Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quarantined Messages (3).zip

Overview

General Information

Sample name:Quarantined Messages (3).zip
Analysis ID:1428644
MD5:3e900525c6df4fa47db5ada47e7b3ff1
SHA1:7da26dddfac0fa7f36c2f55693f35b7bbe7a5fbb
SHA256:2d0db26cb0babb7e08ddcccafcb5563b3fbaa5a07448287611c952b5dd79de4c
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis

Classification

Analysis Advice

Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
  • System is w10x64
  • unarchiver.exe (PID: 7076 cmdline: "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\Quarantined Messages (3).zip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2)
    • 7za.exe (PID: 7164 cmdline: "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\5en31z4t.51p" "C:\Users\user\Desktop\Quarantined Messages (3).zip" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
      • conhost.exe (PID: 7152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: classification engineClassification label: clean2.winZIP@4/1@0/0
Source: C:\Windows\SysWOW64\unarchiver.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7152:120:WilError_03
Source: C:\Windows\SysWOW64\unarchiver.exeFile created: C:\Users\user\AppData\Local\Temp\unarchiver.logJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\unarchiver.exe "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\Quarantined Messages (3).zip"
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\5en31z4t.51p" "C:\Users\user\Desktop\Quarantined Messages (3).zip"
Source: C:\Windows\SysWOW64\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\5en31z4t.51p" "C:\Users\user\Desktop\Quarantined Messages (3).zip"Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\7za.exeSection loaded: 7z.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 15B0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 51C0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeWindow / User API: threadDelayed 477Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeWindow / User API: threadDelayed 9493Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 7140Thread sleep count: 477 > 30Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 7140Thread sleep time: -238500s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 7140Thread sleep count: 9493 > 30Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 7140Thread sleep time: -4746500s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 0_2_0150B1D6 GetSystemInfo,0_2_0150B1D6
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\5en31z4t.51p" "C:\Users\user\Desktop\Quarantined Messages (3).zip"Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping2
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1428644 Sample: Quarantined Messages (3).zip Startdate: 19/04/2024 Architecture: WINDOWS Score: 2 6 unarchiver.exe 4 2->6         started        process3 8 7za.exe 3 6->8         started        process4 10 conhost.exe 8->10         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428644
Start date and time:2024-04-19 10:54:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 2s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Quarantined Messages (3).zip
Detection:CLEAN
Classification:clean2.winZIP@4/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 47
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .zip
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
10:55:33API Interceptor4017375x Sleep call for process: unarchiver.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\unarchiver.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):3433
Entropy (8bit):5.035340095435471
Encrypted:false
SSDEEP:48:5H8cHNQHy23SHyGbMHyGMHyGpaHyGjDHyGMHyGpNcHyGbOHyGocHyG0HyG5FHyGR:WBSOlHo6AdvEJ
MD5:6ECC6B0F9D115BE6DC6D6168C1D6DE0E
SHA1:2CE714953407C998863F44271B5AE5634679203A
SHA-256:F77D5510D2B14EEF1BC3EAA5636046CAE0D1F12CA2AF93D19ADD571FA5FDFA46
SHA-512:3615F16F1CEE4B2E13AFDF932D8E8DBA6551AB15C99904F96C9EC64D995552C7D6703996798FF226B4B921E6059B6802C9C2DDB1309ECE23BC8D93FFE80D9A49
Malicious:false
Reputation:low
Preview:04/19/2024 10:54 AM: Unpack: C:\Users\user\Desktop\Quarantined Messages (3).zip..04/19/2024 10:54 AM: Tmp dir: C:\Users\user\AppData\Local\Temp\5en31z4t.51p..04/19/2024 10:54 AM: Received from standard error: ERROR: Wrong password : fb9cc81a-9f3e-45e1-75f5-08dc600702bc\be53bdb1-f39a-a2a2-c66b-e47c410563cb.eml..04/19/2024 10:54 AM: Received from standard out: 7-Zip 18.05 (x86) : Copyright (c) 1999-2018 Igor Pavlov : 2018-04-30..04/19/2024 10:54 AM: Received from standard out: ..04/19/2024 10:54 AM: Received from standard out: Scanning the drive for archives:..04/19/2024 10:54 AM: Received from standard out: 1 file, 791623 bytes (774 KiB)..04/19/2024 10:54 AM: Received from standard out: ..04/19/2024 10:54 AM: Received from standard out: Extracting archive: C:\Users\user\Desktop\Quarantined Messages (3).zip..04/19/2024 10:54 AM: Received from standard out: --..04/19/2024 10:54 AM: Received from standard out: Path = C:\Users\user\Desktop\Quarantined Messages (3).zip..04/19/2024 10:54
File type:Zip archive data, at least v4.5 to extract, compression method=deflate
Entropy (8bit):7.999766318857523
TrID:
  • ZIP compressed archive (8000/1) 100.00%
File name:Quarantined Messages (3).zip
File size:791'623 bytes
MD5:3e900525c6df4fa47db5ada47e7b3ff1
SHA1:7da26dddfac0fa7f36c2f55693f35b7bbe7a5fbb
SHA256:2d0db26cb0babb7e08ddcccafcb5563b3fbaa5a07448287611c952b5dd79de4c
SHA512:c630868c0b2633034ad38b946c223422ab9b2837d800d90ca13bf0c91b1a92253830c6c9e9b845d6c1faf7f8b9de0ddcaac7a335a0dfc94592babe3da043640b
SSDEEP:12288:uWGrkviMYNpYaSDPZG6ma/C26E370UEjnQaynu6Y0Cqplj3Kil+i:udsiMYNpZSnma/C237uk7uj0Cq7Xl+i
TLSH:08F4335F53A52428818161B6D49CBA4BC2BB7C8B0066F176BF2781BB2E45E7FF1DC181
File Content Preview:PK..-......F.X..K.........M...fb9cc81a-9f3e-45e1-75f5-08dc600702bc/be53bdb1-f39a-a2a2-c66b-e47c410563cb.eml...................."...SC..1...t.5...eD-.3o..........i.....2...4..h...>uC...wY2.97.......:M.8.....f.....~:....U".x....0....U.D.'...>.n..,u.te..-..,
Icon Hash:90cececece8e8eb0
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:10:54:58
Start date:19/04/2024
Path:C:\Windows\SysWOW64\unarchiver.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\Quarantined Messages (3).zip"
Imagebase:0xbf0000
File size:12'800 bytes
MD5 hash:16FF3CC6CC330A08EED70CBC1D35F5D2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:1
Start time:10:54:58
Start date:19/04/2024
Path:C:\Windows\SysWOW64\7za.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\5en31z4t.51p" "C:\Users\user\Desktop\Quarantined Messages (3).zip"
Imagebase:0x7a0000
File size:289'792 bytes
MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:10:54:58
Start date:19/04/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:22.2%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:5.5%
    Total number of Nodes:73
    Total number of Limit Nodes:4
    execution_graph 1169 150a850 1171 150a882 SetFilePointer 1169->1171 1172 150a8e6 1171->1172 1173 150a6d4 1174 150a716 FindCloseChangeNotification 1173->1174 1176 150a750 1174->1176 1130 150a716 1131 150a742 FindCloseChangeNotification 1130->1131 1132 150a781 1130->1132 1133 150a750 1131->1133 1132->1131 1134 150b1d6 1135 150b202 GetSystemInfo 1134->1135 1136 150b238 1134->1136 1137 150b210 1135->1137 1136->1135 1138 150a2da 1139 150a306 SetErrorMode 1138->1139 1140 150a32f 1138->1140 1141 150a31b 1139->1141 1140->1139 1177 150a5dc 1178 150a5fe CreateFileW 1177->1178 1180 150a685 1178->1180 1154 150a882 1156 150a8b7 SetFilePointer 1154->1156 1157 150a8e6 1156->1157 1193 150ad04 1194 150ad2a DuplicateHandle 1193->1194 1196 150adaf 1194->1196 1158 150aa46 1159 150aa6c CreateDirectoryW 1158->1159 1161 150aa93 1159->1161 1197 150aa0b 1198 150aa46 CreateDirectoryW 1197->1198 1200 150aa93 1198->1200 1201 150af8b 1202 150afb2 FindClose 1201->1202 1204 150aff3 1202->1204 1205 150a78f 1206 150a7c2 GetFileType 1205->1206 1208 150a824 1206->1208 1185 150a370 1186 150a392 RegQueryValueExW 1185->1186 1188 150a41b 1186->1188 1115 150a172 1116 150a1c2 FindNextFileW 1115->1116 1117 150a1ca 1116->1117 1122 150afb2 1123 150afde FindClose 1122->1123 1125 150b010 1122->1125 1124 150aff3 1123->1124 1125->1123 1209 150a933 1211 150a962 WriteFile 1209->1211 1212 150a9c9 1211->1212 1213 150b1b4 1214 150b1d6 GetSystemInfo 1213->1214 1216 150b210 1214->1216 1189 150ab76 1190 150abe6 CreatePipe 1189->1190 1192 150ac3e 1190->1192 1142 150a5fe 1145 150a636 CreateFileW 1142->1145 1144 150a685 1145->1144 1217 150a120 1218 150a172 FindNextFileW 1217->1218 1220 150a1ca 1218->1220 1146 150a962 1149 150a997 WriteFile 1146->1149 1148 150a9c9 1149->1148 1162 150abe6 1163 150ac36 CreatePipe 1162->1163 1164 150ac3e 1163->1164 1221 150a2ae 1223 150a2b2 SetErrorMode 1221->1223 1224 150a31b 1223->1224

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_0150A850 1 Function_0150B351 2 Function_053B0739 3 Function_0150B052 4 Function_053B0C3D 5 Function_01540053 6 Function_01502458 7 Function_0150A45C 8 Function_0150B15D 9 Function_0150B246 10 Function_0150AA46 11 Function_0154064F 32 Function_0154066A 11->32 12 Function_0150A370 13 Function_0150B470 14 Function_0150A172 15 Function_053B0E18 74 Function_053B0BA0 15->74 16 Function_053B0018 17 Function_0150B276 18 Function_0150AB76 19 Function_0150A078 20 Function_0154067F 21 Function_0154087F 22 Function_0150267C 23 Function_0150257F 24 Function_053B0E09 24->74 25 Function_0150A962 26 Function_0150A462 27 Function_01502264 28 Function_01502364 29 Function_0150A566 30 Function_0154026D 31 Function_0150AC6C 33 Function_01540810 34 Function_0150A716 35 Function_01540718 36 Function_0150B01E 37 Function_0150AF00 38 Function_01540606 39 Function_01540000 40 Function_0150AD04 41 Function_0150A005 42 Function_0150AE05 43 Function_0150AB06 44 Function_01502006 45 Function_053B0C60 46 Function_0150AA0B 47 Function_0154080B 48 Function_0150A50F 49 Function_01502430 50 Function_0150A933 51 Function_0150A23A 52 Function_053B0C50 53 Function_0150213C 54 Function_0150A33D 55 Function_0150A120 56 Function_0150B121 57 Function_0150AF22 58 Function_053B0748 59 Function_0154082E 60 Function_0150AD2A 61 Function_0150A02E 62 Function_015020D0 63 Function_0150A6D4 64 Function_0150B1D6 65 Function_053B05B1 66 Function_0150AADA 67 Function_0150A2DA 68 Function_053B02B0 68->30 68->38 68->74 78 Function_053B0799 68->78 84 Function_015405E7 68->84 85 Function_053B0B8F 68->85 69 Function_015405D8 70 Function_0150A5DC 71 Function_0150A7C2 72 Function_053B0CA8 73 Function_053B0DA2 73->74 75 Function_015405C8 76 Function_015021F0 77 Function_01502BF0 78->30 78->38 78->45 78->52 78->72 78->74 79 Function_053B0C99 78->79 78->84 78->85 80 Function_0150A1F4 81 Function_015023F4 82 Function_0150A5FE 83 Function_0150AAE0 86 Function_0150ABE6 87 Function_015026EA 88 Function_0150A392 89 Function_01502194 90 Function_01502098 91 Function_0150A09A 92 Function_0150B39E 93 Function_0150B49E 94 Function_01540784 95 Function_0150A882 96 Function_0150A486 97 Function_053B0DE0 97->74 98 Function_0150AF8B 99 Function_0150AC8E 100 Function_0154088A 101 Function_0150A78F 102 Function_0150AEB2 103 Function_0150AFB2 104 Function_015407B6 105 Function_0150B1B4 106 Function_015407B2 107 Function_053B0DD1 107->74 108 Function_015026BA 109 Function_015023BC 110 Function_053B02C0 110->30 110->38 110->74 110->78 110->84 110->85 111 Function_0150A2AE
    APIs
    • GetSystemInfo.KERNELBASE(?), ref: 0150B208
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: InfoSystem
    • String ID:
    • API String ID: 31276548-0
    • Opcode ID: 45f13522e377ff2fe76cacbbc4639d39af72bc276cd8d3ec22432aeb6dc165ce
    • Instruction ID: 74c8f528406a23303ab291588b38cd28fb7b27725a24fc3a3e79bf76fb05f53d
    • Opcode Fuzzy Hash: 45f13522e377ff2fe76cacbbc4639d39af72bc276cd8d3ec22432aeb6dc165ce
    • Instruction Fuzzy Hash: 7C012634900240DFDB21CF49D984769FBE4EF44220F08C8AADD089F756D278A408CFB1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 150b246-150b2eb 5 150b343-150b348 0->5 6 150b2ed-150b2f5 DuplicateHandle 0->6 5->6 7 150b2fb-150b30d 6->7 9 150b34a-150b34f 7->9 10 150b30f-150b340 7->10 9->10
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0150B2F3
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: 1f12a094e8c01eb214eae22f70a8b39675500cbd3f707015ebdb29788c268b34
    • Instruction ID: 229cdf3cdd2367069ca8eb61a89aecabfd8612dbffc7265e20a2c66928e179ca
    • Opcode Fuzzy Hash: 1f12a094e8c01eb214eae22f70a8b39675500cbd3f707015ebdb29788c268b34
    • Instruction Fuzzy Hash: 6931B471404344AFE7228B65DC44FAABFBCEF55210F04849AE985CB562D335E919CB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 14 150ad04-150ad9f 19 150ada1-150ada9 DuplicateHandle 14->19 20 150adf7-150adfc 14->20 22 150adaf-150adc1 19->22 20->19 23 150adc3-150adf4 22->23 24 150adfe-150ae03 22->24 24->23
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0150ADA7
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: 616eb7d675952254d06dd55e01babf7cf0d97e627b0aceca5ab0d16bfbb89a3a
    • Instruction ID: 00a7b424ed38ed4d5c9028d1566430fe15f7fe20daabd7b13b49d4b4b08eb092
    • Opcode Fuzzy Hash: 616eb7d675952254d06dd55e01babf7cf0d97e627b0aceca5ab0d16bfbb89a3a
    • Instruction Fuzzy Hash: 0431C472504344AFE7228F64CC44FA7BFACEF05210F04889AF985DB652D224E819CB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 28 150ab76-150ac67 CreatePipe
    APIs
    • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 0150AC36
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: CreatePipe
    • String ID:
    • API String ID: 2719314638-0
    • Opcode ID: 13d40ac49d8883db79f4472fe28dc170d7f777e66f1c5f87d874c3e5fc5805e7
    • Instruction ID: ae08290a67fd0b5c4ff455e6fb620d946b2e664c4c7d59c29cc1ad5e8e193a85
    • Opcode Fuzzy Hash: 13d40ac49d8883db79f4472fe28dc170d7f777e66f1c5f87d874c3e5fc5805e7
    • Instruction Fuzzy Hash: E7317E7150E3C06FD3138B718C65AA2BFB4AF47610F1A84CBD8C4DF6A3D2696919C762
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 33 150a5dc-150a656 37 150a658 33->37 38 150a65b-150a667 33->38 37->38 39 150a669 38->39 40 150a66c-150a675 38->40 39->40 41 150a6c6-150a6cb 40->41 42 150a677-150a69b CreateFileW 40->42 41->42 45 150a6cd-150a6d2 42->45 46 150a69d-150a6c3 42->46 45->46
    APIs
    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0150A67D
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 7a53e8e898e12814be6afd61a26229d57715cd37901642390ae1c07525b45e73
    • Instruction ID: 9863df6935357f1ee6eca19209eb14d06733553d6b3bf1dcc322508e94000034
    • Opcode Fuzzy Hash: 7a53e8e898e12814be6afd61a26229d57715cd37901642390ae1c07525b45e73
    • Instruction Fuzzy Hash: C8317E71505340AFE722CF65DC44F66BBF8EF45220F08889AE9858B692D375E809DB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 49 150a120-150a1f3 FindNextFileW
    APIs
    • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 0150A1C2
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: FileFindNext
    • String ID:
    • API String ID: 2029273394-0
    • Opcode ID: a40e734bc51d0f9dbd6baab1eb02ecaf5b2ed85673ee3e525f2227118f68e47c
    • Instruction ID: 41c2667a0b6c23f7ee4114b7af6ec4d1b2869697eea956169dce66577cb2b6de
    • Opcode Fuzzy Hash: a40e734bc51d0f9dbd6baab1eb02ecaf5b2ed85673ee3e525f2227118f68e47c
    • Instruction Fuzzy Hash: AC21B27150D3C06FD3128B258C51BA6BFB4EF87610F1945CBD8C4DF693D225A91AC7A2
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 54 150a370-150a3cf 57 150a3d1 54->57 58 150a3d4-150a3dd 54->58 57->58 59 150a3e2-150a3e8 58->59 60 150a3df 58->60 61 150a3ea 59->61 62 150a3ed-150a404 59->62 60->59 61->62 64 150a406-150a419 RegQueryValueExW 62->64 65 150a43b-150a440 62->65 66 150a442-150a447 64->66 67 150a41b-150a438 64->67 65->64 66->67
    APIs
    • RegQueryValueExW.KERNELBASE(?,00000E24,8C4BE639,00000000,00000000,00000000,00000000), ref: 0150A40C
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: QueryValue
    • String ID:
    • API String ID: 3660427363-0
    • Opcode ID: 52d479dc7249619f762e7cf0a09f20cec5080b2a325b2682b4063dcfd1559f12
    • Instruction ID: 61f62ded4b2c4a4453f39f8225c5991ba0a2d6c1ae867d975a3c0e02e5f1e0bc
    • Opcode Fuzzy Hash: 52d479dc7249619f762e7cf0a09f20cec5080b2a325b2682b4063dcfd1559f12
    • Instruction Fuzzy Hash: 62217A76504740AFE722CF55DC84FA6BBF8EF45610F08849AE985CB292D364E908CB61
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 84 150b276-150b2eb 88 150b343-150b348 84->88 89 150b2ed-150b2f5 DuplicateHandle 84->89 88->89 90 150b2fb-150b30d 89->90 92 150b34a-150b34f 90->92 93 150b30f-150b340 90->93 92->93
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0150B2F3
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: ed0b0bb5ff561ebfbd88587acdac4ceda0c29c47b5532dd6cce6949568ebdb62
    • Instruction ID: d13a1310f6d3bce7a89f5b704a020f866e55b9d54540df80a4ee1adb09eef53c
    • Opcode Fuzzy Hash: ed0b0bb5ff561ebfbd88587acdac4ceda0c29c47b5532dd6cce6949568ebdb62
    • Instruction Fuzzy Hash: DF21B072500204AFEB228F65DC84FAABBECEF14214F04886AED85DB655D735E5088BB1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 71 150ad2a-150ad9f 75 150ada1-150ada9 DuplicateHandle 71->75 76 150adf7-150adfc 71->76 78 150adaf-150adc1 75->78 76->75 79 150adc3-150adf4 78->79 80 150adfe-150ae03 78->80 80->79
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0150ADA7
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: a4ed74b74b3413b3d675669233df6e3866d700abef6a98912a96b4699727aa4d
    • Instruction ID: e239e862f48660919c250be4a939fb20f2c88a58fa9e604b76acad1f8844e4a4
    • Opcode Fuzzy Hash: a4ed74b74b3413b3d675669233df6e3866d700abef6a98912a96b4699727aa4d
    • Instruction Fuzzy Hash: BF21B072500304AFEB228F64DC44FABFBECEF14224F04886AE945DBA55D735E5488BB1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 97 150a850-150a8d6 101 150a8d8-150a8f8 SetFilePointer 97->101 102 150a91a-150a91f 97->102 105 150a921-150a926 101->105 106 150a8fa-150a917 101->106 102->101 105->106
    APIs
    • SetFilePointer.KERNELBASE(?,00000E24,8C4BE639,00000000,00000000,00000000,00000000), ref: 0150A8DE
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: FilePointer
    • String ID:
    • API String ID: 973152223-0
    • Opcode ID: a7448e5b0b6e3a47907588d07516c2d5455733411b48ac69478fc72f547fd30b
    • Instruction ID: 8091db869224645a0a31c88c398dccae9753dcea2df6d708d96cc908dc11b89d
    • Opcode Fuzzy Hash: a7448e5b0b6e3a47907588d07516c2d5455733411b48ac69478fc72f547fd30b
    • Instruction Fuzzy Hash: 3621C4715083806FE7238B54DC44FA6BFB8EF46614F0888DAE984DF657D234A909C771
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 109 150a933-150a9b9 113 150a9bb-150a9db WriteFile 109->113 114 150a9fd-150aa02 109->114 117 150aa04-150aa09 113->117 118 150a9dd-150a9fa 113->118 114->113 117->118
    APIs
    • WriteFile.KERNELBASE(?,00000E24,8C4BE639,00000000,00000000,00000000,00000000), ref: 0150A9C1
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: cff0625347c6b5d1c6fdbe5599236b21f6d74574df57bd8ddcd560cfa83d4939
    • Instruction ID: 2a65191021501adb8e2d0b72ea4257ba4684134080c46495b4039cfab6445a82
    • Opcode Fuzzy Hash: cff0625347c6b5d1c6fdbe5599236b21f6d74574df57bd8ddcd560cfa83d4939
    • Instruction Fuzzy Hash: 2E21B271409380AFDB22CF55DC44F96BFB8EF46314F08889AE9849F256C375A548CBB2
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 121 150a5fe-150a656 124 150a658 121->124 125 150a65b-150a667 121->125 124->125 126 150a669 125->126 127 150a66c-150a675 125->127 126->127 128 150a6c6-150a6cb 127->128 129 150a677-150a67f CreateFileW 127->129 128->129 130 150a685-150a69b 129->130 132 150a6cd-150a6d2 130->132 133 150a69d-150a6c3 130->133 132->133
    APIs
    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0150A67D
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: fd943bb25920b973a96397bc67542e230cb12d8f97fb986e8db48f29305190f3
    • Instruction ID: 9f6bba513874fd6677c4fbac7bf28a50d376aed06bfb6a14082f3e8cf952e457
    • Opcode Fuzzy Hash: fd943bb25920b973a96397bc67542e230cb12d8f97fb986e8db48f29305190f3
    • Instruction Fuzzy Hash: 8D217C75A00300AFE722CF69DD45F66FBE8EF48210F048869E9859B696D375E408CB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 136 150a78f-150a80d 140 150a842-150a847 136->140 141 150a80f-150a822 GetFileType 136->141 140->141 142 150a824-150a841 141->142 143 150a849-150a84e 141->143 143->142
    APIs
    • GetFileType.KERNELBASE(?,00000E24,8C4BE639,00000000,00000000,00000000,00000000), ref: 0150A815
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: FileType
    • String ID:
    • API String ID: 3081899298-0
    • Opcode ID: a3336b10cddcaea6dcf344b20fcda3a9ed42085af0ba0c7039dbcaecddaaedb9
    • Instruction ID: c7ede4c18f8fdb5f900ec582b5331b3f33318f044c7c575035c8a405ff4d0e51
    • Opcode Fuzzy Hash: a3336b10cddcaea6dcf344b20fcda3a9ed42085af0ba0c7039dbcaecddaaedb9
    • Instruction Fuzzy Hash: 4121D5B54083806FE7138B65DC44FA6BFB8EF56314F0880DAE9848F297D268A909D775
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 147 150a6d4-150a740 149 150a781-150a786 147->149 150 150a742-150a74a FindCloseChangeNotification 147->150 149->150 151 150a750-150a762 150->151 153 150a764-150a780 151->153 154 150a788-150a78d 151->154 154->153
    APIs
    • FindCloseChangeNotification.KERNELBASE(?), ref: 0150A748
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: ChangeCloseFindNotification
    • String ID:
    • API String ID: 2591292051-0
    • Opcode ID: 0314b2257d7c9cee0ed936d5079d047f944ce80269d07c911d91c6f3416d9001
    • Instruction ID: 0a0d51756cdfb7d768c57bae074e885efd35b8d6337a82f61adbf727338d0eab
    • Opcode Fuzzy Hash: 0314b2257d7c9cee0ed936d5079d047f944ce80269d07c911d91c6f3416d9001
    • Instruction Fuzzy Hash: 9D2192B59093C09FD7138B25DC95652BFB8EF07220F0984DADD858F6A3D264A909CB62
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 156 150aa0b-150aa6a 158 150aa6c 156->158 159 150aa6f-150aa75 156->159 158->159 160 150aa77 159->160 161 150aa7a-150aa83 159->161 160->161 162 150aac4-150aac9 161->162 163 150aa85-150aaa5 CreateDirectoryW 161->163 162->163 166 150aaa7-150aac3 163->166 167 150aacb-150aad0 163->167 167->166
    APIs
    • CreateDirectoryW.KERNELBASE(?,?), ref: 0150AA8B
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: CreateDirectory
    • String ID:
    • API String ID: 4241100979-0
    • Opcode ID: f9bc33c06859f4ffae0dbc1a81b555e064c19e31a5732df2becf71718dfb62b8
    • Instruction ID: c64bcc56655269590081396d23523f1feade0465d4a9abe03fcaa8fd00922477
    • Opcode Fuzzy Hash: f9bc33c06859f4ffae0dbc1a81b555e064c19e31a5732df2becf71718dfb62b8
    • Instruction Fuzzy Hash: 4621D0715083C05FEB12CB69DC55B96BFE8AF06310F0D84EAE884CF293D264E949CB61
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 169 150a392-150a3cf 171 150a3d1 169->171 172 150a3d4-150a3dd 169->172 171->172 173 150a3e2-150a3e8 172->173 174 150a3df 172->174 175 150a3ea 173->175 176 150a3ed-150a404 173->176 174->173 175->176 178 150a406-150a419 RegQueryValueExW 176->178 179 150a43b-150a440 176->179 180 150a442-150a447 178->180 181 150a41b-150a438 178->181 179->178 180->181
    APIs
    • RegQueryValueExW.KERNELBASE(?,00000E24,8C4BE639,00000000,00000000,00000000,00000000), ref: 0150A40C
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: QueryValue
    • String ID:
    • API String ID: 3660427363-0
    • Opcode ID: cf503871699d7d7b1ffe4de1f0b93b6425d2a77ea515476cb3e59461ce147586
    • Instruction ID: 4741e306db8fdca659099a3eb0de90a33b4f64add4111e2d5d7085289e6c9ffe
    • Opcode Fuzzy Hash: cf503871699d7d7b1ffe4de1f0b93b6425d2a77ea515476cb3e59461ce147586
    • Instruction Fuzzy Hash: 9D21AE75600300AFE722CE59CC84FA6F7ECEF04610F08846AE945CB692D374E809CA71
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • WriteFile.KERNELBASE(?,00000E24,8C4BE639,00000000,00000000,00000000,00000000), ref: 0150A9C1
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: 81a7a1caa983aa1756941c22b6ad5c6b9b2063f5b13587ac8acd26f2cc825f0b
    • Instruction ID: 2be5b190dce9ca6e19bbd5aae766241c05c9506fdc437a7dd0759172a1be39cd
    • Opcode Fuzzy Hash: 81a7a1caa983aa1756941c22b6ad5c6b9b2063f5b13587ac8acd26f2cc825f0b
    • Instruction Fuzzy Hash: 6411D071500200AFEB22CF55DC44FAAFBE8EF54324F04886AE9459F695C374A448CBB1
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetFilePointer.KERNELBASE(?,00000E24,8C4BE639,00000000,00000000,00000000,00000000), ref: 0150A8DE
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: FilePointer
    • String ID:
    • API String ID: 973152223-0
    • Opcode ID: 88cc66f8cec5bda3f8c1a3537a21fc23a51c5141c916275994b2ac7e7b6e7c73
    • Instruction ID: d15df56ba26800111f056477d1c860a77c0787782638227f7f7b79b8cac03201
    • Opcode Fuzzy Hash: 88cc66f8cec5bda3f8c1a3537a21fc23a51c5141c916275994b2ac7e7b6e7c73
    • Instruction Fuzzy Hash: 4911BF71500300AEEB22CF94DC44FAAFBE8EF54224F04886AE9459F685D374A5088BB1
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetErrorMode.KERNELBASE(?), ref: 0150A30C
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: ErrorMode
    • String ID:
    • API String ID: 2340568224-0
    • Opcode ID: f3756dc76e0a2bea5d874e0e21a6e4f58f77cf72f09d440dbf1215c6c2e85dcf
    • Instruction ID: c3f8a4008b6935c037b7211bc47b927312dad95cd27647f2349eec0dc8130aec
    • Opcode Fuzzy Hash: f3756dc76e0a2bea5d874e0e21a6e4f58f77cf72f09d440dbf1215c6c2e85dcf
    • Instruction Fuzzy Hash: E51191754093C09FD7238B65DC55A52BFB4EF47220F0980DBD9848F2A3D265A809CB72
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetFileType.KERNELBASE(?,00000E24,8C4BE639,00000000,00000000,00000000,00000000), ref: 0150A815
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: FileType
    • String ID:
    • API String ID: 3081899298-0
    • Opcode ID: ecf5689df69bf9fec4f7d410dcdc57639b20b688bd24943c39b0f2b73d36ac82
    • Instruction ID: 29b9131f51d14e29a5241de7dc90c7ca66ba1f12dbae2e7d254282a8b1e72e9f
    • Opcode Fuzzy Hash: ecf5689df69bf9fec4f7d410dcdc57639b20b688bd24943c39b0f2b73d36ac82
    • Instruction Fuzzy Hash: 1C012271500300AEE721CB55DC84FAAFBE8EF54624F04C4A6ED449F786D378E908CAB5
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CreateDirectoryW.KERNELBASE(?,?), ref: 0150AA8B
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: CreateDirectory
    • String ID:
    • API String ID: 4241100979-0
    • Opcode ID: 7590060ac1af2e96addd3108e8da6bb3cf0ae936d7ae1bdc952774f92448182f
    • Instruction ID: 6fdd44789d864bf34502e2199ad47bcc19be40b5dd589a3dd036cee843c70155
    • Opcode Fuzzy Hash: 7590060ac1af2e96addd3108e8da6bb3cf0ae936d7ae1bdc952774f92448182f
    • Instruction Fuzzy Hash: 3C1182716002409FEB11CF59D984B5AFBD8EF44210F08C4AADD05CF6C6E274E944CB61
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: CloseFind
    • String ID:
    • API String ID: 1863332320-0
    • Opcode ID: 60c0c62d42a65214edf5fa48143ce9efb750d6ae928ecfc717cfcf64e15852ce
    • Instruction ID: d4d3076c877ccfb1c9af3140789e54c8c3b96a7faa002ad0cc819050e2514530
    • Opcode Fuzzy Hash: 60c0c62d42a65214edf5fa48143ce9efb750d6ae928ecfc717cfcf64e15852ce
    • Instruction Fuzzy Hash: 5911CE755093C09FD712CB69CC85A52BFF4EF06220F0984DAE8858B2A3D234A848CB61
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetSystemInfo.KERNELBASE(?), ref: 0150B208
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: InfoSystem
    • String ID:
    • API String ID: 31276548-0
    • Opcode ID: b74e2f095c50b3c58175ee316d413d3a2b5681cbba6a442b874458aa5ddc15d2
    • Instruction ID: fd586151e5d026520c6143aa99b70494ea616434688169989d044c647deb7302
    • Opcode Fuzzy Hash: b74e2f095c50b3c58175ee316d413d3a2b5681cbba6a442b874458aa5ddc15d2
    • Instruction Fuzzy Hash: E9119E754093809FDB12CF55DC84B56BFB4EF46220F0884DAED849F252D275A908CB62
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 0150A1C2
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: FileFindNext
    • String ID:
    • API String ID: 2029273394-0
    • Opcode ID: 18acbbce8f51d952a942e6c9cc1c9e0c996aa3580a2654abd35acb086a58f233
    • Instruction ID: 1d7d6803f5c86fd74e77f9357f28ef7e49f047d703bab7c6b95b1698268a5cea
    • Opcode Fuzzy Hash: 18acbbce8f51d952a942e6c9cc1c9e0c996aa3580a2654abd35acb086a58f233
    • Instruction Fuzzy Hash: C2017171A00200ABD310DF16DC45B66FBE8EB88A20F14855AED489BB45E735F915CBE5
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 0150AC36
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: CreatePipe
    • String ID:
    • API String ID: 2719314638-0
    • Opcode ID: 19eb6d3286bccbac572e1c23a32e3ef0832281657509f9fdd01a262900968eb3
    • Instruction ID: 85e1c586c42be6eddb34155189da77fccd21a232ca1371ac7f4baad8627e33bc
    • Opcode Fuzzy Hash: 19eb6d3286bccbac572e1c23a32e3ef0832281657509f9fdd01a262900968eb3
    • Instruction Fuzzy Hash: FD01B171A00200ABD310DF16CC45B66FBE8FB88A20F14811AEC489BB45E735F925CBE1
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindCloseChangeNotification.KERNELBASE(?), ref: 0150A748
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: ChangeCloseFindNotification
    • String ID:
    • API String ID: 2591292051-0
    • Opcode ID: e36475381e86d793b929121aeed7387d389319810d804a4a7009a0037685f94e
    • Instruction ID: b27a4b2524436b89f912730108fb7bdd4acd42cdf0e1c592c5927e210a348259
    • Opcode Fuzzy Hash: e36475381e86d793b929121aeed7387d389319810d804a4a7009a0037685f94e
    • Instruction Fuzzy Hash: 9601D4759003408FDB11CF59D984766FBE4EF44220F08C4AADC068F796D278E448CAA1
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: CloseFind
    • String ID:
    • API String ID: 1863332320-0
    • Opcode ID: 511f77ea36e67d0d902a2be5a96cf85631e307b8fddf5aaeab5e56ed44b2f28f
    • Instruction ID: dce701ffd429a41b46d8ae235fe036429f5d1c82183bbdb9285ba112582ca19d
    • Opcode Fuzzy Hash: 511f77ea36e67d0d902a2be5a96cf85631e307b8fddf5aaeab5e56ed44b2f28f
    • Instruction Fuzzy Hash: A501F4795003409FDB22CF19D885766FBE4EF04220F08C4AADD058F792D275E848CEA2
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetErrorMode.KERNELBASE(?), ref: 0150A30C
    Memory Dump Source
    • Source File: 00000000.00000002.4095809654.000000000150A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_150a000_unarchiver.jbxd
    Similarity
    • API ID: ErrorMode
    • String ID:
    • API String ID: 2340568224-0
    • Opcode ID: 7b03a8afde240e63325aee783a5b8916dbdd51094855a306ade36a26221aeed5
    • Instruction ID: e4a9435bdccf1b5ac7df31184f20d97ac67a1ac40696e996f2e4f7419dbc0603
    • Opcode Fuzzy Hash: 7b03a8afde240e63325aee783a5b8916dbdd51094855a306ade36a26221aeed5
    • Instruction Fuzzy Hash: 87F0AF35904340DFDB21CF49D985BA6FBE0EF44620F08C4AADD094F796D3B9A458CEA2
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4095904008.0000000001540000.00000040.00000020.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1540000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 41f1b489c9c805b4c69786d89a1651864d91fc47523a8e5536437d79c6dab752
    • Instruction ID: fc0199034518bf28ab3ead0b70213028503778f74a5c4cdbb5eb7ebc5cd6d884
    • Opcode Fuzzy Hash: 41f1b489c9c805b4c69786d89a1651864d91fc47523a8e5536437d79c6dab752
    • Instruction Fuzzy Hash: 5031DDA294E3C04FD7534B349C64195BFB0AE93128B1E80DBD485CF5E3E16D480ACB63
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ac3ef7cf36f15e6db4c6c923dd77a9feae113de49a74cdb4234a488485d9845f
    • Instruction ID: da5eaca1075ea7f66f68786c6e6e0a065d9c09791033446ab80ae067d92c8019
    • Opcode Fuzzy Hash: ac3ef7cf36f15e6db4c6c923dd77a9feae113de49a74cdb4234a488485d9845f
    • Instruction Fuzzy Hash: D7B16E34B01210CFCB19DB76ED59A5E7BF2FF88250B10816ADA069B354DBB89C94CB91
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d31e0b5efdcb8841d47087d46f61e2eb3dea047fc4d5e9c00bf87b88ee57c13e
    • Instruction ID: 3f19725545ab8696f7a260ed96ede862d5b50b08f9e000303ae54f5b4230ee93
    • Opcode Fuzzy Hash: d31e0b5efdcb8841d47087d46f61e2eb3dea047fc4d5e9c00bf87b88ee57c13e
    • Instruction Fuzzy Hash: 54A17D30B002018FDB19DBB9D8557BE77B3FB84308F148469D9169B794DFB89C458B91
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6e2759c5c5f5369b60aeb0511e2601f3fdf467e2802998a1a2c2abff211f99c1
    • Instruction ID: 755385af0ead525992589a5cc8b17287ebab911e7dabe8befaea325d42236a2b
    • Opcode Fuzzy Hash: 6e2759c5c5f5369b60aeb0511e2601f3fdf467e2802998a1a2c2abff211f99c1
    • Instruction Fuzzy Hash: A1210730B002048FE719DB7989516AFBAEBABC5204B44443CD546DB380DF7EAD428B92
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4da146c0551f1a22ad1fc381264d9b749561b67b60c819e72cd050f3583e7961
    • Instruction ID: 84e4e59c8eb02cd8400723f09f64f05048231bec74928d4027e8214b2337d469
    • Opcode Fuzzy Hash: 4da146c0551f1a22ad1fc381264d9b749561b67b60c819e72cd050f3583e7961
    • Instruction Fuzzy Hash: 7721EA30B007048BD715DB7AC5516AFBBEBAFC5104B44883CC146DB784DF79AD068792
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 73abeffa12b45aab0d49ce3fcdbbf27648b0acddbecb7cb72cadacc1f3744bb5
    • Instruction ID: 2d357ebd30b9d949f337b18591dbdf2ed18dbc25880d83ad72029f254ecc5421
    • Opcode Fuzzy Hash: 73abeffa12b45aab0d49ce3fcdbbf27648b0acddbecb7cb72cadacc1f3744bb5
    • Instruction Fuzzy Hash: 3511B131A20118AFCB08CBB4DC45CDF7BF6EB88314B144179E605E7264DB799C068780
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a3a7ecb3673523ae2d8ccbd25b19df5694c0736db4a5b8701b4f8a3375a504e6
    • Instruction ID: 7447f4469c916b60a123ea85f3bd4b8ffac24d3c313f61f372ed66c3848ad45b
    • Opcode Fuzzy Hash: a3a7ecb3673523ae2d8ccbd25b19df5694c0736db4a5b8701b4f8a3375a504e6
    • Instruction Fuzzy Hash: 95118C32A10118AF8B149BB4DC459DF7BF6EB88214B144579E606E7270DF79AC0A8BD1
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4095904008.0000000001540000.00000040.00000020.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1540000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6f1ff156f12270362511ebcf4ac2eabebdc33acab7f937eae1bb9cc5febbbf9f
    • Instruction ID: 06524bc7cc64be1b6a498143acb531bc2cda2ce030572feeaa96ea3f798555dd
    • Opcode Fuzzy Hash: 6f1ff156f12270362511ebcf4ac2eabebdc33acab7f937eae1bb9cc5febbbf9f
    • Instruction Fuzzy Hash: 6D0184B64096406FD300CB45EC41C57FBE8DF96524F04C46AED489B601D231A9188BA2
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4095904008.0000000001540000.00000040.00000020.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1540000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3ea916e0fbc8044ac29f71a0ef3013e9c2382562fa8f38cdcf9394658a262e94
    • Instruction ID: aa65dc7df6cb2aae163ab0ac01223a95e381378f57acb45cdc57d11d7df84bf9
    • Opcode Fuzzy Hash: 3ea916e0fbc8044ac29f71a0ef3013e9c2382562fa8f38cdcf9394658a262e94
    • Instruction Fuzzy Hash: FEF049B65097805FD7118F059C40863FFA8DB86620749C4AFEC499B752D235B909CBB6
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4095904008.0000000001540000.00000040.00000020.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1540000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 14595f6d31441d4e64b96f5f8b2fcfcbbd0060ea6a0ef04edc4fd45684fb3bce
    • Instruction ID: eca232974ebeb2cde65187ff8ae35f4b2b9ef08e23b36a0d6427f9532d8529be
    • Opcode Fuzzy Hash: 14595f6d31441d4e64b96f5f8b2fcfcbbd0060ea6a0ef04edc4fd45684fb3bce
    • Instruction Fuzzy Hash: F3F082B2905204ABD300DF49ED45866F7ECDFD4521F04C56AED088B700E276A9198AF7
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f856da16e5f200c203aaefd2d57180a9a1b290d43f6bebacb6ce32618c85eaae
    • Instruction ID: e090e6010e04aadaf1208491377ed38a083c07007fee864a4a4cc79cd454d7ce
    • Opcode Fuzzy Hash: f856da16e5f200c203aaefd2d57180a9a1b290d43f6bebacb6ce32618c85eaae
    • Instruction Fuzzy Hash: 0CE0DF31F243142FCB48DFB9985159EBFEAEB85264B5545BEC008DB351EF388C028B81
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4095904008.0000000001540000.00000040.00000020.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1540000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4ac675ea3c2f771579361688ba90d24097cc80443b614bbc81c7fa68cdb466fc
    • Instruction ID: 98bbae8fd80345b8d232a100bfa3ff7cd779ddcef0d7597609c068caa11f256f
    • Opcode Fuzzy Hash: 4ac675ea3c2f771579361688ba90d24097cc80443b614bbc81c7fa68cdb466fc
    • Instruction Fuzzy Hash: 8DE092B6A006408B9750CF0AEC41452F7D8EB84630B08C47FDC0D8B701E235B909CEA6
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8ebde3859744bc0437ec7390efec086f69d2c043989ae3fadb51594415a5e613
    • Instruction ID: 985d91742692199d4de11956c9953944c0b790d3c92eec257c44e7f6beda00d6
    • Opcode Fuzzy Hash: 8ebde3859744bc0437ec7390efec086f69d2c043989ae3fadb51594415a5e613
    • Instruction Fuzzy Hash: FAD01231F042182B8B48EFF9985159EBAEA9B84154B55447D9009D7340EE399C0187D1
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f0649136811401a6f6185f432ea9cfe5bce8cb3c1509612ef7366ebb25c63859
    • Instruction ID: 24155dd6f70cb8a8caeef7058a426c2883acc76372f33014d9c4223f56304577
    • Opcode Fuzzy Hash: f0649136811401a6f6185f432ea9cfe5bce8cb3c1509612ef7366ebb25c63859
    • Instruction Fuzzy Hash: 8BE012302903008FD70D9774D91A9E73BA5AB91324F4581AA90049B562D7BDCC86C750
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2e8b4aa5cc200db2cfc6054ddeccbfaaf6456b963ffb8c29b118055989c5915d
    • Instruction ID: d53181d6d3145c380f6a56da68b3ebeda284c6e17f1405549038b3eb85139a0d
    • Opcode Fuzzy Hash: 2e8b4aa5cc200db2cfc6054ddeccbfaaf6456b963ffb8c29b118055989c5915d
    • Instruction Fuzzy Hash: 54E0C2302903008FDB0987B4D81A9E63BA0AB81320F4581A890044B562C7BCCCC2C741
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4095792363.0000000001502000.00000040.00000800.00020000.00000000.sdmp, Offset: 01502000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1502000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b2298747550c3a46d8bbff0371af62921bc6c53c599ad1b4a2600534d8b9b148
    • Instruction ID: 231c718484cb5ed0b786f2d4d70cec2e3cec2255fb5ebce47e6d92a410d2d392
    • Opcode Fuzzy Hash: b2298747550c3a46d8bbff0371af62921bc6c53c599ad1b4a2600534d8b9b148
    • Instruction Fuzzy Hash: F3D05E792056D14FE3279A1CC6A8B993BE4BB55714F4B48F9AC00CF7A3CB68D581D600
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4095792363.0000000001502000.00000040.00000800.00020000.00000000.sdmp, Offset: 01502000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1502000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3850322a9bf7c0977d44663cf6115ca40fb7fd971ae894870c9b71f5e4f5dc80
    • Instruction ID: dad3c0bddb834f402de2d5f9a4066582706caeb4110760398e37346088819087
    • Opcode Fuzzy Hash: 3850322a9bf7c0977d44663cf6115ca40fb7fd971ae894870c9b71f5e4f5dc80
    • Instruction Fuzzy Hash: 92D05E342006814BDB26DE0CD6D8F9D3BD8BB45714F0648E8AC108F7A2C7B4D8C0DA00
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f8be8fd2e00650c85ec0e9a6e6215c511a9df97bc8f7e95207f38c8886108a29
    • Instruction ID: 4bab5881e9a4491378abf5f8968909135801c2f7a0c8344536988a71ec0bd962
    • Opcode Fuzzy Hash: f8be8fd2e00650c85ec0e9a6e6215c511a9df97bc8f7e95207f38c8886108a29
    • Instruction Fuzzy Hash: 11C012303003048BD7089778D91DE6A7B9567C4704F85C16485091B651CBB8EC80C684
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4097597234.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_53b0000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 11af35dcbfba0db011c2086f4e812b6272120e1d9ade328a719873c1b8d276d5
    • Instruction ID: 798137a072dd6b621e90e1f9ba36281944dbbcd78536e8102402e9ac0c19c4ee
    • Opcode Fuzzy Hash: 11af35dcbfba0db011c2086f4e812b6272120e1d9ade328a719873c1b8d276d5
    • Instruction Fuzzy Hash: CFC012303002048BD7089778D91DE67779667C4704F45C16485091B651DBB8EC40C6C4
    Uniqueness

    Uniqueness Score: -1.00%