Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YGPRDS01_2024-04-26_03_35_12.538 (1).zip

Overview

General Information

Sample name:YGPRDS01_2024-04-26_03_35_12.538 (1).zip
Analysis ID:1431968
MD5:d2c77e0c22e6427a360164d1352d785d
SHA1:6c09d134fda4652bc05a4e55c922419f54d1f6a3
SHA256:0f9e90d955b334048b55394cbb71987d9aa079bee5de51d85cd22d7b27f1a450
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis

Classification

Analysis Advice

Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
  • System is w10x64
  • unarchiver.exe (PID: 6688 cmdline: "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\YGPRDS01_2024-04-26_03_35_12.538 (1).zip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2)
    • 7za.exe (PID: 6736 cmdline: "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\ai20ytml.mne" "C:\Users\user\Desktop\YGPRDS01_2024-04-26_03_35_12.538 (1).zip" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
      • conhost.exe (PID: 6764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: classification engineClassification label: clean2.winZIP@4/1@0/0
Source: C:\Windows\SysWOW64\unarchiver.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6764:120:WilError_03
Source: C:\Windows\SysWOW64\unarchiver.exeFile created: C:\Users\user\AppData\Local\Temp\unarchiver.logJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\unarchiver.exe "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\YGPRDS01_2024-04-26_03_35_12.538 (1).zip"
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\ai20ytml.mne" "C:\Users\user\Desktop\YGPRDS01_2024-04-26_03_35_12.538 (1).zip"
Source: C:\Windows\SysWOW64\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\ai20ytml.mne" "C:\Users\user\Desktop\YGPRDS01_2024-04-26_03_35_12.538 (1).zip"Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\7za.exeSection loaded: 7z.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 7F0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 2820000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: A50000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeWindow / User API: threadDelayed 656Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeWindow / User API: threadDelayed 9312Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 6928Thread sleep count: 656 > 30Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 6928Thread sleep time: -328000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 6928Thread sleep count: 9312 > 30Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 6928Thread sleep time: -4656000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 0_2_0079B1D6 GetSystemInfo,0_2_0079B1D6
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\ai20ytml.mne" "C:\Users\user\Desktop\YGPRDS01_2024-04-26_03_35_12.538 (1).zip"Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping2
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1431968 Sample: YGPRDS01_2024-04-26_03_35_1... Startdate: 26/04/2024 Architecture: WINDOWS Score: 2 6 unarchiver.exe 4 2->6         started        process3 8 7za.exe 8 6->8         started        process4 10 conhost.exe 8->10         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1431968
Start date and time:2024-04-26 05:37:00 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 1s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:YGPRDS01_2024-04-26_03_35_12.538 (1).zip
Detection:CLEAN
Classification:clean2.winZIP@4/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 45
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .zip
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
05:38:23API Interceptor4291465x Sleep call for process: unarchiver.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\unarchiver.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):3785
Entropy (8bit):5.077183552079931
Encrypted:false
SSDEEP:48:RuVG2Gb2G2GpIGpG2Gp8G2GB9G4G2Gb0GbGeGB9G4GrlG2G2GmH2G2GzG2GGG2Gh:Xe2KdCSBZT
MD5:9AD9B77C728BF978A5DCA9524C0DF1E9
SHA1:4ED56D2846E5CB8EA0D53980BB691923BA42AB70
SHA-256:E4901835E5CB6E21FB7E4FFA8FA4D9F565E04454F7EFA2F06853523C3A676047
SHA-512:BE3102C251C79A931D487E2EC997B8255E49C4497BD785E6105F812FB5CC0E57144DFB819EA43901D24A4A38BF2BDC0EE0728033CA5A649E78933F9E652C4FA8
Malicious:false
Reputation:low
Preview:04/26/2024 5:37 AM: Unpack: C:\Users\user\Desktop\YGPRDS01_2024-04-26_03_35_12.538 (1).zip..04/26/2024 5:37 AM: Tmp dir: C:\Users\user\AppData\Local\Temp\ai20ytml.mne..04/26/2024 5:37 AM: Received from standard out: ..04/26/2024 5:37 AM: Received from standard out: 7-Zip 18.05 (x86) : Copyright (c) 1999-2018 Igor Pavlov : 2018-04-30..04/26/2024 5:37 AM: Received from standard out: ..04/26/2024 5:37 AM: Received from standard out: Scanning the drive for archives:..04/26/2024 5:37 AM: Received from standard out: 1 file, 475015 bytes (464 KiB)..04/26/2024 5:37 AM: Received from standard out: ..04/26/2024 5:37 AM: Received from standard out: Extracting archive: C:\Users\user\Desktop\YGPRDS01_2024-04-26_03_35_12.538 (1).zip..04/26/2024 5:37 AM: Received from standard out: ..04/26/2024 5:37 AM: Received from standard out: WARNINGS:..04/26/2024 5:37 AM: Received from standard out: Headers Error..04/26/2024 5:37 AM: Received from standard out: ..04/26/2024 5:37 AM: Received from standard ou
File type:Zip archive data, at least v4.5 to extract, compression method=deflate
Entropy (8bit):7.999582061286944
TrID:
  • ZIP compressed archive (8000/1) 100.00%
File name:YGPRDS01_2024-04-26_03_35_12.538 (1).zip
File size:475'015 bytes
MD5:d2c77e0c22e6427a360164d1352d785d
SHA1:6c09d134fda4652bc05a4e55c922419f54d1f6a3
SHA256:0f9e90d955b334048b55394cbb71987d9aa079bee5de51d85cd22d7b27f1a450
SHA512:86649aec56cd1b9140077f6182be31e108158a5c0e17d71888055f94e9cbb7f0f8a5300ea4f152ad21906b333623dc6a3c3155632b5cc7aba3a6f77ab5ad5f03
SSDEEP:12288:zXzixbFZ07LgC+IJTHRPzqA2FgztGg+0t:ZLJ+sThzquMght
TLSH:7FA4234F69841D8E430C5219FC4AC069DD58C6BA5AAC70E35F8AD307D51A6ED2F0FB2E
File Content Preview:PK..-.........ZZ..7=..."..D...Device/HarddiskVolume3/Program Files/AutoHotkey/Compiler/Ahk2Exe.exe.......................w!....\B&"R....&.....(=.....z< k........n)qBs.1..#fp.nb...1.E.R...pJ.f....N....+.].MZ......8K..v.m..L2.V.H..7....9l".Z.m..@..i.ty....2
Icon Hash:90cececece8e8eb0
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:05:37:47
Start date:26/04/2024
Path:C:\Windows\SysWOW64\unarchiver.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\YGPRDS01_2024-04-26_03_35_12.538 (1).zip"
Imagebase:0x190000
File size:12'800 bytes
MD5 hash:16FF3CC6CC330A08EED70CBC1D35F5D2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:1
Start time:05:37:47
Start date:26/04/2024
Path:C:\Windows\SysWOW64\7za.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\ai20ytml.mne" "C:\Users\user\Desktop\YGPRDS01_2024-04-26_03_35_12.538 (1).zip"
Imagebase:0xa70000
File size:289'792 bytes
MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:05:37:47
Start date:26/04/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:22.2%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:5.5%
    Total number of Nodes:73
    Total number of Limit Nodes:4
    execution_graph 1029 79a5fe 1031 79a636 CreateFileW 1029->1031 1032 79a685 1031->1032 1080 79a370 1083 79a392 RegQueryValueExW 1080->1083 1082 79a41b 1083->1082 1104 79a933 1106 79a962 WriteFile 1104->1106 1107 79a9c9 1106->1107 1033 79a172 1034 79a1c2 FindNextFileW 1033->1034 1035 79a1ca 1034->1035 1036 79afb2 1037 79afde FindClose 1036->1037 1039 79b010 1036->1039 1038 79aff3 1037->1038 1039->1037 1108 79b1b4 1109 79b1d6 GetSystemInfo 1108->1109 1111 79b210 1109->1111 1084 79ab76 1085 79aba5 CreatePipe 1084->1085 1087 79ac3e 1085->1087 1112 79a2ae 1115 79a2b2 SetErrorMode 1112->1115 1114 79a31b 1115->1114 1116 79a120 1117 79a172 FindNextFileW 1116->1117 1119 79a1ca 1117->1119 1060 79a962 1062 79a997 WriteFile 1060->1062 1063 79a9c9 1062->1063 1076 79abe6 1077 79ac10 CreatePipe 1076->1077 1079 79ac3e 1077->1079 1025 79a2da 1026 79a32f 1025->1026 1027 79a306 SetErrorMode 1025->1027 1026->1027 1028 79a31b 1027->1028 1088 79a5dc 1089 79a5fe CreateFileW 1088->1089 1091 79a685 1089->1091 1092 79a850 1094 79a882 SetFilePointer 1092->1094 1095 79a8e6 1094->1095 1096 79a6d4 1097 79a716 FindCloseChangeNotification 1096->1097 1099 79a750 1097->1099 1048 79a716 1049 79a781 1048->1049 1050 79a742 FindCloseChangeNotification 1048->1050 1049->1050 1051 79a750 1050->1051 1052 79b1d6 1053 79b238 1052->1053 1054 79b202 GetSystemInfo 1052->1054 1053->1054 1055 79b210 1054->1055 1120 79aa0b 1122 79aa46 CreateDirectoryW 1120->1122 1123 79aa93 1122->1123 1124 79af8b 1127 79afb2 FindClose 1124->1127 1126 79aff3 1127->1126 1128 79a78f 1130 79a7c2 GetFileType 1128->1130 1131 79a824 1130->1131 1068 79a882 1070 79a8b7 SetFilePointer 1068->1070 1071 79a8e6 1070->1071 1132 79ad04 1133 79ad2a DuplicateHandle 1132->1133 1135 79adaf 1133->1135 1072 79aa46 1075 79aa6c CreateDirectoryW 1072->1075 1074 79aa93 1075->1074

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00D10DD1 48 Function_00D10BA0 0->48 1 Function_0079A078 2 Function_00D205D0 3 Function_0079267C 4 Function_0079257F 5 Function_0079A370 6 Function_0079B470 7 Function_0079A172 8 Function_0079B276 9 Function_0079AB76 10 Function_00D102C0 25 Function_00D205E0 10->25 31 Function_00D10799 10->31 10->48 89 Function_00D20606 10->89 11 Function_00D205C0 12 Function_0079AC6C 13 Function_0079A462 14 Function_0079A962 15 Function_00792264 16 Function_00792364 17 Function_0079A566 18 Function_00792458 19 Function_0079B15D 20 Function_0079A45C 21 Function_0079B351 22 Function_0079A850 23 Function_0079B052 24 Function_00D10DE0 24->48 26 Function_0079AA46 27 Function_0079B246 28 Function_0079A23A 29 Function_0079A33D 30 Function_0079213C 31->25 32 Function_00D10C99 31->32 31->48 52 Function_00D10CA8 31->52 57 Function_00D10C50 31->57 75 Function_00D10C60 31->75 31->89 33 Function_00792430 34 Function_0079A933 35 Function_00792528 36 Function_0079AD2A 37 Function_00D20784 38 Function_0079A02E 39 Function_0079B121 40 Function_0079A120 41 Function_0079AF22 42 Function_00D207B2 43 Function_00D105B1 44 Function_00D207B6 45 Function_0079201C 46 Function_0079B01E 47 Function_0079A716 49 Function_0079AA0B 50 Function_00D10DA2 50->48 51 Function_0079A50F 53 Function_0079A005 54 Function_0079AE05 55 Function_0079AD04 56 Function_0079AB06 58 Function_0079A5FE 59 Function_007921F0 60 Function_00D2005F 61 Function_0079A1F4 62 Function_007923F4 63 Function_0079AAE0 64 Function_00D10748 65 Function_00D20648 76 Function_00D2066A 65->76 66 Function_0079ABE6 67 Function_0079AADA 68 Function_0079A2DA 69 Function_0079A5DC 70 Function_007920D0 71 Function_00D2067F 72 Function_00D2087F 73 Function_0079A6D4 74 Function_0079B1D6 77 Function_0079A7C2 78 Function_00D2026D 79 Function_007923BC 80 Function_007926BC 81 Function_00D10014 82 Function_00D20714 83 Function_00D10E18 83->48 84 Function_00D20718 85 Function_0079AEB2 86 Function_0079AFB2 87 Function_0079B1B4 88 Function_00D20001 90 Function_0079A2AE 91 Function_00D10E09 91->48 92 Function_00D20808 93 Function_00792098 94 Function_0079A09A 95 Function_0079B49E 96 Function_0079B39E 97 Function_0079A392 98 Function_00D10C3D 99 Function_00792194 100 Function_0079AF8B 101 Function_0079A78F 102 Function_0079AC8E 103 Function_0079A882 104 Function_00D2082E 105 Function_0079A486
    APIs
    • GetSystemInfo.KERNELBASE(?), ref: 0079B208
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: InfoSystem
    • String ID:
    • API String ID: 31276548-0
    • Opcode ID: 96b4ef6fd8592205eb460df10eec2928b7f7e217c74983c66669c424365419bc
    • Instruction ID: 10d6988d716ae7448dff74fa9bd5f8969e7e7a338ac30fe22d8b1950aff51783
    • Opcode Fuzzy Hash: 96b4ef6fd8592205eb460df10eec2928b7f7e217c74983c66669c424365419bc
    • Instruction Fuzzy Hash: F7018B719042409FEB10CF15E98476AFBE4EF15720F08C4AADD489F656D379A508CBA2
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 d10799-d107c7 3 d10b77 0->3 4 d107cd-d107da 0->4 5 d10b83-d10b8d 3->5 92 d107dc call d10ba0 4->92 93 d107dc call d205e0 4->93 94 d107dc call d20606 4->94 7 d107e2 95 d107e2 call d10c50 7->95 96 d107e2 call d10c60 7->96 8 d107e8-d10802 call d10ba0 11 d10810 8->11 12 d10804-d1080e 8->12 13 d10815-d10817 11->13 12->13 14 d1089b-d10940 13->14 15 d1081d-d1088e 13->15 32 d10948-d109a9 call d10ba0 * 2 14->32 99 d10890 call d205e0 15->99 100 d10890 call d20606 15->100 101 d10890 call d10c99 15->101 102 d10890 call d10ca8 15->102 30 d10896 30->32 42 d10b63-d10b67 32->42 43 d109af 32->43 42->5 45 d10b69-d10b6f call d10ba0 42->45 44 d109b2-d109d1 43->44 49 d109d8-d109da 44->49 47 d10b75 45->47 47->5 50 d10b51-d10b5d 49->50 51 d109e0-d109e4 49->51 50->42 50->44 52 d10b39-d10b46 51->52 53 d109ea-d109fd 51->53 59 d10b4e 52->59 54 d10a70-d10a74 53->54 55 d109ff 53->55 58 d10a7a-d10aa7 54->58 54->59 57 d10a02-d10a24 55->57 64 d10a26 57->64 65 d10a2b-d10a5e 57->65 70 d10aa9 58->70 71 d10aae-d10ad5 58->71 59->50 64->65 76 d10a60 65->76 77 d10a67-d10a6e 65->77 70->71 79 d10ad7-d10aed 71->79 80 d10b1d-d10b25 71->80 76->77 77->54 77->57 84 d10af4-d10b1b 79->84 85 d10aef 79->85 80->59 84->80 89 d10b27-d10b37 84->89 85->84 89->59 92->7 93->7 94->7 95->8 96->8 99->30 100->30 101->30 102->30
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID: :@k$:@k
    • API String ID: 0-4032727010
    • Opcode ID: a0de32e0e55fc63c15873cb7a060028ac03eeb4aafe94b9867d78579c6482372
    • Instruction ID: 96292143cc944f38f0d6809d70b0c0336195e64326ecb05bcc3dd9a5ea5375bd
    • Opcode Fuzzy Hash: a0de32e0e55fc63c15873cb7a060028ac03eeb4aafe94b9867d78579c6482372
    • Instruction Fuzzy Hash: 66A1BF30B006019BDB18AB74D955BBEB7B3AFE4308F248429D90697794DF78DC86CB61
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 104 79b246-79b2eb 109 79b2ed-79b2f5 DuplicateHandle 104->109 110 79b343-79b348 104->110 111 79b2fb-79b30d 109->111 110->109 113 79b34a-79b34f 111->113 114 79b30f-79b340 111->114 113->114
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0079B2F3
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: 0f6c5942daa990d72ab52b26841607a1747828574ce7e01adb468c4ab71dae55
    • Instruction ID: ff718132d5beb565b1971abcd3892a2535c6a35b47e9d15509e01e2e40a111b9
    • Opcode Fuzzy Hash: 0f6c5942daa990d72ab52b26841607a1747828574ce7e01adb468c4ab71dae55
    • Instruction Fuzzy Hash: 743194715043446FEB228B61DC45FA6BFFCEF45310F08859AE985CB552D334A949CB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 118 79ad04-79ad9f 123 79ada1-79ada9 DuplicateHandle 118->123 124 79adf7-79adfc 118->124 125 79adaf-79adc1 123->125 124->123 127 79adfe-79ae03 125->127 128 79adc3-79adf4 125->128 127->128
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0079ADA7
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: b825424336d47d4e15b22c0d860ae2221f5ec367773aab11e947585afb7d9f94
    • Instruction ID: 078d7558aa38bf37c51c563b728c5ebaccc230f7f6118cdb3586a51977c707d4
    • Opcode Fuzzy Hash: b825424336d47d4e15b22c0d860ae2221f5ec367773aab11e947585afb7d9f94
    • Instruction Fuzzy Hash: 1631C171505344AFEB228B61DC44FA7BFECEF05214F08889AF985CB652D234A849CB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 132 79ab76-79aba3 133 79ac10-79ac67 CreatePipe 132->133 134 79aba5-79ac0f 132->134 134->133
    APIs
    • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 0079AC36
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: CreatePipe
    • String ID:
    • API String ID: 2719314638-0
    • Opcode ID: 68d37f484f975abd9c5e122128e5111d62e088615347c8ab3780330f68cec3b1
    • Instruction ID: 1c42461a729366f62b93ff4ed5b24effc1a181510a0418c4809c6c1d98df6517
    • Opcode Fuzzy Hash: 68d37f484f975abd9c5e122128e5111d62e088615347c8ab3780330f68cec3b1
    • Instruction Fuzzy Hash: 0831807250E3C06FD3038B318C65A51BFB4AF47610F1984DBD8C4DF6A3D2296919C762
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 139 79a5dc-79a656 143 79a658 139->143 144 79a65b-79a667 139->144 143->144 145 79a669 144->145 146 79a66c-79a675 144->146 145->146 147 79a677-79a69b CreateFileW 146->147 148 79a6c6-79a6cb 146->148 151 79a6cd-79a6d2 147->151 152 79a69d-79a6c3 147->152 148->147 151->152
    APIs
    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0079A67D
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 450b9a3e0431b047b59b959c9a1e1f5dc52bc83a87e482d12c001e79e0cc7820
    • Instruction ID: 2599125e59347893b8cd8765de9864371d77dc7045349ee01df7c9aecbfac041
    • Opcode Fuzzy Hash: 450b9a3e0431b047b59b959c9a1e1f5dc52bc83a87e482d12c001e79e0cc7820
    • Instruction Fuzzy Hash: CE317E71505340AFEB21CF65DD44F62BBF8EF49220F08889AE9858B652D375E809CB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 155 79a120-79a1f3 FindNextFileW
    APIs
    • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 0079A1C2
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: FileFindNext
    • String ID:
    • API String ID: 2029273394-0
    • Opcode ID: 76d6a268e5770b2d6708eaaef5cf5596b0e419b2046ec6f4ceb1f3584f073d6f
    • Instruction ID: 50817f31e3325f247963cf4a17c0a6cd92347b6a34228b9df958b9e83bbfba36
    • Opcode Fuzzy Hash: 76d6a268e5770b2d6708eaaef5cf5596b0e419b2046ec6f4ceb1f3584f073d6f
    • Instruction Fuzzy Hash: D821057150D3C06FD3028B218C51BA6BFB4EF87620F0985CBD8C4CF693D225A919C7A2
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 160 79a370-79a3cf 163 79a3d1 160->163 164 79a3d4-79a3dd 160->164 163->164 165 79a3df 164->165 166 79a3e2-79a3e8 164->166 165->166 167 79a3ea 166->167 168 79a3ed-79a404 166->168 167->168 170 79a43b-79a440 168->170 171 79a406-79a419 RegQueryValueExW 168->171 170->171 172 79a41b-79a438 171->172 173 79a442-79a447 171->173 173->172
    APIs
    • RegQueryValueExW.KERNELBASE(?,00000E24,5EB935B0,00000000,00000000,00000000,00000000), ref: 0079A40C
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: QueryValue
    • String ID:
    • API String ID: 3660427363-0
    • Opcode ID: 666e0c11c60ab50155def4a715b3c501734c1dda114dcbd9da65d97d154cc330
    • Instruction ID: 98fc05718796704bb610b9921ec87d32b55c31bba55e29c1d02e55f5f91ddb14
    • Opcode Fuzzy Hash: 666e0c11c60ab50155def4a715b3c501734c1dda114dcbd9da65d97d154cc330
    • Instruction Fuzzy Hash: 2B218D71505340AFDB21CF15DC84FA2BBF8EF05710F08849AE945CB252D368E948CBA2
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 190 79b276-79b2eb 194 79b2ed-79b2f5 DuplicateHandle 190->194 195 79b343-79b348 190->195 196 79b2fb-79b30d 194->196 195->194 198 79b34a-79b34f 196->198 199 79b30f-79b340 196->199 198->199
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0079B2F3
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: c43fe5ec99a9992be9830be72b2a2e3c0b4d64722b236bf44abddda0fe5bcb24
    • Instruction ID: 27139cdb5a8c796b0aa9c440198c3cc31b1811cc6a3dab115f0b1b59695007ec
    • Opcode Fuzzy Hash: c43fe5ec99a9992be9830be72b2a2e3c0b4d64722b236bf44abddda0fe5bcb24
    • Instruction Fuzzy Hash: B4219272500204AFEB21CF61DD45FABBBECEF04314F04896AE945DBA51D374E5488B61
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 177 79ad2a-79ad9f 181 79ada1-79ada9 DuplicateHandle 177->181 182 79adf7-79adfc 177->182 183 79adaf-79adc1 181->183 182->181 185 79adfe-79ae03 183->185 186 79adc3-79adf4 183->186 185->186
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0079ADA7
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: 07f948ab679112d9245538463e824eafb053f06b2a1ccaf1a85bdd72a7968040
    • Instruction ID: 2fb144ce9171633bc3fab0f4ec18c096a69ad97f9f68dbdd98e5cb7ee923f5d8
    • Opcode Fuzzy Hash: 07f948ab679112d9245538463e824eafb053f06b2a1ccaf1a85bdd72a7968040
    • Instruction Fuzzy Hash: F021C472500204AFEB218F51DD45FABFBECEF04314F04886AE945DBA55D734E5488BB1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 203 79a850-79a8d6 207 79a8d8-79a8f8 SetFilePointer 203->207 208 79a91a-79a91f 203->208 211 79a8fa-79a917 207->211 212 79a921-79a926 207->212 208->207 212->211
    APIs
    • SetFilePointer.KERNELBASE(?,00000E24,5EB935B0,00000000,00000000,00000000,00000000), ref: 0079A8DE
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: FilePointer
    • String ID:
    • API String ID: 973152223-0
    • Opcode ID: 457778efe7c4c86521d2ed049d7df3a7281eb4b5e03fd19b7b8b9c3b8f8d72fb
    • Instruction ID: 2c2a74479942f801ff850ccab2cc606797266d6e9d96d7aac6301ad054e697e0
    • Opcode Fuzzy Hash: 457778efe7c4c86521d2ed049d7df3a7281eb4b5e03fd19b7b8b9c3b8f8d72fb
    • Instruction Fuzzy Hash: 9121A4715093806FEB128B61DC44FA2BFB8EF46724F0984DAE984DB552D278A909C772
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 215 79a933-79a9b9 219 79a9bb-79a9db WriteFile 215->219 220 79a9fd-79aa02 215->220 223 79a9dd-79a9fa 219->223 224 79aa04-79aa09 219->224 220->219 224->223
    APIs
    • WriteFile.KERNELBASE(?,00000E24,5EB935B0,00000000,00000000,00000000,00000000), ref: 0079A9C1
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: 6b66474845fd360a939b9f38b500752bc426cffaed009f1e25fdfe4cf525fd54
    • Instruction ID: a8586484b3a308f9bfcaaedfbdeb5f71014e24cfc642e1ae167f1f0347082ec6
    • Opcode Fuzzy Hash: 6b66474845fd360a939b9f38b500752bc426cffaed009f1e25fdfe4cf525fd54
    • Instruction Fuzzy Hash: D82183714093806FDB22CF61DC44F96BFB8EF46314F08859AE9849B552D375A548CBB2
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 227 79a5fe-79a656 230 79a658 227->230 231 79a65b-79a667 227->231 230->231 232 79a669 231->232 233 79a66c-79a675 231->233 232->233 234 79a677-79a67f CreateFileW 233->234 235 79a6c6-79a6cb 233->235 237 79a685-79a69b 234->237 235->234 238 79a6cd-79a6d2 237->238 239 79a69d-79a6c3 237->239 238->239
    APIs
    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0079A67D
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: f850f097168eb1d61ecd0d8d84248a3c9b2cf2604084dbddb55065293f21bc5f
    • Instruction ID: 6d780ea4d0489f165c75f753241602c56dc50b78578507455ec3a43b745f55e2
    • Opcode Fuzzy Hash: f850f097168eb1d61ecd0d8d84248a3c9b2cf2604084dbddb55065293f21bc5f
    • Instruction Fuzzy Hash: 66219071501200AFEB21CF65DD85F66FBE8EF08314F088869E9458B751D379E808CBB2
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 242 79a78f-79a80d 246 79a80f-79a822 GetFileType 242->246 247 79a842-79a847 242->247 248 79a849-79a84e 246->248 249 79a824-79a841 246->249 247->246 248->249
    APIs
    • GetFileType.KERNELBASE(?,00000E24,5EB935B0,00000000,00000000,00000000,00000000), ref: 0079A815
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: FileType
    • String ID:
    • API String ID: 3081899298-0
    • Opcode ID: ade92a46574aefe9e83feb12bc0d2d176db85115eb84897dafaf47ced5017f4a
    • Instruction ID: ecfbebae6981bc91b551a5d4a98351a787a862b9442532d7b55ad8f6cebf5484
    • Opcode Fuzzy Hash: ade92a46574aefe9e83feb12bc0d2d176db85115eb84897dafaf47ced5017f4a
    • Instruction Fuzzy Hash: 7621A8B54093806FE7128B11DC44FA2BFB8EF47714F0880D6E9848B653D268A90DD776
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 253 79a6d4-79a740 255 79a781-79a786 253->255 256 79a742-79a74a FindCloseChangeNotification 253->256 255->256 257 79a750-79a762 256->257 259 79a788-79a78d 257->259 260 79a764-79a780 257->260 259->260
    APIs
    • FindCloseChangeNotification.KERNELBASE(?), ref: 0079A748
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: ChangeCloseFindNotification
    • String ID:
    • API String ID: 2591292051-0
    • Opcode ID: 59ee03c1e2751961562ac878414eacd243f89524fd4349f0f1efdcb981d17f2f
    • Instruction ID: 5f7ed9096c761526153e2aef8fe9df9a51bcb9c87ccde7f656907f7e65b86cb1
    • Opcode Fuzzy Hash: 59ee03c1e2751961562ac878414eacd243f89524fd4349f0f1efdcb981d17f2f
    • Instruction Fuzzy Hash: CE21927550A7C05FDB138B25DC95752BFB8EF07220F0984DADD858F6A3D2689908C762
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 262 79aa0b-79aa6a 264 79aa6c 262->264 265 79aa6f-79aa75 262->265 264->265 266 79aa7a-79aa83 265->266 267 79aa77 265->267 268 79aa85-79aaa5 CreateDirectoryW 266->268 269 79aac4-79aac9 266->269 267->266 272 79aacb-79aad0 268->272 273 79aaa7-79aac3 268->273 269->268 272->273
    APIs
    • CreateDirectoryW.KERNELBASE(?,?), ref: 0079AA8B
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: CreateDirectory
    • String ID:
    • API String ID: 4241100979-0
    • Opcode ID: 2c9f78bd705db73a1e5850817483624ecf70d8df881607bc3830554762d3292d
    • Instruction ID: 6fcd94810d4a0d85f77aa3ec7cde947d165b1ca8b02964670694b9ce9aeea951
    • Opcode Fuzzy Hash: 2c9f78bd705db73a1e5850817483624ecf70d8df881607bc3830554762d3292d
    • Instruction Fuzzy Hash: 4B2171715093805FDB12CB25DC55B92BFE8EF06314F09C4EAE984CB653D225D909CB61
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • RegQueryValueExW.KERNELBASE(?,00000E24,5EB935B0,00000000,00000000,00000000,00000000), ref: 0079A40C
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: QueryValue
    • String ID:
    • API String ID: 3660427363-0
    • Opcode ID: 8e7a5117e8616996b548a01c747f20f393792a2f8f4a0ff946c98a1d04da9860
    • Instruction ID: 2edd7128561162a2688ba3c4bf29d183ac0a6e8218ad1302de86ed0ab089147f
    • Opcode Fuzzy Hash: 8e7a5117e8616996b548a01c747f20f393792a2f8f4a0ff946c98a1d04da9860
    • Instruction Fuzzy Hash: AC218C75601204AFEB20CF15DC88FA6B7ECEF14710F18846AE945CB661D778E949CAB2
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • WriteFile.KERNELBASE(?,00000E24,5EB935B0,00000000,00000000,00000000,00000000), ref: 0079A9C1
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: ec2ae0da8dd7f62c6309b14bb0423f457815a9fefe471aa1fb674cb2a50033b4
    • Instruction ID: 9bc01d22f3dec69468924ffe72e27d6551908e4f8e1b67c92377cd89c4e37105
    • Opcode Fuzzy Hash: ec2ae0da8dd7f62c6309b14bb0423f457815a9fefe471aa1fb674cb2a50033b4
    • Instruction Fuzzy Hash: 2711C172500200AFEB21CF51DD44FA6FBE8FF14724F18846AE9459B655D378A548CBB2
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetFilePointer.KERNELBASE(?,00000E24,5EB935B0,00000000,00000000,00000000,00000000), ref: 0079A8DE
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: FilePointer
    • String ID:
    • API String ID: 973152223-0
    • Opcode ID: f52fc3b39b54c5edcea232fe053a240b2c987b123b621c490084c32ff8914d21
    • Instruction ID: 9a56f1702da82c53493aed75936228113d422cb072e8b40fa9606efed3c50675
    • Opcode Fuzzy Hash: f52fc3b39b54c5edcea232fe053a240b2c987b123b621c490084c32ff8914d21
    • Instruction Fuzzy Hash: E211E371500200AFEB21CF55DC44FA6FBE8EF54724F18845AED459B645D378A5488BB2
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetErrorMode.KERNELBASE(?), ref: 0079A30C
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: ErrorMode
    • String ID:
    • API String ID: 2340568224-0
    • Opcode ID: 115e34085095b51490a437260f131f0fedd90db494f60195fad107e38be7d481
    • Instruction ID: c80d8e39a63d3563c04a1ef03e9dc6f66a5fba372a74255187e7e3471b83c571
    • Opcode Fuzzy Hash: 115e34085095b51490a437260f131f0fedd90db494f60195fad107e38be7d481
    • Instruction Fuzzy Hash: E51194754093C06FDB128B25DC54A52BFB4EF47220F0980DBDD848F163D279A808CB62
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetFileType.KERNELBASE(?,00000E24,5EB935B0,00000000,00000000,00000000,00000000), ref: 0079A815
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: FileType
    • String ID:
    • API String ID: 3081899298-0
    • Opcode ID: 5d094095dd09cc58b92ca215c3ba693417ac5041df27bd0746db9f84db8147e8
    • Instruction ID: 829f0e4770545cd39f7df474f54fbcbe703cb289c134410062d94b61333f6f14
    • Opcode Fuzzy Hash: 5d094095dd09cc58b92ca215c3ba693417ac5041df27bd0746db9f84db8147e8
    • Instruction Fuzzy Hash: EF01D671504204AFEB61CB11DC44FA6FBE8EF15724F18C056ED059B745D378E94C8AB6
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CreateDirectoryW.KERNELBASE(?,?), ref: 0079AA8B
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: CreateDirectory
    • String ID:
    • API String ID: 4241100979-0
    • Opcode ID: 4bfaddc934924ed1c422fa5c4a4a0cb0e811666f5960c9725b05b10c794e2424
    • Instruction ID: a26ab8469fff886a1f7f7ee3fac8c273c8b79991f568ca0bd43804727b036919
    • Opcode Fuzzy Hash: 4bfaddc934924ed1c422fa5c4a4a0cb0e811666f5960c9725b05b10c794e2424
    • Instruction Fuzzy Hash: EB116571605240AFEB50CF15E984B56FBE8EF15710F08C4AADD45CB751E778E904CBA2
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetSystemInfo.KERNELBASE(?), ref: 0079B208
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: InfoSystem
    • String ID:
    • API String ID: 31276548-0
    • Opcode ID: 01312162f9a12a74481b9fe3458c4fe97524d76ad702a4f9ab28d068eb0d15aa
    • Instruction ID: 9a3a51d0625f648d93e4a9a899eca00355a18d43f1066cd8c7ce5d91349b2b5f
    • Opcode Fuzzy Hash: 01312162f9a12a74481b9fe3458c4fe97524d76ad702a4f9ab28d068eb0d15aa
    • Instruction Fuzzy Hash: 0A1170715093809FDB12CF25ED44B56BFB4EF46620F0884EAED849F652D279A908CB62
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: CloseFind
    • String ID:
    • API String ID: 1863332320-0
    • Opcode ID: 67af661ef0070971a17635405d290540a55593cfe60ce0250b6851526ab0c1aa
    • Instruction ID: b9a71226f64e74eb06fb3d44b3b15e00b6473420c6429f0a53f03205a2e9ae92
    • Opcode Fuzzy Hash: 67af661ef0070971a17635405d290540a55593cfe60ce0250b6851526ab0c1aa
    • Instruction Fuzzy Hash: 1611A0715093C09FDB12CB25DC45B52BFF4EF46220F0984DAED858B662D378A808DB61
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 0079A1C2
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: FileFindNext
    • String ID:
    • API String ID: 2029273394-0
    • Opcode ID: 49ea4785b5eb7de986b51f3c2758b21910c0f88553abc96d2a20e65cf586844f
    • Instruction ID: fc8d266e849721bc643d1dfc41bc622943de7e210fb29692bc9d14e6d4c1a057
    • Opcode Fuzzy Hash: 49ea4785b5eb7de986b51f3c2758b21910c0f88553abc96d2a20e65cf586844f
    • Instruction Fuzzy Hash: 63017171A00200ABD310DF16DD85B66FBE8FB88A20F14856AED089BB41D735B955CBE5
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 0079AC36
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: CreatePipe
    • String ID:
    • API String ID: 2719314638-0
    • Opcode ID: 866aed58a159a055981ee7c6a226ea32c55fe78ded178472e6b413445ab0fb58
    • Instruction ID: 02e351886e782bd12e0f292546b37aba53e59c3829beee204ac39038a3dfceb4
    • Opcode Fuzzy Hash: 866aed58a159a055981ee7c6a226ea32c55fe78ded178472e6b413445ab0fb58
    • Instruction Fuzzy Hash: AE01B171A00200ABD310DF16CD85B66FBE8FB88A20F14812AEC089BB41D735B919CBE1
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindCloseChangeNotification.KERNELBASE(?), ref: 0079A748
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: ChangeCloseFindNotification
    • String ID:
    • API String ID: 2591292051-0
    • Opcode ID: b9f7e32d491dc41813d4e2202cc63be2cf36353a082acda670abfcd8c4ebdb72
    • Instruction ID: 09a1582d54be3394793c281f7dd18496d793c1b852a58d2952e18b853c9b7d23
    • Opcode Fuzzy Hash: b9f7e32d491dc41813d4e2202cc63be2cf36353a082acda670abfcd8c4ebdb72
    • Instruction Fuzzy Hash: EC01F7719012409FDB50CF55E885766FBE4DF14320F18C4AADC05CF751D378E908CAA2
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: CloseFind
    • String ID:
    • API String ID: 1863332320-0
    • Opcode ID: bca540b73dfe379ea102b6829610e00a7206f50da4f45bafd468487e561a93ba
    • Instruction ID: 6f0ab8dd3572719d7d95e16e9e63bbdb84d189551cca1be0f1a8b191ddec68b1
    • Opcode Fuzzy Hash: bca540b73dfe379ea102b6829610e00a7206f50da4f45bafd468487e561a93ba
    • Instruction Fuzzy Hash: 7301F4755042449FDB10CF19E885762FBE4EF15720F08C0AADD058B752E379E848DEA2
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetErrorMode.KERNELBASE(?), ref: 0079A30C
    Memory Dump Source
    • Source File: 00000000.00000002.4114138343.000000000079A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_79a000_unarchiver.jbxd
    Similarity
    • API ID: ErrorMode
    • String ID:
    • API String ID: 2340568224-0
    • Opcode ID: 2a91d9f55a82c9f0f6e6927225a637a2364cb5c23c975201402ad7f1c1eefe95
    • Instruction ID: 622fe4ac750be0a183938da54a08ff733bb6ad258056d1a2a0f7fbdb5ab07fa4
    • Opcode Fuzzy Hash: 2a91d9f55a82c9f0f6e6927225a637a2364cb5c23c975201402ad7f1c1eefe95
    • Instruction Fuzzy Hash: EEF0AF35905244AFDB20CF06E884762FBE4EF15720F08C0AADD094B752D379E808CAA2
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID: [MV
    • API String ID: 0-2355692974
    • Opcode ID: 9b7a509f2835fa0361eea7d0d751fcd9ae6c92f36621e0726c2290f07018e88c
    • Instruction ID: 2431404a83f0e1ac9873dc3dd73356059dda4d118db44bbbdfbafcd0421034c0
    • Opcode Fuzzy Hash: 9b7a509f2835fa0361eea7d0d751fcd9ae6c92f36621e0726c2290f07018e88c
    • Instruction Fuzzy Hash: CC210430700655ABCB15EB39A4026AFBADB9BD5308B44843CD085DB341DF7AE98687A6
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID: [MV
    • API String ID: 0-2355692974
    • Opcode ID: c9c48241d01fe3abf2d6fe4c22626f8be6967f0b3948e2fc0a072a3f0274c151
    • Instruction ID: f97bfacba7404ab4e0fccc2eeaf7f58d153be9fdafc05881787d52780be12de4
    • Opcode Fuzzy Hash: c9c48241d01fe3abf2d6fe4c22626f8be6967f0b3948e2fc0a072a3f0274c151
    • Instruction Fuzzy Hash: C321F3307006159BCB14EB3994426AFBBEBAFD5308B44883CD086DB741DF7AE9468796
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: eb55dcfab3207c468fb813d48cfdcc75bca9ac0ae1653f5f6905f41abae44340
    • Instruction ID: 4be00cf8dff9d9bfd41f9e3ea21bfdf322165db28b025030c86c5e3701d4daf4
    • Opcode Fuzzy Hash: eb55dcfab3207c468fb813d48cfdcc75bca9ac0ae1653f5f6905f41abae44340
    • Instruction Fuzzy Hash: A0B16E34701510DFC768FF64E958A9A7BF2FF99300B54C4A4EA06973A8CB749D81CBA1
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114490988.0000000000D20000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d20000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: cc480011733e128b85d5bd53e6629e37ac5aef1c9292e7bea606c322e48b7eb9
    • Instruction ID: 33d7063d15b6311fc0a3675aa80533d6b5d233a41de41d6cee17e992d6dbd5bc
    • Opcode Fuzzy Hash: cc480011733e128b85d5bd53e6629e37ac5aef1c9292e7bea606c322e48b7eb9
    • Instruction Fuzzy Hash: F411D6B25092446FD300DF15AD459A6FBE8DF86525F08C4BBEC48CB701E236B95D8BE2
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2d505ca24fbd5bbb28ce77371e0e6b7ee05b79bc8fb5543b4165511796124f5a
    • Instruction ID: 9ab3404dd2c4de35a2f2d799ba722831113cf6a0bd039f58aa85888720407b1e
    • Opcode Fuzzy Hash: 2d505ca24fbd5bbb28ce77371e0e6b7ee05b79bc8fb5543b4165511796124f5a
    • Instruction Fuzzy Hash: AA119E32B10118AFCB55ABB8D844DDFBBF6BB88214B058475E605E7334EF31A8498B91
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114490988.0000000000D20000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d20000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c0194bc89c7854a96672b6cba7d7d212cecb89d997cd28545b1ab7a45ea15207
    • Instruction ID: 043bbfef5705c4913831c1f415ead91c593d8b6277ac628607c28ea29548997e
    • Opcode Fuzzy Hash: c0194bc89c7854a96672b6cba7d7d212cecb89d997cd28545b1ab7a45ea15207
    • Instruction Fuzzy Hash: E101B9B150D3D06FD7038B119C45856BFB8DE5766070984DBE849CB663D239B908CB72
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114490988.0000000000D20000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d20000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b3337eca4dcf0222664b0826d95aec73cbae5cbf4b25c60f4286a3fff5e820c3
    • Instruction ID: 73521b5b81af46d97658890cdbd1bab6190c971a7f03d6ae1d2d59c229de594a
    • Opcode Fuzzy Hash: b3337eca4dcf0222664b0826d95aec73cbae5cbf4b25c60f4286a3fff5e820c3
    • Instruction Fuzzy Hash: B0F082B2905204ABD200DF05ED458A6F7ECEF84521F04C53AED088B700E376B9194AE7
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114490988.0000000000D20000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d20000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7f2a6129a1cf700664c07832537520315633ac0a0743c42c0dec27470b3d6176
    • Instruction ID: 35aa3aee085c842e7566dab5cfa9d1398eaf43d7ab6505dfc73a387e0ac484eb
    • Opcode Fuzzy Hash: 7f2a6129a1cf700664c07832537520315633ac0a0743c42c0dec27470b3d6176
    • Instruction Fuzzy Hash: ECE092B66006004B9750CF0BEC41452F7E8EB88630B08C07FDC0D8B701E239B508CAA6
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ba65e99547866917a7c10bc8cdafa670ca3fa27d788cf07a54345f605779617b
    • Instruction ID: 23fe0e3c760bf3adf273b4a7257a2890c8d35ce695cf48cbc860ea5a58dfa58e
    • Opcode Fuzzy Hash: ba65e99547866917a7c10bc8cdafa670ca3fa27d788cf07a54345f605779617b
    • Instruction Fuzzy Hash: 09E0DF32F142242FEB08EAB9A4406EF7FE69B82114B80457A9008D7360EE39CD0283C1
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 098eb3c8a1a36fcd6118bf8d4b490a4fe257cc4ed6d94e9a5f1f2950836a2246
    • Instruction ID: 3c25275180895fe2cc64f270208a53f3e6c9ec9aa40f5c7584986eeb820a4c03
    • Opcode Fuzzy Hash: 098eb3c8a1a36fcd6118bf8d4b490a4fe257cc4ed6d94e9a5f1f2950836a2246
    • Instruction Fuzzy Hash: CAD05B32F002183B9B44EBF998415DF7BEAABC4154B55447D9009E7750EF35DD0187D1
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c6a0e3209f9744247fd68a08dd096fc10f434236f2950702ee071f69f099374c
    • Instruction ID: 1fa7978b9f49b255ac7724fb42192c1ab9efdd9c10f6a3e7b24eabce11284100
    • Opcode Fuzzy Hash: c6a0e3209f9744247fd68a08dd096fc10f434236f2950702ee071f69f099374c
    • Instruction Fuzzy Hash: CEE0C22070C2815FD30AA370E814AAA7F510BA2300F4981EAE0888B2E3DFB4DCC4C361
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 37a6cb9e1f6478feada1a2ea55ae2e617a9318b819f9588e857827aefe925dd2
    • Instruction ID: 3fcb23df961ed923ab04e4bb20a5250a583f97e872408b70f2c9fdd0ccb51c9f
    • Opcode Fuzzy Hash: 37a6cb9e1f6478feada1a2ea55ae2e617a9318b819f9588e857827aefe925dd2
    • Instruction Fuzzy Hash: D4D0C2203193845FC7066730A4155A97F6117C6300F59C4D1E5844B2A3CAA4CDC4C7A0
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114120818.0000000000792000.00000040.00000800.00020000.00000000.sdmp, Offset: 00792000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_792000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9d65058603a8c1d49cc55e18328731590c145478297501fb9f294ffb3b8720c0
    • Instruction ID: 18fba09b7163752018b578c02df8eadcb1fade760f6587ec79332f9d637171f8
    • Opcode Fuzzy Hash: 9d65058603a8c1d49cc55e18328731590c145478297501fb9f294ffb3b8720c0
    • Instruction Fuzzy Hash: F3D02E393006C04FD712EA0CD1A8B8537D4AF70708F0A00F9A8008B773CB2CDC82D600
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114120818.0000000000792000.00000040.00000800.00020000.00000000.sdmp, Offset: 00792000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_792000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7441b9a4fe8086e8f5d0f4360a08ab0a5273cf16e25896d22bc8e8fea9cc0a94
    • Instruction ID: 11f43d6c60595b3a69d1477affc1e40b3ea6e68a4e8473879e68d931da7ece94
    • Opcode Fuzzy Hash: 7441b9a4fe8086e8f5d0f4360a08ab0a5273cf16e25896d22bc8e8fea9cc0a94
    • Instruction Fuzzy Hash: 66D05E342002815BCB16EA0CD6D4F5937D4AF54B14F0644E8AC108B762C7ACD8C1DA00
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f550558cfba1997b53678533dedd9eb9d3194a54cd55fa076a95580649093255
    • Instruction ID: 5dcbef8e2c72713bcf972183961a5fcc06bc7805c31b35cc0b33d992720953a0
    • Opcode Fuzzy Hash: f550558cfba1997b53678533dedd9eb9d3194a54cd55fa076a95580649093255
    • Instruction Fuzzy Hash: 88C012313002049BC748B778E519E6ABB9957D4304F88C464A4080B266CFB4ECC0C650
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.4114480051.0000000000D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D10000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d10000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2d3948cc36135dfc83af70983f4dc8c01a45e4c4cf3149dcfeda3ef69afdfef5
    • Instruction ID: 9c72db8e6d3d6c56060d93e0d0378505035f04799ae9c204213d39a50472cbe1
    • Opcode Fuzzy Hash: 2d3948cc36135dfc83af70983f4dc8c01a45e4c4cf3149dcfeda3ef69afdfef5
    • Instruction Fuzzy Hash: 67C012303002049BC708B778E519E667B9657D0304F89C464A4080B266CFB4ECC0C690
    Uniqueness

    Uniqueness Score: -1.00%