686932f25d41d1f14ae1a91d469003489e3a0780bce169f
                                            • Opcode Fuzzy Hash: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                                            • Instruction Fuzzy Hash: 6D11F3B2D0830136D500BA366C02AAF7A5C4A91B5CF44056EFD4563293EA2DAA4943FF
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteMenuObject$IconWindow
                                            • String ID:
                                            • API String ID: 752480666-0
                                            • Opcode ID: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                            • Instruction ID: bf467a0aa8f060071afd9cdae546a2eb92d9c059e8a57ac1e588bb5f3fc3a395
                                            • Opcode Fuzzy Hash: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                            • Instruction Fuzzy Hash: 26215E30200A019FC724DF24D5E8B7AB7A9FB44312F50855EED498B392CB39EC89CB59
                                            APIs
                                            • DestroyWindow.USER32(00000000), ref: 0045527A
                                            • ImageList_Destroy.COMCTL32(?), ref: 0045528C
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                            • String ID:
                                            • API String ID: 3275902921-0
                                            • Opcode ID: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                            • Instruction ID: c357af2a313eda44c34a26cb015c973203dd8f66e4d80e74dc1abfaeb9ce60f9
                                            • Opcode Fuzzy Hash: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                            • Instruction Fuzzy Hash: 2D217E70604A019BC714DF79D99466AB7A5BF44311F40856EF919CB342DB38E849CF68
                                            APIs
                                            • GetCurrentProcess.KERNEL32(0000000A,?,?,?,?,?,00446540,?,?,?,?,?,?,?,?,?), ref: 0043935D
                                            • OpenProcessToken.ADVAPI32(00000000,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439364
                                            • CreateEnvironmentBlock.USERENV(?,?,00000001,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439376
                                            • CloseHandle.KERNEL32(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439383
                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 004393C0
                                            • DestroyEnvironmentBlock.USERENV(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 004393D4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                            • String ID:
                                            • API String ID: 1413079979-0
                                            • Opcode ID: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                            • Instruction ID: 8c652321442b38080740e7d333ba663a52d3460857ef2618669649d87ea194c0
                                            • Opcode Fuzzy Hash: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                            • Instruction Fuzzy Hash: 7B2150B2208300ABD314CB65D854EABB7EDEBCD754F084E1DF989A3250C7B4E901CB25
                                            APIs
                                            • ___set_flsgetvalue.LIBCMT ref: 0041418F
                                            • __calloc_crt.LIBCMT ref: 0041419B
                                            • __getptd.LIBCMT ref: 004141A8
                                            • CreateThread.KERNEL32(?,?,004140DB,00000000,?,?), ref: 004141DF
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 004141E9
                                            • __dosmaperr.LIBCMT ref: 00414201
                                              • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                              • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                            • String ID:
                                            • API String ID: 1803633139-0
                                            • Opcode ID: 9093ead1b57094de5194e295d789e60ec266b8318c1e976fb280fb1b07ce6f9a
                                            • Instruction ID: ec3febacf030228bba34671a5a373aa86179f0c9a00f1e1343e4adce14cbcb36
                                            • Opcode Fuzzy Hash: 9093ead1b57094de5194e295d789e60ec266b8318c1e976fb280fb1b07ce6f9a
                                            • Instruction Fuzzy Hash: 1311DD72504209BFCB10AFA5DC828DF7BA8EF44368B20446EF50193151EB39C9C18A68
                                            APIs
                                            • ImageList_Destroy.COMCTL32(?), ref: 004555E8
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                            • String ID:
                                            • API String ID: 3275902921-0
                                            • Opcode ID: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                            • Instruction ID: 9e206caaed87a4944845468030bda76e3f946505fe2e652cce1cc100bc4c7c20
                                            • Opcode Fuzzy Hash: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                            • Instruction Fuzzy Hash: BE2141702006409FCB25DF25C994A2B77A9FF44312F80856EED49CB352DB39EC4ACB59
                                            APIs
                                            • SendMessageW.USER32 ref: 004554DF
                                            • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004554FA
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                            • String ID:
                                            • API String ID: 3691411573-0
                                            • Opcode ID: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                            • Instruction ID: ead105b7aa3a144aa2df3f4c31681f961a0d6b706109639263d1a652a664e8ec
                                            • Opcode Fuzzy Hash: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                            • Instruction Fuzzy Hash: A5118F713046419BDB10DF68DD88A2A77A8FB58322F404A2AFE14DB2D1D775DC498B68
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcslen$_wcstok$ExtentPoint32Text
                                            • String ID:
                                            • API String ID: 1814673581-0
                                            • Opcode ID: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                            • Instruction ID: 25d714350c6a951fb861184d208c8546153e966ae5ec0a2422e5c8358eb53325
                                            • Opcode Fuzzy Hash: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                            • Instruction Fuzzy Hash: F60125B19053126BC6209F95DC42B5BB7E8EF45760F11842AFD04E3340D7F8E84483EA
                                            APIs
                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362A7
                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362B2
                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362BA
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362C5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                            • String ID:
                                            • API String ID: 2833360925-0
                                            • Opcode ID: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                            • Instruction ID: c21ea81f2c38402705b15ef58ab4919efdb6e4f3ef0ac894e378511a69de5cf2
                                            • Opcode Fuzzy Hash: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                            • Instruction Fuzzy Hash: C411D031909306ABC700EF19DA8499FB7E4FFCCB11F828D2DF98592210D734C9498B96
                                            APIs
                                              • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                              • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                              • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                            • MoveToEx.GDI32(?,?,?,00000000), ref: 0044721F
                                            • LineTo.GDI32(?,?,?), ref: 00447227
                                            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447235
                                            • LineTo.GDI32(?,?,?), ref: 0044723D
                                            • EndPath.GDI32(?), ref: 0044724E
                                            • StrokePath.GDI32(?), ref: 0044725C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                            • String ID:
                                            • API String ID: 372113273-0
                                            • Opcode ID: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                            • Instruction ID: cf4011081099dc8586e946db52605055ec0608de7db987eb6b7af15cf0be2a5d
                                            • Opcode Fuzzy Hash: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                            • Instruction Fuzzy Hash: B7018F36105264BBE2119750EC4AF9FBBACEF8A710F14451DF70156191C7F42A0587BD
                                            APIs
                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0041098F
                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410997
                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004109A2
                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004109AD
                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 004109B5
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004109BD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Virtual
                                            • String ID:
                                            • API String ID: 4278518827-0
                                            • Opcode ID: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                            • Instruction ID: 14dd698fb88c41d3cb2937c08abaa7ad6cdafd80764dd657d9f2199fb51feb0a
                                            • Opcode Fuzzy Hash: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                            • Instruction Fuzzy Hash: 52112A6118ABC4ADD3329F694854A87FFE45FB6304F484A8ED1D607A43C195A60CCBBA
                                            APIs
                                            • GetDC.USER32(00000000), ref: 0044CBEF
                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC00
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC09
                                            • ReleaseDC.USER32(00000000,00000000), ref: 0044CC10
                                            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CC29
                                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0044CC37
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CapsDevice$Release
                                            • String ID:
                                            • API String ID: 1035833867-0
                                            • Opcode ID: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                            • Instruction ID: 50bf861fd692b93b916a63282857a41227f0dfa19545bc4f0a59f576ae553c11
                                            • Opcode Fuzzy Hash: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                            • Instruction Fuzzy Hash: 560184B1641314BFF6009BA1DC4AF1BBB9CEF55755F01842EFF44A7241D6B098008BA9
                                            APIs
                                            • InterlockedExchange.KERNEL32(0042A369,057401F8), ref: 0044B66E
                                            • EnterCriticalSection.KERNEL32(0042A321), ref: 0044B67B
                                            • TerminateThread.KERNEL32(?,000001F6), ref: 0044B689
                                            • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B697
                                              • Part of subcall function 004356CD: CloseHandle.KERNEL32(00000000,0042A365,0044B6A3,0042A365,?,000003E8,?,000001F6), ref: 004356D9
                                            • InterlockedExchange.KERNEL32(0042A369,000001F6), ref: 0044B6AC
                                            • LeaveCriticalSection.KERNEL32(0042A321), ref: 0044B6AF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                            • String ID:
                                            • API String ID: 3495660284-0
                                            • Opcode ID: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                            • Instruction ID: 3e278a896620ffa5fdfd5bcc44ba61fc9bc9ab212b345b13b81bb6ec37c91fca
                                            • Opcode Fuzzy Hash: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                            • Instruction Fuzzy Hash: E3F0F672141206BBD210AB24EE89DBFB37CFF44315F41096AF60142550CB75F811CBBA
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00437127
                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00437140
                                            • GetWindowThreadProcessId.USER32(?,?), ref: 00437150
                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00437162
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0043716D
                                            • CloseHandle.KERNEL32(00000000), ref: 00437174
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                            • String ID:
                                            • API String ID: 839392675-0
                                            • Opcode ID: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                            • Instruction ID: 38550948ec006cf47bed7574f40cc63f5aae242ba43c895826076912260f23cd
                                            • Opcode Fuzzy Hash: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                            • Instruction Fuzzy Hash: 37F054352813117BE6215B109E4EFEF37A8AF49F02F104828FB41B51D0E7E469458BAE
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000008,004A8E80,BC000000,00431B28,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,00000004), ref: 00436055
                                            • LockServiceDatabase.ADVAPI32(00000000), ref: 00436062
                                            • UnlockServiceDatabase.ADVAPI32(00000000), ref: 0043606D
                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00436076
                                            • GetLastError.KERNEL32 ref: 00436081
                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00436091
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Service$CloseDatabaseHandle$ErrorLastLockManagerOpenUnlock
                                            • String ID:
                                            • API String ID: 1690418490-0
                                            • Opcode ID: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                            • Instruction ID: 156e5f382d75df54ba3c5c30185d6bb62b1a9e6e0194ec4ef6b9e4a62dbea0b3
                                            • Opcode Fuzzy Hash: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                            • Instruction Fuzzy Hash: 9BE0E5319821216BC6231B30AE4DBCF3B99DB1F311F041827F701D2250CB998404DBA8
                                            APIs
                                              • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                            • CoInitialize.OLE32(00000000), ref: 00475B71
                                            • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 00475B8A
                                            • CoUninitialize.OLE32 ref: 00475D71
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                                            • String ID: .lnk$HH
                                            • API String ID: 886957087-3121654589
                                            • Opcode ID: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                            • Instruction ID: f4d7caca580305710a2a5ca379fd8543151c5613ecc12b631d1ff665410dc3a0
                                            • Opcode Fuzzy Hash: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                            • Instruction Fuzzy Hash: B0819D75604300AFD310EF65CC82F5AB3A9EF88704F50892DF658AF2D2D6B5E905CB99
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Menu$Delete$InfoItem_memset
                                            • String ID: 0
                                            • API String ID: 1173514356-4108050209
                                            • Opcode ID: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                            • Instruction ID: b3a4179b3c174fb1a3aa0d908437eb3f68f1f523a6631853a4ee88e897a1c7ed
                                            • Opcode Fuzzy Hash: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                            • Instruction Fuzzy Hash: 31418CB55043019BD710CF19C884B5BBBE5AFC5324F148A6EFCA49B282C375E809CBA6
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469368
                                            • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00469379
                                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 004693AB
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 763830540-1403004172
                                            • Opcode ID: 7f2c4204b424c93c7ac22b89fbd31dfb367e10b18f94ca1fc21d6a87b04bc3c1
                                            • Instruction ID: 8c71ebf423f389569590ff88e643f185c263fd61562863516bde62979c95be4e
                                            • Opcode Fuzzy Hash: 7f2c4204b424c93c7ac22b89fbd31dfb367e10b18f94ca1fc21d6a87b04bc3c1
                                            • Instruction Fuzzy Hash: E0210C7160020067C210BB3A9C46FAF77989B85364F09052FF959AB3D1EA7CE94A436E
                                            APIs
                                            • GetStdHandle.KERNEL32(?), ref: 004439B4
                                              • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,74DF2EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                              • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                              • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CurrentHandleProcess$Duplicate
                                            • String ID: nul
                                            • API String ID: 2124370227-2873401336
                                            • Opcode ID: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                            • Instruction ID: e5202fea31d744cc2812a948a395a4146b23d8233fafbd02014e3d546f800e0b
                                            • Opcode Fuzzy Hash: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                            • Instruction Fuzzy Hash: 8921A070104301ABE320DF28D886B9B77E4AF94B24F504E1EF9D4972D1E3B5DA54CBA6
                                            APIs
                                            • GetStdHandle.KERNEL32(000000F6), ref: 004438B7
                                              • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,74DF2EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                              • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                              • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CurrentHandleProcess$Duplicate
                                            • String ID: nul
                                            • API String ID: 2124370227-2873401336
                                            • Opcode ID: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                            • Instruction ID: 183321404fa0000a7fb955016a75d3ae5bd0bbc3c7f5d4043dd6f74a8503dfc6
                                            • Opcode Fuzzy Hash: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                            • Instruction Fuzzy Hash: 4E2182701002019BE210DF28DC45F9BB7E4AF54B34F204A1EF9E4962D0E7759654CB56
                                            APIs
                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00441333
                                            • LoadLibraryW.KERNEL32(?,?,?,?,0047B4D0,?,?,?,?,?,?,?,?,?,00000000), ref: 0044133A
                                            • SendMessageW.USER32(?,00000467,00000000,?), ref: 00441352
                                            • DestroyWindow.USER32(00000000,?,00000467,00000000,?,?,?,?,0047B4D0,?,?,?,?,?,?), ref: 0044135B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$DestroyLibraryLoadWindow
                                            • String ID: SysAnimate32
                                            • API String ID: 3529120543-1011021900
                                            • Opcode ID: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                            • Instruction ID: 28effd0bdeb99d0e0a50349a2d6ccdc4655b9339127a2247ff1827a793b197f6
                                            • Opcode Fuzzy Hash: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                            • Instruction Fuzzy Hash: D0216271204301ABF7209AA5DC84F6B73ECEBD9724F104A1EF651D72E0D6B4DC818729
                                            APIs
                                            • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000001), ref: 0044304E
                                            • TranslateMessage.USER32(?), ref: 0044308B
                                            • DispatchMessageW.USER32(?), ref: 00443096
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004430AD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Message$Peek$DispatchTranslate
                                            • String ID: *.*
                                            • API String ID: 1795658109-438819550
                                            • Opcode ID: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                            • Instruction ID: a39ada88e739a490af96418dc0f35d82e94fc94c1e76e22fe960a83301852fb1
                                            • Opcode Fuzzy Hash: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                            • Instruction Fuzzy Hash: 9F2138715183419EF720DF289C80FA3B7949B60B05F008ABFF66492191E6B99608C76E
                                            APIs
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                              • Part of subcall function 004389A1: SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                              • Part of subcall function 004389A1: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                              • Part of subcall function 004389A1: GetCurrentThreadId.KERNEL32 ref: 004389DA
                                              • Part of subcall function 004389A1: AttachThreadInput.USER32(00000000), ref: 004389E1
                                            • GetFocus.USER32 ref: 004609EF
                                              • Part of subcall function 004389EB: GetParent.USER32(?), ref: 004389F7
                                              • Part of subcall function 004389EB: GetParent.USER32(?), ref: 00438A04
                                            • GetClassNameW.USER32(?,?,00000100), ref: 00460A37
                                            • EnumChildWindows.USER32(?,00445A31,?), ref: 00460A60
                                            • __swprintf.LIBCMT ref: 00460A7A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_wcslen
                                            • String ID: %s%d
                                            • API String ID: 991886796-1110647743
                                            • Opcode ID: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                            • Instruction ID: 20a4aa43144560c0524e92d1094e5dcb4402c89d1d481f65a72662ac57dae138
                                            • Opcode Fuzzy Hash: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                            • Instruction Fuzzy Hash: 7521A4712403046BD610FB65DC8AFEFB7ACAF98704F00481FF559A7181EAB8A509877A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _memset$_sprintf
                                            • String ID: %02X
                                            • API String ID: 891462717-436463671
                                            • Opcode ID: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                            • Instruction ID: c3235ccac5cd273424cb9b73a8b9e0f10e05fa8943de770f4571b5c3e9b76774
                                            • Opcode Fuzzy Hash: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                            • Instruction Fuzzy Hash: 5B11E97225021167D314FA698C93BEE724CAB45704F50453FF541A75C1EF6CB558839E
                                            APIs
                                            • _memset.LIBCMT ref: 0042CD00
                                            • GetOpenFileNameW.COMDLG32 ref: 0042CD51
                                              • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,?,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,004A8E80,C:\Users\user\Desktop\SUNNY HONG VSL PARTICULARS.xlsx.exe,0040F3D2), ref: 0040FFCA
                                              • Part of subcall function 00410130: SHGetMalloc.SHELL32(00000000), ref: 0041013A
                                              • Part of subcall function 00410130: SHGetDesktopFolder.SHELL32(?,004A8E80), ref: 00410150
                                              • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 00410160
                                              • Part of subcall function 00410130: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410197
                                              • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 004101AC
                                              • Part of subcall function 00410020: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 00410037
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: NamePath$Full_wcscpy$DesktopFileFolderFromListMallocOpen_memset
                                            • String ID: $OH$@OH$X
                                            • API String ID: 3491138722-1394974532
                                            • Opcode ID: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                            • Instruction ID: e3e81f3fa603e1d093c5df9e9287f390c0398a0e5563e0e16fb911f44c5f658a
                                            • Opcode Fuzzy Hash: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                            • Instruction Fuzzy Hash: 2111C2B02043405BC311EF19984175FBBE9AFD5308F14882EF68497292D7FD854DCB9A
                                            APIs
                                            • LoadLibraryW.KERNEL32(00000000), ref: 00463DD1
                                            • GetProcAddress.KERNEL32(?,?), ref: 00463E68
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00463E84
                                            • GetProcAddress.KERNEL32(?,?), ref: 00463ECE
                                            • FreeLibrary.KERNEL32(?,?,?,00000000,?), ref: 00463EF0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressProc$Library$FreeLoad
                                            • String ID:
                                            • API String ID: 2449869053-0
                                            • Opcode ID: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                            • Instruction ID: 5a5949aabc30296464acd143044f95cbdcafad8a77d2d24e7d672d776762960f
                                            • Opcode Fuzzy Hash: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                            • Instruction Fuzzy Hash: 9051C1752043409FC300EF25C881A5BB7A4FF89305F00456EF945A73A2DB79EE45CBAA
                                            APIs
                                            • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C3DA
                                            • SetKeyboardState.USER32(00000080), ref: 0044C3ED
                                            • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C441
                                            • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C465
                                            • SendInput.USER32 ref: 0044C509
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: KeyboardMessagePostState$InputSend
                                            • String ID:
                                            • API String ID: 3031425849-0
                                            • Opcode ID: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                            • Instruction ID: f46f63d78903415e516a46676784f6fcea1caa301ceb581e17347d916cd8316d
                                            • Opcode Fuzzy Hash: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                            • Instruction Fuzzy Hash: DB413B715462446FF760AB24D944BBFBB94AF99324F04061FF9D4122C2D37D9908C77A
                                            APIs
                                            • RegEnumKeyExW.ADVAPI32 ref: 004422F0
                                            • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,?,?), ref: 0044232B
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0044234E
                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00442390
                                            • RegEnumKeyExW.ADVAPI32(?,00000000), ref: 004423C0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Enum$CloseDeleteOpen
                                            • String ID:
                                            • API String ID: 2095303065-0
                                            • Opcode ID: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                            • Instruction ID: 24d8057b763805d248a02a33893b377b1579bd56aab3fff97e90bb3d062a49ad
                                            • Opcode Fuzzy Hash: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                            • Instruction Fuzzy Hash: 0C3150721043056EE210DF94DD84FBF73ECEBC9314F44492EBA9596141D7B8E9098B6A
                                            APIs
                                            • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C2F4
                                            • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C31B
                                            • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C363
                                            • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C385
                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C392
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: PrivateProfile$SectionWrite$String
                                            • String ID:
                                            • API String ID: 2832842796-0
                                            • Opcode ID: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                            • Instruction ID: eb365ed5c03c4bb3a44f9ddbc5128f2f56e5f8affd5b6ace934fe40af23b551f
                                            • Opcode Fuzzy Hash: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                            • Instruction Fuzzy Hash: 00318675240305ABD610DFA1DC85F9BB3A8AF84705F00891DF94497292D7B9E889CB94
                                            APIs
                                            • GetClientRect.USER32(?,?), ref: 00447997
                                            • GetCursorPos.USER32(?), ref: 004479A2
                                            • ScreenToClient.USER32(?,?), ref: 004479BE
                                            • WindowFromPoint.USER32(?,?), ref: 004479FF
                                            • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447A78
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Client$CursorFromPointProcRectScreenWindow
                                            • String ID:
                                            • API String ID: 1822080540-0
                                            • Opcode ID: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                            • Instruction ID: e9c1e18ea4fcc9a2ad4b32cd349e8b57ec7287094a91df3c43d19f1875151664
                                            • Opcode Fuzzy Hash: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                            • Instruction Fuzzy Hash: DE3188742082029BD710CF19D88596FB7A9EBC8714F144A1EF88097291D778EA57CBAA
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00447C1B
                                            • ScreenToClient.USER32(?,?), ref: 00447C39
                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                            • EndPaint.USER32(?,?), ref: 00447CD1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ClientPaintRectRectangleScreenViewportWindow
                                            • String ID:
                                            • API String ID: 659298297-0
                                            • Opcode ID: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                            • Instruction ID: 653bb342b0117225c29b14224c0e663a7b864e912777eddc33bb147bcfad3e12
                                            • Opcode Fuzzy Hash: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                            • Instruction Fuzzy Hash: 8A3150706043019FE320CF15D9C8F7B7BE8EB89724F044A6EF994873A1D774A8468B69
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 004478A7
                                            • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478C3
                                            • DefDlgProcW.USER32(?,0000007B,?,?,004A83D8,?,004A83D8,?), ref: 004478E7
                                            • GetCursorPos.USER32(?), ref: 00447935
                                            • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 0044795B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CursorMenuPopupTrack$Proc
                                            • String ID:
                                            • API String ID: 1300944170-0
                                            • Opcode ID: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                            • Instruction ID: 600148c7f6f0e64f7aba5c2d0a58757112576a5c49d56a392ea253be37485a5b
                                            • Opcode Fuzzy Hash: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                            • Instruction Fuzzy Hash: 2B31E475244204ABE214DB48DC48FABB7A5FBC9711F14491EF64483390D7B96C4BC779
                                            APIs
                                            • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                            • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                            • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                            • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                            • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                              • Part of subcall function 004413F0: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                              • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                              • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                              • Part of subcall function 004413F0: SendMessageW.USER32(00A01A68,000000F1,00000000,00000000), ref: 004414C6
                                              • Part of subcall function 004413F0: SendMessageW.USER32(00A01A68,000000F1,00000001,00000000), ref: 004414F1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$EnableMessageSend$LongShow
                                            • String ID:
                                            • API String ID: 142311417-0
                                            • Opcode ID: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                            • Instruction ID: 53ead31d82dc60d0a1ec6489c26700cf05fac79e8a5bf65a12bf69c5108a1aee
                                            • Opcode Fuzzy Hash: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                            • Instruction Fuzzy Hash: 942105B07053809BF7148E28C8C47AFB7D0FB95345F08482EF981A6391DBAC9845C72E
                                            APIs
                                            • _memset.LIBCMT ref: 0044955A
                                              • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                            • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 004495B3
                                            • _wcslen.LIBCMT ref: 004495C1
                                            • _wcslen.LIBCMT ref: 004495CE
                                            • SendMessageW.USER32(?,00001060,00000000,?), ref: 004495FF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend_wcslen$_memset_wcspbrk
                                            • String ID:
                                            • API String ID: 1843234404-0
                                            • Opcode ID: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                            • Instruction ID: 2eba0e6ca7bf2f01d6f4dc0284c8cedbdf4c7ea0b5caad0642d64795040b3bc6
                                            • Opcode Fuzzy Hash: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                            • Instruction Fuzzy Hash: 1821F87260430556E630EB15AC81BFBB3D8EBD0761F10483FEE4081280E67E9959D3AA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                            • Instruction ID: 4734ce3ce40af5b77ad59fd8baedf6a3e56741e39cc50bb30d89ac3ca2d3bd52
                                            • Opcode Fuzzy Hash: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                            • Instruction Fuzzy Hash: 1321E0712006409BCB10EF29D994D6B73A8EF45321B40466EFE5597382DB34EC08CBA9
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 00445721
                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0044573C
                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00445773
                                            • _wcslen.LIBCMT ref: 004457A3
                                            • CharUpperBuffW.USER32(00000000,00000000), ref: 004457AD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                            • String ID:
                                            • API String ID: 3087257052-0
                                            • Opcode ID: 707967777abbcb615846d4014dd15678eb91240126a64b2d293a4799175c36b7
                                            • Instruction ID: 00e09c3d40749c53521e9302b0eb92bb7bfe2d7d521d01ead8474e6f611d5aec
                                            • Opcode Fuzzy Hash: 707967777abbcb615846d4014dd15678eb91240126a64b2d293a4799175c36b7
                                            • Instruction Fuzzy Hash: FA11E972601741BBF7105B35DC46F5B77CDAF65320F04443AF40AE6281FB69E84583AA
                                            APIs
                                            • IsWindow.USER32(00000000), ref: 00459DEF
                                            • GetForegroundWindow.USER32 ref: 00459E07
                                            • GetDC.USER32(00000000), ref: 00459E44
                                            • GetPixel.GDI32(00000000,?,00000000), ref: 00459E4F
                                            • ReleaseDC.USER32(00000000,00000000), ref: 00459E8B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$ForegroundPixelRelease
                                            • String ID:
                                            • API String ID: 4156661090-0
                                            • Opcode ID: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                            • Instruction ID: f25aa70a507d7fb142791e963b89e5313ab4350e7ab13503248c443e15a863bf
                                            • Opcode Fuzzy Hash: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                            • Instruction Fuzzy Hash: 76219D76600202ABD700EFA5CD49A5AB7E9FF84315F19483DF90597642DB78FC04CBA9
                                            APIs
                                              • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 00464985
                                            • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,00000000), ref: 00464993
                                            • connect.WSOCK32(00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649CD
                                            • WSAGetLastError.WSOCK32(00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649F4
                                            • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 00464A07
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                            • String ID:
                                            • API String ID: 245547762-0
                                            • Opcode ID: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
                                            • Instruction ID: b27d5ee258410aac5bd3077dd9c53ce90635b59006b610d0ec7ee295a05cd03d
                                            • Opcode Fuzzy Hash: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
                                            • Instruction Fuzzy Hash: 3211DA712002109BD310FB2AC842F9BB3D8AF85728F04895FF594A72D2D7B9A885875A
                                            APIs
                                            • DeleteObject.GDI32(00000000), ref: 00447151
                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                            • SelectObject.GDI32(?,00000000), ref: 004471A2
                                            • BeginPath.GDI32(?), ref: 004471B7
                                            • SelectObject.GDI32(?,00000000), ref: 004471DC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Object$Select$BeginCreateDeletePath
                                            • String ID:
                                            • API String ID: 2338827641-0
                                            • Opcode ID: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                            • Instruction ID: ab30216038401830d00444c504d41f25dcbf82a6e2307e0a418987ed8484b610
                                            • Opcode Fuzzy Hash: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                            • Instruction Fuzzy Hash: 7E2171B18083019FD320CF29AD44A1B7FACF74A724F14052FF654933A1EB789849CB69
                                            APIs
                                            • Sleep.KERNEL32(00000000,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043771E
                                            • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043773C
                                            • Sleep.KERNEL32(00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043775C
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,004448B6,0000000F,?), ref: 00437767
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CounterPerformanceQuerySleep
                                            • String ID:
                                            • API String ID: 2875609808-0
                                            • Opcode ID: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                            • Instruction ID: fd8a8a83491f03de43ea78fbc63302b75a2fa5438857304713168bbc83ca9150
                                            • Opcode Fuzzy Hash: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                            • Instruction Fuzzy Hash: EA11A3B64093119BC210EF1ADA88A8FB7F4FFD8765F004D2EF9C462250DB34D5598B9A
                                            APIs
                                            • SendMessageW.USER32 ref: 0046FD00
                                            • SendMessageW.USER32(?,0000104C,00000000,?), ref: 0046FD2E
                                            • SendMessageW.USER32(?,00001015,?,?), ref: 0046FD4B
                                            • DestroyIcon.USER32(?), ref: 0046FD58
                                            • DestroyIcon.USER32(?), ref: 0046FD5F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$DestroyIcon
                                            • String ID:
                                            • API String ID: 3419509030-0
                                            • Opcode ID: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                            • Instruction ID: ba7c1cc62690e465ab1dcb48fa3e0f79152c3dc78d34179caeeeb49ed344ab69
                                            • Opcode Fuzzy Hash: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                            • Instruction Fuzzy Hash: 5F1182B15043449BE730DF14DC46BABB7E8FBC5714F00492EE6C857291D6B8A84A8B67
                                            APIs
                                            • __getptd.LIBCMT ref: 004175AE
                                              • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                              • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                            • __amsg_exit.LIBCMT ref: 004175CE
                                            • __lock.LIBCMT ref: 004175DE
                                            • InterlockedDecrement.KERNEL32(?), ref: 004175FB
                                            • InterlockedIncrement.KERNEL32(00A02D00), ref: 00417626
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                            • String ID:
                                            • API String ID: 4271482742-0
                                            • Opcode ID: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                            • Instruction ID: de548182bd5f57d4f8c9f8a4c79293bfa6802d75d0085d2526eaa3c6a777046b
                                            • Opcode Fuzzy Hash: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                            • Instruction Fuzzy Hash: 9401AD31944A11AFC710ABA998497CE7BB0BB11724F0540ABE80063791CB3CA9C1CFEE
                                            APIs
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteObjectWindow$Icon
                                            • String ID:
                                            • API String ID: 4023252218-0
                                            • Opcode ID: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                            • Instruction ID: d1816f9fa450f538fb043821254e2bd2cfb9ade9207d957631f6d0e9d50691b6
                                            • Opcode Fuzzy Hash: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                            • Instruction Fuzzy Hash: 05015E70300605ABCB20DF65D9D4B2B77A8BF14712B50452AFD04D7346EB38EC48CB69
                                            APIs
                                            • GetDlgItem.USER32(?,000003E9), ref: 00460342
                                            • GetWindowTextW.USER32(00000000,00000100,00000100), ref: 00460357
                                            • MessageBeep.USER32(00000000), ref: 0046036D
                                            • KillTimer.USER32(?,0000040A), ref: 00460392
                                            • EndDialog.USER32(?,00000001), ref: 004603AB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                            • String ID:
                                            • API String ID: 3741023627-0
                                            • Opcode ID: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                            • Instruction ID: 48c257e0c270193328064fa19c5b46d6a870d8092b70dfec968bdaebd9a60f08
                                            • Opcode Fuzzy Hash: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                            • Instruction Fuzzy Hash: BE018831500300A7E7209B54DE5DBDB77A8BF44B05F00492EB681A25D0E7F8A584CB55
                                            APIs
                                            • SendMessageW.USER32(?,00001101,00000000,?), ref: 00455514
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: DeleteDestroyObject$IconMessageSendWindow
                                            • String ID:
                                            • API String ID: 1489400265-0
                                            • Opcode ID: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                            • Instruction ID: 68d82c845863845e83b9d92669df32d5d1b96a6c2c0272d07869f65424c05900
                                            • Opcode Fuzzy Hash: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                            • Instruction Fuzzy Hash: D9014F703006419BDB10EF65DED8A2A73A9FB44712B40455AFE05DB286DB78EC49CB68
                                            APIs
                                              • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                            • String ID:
                                            • API String ID: 1042038666-0
                                            • Opcode ID: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                            • Instruction ID: 707d1f3050e1f0ff98422ce5efa9f9a4d3559fdafbc0a23101ed238e91bf2869
                                            • Opcode Fuzzy Hash: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                            • Instruction Fuzzy Hash: B2014B702006419BCB10AF65D9C8A2A33ACAF19322780456AFD05D7242DB28EC498B79
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                            • String ID:
                                            • API String ID: 2625713937-0
                                            • Opcode ID: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                            • Instruction ID: 1b0d13c7bbaa275692c81ef4a4760df4fcf6218f807946f7e03cce85d1463269
                                            • Opcode Fuzzy Hash: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                            • Instruction Fuzzy Hash: F7F0A4751052019BD7508F18EC0C70E7FA8FB4F325F04462EEA19932E0DB781546CBAD
                                            APIs
                                              • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                            • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                              • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                              • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                              • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                            • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                              • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                            • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                              • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                            • ExitThread.KERNEL32 ref: 0041410F
                                            • GetCurrentThreadId.KERNEL32 ref: 00414115
                                            • __freefls@4.LIBCMT ref: 00414135
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                            • String ID:
                                            • API String ID: 132634196-0
                                            • Opcode ID: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                            • Instruction ID: c6f54ac6c47f72d6c6be617d0ab0d95393642b3a08ca47198428750b18cc63fb
                                            • Opcode Fuzzy Hash: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                            • Instruction Fuzzy Hash: EFE0B6318012096B8F0177F28E2A8DF3A2DAD56799B12842EBF10A3112DA6DD9D147AD
                                            APIs
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00415610
                                              • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                            • __getptd_noexit.LIBCMT ref: 00415620
                                            • CloseHandle.KERNEL32(?,?,0041566B), ref: 00415634
                                            • __freeptd.LIBCMT ref: 0041563B
                                            • ExitThread.KERNEL32 ref: 00415643
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CloseCurrentExitFindHandleImageNonwritableSectionThread__freeptd__getptd_noexit
                                            • String ID:
                                            • API String ID: 3798957060-0
                                            • Opcode ID: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                            • Instruction ID: 5ad9b57b40d8b41da6f03c32f2a15b2799e0bbfe2e5ad1689210a27a588f1b2a
                                            • Opcode Fuzzy Hash: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                            • Instruction Fuzzy Hash: 29E01A31501A1197C2212BB9AC097DE3255AF01F36F944A6EF81A952A0DB6CD98147AD
                                            APIs
                                              • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                            • ___set_flsgetvalue.LIBCMT ref: 00415690
                                              • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                              • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                              • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                            • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                              • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                            • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                              • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                            • ExitThread.KERNEL32 ref: 004156BD
                                            • __freefls@4.LIBCMT ref: 004156D9
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                            • String ID:
                                            • API String ID: 1537469427-0
                                            • Opcode ID: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                            • Instruction ID: 6f4b581ce684dac4bce1a6396b1ab204a3b2196504341234b7a244e47b3a25b0
                                            • Opcode Fuzzy Hash: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                            • Instruction Fuzzy Hash: 83E0E6308003096BCF0037F29E1A9DF392DAD41389B52841E7E14B2122DE6DD9D1466D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _malloc
                                            • String ID: Default$|k
                                            • API String ID: 1579825452-2254895183
                                            • Opcode ID: 3487a4ebd3b6326aef9d7885c20b94cf9b3333ebd549fd878091b2165ba8d13b
                                            • Instruction ID: 39a525bc613f0e7e9485e4ea944b13d532e73913c0a35fc25f8fa2b96209a7b9
                                            • Opcode Fuzzy Hash: 3487a4ebd3b6326aef9d7885c20b94cf9b3333ebd549fd878091b2165ba8d13b
                                            • Instruction Fuzzy Hash: 51F19F706083018BD714DF25C484A6BB7E5AF85314F64886FF885AB392D738EC55CB9B
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _memcmp
                                            • String ID: '$[$h
                                            • API String ID: 2931989736-1224472061
                                            • Opcode ID: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
                                            • Instruction ID: c2eec353cbd26a418970a1643da97c958d9efd09d44d369c5aec2a2e92b02032
                                            • Opcode Fuzzy Hash: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
                                            • Instruction Fuzzy Hash: EBE1B3756083858FE725CF28C8807ABBBE1FFC9304F18896EE89587341D7799849CB56
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _strncmp
                                            • String ID: >$R$U
                                            • API String ID: 909875538-1924298640
                                            • Opcode ID: 83caccdc30ebaedd60eda3635d3ed4fa95617b34971efb7504fa10d53abc7e5a
                                            • Instruction ID: f6794502b7c89560a677b30a08de70cb8bc1b17d125f16f135907c58c8460d8d
                                            • Opcode Fuzzy Hash: 83caccdc30ebaedd60eda3635d3ed4fa95617b34971efb7504fa10d53abc7e5a
                                            • Instruction Fuzzy Hash: 46E19C745083818FEB25CF29C49076BBBE1EFD9304F28496EE89587381D378E849CB56
                                            APIs
                                              • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                            • CoInitialize.OLE32(00000000), ref: 0046CE18
                                            • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
                                            • CoUninitialize.OLE32 ref: 0046CE50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                                            • String ID: .lnk
                                            • API String ID: 886957087-24824748
                                            • Opcode ID: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                            • Instruction ID: 09ec1e36491b9dee8eccbfa157b0fc1a83632a56aae6c10d58f94140378ad3aa
                                            • Opcode Fuzzy Hash: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                            • Instruction Fuzzy Hash: D3A1ABB5A042019FC704EF64C980E6BB7E9EF88714F14895EF8849B392D735EC45CBA6
                                            Strings
                                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00469C37
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcslen
                                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                            • API String ID: 176396367-557222456
                                            • Opcode ID: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                            • Instruction ID: 5ec49088f7a0f5eff408c40ec761cfb1cab3d77d8e9f1d748350f88cc39ab646
                                            • Opcode Fuzzy Hash: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                            • Instruction Fuzzy Hash: 2C818F715183009FC310EF65C88186BB7E8AF85714F408A2FF5959B2A2E778ED45CB9B
                                            APIs
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                            • VariantInit.OLEAUT32(00000000), ref: 0042D2E0
                                            • VariantCopy.OLEAUT32(?,?), ref: 0042D2EE
                                            • VariantClear.OLEAUT32(00000000), ref: 0042D2FF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCopyInit_malloc
                                            • String ID: 4RH
                                            • API String ID: 2981388473-749298218
                                            • Opcode ID: 4feaa528d6096a3eb4cb9403f6e39e38e90fdea1ed4b6218c2cb6dc4c25be61b
                                            • Instruction ID: 2430bd0654d197d786bc988f6f01769df72c779a088326c60667d263ff95ce9f
                                            • Opcode Fuzzy Hash: 4feaa528d6096a3eb4cb9403f6e39e38e90fdea1ed4b6218c2cb6dc4c25be61b
                                            • Instruction Fuzzy Hash: CC913874A083519FC720CF29D480A1AB7E1FF89304F64892EE999DB351D774EC85CB96
                                            APIs
                                              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                            • __wcsnicmp.LIBCMT ref: 0046681A
                                            • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 004668B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                            • String ID: LPT$HH
                                            • API String ID: 3035604524-2728063697
                                            • Opcode ID: 2945cb5b31277d8c8021d55f3d7ec86f9f5d8a101f6134c00f702d091f19bef7
                                            • Instruction ID: 32c7950bcbaa764ae6d62266904c1b9f72d26d84b6ae022b5f72856ccecd4d84
                                            • Opcode Fuzzy Hash: 2945cb5b31277d8c8021d55f3d7ec86f9f5d8a101f6134c00f702d091f19bef7
                                            • Instruction Fuzzy Hash: 2151D5B16043009FC720EF65C881B1BB7E5AF85704F11491EFA859B382E779ED49C79A
                                            APIs
                                              • Part of subcall function 004374AF: WriteProcessMemory.KERNEL32(?,?,00000000,00000000,00000000,?,00461142,?), ref: 004374E2
                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00438AB8
                                              • Part of subcall function 00437472: ReadProcessMemory.KERNEL32(?,00000000,00000000,?,00000000,00000000,00460C33,?,00000000,?,00000202), ref: 004374A5
                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00438B2F
                                            • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 00438BAF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$MemoryProcess$ReadWrite
                                            • String ID: @
                                            • API String ID: 4055202900-2766056989
                                            • Opcode ID: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                            • Instruction ID: 682097a2b5231093ce935cfc9f6f49684b756042c0be5430c67da702d62f7190
                                            • Opcode Fuzzy Hash: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                            • Instruction Fuzzy Hash: E6518FB2208304ABD310DB64CC81FEFB7A9EFC9714F04591EFA8597181D678F9498B66
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CrackInternet_memset_wcslen
                                            • String ID: |
                                            • API String ID: 915713708-2343686810
                                            • Opcode ID: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                            • Instruction ID: 59fb16093b155e5aebf0565036b17e76eaaa1a90c891d08183ce313382d628e9
                                            • Opcode Fuzzy Hash: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                            • Instruction Fuzzy Hash: AE417EB2754301ABD204EF69DC81B9BF7E8FB88714F00052EF64593290DB75E909CBA6
                                            APIs
                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A7FE
                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A851
                                            • HttpQueryInfoW.WININET ref: 0044A892
                                              • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                            • String ID:
                                            • API String ID: 3705125965-3916222277
                                            • Opcode ID: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                            • Instruction ID: e2ea4e726a01332d61d4ddbc0b4be6fd5f15ca60b5c099a75bcf819f780d651a
                                            • Opcode Fuzzy Hash: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                            • Instruction Fuzzy Hash: F431C6B56813416BE320EB16DC42F9FB7E8EFD9714F00091FF65057281D7A8A50D876A
                                            APIs
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00450A84
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00450AA2
                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00450AB3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$Long
                                            • String ID: SysTreeView32
                                            • API String ID: 847901565-1698111956
                                            • Opcode ID: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                            • Instruction ID: 1ec52148e0427fd314aa46f8515fbaae5756f8dde681787cc4d1a4a364837cef
                                            • Opcode Fuzzy Hash: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                            • Instruction Fuzzy Hash: 9831E670244301AFE710DB64CC84B6BB3E8EF98325F104A1EF9A5932D1D7B8AD85CB25
                                            APIs
                                            • LoadLibraryA.KERNEL32(?), ref: 00437CB2
                                            • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00437D26
                                            • FreeLibrary.KERNEL32(?,?,AU3_GetPluginDetails), ref: 00437D3D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Library$AddressFreeLoadProc
                                            • String ID: AU3_GetPluginDetails
                                            • API String ID: 145871493-4132174516
                                            • Opcode ID: 86e4c61e32d2ed878dfd7fe720ec64e92d9a8cb9aafa3c38a6749b64446316ec
                                            • Instruction ID: 909018a8305b4cb0ce841e730e5bf8c258fddf5044228ae68d4d210ccee2088c
                                            • Opcode Fuzzy Hash: 86e4c61e32d2ed878dfd7fe720ec64e92d9a8cb9aafa3c38a6749b64446316ec
                                            • Instruction Fuzzy Hash: 054147B96042019FC314DF68D8C4D5AF3E5FF8D304B20866EE9568B751DB35E802CB96
                                            APIs
                                            • DestroyWindow.USER32(00000000,004A83D8,00000000,?,?), ref: 00450C60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: DestroyWindow
                                            • String ID: msctls_updown32
                                            • API String ID: 3375834691-2298589950
                                            • Opcode ID: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                            • Instruction ID: 6a1e1189e42626fde14bc74b9d87f1f450c181bb0fe7a510af516aef360d3f61
                                            • Opcode Fuzzy Hash: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                            • Instruction Fuzzy Hash: CE31A279300201AFD624DF54DC81F5B73A9EB9A714F20451EF640AB382C7B4AC4ACB6A
                                            APIs
                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0045122A
                                            • SendMessageW.USER32(00000000,00000186,00000000,00000000), ref: 00451238
                                            • MoveWindow.USER32(?,?,00000000,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 0045125D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$MoveWindow
                                            • String ID: Listbox
                                            • API String ID: 3315199576-2633736733
                                            • Opcode ID: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                            • Instruction ID: bfe1e9b3800f224edd0053b2d0d87a77da448e7bf5b17050dc61905274d7532a
                                            • Opcode Fuzzy Hash: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                            • Instruction Fuzzy Hash: E421D3712043047BE6209A65DC81F6BB3E8EBCD735F104B1EFA60A72D1C675EC458729
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D243
                                            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D2C7
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D30C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ErrorMode$InformationVolume
                                            • String ID: HH
                                            • API String ID: 2507767853-2761332787
                                            • Opcode ID: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                            • Instruction ID: 4a708fd112bc3492f79fb502a293ca5b83a6a9b53d4ab80d782c21126568c1ab
                                            • Opcode Fuzzy Hash: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                            • Instruction Fuzzy Hash: 622148756083019FC310EF55D944A6BB7E4FF88704F40882EFA45972A2D774E909CB5A
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D44A
                                            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CE
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D502
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ErrorMode$InformationVolume
                                            • String ID: HH
                                            • API String ID: 2507767853-2761332787
                                            • Opcode ID: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                            • Instruction ID: 8e4373afe1f51974a95c06a3ae407364d3098df30383bdf5f9e51316f0e0b5c8
                                            • Opcode Fuzzy Hash: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                            • Instruction Fuzzy Hash: 902137756083019FC314EF55D944A5AB7E8FF88710F40882EFA49972A2D778E909CB9A
                                            APIs
                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450D74
                                            • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450D8A
                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450D98
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: msctls_trackbar32
                                            • API String ID: 3850602802-1010561917
                                            • Opcode ID: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                            • Instruction ID: c83169f0c5ec68c29a3e9aa847b4a28030a04f73c00385235601d1c9d4ce90e2
                                            • Opcode Fuzzy Hash: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                            • Instruction Fuzzy Hash: 4F1193717403117BE610CAA8DC81F5B73E8AB98B25F204A1AFA50A72C1D2B4FC458B68
                                            APIs
                                              • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                            • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046BD78
                                            • WSAGetLastError.WSOCK32(00000000,?,?,00000000,?,?), ref: 0046BD83
                                            • inet_ntoa.WSOCK32(00000000,?), ref: 0046BDCD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ByteCharErrorLastMultiWidegethostbynameinet_ntoa
                                            • String ID: HH
                                            • API String ID: 1515696956-2761332787
                                            • Opcode ID: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
                                            • Instruction ID: 2fad99cf3c45da3a785a9a513efbde0c8943f1fdc9598a344110207fd9df59bd
                                            • Opcode Fuzzy Hash: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
                                            • Instruction Fuzzy Hash: E21142765043006BC744FB66D885D9FB3A8AFC4318F448C2EF945A7242DA39E949876A
                                            APIs
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                            • GetMenuItemInfoW.USER32 ref: 004497EA
                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00449817
                                            • DrawMenuBar.USER32 ref: 00449828
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Menu$InfoItem$Draw_malloc
                                            • String ID: 0
                                            • API String ID: 772068139-4108050209
                                            • Opcode ID: aba2b2f37e8aede0e07af882035f7c7ba327ed0a8d43e4983355c33413849c0f
                                            • Instruction ID: 895394c4ac3d8cdb9511dba433443d5742fa96e32f07ab63668b9f5a94eb31d1
                                            • Opcode Fuzzy Hash: aba2b2f37e8aede0e07af882035f7c7ba327ed0a8d43e4983355c33413849c0f
                                            • Instruction Fuzzy Hash: 941182B16042009BF730EB55EC96FABB7A8FB91714F00452EE648CA281DB7A9445CB76
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AllocTask_wcslen
                                            • String ID: hkG
                                            • API String ID: 2651040394-3610518997
                                            • Opcode ID: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                            • Instruction ID: 372044899b15e8c53ead78f1c779643819f92c4817f04f111663958edd7e2adf
                                            • Opcode Fuzzy Hash: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                            • Instruction Fuzzy Hash: DCE065736442225B97506A79AC045CBA7D8AFB0370B15482BF880E7310E278E89643E5
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0043417A
                                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0043418C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                            • API String ID: 2574300362-1816364905
                                            • Opcode ID: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                            • Instruction ID: 1a9860a365f0c849ce8c10f1c40c5c80f9dda93506fd3415c38c98a37cde1a5a
                                            • Opcode Fuzzy Hash: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                            • Instruction Fuzzy Hash: F9D05EB1440B039FCB109FA0D80C64BB6E4AB64301F148C2EF885B2654D7B8E8C0CBA8
                                            APIs
                                            • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434466,?,?,00464B68,?,?,?,?,?,00000000,?,?,00000101,?), ref: 004343DE
                                            • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004343F0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: ICMP.DLL$IcmpSendEcho
                                            • API String ID: 2574300362-58917771
                                            • Opcode ID: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                            • Instruction ID: bde82dd314f67bb94adb8237e566b22d9cd50c1f3059090bebd97951f1ce1dc3
                                            • Opcode Fuzzy Hash: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                            • Instruction Fuzzy Hash: C9D017B45043039BD7105B21D80874A76E4AF58310F118C2FF881E2250CBBCE8808B79
                                            APIs
                                            • LoadLibraryA.KERNEL32(ICMP.DLL,?,0043447D,?,?,00464B56,?,?,?,?,00000000,?,?,00000101,?,?), ref: 0043440D
                                            • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 0043441F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: ICMP.DLL$IcmpCloseHandle
                                            • API String ID: 2574300362-3530519716
                                            • Opcode ID: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                            • Instruction ID: 815a2f2ef77883dfca24b23846b24e776c3b140ddfaf16f0983d17b56328066b
                                            • Opcode Fuzzy Hash: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                            • Instruction Fuzzy Hash: 9FD017B04443129AD7106B64D80874A76E4AB68302F129C3FF881A2660C7BCA8808B39
                                            APIs
                                            • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434494,?,?,00464A94,?), ref: 0043443C
                                            • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0043444E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: ICMP.DLL$IcmpCreateFile
                                            • API String ID: 2574300362-275556492
                                            • Opcode ID: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                            • Instruction ID: c247b13c068300da1972229949477068df6ba5342f41feac8fae2a533bc96115
                                            • Opcode Fuzzy Hash: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                            • Instruction Fuzzy Hash: 97D017B04043029ADB105B60D90875A77E4AB68300F118C7FF9A1A2250C7BCA8808B29
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,0040E551,?), ref: 0040EE7B
                                            • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040EE8D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: IsWow64Process$kernel32.dll
                                            • API String ID: 2574300362-3024904723
                                            • Opcode ID: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                                            • Instruction ID: 75875fa2f3f8b89ed4c8cde0d061cde3839b728dd3838c322d7dfd2ddbff31fa
                                            • Opcode Fuzzy Hash: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                                            • Instruction Fuzzy Hash: 51D0C9B0940707DAC7301F72C91871B7AE4AB40342F204C3EB995A1290DBBCC0408B28
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,0040E5BF,?), ref: 0040EEEB
                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0040EEFD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                            • API String ID: 2574300362-192647395
                                            • Opcode ID: 58ac1dddc1eea1967b9e3df612208a50857473a21dbb81c427901d39c1ebcba1
                                            • Instruction ID: 788ba9bdae5bc0ddad915f4d08bdcf590d5e3b2ea1e3da194f5c7121584c3133
                                            • Opcode Fuzzy Hash: 58ac1dddc1eea1967b9e3df612208a50857473a21dbb81c427901d39c1ebcba1
                                            • Instruction Fuzzy Hash: ABD0C9B0944703AAC7311F72C91C70A7AE4AB40341F204C3EB996E1691DBBCC0508B2C
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: c8a8680659340ce3ae7b61d15611f915275d61821cdaab737acf418eefb31e18
                                            • Instruction ID: 4e1e522645e86f73b8885f2d86dba7d443b77ce6b8f7ad4508257b27d10f8221
                                            • Opcode Fuzzy Hash: c8a8680659340ce3ae7b61d15611f915275d61821cdaab737acf418eefb31e18
                                            • Instruction Fuzzy Hash: 3DD18D746003018FD724DF25D484A26B7E1EF49704F64887EE9899B3A1D739EC92CB9A
                                            APIs
                                            • __flush.LIBCMT ref: 00414630
                                            • __fileno.LIBCMT ref: 00414650
                                            • __locking.LIBCMT ref: 00414657
                                            • __flsbuf.LIBCMT ref: 00414682
                                              • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                              • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                            • String ID:
                                            • API String ID: 3240763771-0
                                            • Opcode ID: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                            • Instruction ID: ec1a4dff6c5341ad57a53ba98b0f539b864df2cc4a0ba96fecd891c5d8a4160d
                                            • Opcode Fuzzy Hash: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                            • Instruction Fuzzy Hash: 4841A571A00605ABDB249FA5C9445DFB7B6EFC1328F28852FE41997280D77CDEC18B48
                                            APIs
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                            • VariantCopy.OLEAUT32(?,?), ref: 00478259
                                            • VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                            • VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CopyVariant$ErrorLast
                                            • String ID:
                                            • API String ID: 2286883814-0
                                            • Opcode ID: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                            • Instruction ID: 2d87100fc18953c9afe9b7e879878e48daa4ef19e0256d9a4550ae3fa38499cf
                                            • Opcode Fuzzy Hash: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                            • Instruction Fuzzy Hash: 5F517C751543409FC310DF69C880A9BBBE4FF88314F448A6EF9499B352DB39E909CB99
                                            APIs
                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 00474068
                                            • WSAGetLastError.WSOCK32(00000000,00000002,00000002,00000011), ref: 00474076
                                            • #21.WSOCK32 ref: 004740E0
                                            • WSAGetLastError.WSOCK32(00000000), ref: 004740EB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ErrorLast$socket
                                            • String ID:
                                            • API String ID: 1881357543-0
                                            • Opcode ID: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
                                            • Instruction ID: ff1742a21ceaee7448286ece46cbaad1fa76dded649dcd1b12ff87c083dae87e
                                            • Opcode Fuzzy Hash: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
                                            • Instruction Fuzzy Hash: 7641D9717403006AE720BF6ADC47F5672C89B54B18F14496EF648BF2C3D6FAA881869C
                                            APIs
                                            • ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                            • GetWindowRect.USER32(?,?), ref: 00441D5A
                                            • PtInRect.USER32(?,?,?), ref: 00441D6F
                                            • MessageBeep.USER32(00000000), ref: 00441DF2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Rect$BeepClientMessageScreenWindow
                                            • String ID:
                                            • API String ID: 1352109105-0
                                            • Opcode ID: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                            • Instruction ID: 11ad13a84751b34e4f8a983c71a6a29643224e7bbeba0240db3aabd8edeb2108
                                            • Opcode Fuzzy Hash: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                            • Instruction Fuzzy Hash: E64192B5A042418FE710DF18D884AABB7E5FFC9311F18866FE8518B360D734AC85CBA5
                                            APIs
                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042387E
                                            • __isleadbyte_l.LIBCMT ref: 004238B2
                                            • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 004238E3
                                            • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 00423951
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                            • String ID:
                                            • API String ID: 3058430110-0
                                            • Opcode ID: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                            • Instruction ID: 550681b3841f0f34ee613cb5364b25607849a03987ccfca5eaaec14299199b49
                                            • Opcode Fuzzy Hash: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                            • Instruction Fuzzy Hash: A931C270B00265EFDB20EF64D8849AA7BF5EF01312B9445AAF0A09F291D338CE81CB55
                                            APIs
                                            • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D10A
                                            • GetLastError.KERNEL32(?,00000000), ref: 0045D12B
                                            • DeleteFileW.KERNEL32(00000000,?), ref: 0045D14C
                                            • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0045D16A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                            • String ID:
                                            • API String ID: 3321077145-0
                                            • Opcode ID: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                            • Instruction ID: 240381fd0e223f31e6bb83dc4f900fe278965bce5f9bbaa9f824fb1079ab41c9
                                            • Opcode Fuzzy Hash: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                            • Instruction Fuzzy Hash: 393180B5900301ABCB10AF71C985A1BF7E8AF84755F10891EF85497392C739FC45CB68
                                            APIs
                                            • GetParent.USER32(?), ref: 004505BF
                                            • DefDlgProcW.USER32(?,00000138,?,?,004A83D8,?,004A83D8,?), ref: 00450610
                                            • DefDlgProcW.USER32(?,00000133,?,?,004A83D8,?,004A83D8,?), ref: 0045065A
                                            • DefDlgProcW.USER32(?,00000134,?,?,004A83D8,?,004A83D8,?), ref: 00450688
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Proc$Parent
                                            • String ID:
                                            • API String ID: 2351499541-0
                                            • Opcode ID: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                            • Instruction ID: e3e31f905615dd8bfbe674c7a91f48f64006a8638b4dc9b760805e547d05c650
                                            • Opcode Fuzzy Hash: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                            • Instruction Fuzzy Hash: 8C3128362411006BC2209B299C58DBB7B58EBC7336F14465BFA54832D3CB769826C768
                                            APIs
                                              • Part of subcall function 00438C85: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00438C95
                                              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                            • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 00461420
                                            • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 0046144F
                                            • __itow.LIBCMT ref: 00461461
                                            • __itow.LIBCMT ref: 004614AB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$__itow$_wcslen
                                            • String ID:
                                            • API String ID: 2875217250-0
                                            • Opcode ID: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                            • Instruction ID: b65c482f8247f617b799fd724a7506577ebf884cdb52d0d4602b18db992df379
                                            • Opcode Fuzzy Hash: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                            • Instruction Fuzzy Hash: 3A213D7670031067D210BA169C86FAFB794EB94714F08443FFF44AB241EE69E94687EB
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 00472806
                                              • Part of subcall function 00443EEF: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 00443F11
                                              • Part of subcall function 00443EEF: GetCurrentThreadId.KERNEL32 ref: 00443F18
                                              • Part of subcall function 00443EEF: AttachThreadInput.USER32(00000000), ref: 00443F1F
                                            • GetCaretPos.USER32(?), ref: 0047281A
                                            • ClientToScreen.USER32(00000000,?), ref: 00472856
                                            • GetForegroundWindow.USER32 ref: 0047285C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                            • String ID:
                                            • API String ID: 2759813231-0
                                            • Opcode ID: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                            • Instruction ID: 38f02bd9b1f6bed34cfa7ce2d7f69328ba3456287a0ba45db7850a86b8391dd2
                                            • Opcode Fuzzy Hash: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                            • Instruction Fuzzy Hash: FF2195716403056FE310EF65CC42F5BB7E8AF84708F144D2EF544AB282D6FAB9858795
                                            APIs
                                              • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                            • GetWindowLongW.USER32(?,000000EC), ref: 0047728E
                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772A9
                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772C0
                                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772D0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$Long$AttributesLayered
                                            • String ID:
                                            • API String ID: 2169480361-0
                                            • Opcode ID: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                            • Instruction ID: faea1ea985e506ac999786301d765d91882fdca708237d94abe4bce3661c65f1
                                            • Opcode Fuzzy Hash: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                            • Instruction Fuzzy Hash: 5F11B431205510ABD310FB29DD45F9BB798FF91720F10862EF455E72E2C7A8AC45C7A8
                                            APIs
                                            • SendMessageW.USER32 ref: 00448CB8
                                            • GetWindowLongW.USER32(?,000000EC), ref: 00448CE0
                                            • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448D19
                                            • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow
                                            • String ID:
                                            • API String ID: 312131281-0
                                            • Opcode ID: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                            • Instruction ID: 9d6bf2a2f0cb0d5184a29e15ea511504db1ac53b4253ca88fa0f688086887250
                                            • Opcode Fuzzy Hash: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                            • Instruction Fuzzy Hash: B12174715053019BF3208F18D98879FB7E4FBD5325F140B2EF594962D0DBB58449C796
                                            APIs
                                            • select.WSOCK32 ref: 0045890A
                                            • __WSAFDIsSet.WSOCK32(00000000,00000000), ref: 00458919
                                            • accept.WSOCK32(00000000,00000000,00000000,00000000,00000000), ref: 00458927
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00458952
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ErrorLastacceptselect
                                            • String ID:
                                            • API String ID: 385091864-0
                                            • Opcode ID: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
                                            • Instruction ID: 93f38c3b8a65fd8a68e5265ae944391143789c71a4918893f245a539b4228a7d
                                            • Opcode Fuzzy Hash: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
                                            • Instruction Fuzzy Hash: 1F2166712043019BD314EF29C842BABB7E5AFC4714F144A2EF994DB2C1DBB4A985CB99
                                            APIs
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00438D6F
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D82
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D9A
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438DB4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                            • Instruction ID: 707762f1bc06eebb59e9357f9c77b20c0e090dcf7cedc03b298b4f863176c0ea
                                            • Opcode Fuzzy Hash: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                            • Instruction Fuzzy Hash: 77113AB6204305AFD210EF58DC84F6BF7E8EBE8750F20491EF580D7290D6B1A8468BA1
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,FFFFFFFF,?,?,?,?,?,?,00400000,00000000), ref: 0043367E
                                            • GetStockObject.GDI32(00000011), ref: 00433695
                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043369F
                                            • ShowWindow.USER32(00000000,00000000), ref: 004336BA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Window$CreateMessageObjectSendShowStock
                                            • String ID:
                                            • API String ID: 1358664141-0
                                            • Opcode ID: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                            • Instruction ID: 5bb77caae3378c1c36de35f78993aeb7f53e4fc0e9047450929301c31466c70f
                                            • Opcode Fuzzy Hash: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                            • Instruction Fuzzy Hash: 60114F72204A00BFD254DF55CC49F5BB3F9AFCCB01F20950DB254922A0D7B4E9418BA9
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 004441B8
                                            • MessageBoxW.USER32(?,?,?,?), ref: 004441F6
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0044420C
                                            • CloseHandle.KERNEL32(00000000), ref: 00444213
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                            • String ID:
                                            • API String ID: 2880819207-0
                                            • Opcode ID: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                            • Instruction ID: a177bb78e812b0c83f085b16f259857c8a511f23e32e5024349264f8b0df3d09
                                            • Opcode Fuzzy Hash: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                            • Instruction Fuzzy Hash: C401E5364183105BD300DB28ED08A9BBBD8BFD9721F18067EF89893351E6B48948C7B6
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00434037
                                            • ScreenToClient.USER32(?,?), ref: 0043405B
                                            • ScreenToClient.USER32(?,?), ref: 00434085
                                            • InvalidateRect.USER32(?,?,?), ref: 004340A4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ClientRectScreen$InvalidateWindow
                                            • String ID:
                                            • API String ID: 357397906-0
                                            • Opcode ID: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                            • Instruction ID: 02545dd0d615a745195cb6f618e51c1f9c2552a202a2369b8695847d2ce6fb2f
                                            • Opcode Fuzzy Hash: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                            • Instruction Fuzzy Hash: 24117EB9608302AFC304DF18D98095BBBE9FFD8650F10891EF88993350D770E9498BA2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                            • String ID:
                                            • API String ID: 3016257755-0
                                            • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                            • Instruction ID: 11ead64bc5c18606fe5fffcedc2bbdf89ccfa4faa7bd693ca83be0ddd2add3a5
                                            • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                            • Instruction Fuzzy Hash: AA11A272500059BBCF225E85EC018EE3F66FB88354B898416FE2858131C73AC9B1AB85
                                            APIs
                                            • __wsplitpath.LIBCMT ref: 00436A45
                                              • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                            • __wsplitpath.LIBCMT ref: 00436A6C
                                            • __wcsicoll.LIBCMT ref: 00436A93
                                            • __wcsicoll.LIBCMT ref: 00436AB0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                            • String ID:
                                            • API String ID: 1187119602-0
                                            • Opcode ID: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                            • Instruction ID: cc447ddabc085245cf6c6bda96777749177fc915bba42f20b5b260b799017f3a
                                            • Opcode Fuzzy Hash: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                            • Instruction Fuzzy Hash: 690165B64043416BD724EB50D881EEBB3ED7BD8304F04C91EB5C982041FB38D24C87A6
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: _wcslen$_malloc_wcscat_wcscpy
                                            • String ID:
                                            • API String ID: 1597257046-0
                                            • Opcode ID: ef4c8eb1668fb764ac9879486c39433899b48e1b70f0ed706df85b8b39ec7f0c
                                            • Instruction ID: 9df5ee2dcc5f1a759a9cde70f7b42babd8a8bdcc369222b22224423102f690bd
                                            • Opcode Fuzzy Hash: ef4c8eb1668fb764ac9879486c39433899b48e1b70f0ed706df85b8b39ec7f0c
                                            • Instruction Fuzzy Hash: BFF06D32200200AFC314EB66C885E6BB3EAEBC5324F04852EF556C7791DB39F841C764
                                            APIs
                                            • DeleteObject.GDI32(?), ref: 0045564E
                                            • DeleteObject.GDI32(?), ref: 0045565C
                                            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                            • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: DeleteDestroyObject$IconWindow
                                            • String ID:
                                            • API String ID: 3349847261-0
                                            • Opcode ID: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                            • Instruction ID: 3a9029eb8e47786e7dec82746d504bb216afab776d143f23dce7b1a7602128e4
                                            • Opcode Fuzzy Hash: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                            • Instruction Fuzzy Hash: 06F03C702006419BDB20AF65DDD8A2B77ACEF45322740456AFD04D7242DB28DC498B7D
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?), ref: 0044B60B
                                            • InterlockedExchange.KERNEL32(?,?), ref: 0044B619
                                            • LeaveCriticalSection.KERNEL32(?), ref: 0044B630
                                            • LeaveCriticalSection.KERNEL32(?), ref: 0044B641
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                            • String ID:
                                            • API String ID: 2223660684-0
                                            • Opcode ID: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                            • Instruction ID: 8f2921e390180aa9c6083979f061463a0462abb68b72a76a452ff5fd2bc04521
                                            • Opcode Fuzzy Hash: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                            • Instruction Fuzzy Hash: 35F08C362422019F82249B59EA488DBB3FDEBE97213009C2FE142C32108BB5F806CB75
                                            APIs
                                              • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                              • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                              • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                            • MoveToEx.GDI32(?,?,00000000,00000000), ref: 0044728F
                                            • LineTo.GDI32(?,00000000,00000002), ref: 004472A0
                                            • EndPath.GDI32(?), ref: 004472B0
                                            • StrokePath.GDI32(?), ref: 004472BE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                            • String ID:
                                            • API String ID: 2783949968-0
                                            • Opcode ID: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                            • Instruction ID: 15f667079dd022c0076d5117e5ffb33549464faf874781034dcdd6a9c0a79bb3
                                            • Opcode Fuzzy Hash: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                            • Instruction Fuzzy Hash: 46F09030109361BFE211DB10DC0AF9F3B98AB46310F10490CF641622D2C7B46845C7BA
                                            APIs
                                            • __getptd.LIBCMT ref: 00417D1A
                                              • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                              • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                            • __getptd.LIBCMT ref: 00417D31
                                            • __amsg_exit.LIBCMT ref: 00417D3F
                                            • __lock.LIBCMT ref: 00417D4F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                            • String ID:
                                            • API String ID: 3521780317-0
                                            • Opcode ID: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                            • Instruction ID: 784cd6646040312d8c3929352b57c791f513dbd9ce30c249d09a92555f0e5bc7
                                            • Opcode Fuzzy Hash: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                            • Instruction Fuzzy Hash: D4F06D319447089AD720FB66E4067EA32B0AF01728F11856FA4415B7D2DB3C99C08B9E
                                            APIs
                                            • GetDesktopWindow.USER32 ref: 00471144
                                            • GetDC.USER32(00000000), ref: 0047114D
                                            • GetDeviceCaps.GDI32(00000000,00000074), ref: 0047115A
                                            • ReleaseDC.USER32(00000000,?), ref: 0047117B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CapsDesktopDeviceReleaseWindow
                                            • String ID:
                                            • API String ID: 2889604237-0
                                            • Opcode ID: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                            • Instruction ID: a1da8b046b56c0024f4e51319ca7c868ce9b42ab557c4db2e47d6af70bf9fcef
                                            • Opcode Fuzzy Hash: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                            • Instruction Fuzzy Hash: 75F05E759042009FC310DF65DC4856EBBA4FB94351F108C3EFD05D2251DB7889059B99
                                            APIs
                                            • GetDesktopWindow.USER32 ref: 00471102
                                            • GetDC.USER32(00000000), ref: 0047110B
                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00471118
                                            • ReleaseDC.USER32(00000000,?), ref: 00471139
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CapsDesktopDeviceReleaseWindow
                                            • String ID:
                                            • API String ID: 2889604237-0
                                            • Opcode ID: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                            • Instruction ID: 5204c471e266b2ed5cdb435334cd6f206910ee07043e0bb223494c3f632f6575
                                            • Opcode Fuzzy Hash: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                            • Instruction Fuzzy Hash: 78F05E759042009FD310EF65DC5896EBBA4FB94351F104C3EFC05D2251DB7489059B99
                                            APIs
                                            • SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                            • GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                            • GetCurrentThreadId.KERNEL32 ref: 004389DA
                                            • AttachThreadInput.USER32(00000000), ref: 004389E1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                            • String ID:
                                            • API String ID: 2710830443-0
                                            • Opcode ID: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                            • Instruction ID: 438da6915ae72ab6a15f098678a9856147cbf2dc0a85cf0a700465948addd5b0
                                            • Opcode Fuzzy Hash: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                            • Instruction Fuzzy Hash: 14E012712853107BE72157509D0EFAF7B98AF18B11F14481EB241B50D0DAF8A941876E
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004390CD
                                            • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 004390DB
                                            • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390EB
                                            • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390F0
                                              • Part of subcall function 00438FB6: GetProcessHeap.KERNEL32(00000000,?,00439504,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FC1
                                              • Part of subcall function 00438FB6: HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00438FC8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                            • String ID:
                                            • API String ID: 146765662-0
                                            • Opcode ID: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                            • Instruction ID: e19b07cb6d87eea3d85dfea562759309df1919ba68b29a0146d7a5ec0ea3c710
                                            • Opcode Fuzzy Hash: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                            • Instruction Fuzzy Hash: 5DE0C976504311ABC620EB65DC48C4BB7E9EF883303114E1DF89693260CA74E881CB65
                                            APIs
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00414070
                                              • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                            • __getptd_noexit.LIBCMT ref: 00414080
                                            • __freeptd.LIBCMT ref: 0041408A
                                            • ExitThread.KERNEL32 ref: 00414093
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                            • String ID:
                                            • API String ID: 3182216644-0
                                            • Opcode ID: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                            • Instruction ID: 8c1b811a677bc0208766d104aadce1409d27245c16b3af4a320e27a455eae914
                                            • Opcode Fuzzy Hash: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                            • Instruction Fuzzy Hash: F8D0EC7051024256D6207BA7ED097AA3A589B44B26B15446EA905801B1DF68D9C1862D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: BuffCharLower
                                            • String ID: $8'I
                                            • API String ID: 2358735015-3608026889
                                            • Opcode ID: e3039598ad07eb1683e22d1e13845cc1c6bfaba1fe80df618d976ecbdfba683b
                                            • Instruction ID: 1bf34105e022c250dd7240f1ea7ec4803edb57b208c13e69c3fb06210d7c4844
                                            • Opcode Fuzzy Hash: e3039598ad07eb1683e22d1e13845cc1c6bfaba1fe80df618d976ecbdfba683b
                                            • Instruction Fuzzy Hash: 9FE1AE745043018BCB24EF16D88166BB7E4BF94348F40482FF88597292EB79DD89CB9B
                                            APIs
                                            • OleSetContainedObject.OLE32(00000000,00000001), ref: 0047857A
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                              • Part of subcall function 00445513: OleSetContainedObject.OLE32(?,00000000), ref: 00445593
                                              • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: CopyVariant$ContainedObject$ErrorLast_malloc
                                            • String ID: AutoIt3GUI$Container
                                            • API String ID: 3380330463-3941886329
                                            • Opcode ID: a9ff7069b9b8d6ccd49eba872ad7efd2467de888f1098c4430e935d21ee713db
                                            • Instruction ID: 8a51a4197b359b89da059ec4b883cd23719ad159cb4f439b8c2c8f5fea4c1b32
                                            • Opcode Fuzzy Hash: a9ff7069b9b8d6ccd49eba872ad7efd2467de888f1098c4430e935d21ee713db
                                            • Instruction Fuzzy Hash: FEA16A71240601AFC760EF69C880A6BB7E9FB88304F10892EF649CB361EB75E945CB55
                                            APIs
                                            • _wcslen.LIBCMT ref: 00409A61
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                            • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                            • String ID: 0vH
                                            • API String ID: 1143807570-3662162768
                                            • Opcode ID: 06636c051a656e0db8e48e9a81f0f7daa77b956eb8708b24b717754a54bb628e
                                            • Instruction ID: 5e67718e4417cbef977f4cc7974cb0b4b39b480e5382bb1977b3cac956c07efc
                                            • Opcode Fuzzy Hash: 06636c051a656e0db8e48e9a81f0f7daa77b956eb8708b24b717754a54bb628e
                                            • Instruction Fuzzy Hash: 53515BB1A083009FC718CF18C48065BB7E1FF88314F54856EF9999B391D779E942CB96
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HH$HH
                                            • API String ID: 0-1787419579
                                            • Opcode ID: 7546cf6663fec2d41e0be28018c51c43d88dc93244b488606bcda1ed75612bc1
                                            • Instruction ID: b2aab3850ea6996be17d3b26b1a0d96f4757dd5de2ef7d298d9c2790e2b3b10f
                                            • Opcode Fuzzy Hash: 7546cf6663fec2d41e0be28018c51c43d88dc93244b488606bcda1ed75612bc1
                                            • Instruction Fuzzy Hash: 1241BF367042009FC310EF69E881F5AF3A1EF99314F548A6EFA589B381D776E811CB95
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: InfoItemMenu_memset
                                            • String ID: 0
                                            • API String ID: 2223754486-4108050209
                                            • Opcode ID: 38f09aa922346eb88559bb972c0ed36bedb4057ad35cf6b519ccfeef0a85981d
                                            • Instruction ID: 143d79469fb3e570aa9bb1e7a79db7ad77638f8ab3c2e89d41e08a42c99b444e
                                            • Opcode Fuzzy Hash: 38f09aa922346eb88559bb972c0ed36bedb4057ad35cf6b519ccfeef0a85981d
                                            • Instruction Fuzzy Hash: CB3101721043009BF3249F18DC85BABBBE4EBC6310F14081FFA90C62A0E379D949C75A
                                            APIs
                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0044846C
                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044847E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: '
                                            • API String ID: 3850602802-1997036262
                                            • Opcode ID: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                            • Instruction ID: cecdca06d5aa7ecc7109d5e1ff25192cbd540bafe2d1ef24ff7c1b98f096cb5f
                                            • Opcode Fuzzy Hash: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                            • Instruction Fuzzy Hash: 984179706083459FE710CF18C880BABB7E1FB89700F54882EF9888B351DB75A841CF5A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0
                                            • API String ID: 0-4108050209
                                            • Opcode ID: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                            • Instruction ID: 268d240ecd79f719a1425e83c09d650ed443e1bf0ac8ef4f8d51517adc50c1d2
                                            • Opcode Fuzzy Hash: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                            • Instruction Fuzzy Hash: B6210D765042206BEB15DF08D844B97B7A4FBDA310F44492BEE9897250D379E848C7AA
                                            APIs
                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00451305
                                            • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00451313
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: Combobox
                                            • API String ID: 3850602802-2096851135
                                            • Opcode ID: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                            • Instruction ID: f266216a818347eeb58d59163185d0479ace604409515c443b0f4894c7ad90f2
                                            • Opcode Fuzzy Hash: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                            • Instruction Fuzzy Hash: D9110A72A0430067E6109AA4DC80F5BB3D8EB99735F10071BFA24E72E1D774FC448768
                                            APIs
                                            • GetWindowTextLengthW.USER32(00000000), ref: 004515DA
                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004515EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: LengthMessageSendTextWindow
                                            • String ID: edit
                                            • API String ID: 2978978980-2167791130
                                            • Opcode ID: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                            • Instruction ID: b80de1f22085cd2d24dcce0fe83431d10f7d2aff66e66183492c5b70af3c9e13
                                            • Opcode Fuzzy Hash: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                            • Instruction Fuzzy Hash: 2011E4716003006BD6109A64D884F6BB3DCEBD8335F104B1EFA61D32E1D779EC458729
                                            APIs
                                            • Sleep.KERNEL32(00000000), ref: 00474833
                                            • GlobalMemoryStatusEx.KERNEL32 ref: 00474846
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: GlobalMemorySleepStatus
                                            • String ID: @
                                            • API String ID: 2783356886-2766056989
                                            • Opcode ID: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                            • Instruction ID: 41c327e25453105c4ca6c880754d33c67e761007402a238c65fd2e715fefe222
                                            • Opcode Fuzzy Hash: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                            • Instruction Fuzzy Hash: 4421C230929A14B7C2107F6ABD4BB5E7BB8AF44716F008C5DF5C562094DF785268836F
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: htonsinet_addr
                                            • String ID: 255.255.255.255
                                            • API String ID: 3832099526-2422070025
                                            • Opcode ID: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                            • Instruction ID: e3b5e028fda38c0aed97ec3d425ece65e45bc088e5f3683a6f0e3ee8de0e9224
                                            • Opcode Fuzzy Hash: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                            • Instruction Fuzzy Hash: 6F11253620030057DA10EB69C882F9BB394EFC4728F00896BFA105B283D679F45A832E
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469547
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 455545452-1403004172
                                            • Opcode ID: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                            • Instruction ID: d7878a024921556205560296ec06e6abf53b779169672b4943ab7ad66f70e2c7
                                            • Opcode Fuzzy Hash: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                            • Instruction Fuzzy Hash: 2601D6327011106B8600BB299C019AFB39DDBC2370F544A2FF965573D1EA39AC0E476A
                                            APIs
                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00442B8C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: InternetOpen
                                            • String ID: <local>
                                            • API String ID: 2038078732-4266983199
                                            • Opcode ID: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                            • Instruction ID: 525aca290fb55aeb65c4bf55ca0deee88c9418ef2a1db54778758d1eb2e06c8a
                                            • Opcode Fuzzy Hash: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                            • Instruction Fuzzy Hash: 9011A934144751AAF621DF108D86FB77794FB50B01F50480FF9866B2C0D6F4B848C766
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • SendMessageW.USER32(00000000,00000180,00000000,00000000), ref: 00469660
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 455545452-1403004172
                                            • Opcode ID: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                            • Instruction ID: 486d2595d5a7427da4a9c048e684990a8dc9cac685a8154682435d05c4426571
                                            • Opcode Fuzzy Hash: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                            • Instruction Fuzzy Hash: A101D87274121027C600BA259C01AEBB39CEB96354F04443BF94597291EA6DED0E43AA
                                            APIs
                                              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                            • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 004695D6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 455545452-1403004172
                                            • Opcode ID: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                            • Instruction ID: 72d13aeac174e9c1a3a177398698555a642000804846b33da1492f44d6438514
                                            • Opcode Fuzzy Hash: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                            • Instruction Fuzzy Hash: 4D01A77374111067C610BA6A9C01AEB739CABD2364F44443BF94597292EA7DED0E43AA
                                            APIs
                                            • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560BA
                                              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                            • wsprintfW.USER32 ref: 004560E9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: MessageSend_mallocwsprintf
                                            • String ID: %d/%02d/%02d
                                            • API String ID: 1262938277-328681919
                                            • Opcode ID: dc5fd9a877cd0fc352ed6de9b5f97ee6fb2dcbb154e3a48ad4a1e49fbb654ae8
                                            • Instruction ID: 2a73c44ac592e0fe880a68d863bd42ca8887a008949f121bccc13d44bcf2ebb3
                                            • Opcode Fuzzy Hash: dc5fd9a877cd0fc352ed6de9b5f97ee6fb2dcbb154e3a48ad4a1e49fbb654ae8
                                            • Instruction Fuzzy Hash: 13F08272744220A7E2105BA5AC01BBFB3D4EB84762F10443BFE44D12C0E66E8455D7BA
                                            APIs
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0044226C
                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0044227F
                                              • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: FindMessagePostSleepWindow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 529655941-2988720461
                                            • Opcode ID: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                            • Instruction ID: f0ed9326d30a696a9ade51716a531e8bd1705000bbe21894ac7a57cb5589152b
                                            • Opcode Fuzzy Hash: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                            • Instruction Fuzzy Hash: 71D0A772F8130177E92077706D0FFCB26246F14710F010C3AB305AA1C0D4E8D440C358
                                            APIs
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00442240
                                            • PostMessageW.USER32(00000000), ref: 00442247
                                              • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: FindMessagePostSleepWindow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 529655941-2988720461
                                            • Opcode ID: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                            • Instruction ID: d1e5b9be119239975405e397b0c0efdc35250005003305bf123d4268f2ecb06f
                                            • Opcode Fuzzy Hash: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                            • Instruction Fuzzy Hash: 4DD05E72B813013BE92076706D0FF8B26246B14710F010C2AB205AA1C0D4E8A4408358
                                            APIs
                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00439522
                                              • Part of subcall function 00411A1F: _doexit.LIBCMT ref: 00411A2B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1685187823.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1685173002.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685308032.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685323793.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1685360528.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_SUNNY HONG VSL PARTICULARS.jbxd
                                            Similarity
                                            • API ID: Message_doexit
                                            • String ID: AutoIt$Error allocating memory.
                                            • API String ID: 1993061046-4017498283
                                            • Opcode ID: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                            • Instruction ID: 5d68346425d2699d55792fe39b85c2381918ba1f955abba655776c5540820644
                                            • Opcode Fuzzy Hash: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                            • Instruction Fuzzy Hash: 82B092343C038627E20437A01C0BF8C28049B64F42F220C2AB308384D259D90080231E