Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CITY OF PETERBOROUGH - 458869.zip

Overview

General Information

Sample name:CITY OF PETERBOROUGH - 458869.zip
Analysis ID:1446724
MD5:fc0c0b757272fd6c7e685cf7ab572015
SHA1:7f4154b32f6c5faa1c131d842be0295c63a4731f
SHA256:42c215003cedebf58ae579314fe5f2776f5f289bf73209fff56fda9d98784c26
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis

Classification

  • System is w10x64
  • unarchiver.exe (PID: 5340 cmdline: "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2)
    • 7za.exe (PID: 6760 cmdline: "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fadbomdn.g5u" "C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
      • conhost.exe (PID: 6720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: classification engineClassification label: clean2.winZIP@4/1@0/0
Source: C:\Windows\SysWOW64\unarchiver.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6720:120:WilError_03
Source: C:\Windows\SysWOW64\unarchiver.exeFile created: C:\Users\user\AppData\Local\Temp\unarchiver.logJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\unarchiver.exe "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip"
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fadbomdn.g5u" "C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip"
Source: C:\Windows\SysWOW64\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fadbomdn.g5u" "C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip"Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\7za.exeSection loaded: 7z.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 1580000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 3050000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 5050000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeWindow / User API: threadDelayed 528Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeWindow / User API: threadDelayed 9440Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 1164Thread sleep count: 528 > 30Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 1164Thread sleep time: -264000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 1164Thread sleep count: 9440 > 30Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 1164Thread sleep time: -4720000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 0_2_0107B1D6 GetSystemInfo,0_2_0107B1D6
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fadbomdn.g5u" "C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip"Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping2
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1446724 Sample: CITY OF PETERBOROUGH - 458869.zip Startdate: 23/05/2024 Architecture: WINDOWS Score: 2 6 unarchiver.exe 4 2->6         started        process3 8 7za.exe 2 6->8         started        process4 10 conhost.exe 8->10         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1446724
Start date and time:2024-05-23 20:18:47 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 2s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:CITY OF PETERBOROUGH - 458869.zip
Detection:CLEAN
Classification:clean2.winZIP@4/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 46
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .zip
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: CITY OF PETERBOROUGH - 458869.zip
TimeTypeDescription
14:20:08API Interceptor4112349x Sleep call for process: unarchiver.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\unarchiver.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):3331
Entropy (8bit):5.099271797615244
Encrypted:false
SSDEEP:48:ZleaWGbAGAGpWGKhGAGp3BGb6GCBG4GWJGAGAGmfGAGhGAGm37L1pfHfHfHfHfHj:ZlqUqEG1AdYOY/
MD5:1A0C8466EA668D2FCEB93049CC6EFB6E
SHA1:661194ED030FD57CCC516B25E372075D7CDE375E
SHA-256:7DF2B5A781C722B0662A8A906368A6D3ECABEA0D56936F75424B4DB095DB6E34
SHA-512:C0EA6BC4CE194D0840050B0A157683755BBD6D04A28ACEBBA3C102CB31CFD5A0554FE0DE72F6396050CFEDF85D5F9C1EE1CC79A18AF062D01D02E8A548476703
Malicious:false
Reputation:low
Preview:05/23/2024 2:19 PM: Unpack: C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip..05/23/2024 2:19 PM: Tmp dir: C:\Users\user\AppData\Local\Temp\fadbomdn.g5u..05/23/2024 2:19 PM: Received from standard error: ERROR: Wrong password : CITY OF PETERBOROUGH - 458869.pdf..05/23/2024 2:19 PM: Received from standard out: 7-Zip 18.05 (x86) : Copyright (c) 1999-2018 Igor Pavlov : 2018-04-30..05/23/2024 2:19 PM: Received from standard out: ..05/23/2024 2:19 PM: Received from standard out: Scanning the drive for archives:..05/23/2024 2:19 PM: Received from standard out: 1 file, 5475 bytes (6 KiB)..05/23/2024 2:19 PM: Received from standard out: ..05/23/2024 2:19 PM: Received from standard out: Extracting archive: C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip..05/23/2024 2:19 PM: Received from standard out: --..05/23/2024 2:19 PM: Received from standard out: Path = C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip..05/23/2024 2:19 PM: Received from standard out: Type = zi
File type:Zip archive data, at least v2.0 to extract, compression method=deflate
Entropy (8bit):7.958812988271879
TrID:
  • ZIP compressed archive (8000/1) 100.00%
File name:CITY OF PETERBOROUGH - 458869.zip
File size:5'475 bytes
MD5:fc0c0b757272fd6c7e685cf7ab572015
SHA1:7f4154b32f6c5faa1c131d842be0295c63a4731f
SHA256:42c215003cedebf58ae579314fe5f2776f5f289bf73209fff56fda9d98784c26
SHA512:62c8feec2736694e43f3d258ba488403b0de06341cd41c33ad8522c80d24de8ccdd1f2f4e6af2e2b63ef754728cce25b7318aad11ea7297cf08cde3150e820aa
SSDEEP:96:SKRmuZejd3Mnerr4Tcih/82ejC+1q0YH41dUjt+Y3vvbfYBOVFqXRSCOc:FRmuverU9h/7/+1q0YOUQyvvLnFqXTOc
TLSH:84B18E85AA80E4B1C38A9CB742CADC24EA4B4A5DB410FFFD834B86C31D4D7598D7993D
File Content Preview:PK.........h.X........:...!...CITY OF PETERBOROUGH - 458869.pdf.g...M...LXi=..+...Yv#7...oq'avr.e...!m.8......w[......D`8..)..p~qD.9./..`=..\...o.`....;....;/..T.....h.b...E9.8m.s..@...">.....!..D3.D?.v.j....^.)...{v.....0.....#.gh.......M#&.;..b.......#.
Icon Hash:90cececece8e8eb0
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:14:19:33
Start date:23/05/2024
Path:C:\Windows\SysWOW64\unarchiver.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip"
Imagebase:0xa70000
File size:12'800 bytes
MD5 hash:16FF3CC6CC330A08EED70CBC1D35F5D2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:1
Start time:14:19:33
Start date:23/05/2024
Path:C:\Windows\SysWOW64\7za.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\fadbomdn.g5u" "C:\Users\user\Desktop\CITY OF PETERBOROUGH - 458869.zip"
Imagebase:0x320000
File size:289'792 bytes
MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:14:19:33
Start date:23/05/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:20%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:0%
    Total number of Nodes:73
    Total number of Limit Nodes:4
    execution_graph 1158 107aa46 1159 107aa6c CreateDirectoryW 1158->1159 1161 107aa93 1159->1161 1213 107ad04 1214 107ad2a DuplicateHandle 1213->1214 1216 107adaf 1214->1216 1170 107a882 1172 107a8b7 SetFilePointer 1170->1172 1173 107a8e6 1172->1173 1217 107a78f 1218 107a7c2 GetFileType 1217->1218 1220 107a824 1218->1220 1221 107aa0b 1224 107aa46 CreateDirectoryW 1221->1224 1223 107aa93 1224->1223 1225 107af8b 1226 107afb2 FindClose 1225->1226 1228 107aff3 1226->1228 1182 107a716 1183 107a742 FindCloseChangeNotification 1182->1183 1184 107a781 1182->1184 1185 107a750 1183->1185 1184->1183 1190 107b1d6 1191 107b202 GetSystemInfo 1190->1191 1192 107b238 1190->1192 1193 107b210 1191->1193 1192->1191 1249 107a6d4 1250 107a716 FindCloseChangeNotification 1249->1250 1252 107a750 1250->1252 1253 107a850 1254 107a882 SetFilePointer 1253->1254 1256 107a8e6 1254->1256 1257 107a5dc 1259 107a5fe CreateFileW 1257->1259 1260 107a685 1259->1260 1209 107a2da 1210 107a306 SetErrorMode 1209->1210 1212 107a32f 1209->1212 1211 107a31b 1210->1211 1212->1210 1162 107abe6 1163 107ac10 CreatePipe 1162->1163 1165 107ac3e 1163->1165 1166 107a962 1169 107a997 WriteFile 1166->1169 1168 107a9c9 1169->1168 1229 107a120 1230 107a172 FindNextFileW 1229->1230 1232 107a1ca 1230->1232 1233 107a2ae 1235 107a2b2 SetErrorMode 1233->1235 1236 107a31b 1235->1236 1261 107ab76 1262 107aba5 CreatePipe 1261->1262 1264 107ac3e 1262->1264 1237 107b1b4 1238 107b1d6 GetSystemInfo 1237->1238 1240 107b210 1238->1240 1241 107a933 1242 107a962 WriteFile 1241->1242 1244 107a9c9 1242->1244 1194 107a172 1195 107a1c2 FindNextFileW 1194->1195 1196 107a1ca 1195->1196 1201 107afb2 1202 107b010 1201->1202 1203 107afde FindClose 1201->1203 1202->1203 1204 107aff3 1203->1204 1265 107a370 1267 107a392 RegQueryValueExW 1265->1267 1268 107a41b 1267->1268 1205 107a5fe 1206 107a636 CreateFileW 1205->1206 1208 107a685 1206->1208

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_01072006 1 Function_0107AB06 2 Function_01040606 3 Function_0107A005 4 Function_0107AE05 5 Function_0107AD04 6 Function_01040003 7 Function_0107A50F 8 Function_0107AA0B 9 Function_0104080B 10 Function_0107A716 11 Function_01072310 12 Function_01040713 13 Function_0107B01E 14 Function_05230739 15 Function_05230C3D 16 Function_0107AF22 17 Function_05230006 18 Function_0107B121 19 Function_0107A120 20 Function_0107B12F 21 Function_0107A02E 22 Function_0104082E 23 Function_05230E08 67 Function_05230BA0 23->67 24 Function_0107AD2A 25 Function_0107A933 26 Function_01072430 27 Function_0104003E 28 Function_0107A33D 29 Function_05230E18 29->67 30 Function_0107213C 31 Function_0107A23A 32 Function_0107AA46 33 Function_0107B246 34 Function_05230C60 35 Function_01072B44 36 Function_01072044 37 Function_0107B442 38 Function_0104064D 53 Function_0104066A 38->53 39 Function_0107B052 40 Function_0107B351 41 Function_0107A850 42 Function_0107B15D 43 Function_01072C5D 44 Function_0107A45C 45 Function_01072458 46 Function_0107A566 47 Function_01072364 48 Function_01072264 49 Function_0107A962 50 Function_0107A462 51 Function_05230748 52 Function_0107AC6C 54 Function_0107B276 55 Function_0107AB76 56 Function_05230C50 57 Function_0107A172 58 Function_0107A370 59 Function_0107B470 60 Function_0104067F 61 Function_0107247C 62 Function_0107267C 63 Function_0107A078 64 Function_01040784 65 Function_0107A486 66 Function_05230DA2 66->67 68 Function_0107A882 69 Function_01040883 70 Function_0107A78F 71 Function_0107AC8E 72 Function_05230CA8 73 Function_0107AF8B 74 Function_052305B1 75 Function_052302B0 75->2 75->67 93 Function_05230799 75->93 108 Function_010405E3 75->108 76 Function_01072194 77 Function_0107A392 78 Function_0107B39E 79 Function_0107B49E 80 Function_0107A09A 81 Function_01072098 82 Function_01072DA1 83 Function_010726AE 84 Function_0107A2AE 85 Function_05230B8F 86 Function_010407B6 87 Function_010722B4 88 Function_0107B1B4 89 Function_0107AEB2 90 Function_0107AFB2 91 Function_010407B2 92 Function_010405B3 93->2 93->34 93->56 93->67 93->72 94 Function_05230C99 93->94 93->108 95 Function_010723BC 96 Function_05230DE0 96->67 97 Function_0107A7C2 98 Function_010405C3 99 Function_0107B1D6 100 Function_0107A6D4 101 Function_010720D0 102 Function_010405D3 103 Function_0107A5DC 104 Function_0107A2DA 105 Function_0107AADA 106 Function_0107ABE6 107 Function_052302C0 107->2 107->67 107->93 107->108 109 Function_0107AAE0 110 Function_010726EC 111 Function_05230DD1 111->67 112 Function_010723F4 113 Function_0107A1F4 114 Function_01072CF3 115 Function_010721F0 116 Function_0107A5FE
    APIs
    • GetSystemInfo.KERNELBASE(?), ref: 0107B208
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: InfoSystem
    • String ID:
    • API String ID: 31276548-0
    • Opcode ID: 653a722ad1dd3cbe3aaae67db72746152770aa79c406fd5f513fd8e24a9beee9
    • Instruction ID: 2ef952e7598bfd09dbcfbeede8ccb14809ee5836768919b2b233cecca8ebb211
    • Opcode Fuzzy Hash: 653a722ad1dd3cbe3aaae67db72746152770aa79c406fd5f513fd8e24a9beee9
    • Instruction Fuzzy Hash: 3B01D1719052448FDB50CF19E98976AFBE4EF45320F08C4AADD498F352D379E408CBA2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 107b246-107b2eb 5 107b343-107b348 0->5 6 107b2ed-107b2f5 DuplicateHandle 0->6 5->6 7 107b2fb-107b30d 6->7 9 107b30f-107b340 7->9 10 107b34a-107b34f 7->10 10->9
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0107B2F3
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: d1bd5051f0b333e8f8a475a51a8456e0c8a24e9ff884736b3eae4f5da2be8526
    • Instruction ID: 30641e3f2d9bad18882465df8e5668a263e4d8b9a663e1395ac965fbcf7d2366
    • Opcode Fuzzy Hash: d1bd5051f0b333e8f8a475a51a8456e0c8a24e9ff884736b3eae4f5da2be8526
    • Instruction Fuzzy Hash: 8131A171504344AFE7228B65DC44FA7BFBCEF06220F08889AE985DB562D364E9098B71

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 21 107ad04-107ad9f 26 107adf7-107adfc 21->26 27 107ada1-107ada9 DuplicateHandle 21->27 26->27 29 107adaf-107adc1 27->29 30 107adc3-107adf4 29->30 31 107adfe-107ae03 29->31 31->30
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0107ADA7
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: b82143064e793cdecc0c42ede3b101b7e7d323b6654c751b5a2a188b2027df77
    • Instruction ID: 54b4b88bdeddbc08433025560f789717c73fe14a3afddd9e5d2f6f9ee79c8fac
    • Opcode Fuzzy Hash: b82143064e793cdecc0c42ede3b101b7e7d323b6654c751b5a2a188b2027df77
    • Instruction Fuzzy Hash: CD31A171504344AFEB228B65DC44FA7BFECEF05224F08889AF985DB552D324E849CB71

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 14 107ab76-107aba3 15 107aba5-107ac0f 14->15 16 107ac10-107ac67 CreatePipe 14->16 15->16
    APIs
    • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 0107AC36
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: CreatePipe
    • String ID:
    • API String ID: 2719314638-0
    • Opcode ID: dafd869d988bd8581034cefbf9a9da130fa89f653ec7a174361c621ebc6d290c
    • Instruction ID: c6d121b7532739a34e902bb363f27c0539b22e5230757b4e4fd98d6685f23567
    • Opcode Fuzzy Hash: dafd869d988bd8581034cefbf9a9da130fa89f653ec7a174361c621ebc6d290c
    • Instruction Fuzzy Hash: 0931A27150E3C06FD3038B718C65A96BFB4AF47210F1A84CBD8C4DF5A3D269A919C7A2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 35 107a5dc-107a656 39 107a65b-107a667 35->39 40 107a658 35->40 41 107a66c-107a675 39->41 42 107a669 39->42 40->39 43 107a677-107a69b CreateFileW 41->43 44 107a6c6-107a6cb 41->44 42->41 47 107a6cd-107a6d2 43->47 48 107a69d-107a6c3 43->48 44->43 47->48
    APIs
    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0107A67D
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 9d080890faa8c59912649ba34496a774849768adc864e903bf93c11bf6dd3560
    • Instruction ID: 362589a97da9b082961c19d1b148a41901ad6652b52be8b755531513ab3bdfa1
    • Opcode Fuzzy Hash: 9d080890faa8c59912649ba34496a774849768adc864e903bf93c11bf6dd3560
    • Instruction Fuzzy Hash: 3E319E71605340AFE722CB65DC44F66BFE8EF49220F08889EE9858B652D375E408CB71

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 51 107a120-107a1f3 FindNextFileW
    APIs
    • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 0107A1C2
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: FileFindNext
    • String ID:
    • API String ID: 2029273394-0
    • Opcode ID: d41ee2cdb1124a6f31a754194d104495fe95e9f6da17dcdd7a236190ac826e58
    • Instruction ID: 64d15fd66f39b314870ccd657a3a8179fb53cec18f2acd4c3d442c450efb3ca2
    • Opcode Fuzzy Hash: d41ee2cdb1124a6f31a754194d104495fe95e9f6da17dcdd7a236190ac826e58
    • Instruction Fuzzy Hash: 2A21E57150D3C06FD3028B259C51BA6BFB4EF87620F1985CBD884DF693D225A919C7A2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 73 107ad2a-107ad9f 77 107adf7-107adfc 73->77 78 107ada1-107ada9 DuplicateHandle 73->78 77->78 80 107adaf-107adc1 78->80 81 107adc3-107adf4 80->81 82 107adfe-107ae03 80->82 82->81
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0107ADA7
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: b690c3c80e63ac4271f20ee8da4d11cfa971e70a847201ce96fee4ce22f6e0f0
    • Instruction ID: 47b1edb364e7f2e603c9dc1466b9b2ee4c2470e7d4dda0e5f409bff6434daec3
    • Opcode Fuzzy Hash: b690c3c80e63ac4271f20ee8da4d11cfa971e70a847201ce96fee4ce22f6e0f0
    • Instruction Fuzzy Hash: 3421B272500204AFEB219F55DC44FABFBECEF14224F08886AE9869B651D774E4488BB1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 86 107b276-107b2eb 90 107b343-107b348 86->90 91 107b2ed-107b2f5 DuplicateHandle 86->91 90->91 92 107b2fb-107b30d 91->92 94 107b30f-107b340 92->94 95 107b34a-107b34f 92->95 95->94
    APIs
    • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0107B2F3
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: 8ab991accea501f896650e88b4d35aa8e9ec8ae097d931427bbc74f0d8793657
    • Instruction ID: 5398826e88359c23c9f453dd6b8e02157204b1cf9db8dae82f460743957da77d
    • Opcode Fuzzy Hash: 8ab991accea501f896650e88b4d35aa8e9ec8ae097d931427bbc74f0d8793657
    • Instruction Fuzzy Hash: E421BD72500204AFEB218F65DC84FABFBECEF14224F04886AE9859B651D774E4488BB5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 56 107a370-107a3cf 59 107a3d4-107a3dd 56->59 60 107a3d1 56->60 61 107a3e2-107a3e8 59->61 62 107a3df 59->62 60->59 63 107a3ed-107a404 61->63 64 107a3ea 61->64 62->61 66 107a406-107a419 RegQueryValueExW 63->66 67 107a43b-107a440 63->67 64->63 68 107a442-107a447 66->68 69 107a41b-107a438 66->69 67->66 68->69
    APIs
    • RegQueryValueExW.KERNELBASE(?,00000E24,4CA933BE,00000000,00000000,00000000,00000000), ref: 0107A40C
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: QueryValue
    • String ID:
    • API String ID: 3660427363-0
    • Opcode ID: d3c7ad030f3e7e62d262269f53ce8cfbc66f28bd92ecf8951235c4f838e6f9c8
    • Instruction ID: 991185fa81815bef7a7b0bfe207a332eb752c5c11c15c8a53663842560fedce7
    • Opcode Fuzzy Hash: d3c7ad030f3e7e62d262269f53ce8cfbc66f28bd92ecf8951235c4f838e6f9c8
    • Instruction Fuzzy Hash: BC218B71604344AFE721CF15DC84FA7BBF8EF45620F08849AE985DB292D364E908CB65

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 99 107a850-107a8d6 103 107a91a-107a91f 99->103 104 107a8d8-107a8f8 SetFilePointer 99->104 103->104 107 107a921-107a926 104->107 108 107a8fa-107a917 104->108 107->108
    APIs
    • SetFilePointer.KERNELBASE(?,00000E24,4CA933BE,00000000,00000000,00000000,00000000), ref: 0107A8DE
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: FilePointer
    • String ID:
    • API String ID: 973152223-0
    • Opcode ID: 30128ad9cb14ac0e10980169c75dfd58f2b4637af573175ffc8d8058c2048655
    • Instruction ID: 9cc2de29810f16ecfd124e3352e7843e75185cbf85cb17ff680bbccd9304e1a7
    • Opcode Fuzzy Hash: 30128ad9cb14ac0e10980169c75dfd58f2b4637af573175ffc8d8058c2048655
    • Instruction Fuzzy Hash: 2221C171508380AFE7228B24DC44FA6BFB8EF46724F0884DAE9849B553C274A809CB75

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 111 107a933-107a9b9 115 107a9fd-107aa02 111->115 116 107a9bb-107a9db WriteFile 111->116 115->116 119 107aa04-107aa09 116->119 120 107a9dd-107a9fa 116->120 119->120
    APIs
    • WriteFile.KERNELBASE(?,00000E24,4CA933BE,00000000,00000000,00000000,00000000), ref: 0107A9C1
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: 6c0db08af01670afd1683fb14dd63e0fca7a4530c298d1428693ba4387ae0cbc
    • Instruction ID: 753a237b145f91a5eab2c197308b6a7f8747461f4a3527e667cb9f528debd8fe
    • Opcode Fuzzy Hash: 6c0db08af01670afd1683fb14dd63e0fca7a4530c298d1428693ba4387ae0cbc
    • Instruction Fuzzy Hash: D721A171509380AFDB22CF65DC44F97BFB8EF46214F0884DAE9849B152D375A409CB76

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 123 107a5fe-107a656 126 107a65b-107a667 123->126 127 107a658 123->127 128 107a66c-107a675 126->128 129 107a669 126->129 127->126 130 107a677-107a67f CreateFileW 128->130 131 107a6c6-107a6cb 128->131 129->128 133 107a685-107a69b 130->133 131->130 134 107a6cd-107a6d2 133->134 135 107a69d-107a6c3 133->135 134->135
    APIs
    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0107A67D
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 26c76ee3168c0895f55cd07af88578b72896325b00124b3f10501a7792bfb650
    • Instruction ID: cfcd3e21eafee209b1447b7ed0a70c3ca2f003fe6d9d4773120b719070a12a4d
    • Opcode Fuzzy Hash: 26c76ee3168c0895f55cd07af88578b72896325b00124b3f10501a7792bfb650
    • Instruction Fuzzy Hash: 2821AE71A00204AFE721CF65DD85F6AFBE8EF58224F08886DE9858B651D371E408CB75

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 138 107a78f-107a80d 142 107a842-107a847 138->142 143 107a80f-107a822 GetFileType 138->143 142->143 144 107a824-107a841 143->144 145 107a849-107a84e 143->145 145->144
    APIs
    • GetFileType.KERNELBASE(?,00000E24,4CA933BE,00000000,00000000,00000000,00000000), ref: 0107A815
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: FileType
    • String ID:
    • API String ID: 3081899298-0
    • Opcode ID: ce53f7d2a3035a5fb23945123ba38d3dc8a09f07c1ec1cecad7218fa83670e39
    • Instruction ID: de29d0627c89c60aa1726a64df4016bfd14989e8968779179654e1db47de0848
    • Opcode Fuzzy Hash: ce53f7d2a3035a5fb23945123ba38d3dc8a09f07c1ec1cecad7218fa83670e39
    • Instruction Fuzzy Hash: B22105B54083806FE7128B21DC40BA6BFB8EF56324F0880DAE9849B293D264A909C775

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 149 107a6d4-107a740 151 107a742-107a74a FindCloseChangeNotification 149->151 152 107a781-107a786 149->152 154 107a750-107a762 151->154 152->151 155 107a764-107a780 154->155 156 107a788-107a78d 154->156 156->155
    APIs
    • FindCloseChangeNotification.KERNELBASE(?), ref: 0107A748
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: ChangeCloseFindNotification
    • String ID:
    • API String ID: 2591292051-0
    • Opcode ID: 4b87ebd321c8c809b0064f4f03966e39ce0cb53a4bf73edbe046880cdea0e383
    • Instruction ID: 34e54a5b84fe5beda20ac9c28658afa10807ebbfe4e14ccd852d6f3405c10609
    • Opcode Fuzzy Hash: 4b87ebd321c8c809b0064f4f03966e39ce0cb53a4bf73edbe046880cdea0e383
    • Instruction Fuzzy Hash: 8721A4759093C09FDB138B25DC95752BFB8EF07220F0D84DADD858F6A3D2649909C762

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 158 107aa0b-107aa6a 160 107aa6f-107aa75 158->160 161 107aa6c 158->161 162 107aa77 160->162 163 107aa7a-107aa83 160->163 161->160 162->163 164 107aa85-107aaa5 CreateDirectoryW 163->164 165 107aac4-107aac9 163->165 168 107aaa7-107aac3 164->168 169 107aacb-107aad0 164->169 165->164 169->168
    APIs
    • CreateDirectoryW.KERNELBASE(?,?), ref: 0107AA8B
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: CreateDirectory
    • String ID:
    • API String ID: 4241100979-0
    • Opcode ID: 6675e002695042187c06b56ac031daa9ab4cedf6635852daae676b1f3e32240b
    • Instruction ID: 29233ad6a2956794eb459a6480cb13403bad9e6f831402b44c00ce1fd205e5ae
    • Opcode Fuzzy Hash: 6675e002695042187c06b56ac031daa9ab4cedf6635852daae676b1f3e32240b
    • Instruction Fuzzy Hash: EA2183716093C09FD752CB29DC55B96BFE8AF06324F0D84EAE984CB153D325D909CB61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 171 107a392-107a3cf 173 107a3d4-107a3dd 171->173 174 107a3d1 171->174 175 107a3e2-107a3e8 173->175 176 107a3df 173->176 174->173 177 107a3ed-107a404 175->177 178 107a3ea 175->178 176->175 180 107a406-107a419 RegQueryValueExW 177->180 181 107a43b-107a440 177->181 178->177 182 107a442-107a447 180->182 183 107a41b-107a438 180->183 181->180 182->183
    APIs
    • RegQueryValueExW.KERNELBASE(?,00000E24,4CA933BE,00000000,00000000,00000000,00000000), ref: 0107A40C
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: QueryValue
    • String ID:
    • API String ID: 3660427363-0
    • Opcode ID: 57282f6bd57a6cbd20dff62d11d3241e767251d0ce9813bb58cfefbbd2ec348e
    • Instruction ID: faab512d228a00d556c7310327628e377c3f5cab8a295542c2363b5b0e4ffebb
    • Opcode Fuzzy Hash: 57282f6bd57a6cbd20dff62d11d3241e767251d0ce9813bb58cfefbbd2ec348e
    • Instruction Fuzzy Hash: D9219D71A00204AEE760CF15CC84FABB7ECEF54610F08C49AE9859B651D760E809CA75
    APIs
    • WriteFile.KERNELBASE(?,00000E24,4CA933BE,00000000,00000000,00000000,00000000), ref: 0107A9C1
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: 3a776c866718afdef37a736d28b5d6aa9e6022451413745e766ee9e5974e2e62
    • Instruction ID: 7a330079f95223134f2954d829ade11674715e4bf7869e2bf1b52086b48b39e2
    • Opcode Fuzzy Hash: 3a776c866718afdef37a736d28b5d6aa9e6022451413745e766ee9e5974e2e62
    • Instruction Fuzzy Hash: 1611EF72A00200EFEB21CF55DC40BABFBE8EF14324F08845AE9459B651D374E418CBB5
    APIs
    • SetFilePointer.KERNELBASE(?,00000E24,4CA933BE,00000000,00000000,00000000,00000000), ref: 0107A8DE
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: FilePointer
    • String ID:
    • API String ID: 973152223-0
    • Opcode ID: f59f116dfdda92c262bbe0133afbdac92f69bdb1f2cd89bf92933e87b73b71b1
    • Instruction ID: 0c89decaa8c176591524ccc0b34805bdf8ccd6f9f66c32dbae860d851f789431
    • Opcode Fuzzy Hash: f59f116dfdda92c262bbe0133afbdac92f69bdb1f2cd89bf92933e87b73b71b1
    • Instruction Fuzzy Hash: A011C171A00204EFEB61CF55DC44BAAFBE8EF54724F08C49AED459B641D374E4188BB5
    APIs
    • SetErrorMode.KERNELBASE(?), ref: 0107A30C
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: ErrorMode
    • String ID:
    • API String ID: 2340568224-0
    • Opcode ID: 72fcd90d1dd822e617917b7b073bc66c1d6f0f7cdd170caecb0c5818a983e6e1
    • Instruction ID: 00cbef982677ce2c56722a81da3b83904d14a3bf513186b21e3deab45ff27463
    • Opcode Fuzzy Hash: 72fcd90d1dd822e617917b7b073bc66c1d6f0f7cdd170caecb0c5818a983e6e1
    • Instruction Fuzzy Hash: E9118C759093C09FDB228B25DC54A56BFB4EF47220F0984DAED848F263D265A809CB62
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: CloseFind
    • String ID:
    • API String ID: 1863332320-0
    • Opcode ID: c438394d46472ba83cb3ac43fe601dd2b563de64192d0354c5c6c235fd706204
    • Instruction ID: eb77865e8499db6c98df3c8be79f3c7bf64fb6180fc4b05f6eac2618b53a4420
    • Opcode Fuzzy Hash: c438394d46472ba83cb3ac43fe601dd2b563de64192d0354c5c6c235fd706204
    • Instruction Fuzzy Hash: 6B11A0715093C49FD7128B29DC45B52FFF4EF46220F0984DEED858B263D274A808CB61
    APIs
    • GetSystemInfo.KERNELBASE(?), ref: 0107B208
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: InfoSystem
    • String ID:
    • API String ID: 31276548-0
    • Opcode ID: 990106205482aa591cf6a8b1f52ddc5107fabccf620172247b1e2528308d3d0d
    • Instruction ID: 5e260b896ef382a08d8c363d2345bc3f9c70cd6b9725fdbf84f5575f8a6800ea
    • Opcode Fuzzy Hash: 990106205482aa591cf6a8b1f52ddc5107fabccf620172247b1e2528308d3d0d
    • Instruction Fuzzy Hash: DD115E719093849FDB12CF25DC54B56BFB4EF46220F0884DAED858F252D279A908CB62
    APIs
    • CreateDirectoryW.KERNELBASE(?,?), ref: 0107AA8B
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: CreateDirectory
    • String ID:
    • API String ID: 4241100979-0
    • Opcode ID: d2f8d4db91cd015d8a5d6b8fa6b596f139f09e32b59528f6b7fec351369ddf95
    • Instruction ID: 616fe5b5fb001eb0c726092560a67411f748e175ae91b667ff2637fd0218cc94
    • Opcode Fuzzy Hash: d2f8d4db91cd015d8a5d6b8fa6b596f139f09e32b59528f6b7fec351369ddf95
    • Instruction Fuzzy Hash: 54118271B002409FEB50DF19D98475AFBE8EF05220F0CC4AADD45CB242E374E404CB65
    APIs
    • GetFileType.KERNELBASE(?,00000E24,4CA933BE,00000000,00000000,00000000,00000000), ref: 0107A815
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: FileType
    • String ID:
    • API String ID: 3081899298-0
    • Opcode ID: aa06979c9a149f62cfc60a63c87ef0da03ca7de3fdc6294f034a60c92addc47d
    • Instruction ID: 645be106584716c268f80e3ff75ec266c0ccf1255342ee1b2788c1be04fd9875
    • Opcode Fuzzy Hash: aa06979c9a149f62cfc60a63c87ef0da03ca7de3fdc6294f034a60c92addc47d
    • Instruction Fuzzy Hash: DE01D671A00244EEE760CF05DC85BABF7E8EF54624F08C09AED459B741D374E4098AB5
    APIs
    • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 0107AC36
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: CreatePipe
    • String ID:
    • API String ID: 2719314638-0
    • Opcode ID: 1d2397bbfc8861139b90e59e4bbe49c7d77ee7aa9571004af3be722a38cc24b9
    • Instruction ID: cb28b968f389ff67394a9358b69db1d6da6f74a775493fbdaf033b3fd25db99f
    • Opcode Fuzzy Hash: 1d2397bbfc8861139b90e59e4bbe49c7d77ee7aa9571004af3be722a38cc24b9
    • Instruction Fuzzy Hash: 50019E71600200ABD310DF16DC86B66FBE8FB88A20F14851AEC089B741D731F915CBA1
    APIs
    • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 0107A1C2
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: FileFindNext
    • String ID:
    • API String ID: 2029273394-0
    • Opcode ID: 95733328e974a47d31669bb510dffb594226678b30a19932b391e7431688313a
    • Instruction ID: 13a82577d302abbdbe2d93dddd0c7518c2ee02e00409409d440cee10e53e8ef4
    • Opcode Fuzzy Hash: 95733328e974a47d31669bb510dffb594226678b30a19932b391e7431688313a
    • Instruction Fuzzy Hash: B3017171600600AFD314DF16DC86B66FBE8FB88A20F14855AED089B741D735F915CBE5
    APIs
    • FindCloseChangeNotification.KERNELBASE(?), ref: 0107A748
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: ChangeCloseFindNotification
    • String ID:
    • API String ID: 2591292051-0
    • Opcode ID: 9e1a69bd0d2ff328da6739edf8f324c148fea1195580c54fc7a9af6141b35b03
    • Instruction ID: 9570fa6337cfa5a24063c2d57e7bf935a9951078a1af8c3d9100d9ce851d3a95
    • Opcode Fuzzy Hash: 9e1a69bd0d2ff328da6739edf8f324c148fea1195580c54fc7a9af6141b35b03
    • Instruction Fuzzy Hash: 3501DF71A00240CFDB50CF19DD8576AFBE4EF05220F08C4AADC4A8B652D378E408CAA2
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: CloseFind
    • String ID:
    • API String ID: 1863332320-0
    • Opcode ID: d32615119b3ff470ee03adbf08334907bfe64f7103d200e65c89bfcf8d13d398
    • Instruction ID: e2b364ca6182598888cba46288f6033f53f45bad76e82ca2896bfe9ac9298bd3
    • Opcode Fuzzy Hash: d32615119b3ff470ee03adbf08334907bfe64f7103d200e65c89bfcf8d13d398
    • Instruction Fuzzy Hash: 8001F475A00248CFDB518F19D88576AFBE4EF05320F08C0AADD458B792D375E848DEA2
    APIs
    • SetErrorMode.KERNELBASE(?), ref: 0107A30C
    Memory Dump Source
    • Source File: 00000000.00000002.4454397050.000000000107A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107A000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_107a000_unarchiver.jbxd
    Similarity
    • API ID: ErrorMode
    • String ID:
    • API String ID: 2340568224-0
    • Opcode ID: 1e48d41c8893e6dd3dfab41cf7a1501cdcd19f88e4e24b11adb82c4a139452a7
    • Instruction ID: a4f39f3c21850b3d527cb10c8204c9a2c623c5366809f49a3e8b85754632e821
    • Opcode Fuzzy Hash: 1e48d41c8893e6dd3dfab41cf7a1501cdcd19f88e4e24b11adb82c4a139452a7
    • Instruction Fuzzy Hash: 32F0A435A04244CFDB50CF05D88576AFBE4EF45620F0CC09ADD454B752D3B5E418CA66
    Memory Dump Source
    • Source File: 00000000.00000002.4454359593.0000000001040000.00000040.00000020.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1040000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 35fbb7654806c5ccc5b74dc423828a3c1d302bc533d183373e20b77686d58144
    • Instruction ID: 5ab2dd4415cdeca273126247b84f3a498a2ed7e861c8ce8582ff4a5eee3d34de
    • Opcode Fuzzy Hash: 35fbb7654806c5ccc5b74dc423828a3c1d302bc533d183373e20b77686d58144
    • Instruction Fuzzy Hash: 92216DE294E3C04FE30357349D516A5BFB09F53224F1E84EBD984CB663E269494AC7A3
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0a1e307198571f318047da498099a2d7e782ef86b82997c2aed93f0312c32e99
    • Instruction ID: 8ba228a7dc18895e50d4cec957f8c3ffc0acf321d2885cc9c53a7f196e70730e
    • Opcode Fuzzy Hash: 0a1e307198571f318047da498099a2d7e782ef86b82997c2aed93f0312c32e99
    • Instruction Fuzzy Hash: 56B15935612301CFC758DF64E859A5F7BAAFF88600B1090B8E946AB356DB3D9C01CFA1
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ba076df626b7e354e29e4e56034ac060d773681956121492eb2dc95c2cacf834
    • Instruction ID: 8fae374019770f366d2d60758e3f629f69cb9ce0497740b08f2b4e0e9cba5528
    • Opcode Fuzzy Hash: ba076df626b7e354e29e4e56034ac060d773681956121492eb2dc95c2cacf834
    • Instruction Fuzzy Hash: 3FA16B31B002018BDB18ABB4D45976F77A7FFE4708F248069D946AB394DB7D9C428BA1
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a5d2c249ba64506f41a5bd29d63bad297554925915e5e4384d4612642c39d18c
    • Instruction ID: f28e26df88739d9e33660c485ed53c2ae1db1d2ee058f0bdad4f6f6ba76cc807
    • Opcode Fuzzy Hash: a5d2c249ba64506f41a5bd29d63bad297554925915e5e4384d4612642c39d18c
    • Instruction Fuzzy Hash: E6212671B043854BC716EB3984413AE7AE7AFD6208F4484BCD4C6DB342DF3DA90687A6
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ace1dee02072d555ef68fb82ee7dd64f10a58812bc490f37249488d02a0651aa
    • Instruction ID: ddc5456c875f4a70ac9a74eb2989daa4c1fb993403c6ac108191545ad4cd887d
    • Opcode Fuzzy Hash: ace1dee02072d555ef68fb82ee7dd64f10a58812bc490f37249488d02a0651aa
    • Instruction Fuzzy Hash: C321F171B046058BCB14EB3684412AFB7E7AFE5208B44887CD486DB741DF79E9068BA9
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 45b99f73a59a7b748e59bde9eb8cf776487f1adc21d2bc598d5025169068b09e
    • Instruction ID: af66c209b19077fc809c8eefbc6720e95f9337f97aa40c58fba78c11dd115b57
    • Opcode Fuzzy Hash: 45b99f73a59a7b748e59bde9eb8cf776487f1adc21d2bc598d5025169068b09e
    • Instruction Fuzzy Hash: D0118F33B10219AFCB44ABB8D84599F7BF6EFC8214B044479E605E7230EB39AC158B80
    Memory Dump Source
    • Source File: 00000000.00000002.4454359593.0000000001040000.00000040.00000020.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1040000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e1c44e760c7306d3cf5cd2d337bf0cb092b2056696fcfc705836c37c240c2413
    • Instruction ID: c11fdc3f1f1107969b23e90b947ffd9c5db8489d03cf3972ca6b3cd3cfbff57e
    • Opcode Fuzzy Hash: e1c44e760c7306d3cf5cd2d337bf0cb092b2056696fcfc705836c37c240c2413
    • Instruction Fuzzy Hash: A4018FB2409644AFD300DB05ED41C57BBFCEF86525F09C86AEC489B711E235A9188BB2
    Memory Dump Source
    • Source File: 00000000.00000002.4454359593.0000000001040000.00000040.00000020.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1040000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 61cd20f7c72043d11abbe630bf4f839a1adbcb6370297d68fd73496e2e410f8d
    • Instruction ID: 8c398d8dd8827833a4d1fd35b3d711a379825eff7331a26f9c9252dd726df353
    • Opcode Fuzzy Hash: 61cd20f7c72043d11abbe630bf4f839a1adbcb6370297d68fd73496e2e410f8d
    • Instruction Fuzzy Hash: 4BF0A4B65497806FC7118B16EC41853FFF8EF8623070984ABEC498B612D239B919CB72
    Memory Dump Source
    • Source File: 00000000.00000002.4454359593.0000000001040000.00000040.00000020.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1040000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 95b0d3cfeebc85a512aef53c99f828fae6b58399942ee225aeea299bf3fc4dbf
    • Instruction ID: cff5fd6e5b2ad61f7e7ea87706a2316a76eb55341c337b2cfb3207f0982fac91
    • Opcode Fuzzy Hash: 95b0d3cfeebc85a512aef53c99f828fae6b58399942ee225aeea299bf3fc4dbf
    • Instruction Fuzzy Hash: 5BF082B2845204AB9240DF05ED458A6F7ECEF84521F04C52AEC088B700E276A9198AF2
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d4d3b1e37df1b9c855d75b148436a59908dc79d1a1ca87356459376fee92c768
    • Instruction ID: 945e7b610ce3eba1fea93b780024ded883f60ebd9d570f331adf00d7dcb3764e
    • Opcode Fuzzy Hash: d4d3b1e37df1b9c855d75b148436a59908dc79d1a1ca87356459376fee92c768
    • Instruction Fuzzy Hash: 30E0DFB2F1A2541FDB44DAB898115DE7FA1DB82124B8444BAD088DB351EE3A8903C7C0
    Memory Dump Source
    • Source File: 00000000.00000002.4454359593.0000000001040000.00000040.00000020.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1040000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 39fffe106b28594656de258750c0f59c2fb98d28ee509671ee988d82f4e2ba70
    • Instruction ID: a6721e3404031f982c0c8864d6425ffbb47f2b522a638f6ef47a41cfee3503df
    • Opcode Fuzzy Hash: 39fffe106b28594656de258750c0f59c2fb98d28ee509671ee988d82f4e2ba70
    • Instruction Fuzzy Hash: 8CE092B66006044B9750CF0BFC41462F7E8EB84630708C47FDC0D8B711E639B508CAA5
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6fcd09898d6b2035922badd83110e77ff2618e1819303126375951805a64bc18
    • Instruction ID: c3fab226ff1d5ece6e765a6786581726423b1cbf7ab5b65f93cd7c85514f2a80
    • Opcode Fuzzy Hash: 6fcd09898d6b2035922badd83110e77ff2618e1819303126375951805a64bc18
    • Instruction Fuzzy Hash: 3BD01272F152182B9B44EAF9984159F7BEA9B84154B9444799009D7350EE35990187C0
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: be72a2c248ede8d766c4a2250a3088ce16afb1a113fb92c996aa2a7a2472b191
    • Instruction ID: 5d5b8bcd10c1ec73a5576068a523462007fba6956137b1eeaca2920de7c2fb89
    • Opcode Fuzzy Hash: be72a2c248ede8d766c4a2250a3088ce16afb1a113fb92c996aa2a7a2472b191
    • Instruction Fuzzy Hash: 60E08C3231A3808FC7079778981A5997F719F97214F49C0EA8088CF2B3C239C805CB51
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a32248057d67b69e94ed7e0df120e817dac8b6e33ed3602c35151b227b0ba85c
    • Instruction ID: 16fbffbc1907759e78323f211b73862c35abeb4e93db0aa3be273ead788831b5
    • Opcode Fuzzy Hash: a32248057d67b69e94ed7e0df120e817dac8b6e33ed3602c35151b227b0ba85c
    • Instruction Fuzzy Hash: A4E0122531E3C04FC707577494295A53F726FD2214F4D80EAD4848F263C928D959D791
    Memory Dump Source
    • Source File: 00000000.00000002.4454384697.0000000001072000.00000040.00000800.00020000.00000000.sdmp, Offset: 01072000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1072000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9a497fc03ee45d4c0f6f524c8d619b361bb194beb10c463931ae1bb135cfed51
    • Instruction ID: 895f1f2f0203e10543f69915e78c022d3fc1f776804feece20907c6ccd7cdb00
    • Opcode Fuzzy Hash: 9a497fc03ee45d4c0f6f524c8d619b361bb194beb10c463931ae1bb135cfed51
    • Instruction Fuzzy Hash: 09D02E3A2016C08FE3228B0CC1A4B853BE4AB60704F0A00F9A8408B763CB28D4C0C200
    Memory Dump Source
    • Source File: 00000000.00000002.4454384697.0000000001072000.00000040.00000800.00020000.00000000.sdmp, Offset: 01072000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1072000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9b39aa3a8564c6af10b7a72cdd958f64c68afeb223b839fdc1220b801aad5661
    • Instruction ID: 7372b0e142b15ed2aa4b207374dd2dc1de8dc7c44ae8e3cf9060d0138e49596b
    • Opcode Fuzzy Hash: 9b39aa3a8564c6af10b7a72cdd958f64c68afeb223b839fdc1220b801aad5661
    • Instruction Fuzzy Hash: 06D05E347016814BD725DA0CC6D4F593BD4AB50B14F0684ECAC508B762C7A8D8C0CA04
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5592c8e7063ed98c2723ea19d73dd3c831520eec096eb456db8b277463269438
    • Instruction ID: 8f5262d28668d3e8ebade185865642b2124cf4c91ea121a040ffb3989bacd307
    • Opcode Fuzzy Hash: 5592c8e7063ed98c2723ea19d73dd3c831520eec096eb456db8b277463269438
    • Instruction Fuzzy Hash: 29C012313103048BC704A779D41EE26739AAFD0304F89C0B484094B261CA78EC40C694
    Memory Dump Source
    • Source File: 00000000.00000002.4455480319.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5230000_unarchiver.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b0bec2983504575f0ac0c2b4bec1347a19de8e87dd68b2b2469d47bef7c39a71
    • Instruction ID: d7f1e2f935f9ba541258c5931008b11527657665115b8980679317214fc64ec2
    • Opcode Fuzzy Hash: b0bec2983504575f0ac0c2b4bec1347a19de8e87dd68b2b2469d47bef7c39a71
    • Instruction Fuzzy Hash: 84C012323103048BC704A778D51EA2A779AAFD4304F88C0B444095B261CA78EC40C654