Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ATT00004.zip

Overview

General Information

Sample name:ATT00004.zip
Analysis ID:1544863
MD5:1bdac065cd8abdafdad2aa0f8b881428
SHA1:6657fc8396e80a79b4b2525dc5f27a92d5e2b7cb
SHA256:35d26ed6734c6903e52a887fa243f46626bf4d8787352b79a6399a2d8b980edf
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • unarchiver.exe (PID: 5500 cmdline: "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\ATT00004.zip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2)
    • 7za.exe (PID: 6900 cmdline: "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\b22xvwxz.elc" "C:\Users\user\Desktop\ATT00004.zip" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
      • conhost.exe (PID: 3364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: unknownDNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: classification engineClassification label: clean2.winZIP@4/1@1/0
Source: C:\Windows\SysWOW64\unarchiver.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3364:120:WilError_03
Source: C:\Windows\SysWOW64\unarchiver.exeFile created: C:\Users\user\AppData\Local\Temp\unarchiver.logJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\unarchiver.exe "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\ATT00004.zip"
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\b22xvwxz.elc" "C:\Users\user\Desktop\ATT00004.zip"
Source: C:\Windows\SysWOW64\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\b22xvwxz.elc" "C:\Users\user\Desktop\ATT00004.zip"Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\7za.exeSection loaded: 7z.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 1480000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 31E0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 14F0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeWindow / User API: threadDelayed 575Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeWindow / User API: threadDelayed 9397Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5472Thread sleep count: 575 > 30Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5472Thread sleep time: -287500s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5472Thread sleep count: 9397 > 30Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5472Thread sleep time: -4698500s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 0_2_0142B286 GetSystemInfo,0_2_0142B286
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\b22xvwxz.elc" "C:\Users\user\Desktop\ATT00004.zip"Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping2
Virtualization/Sandbox Evasion
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1544863 Sample: ATT00004.zip Startdate: 29/10/2024 Architecture: WINDOWS Score: 2 13 198.187.3.20.in-addr.arpa 2->13 7 unarchiver.exe 4 2->7         started        process3 process4 9 7za.exe 2 7->9         started        process5 11 conhost.exe 9->11         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
198.187.3.20.in-addr.arpa
unknown
unknownfalse
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1544863
    Start date and time:2024-10-29 19:38:17 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 3s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:18
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:ATT00004.zip
    Detection:CLEAN
    Classification:clean2.winZIP@4/1@1/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 48
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .zip
    • Override analysis time to 240000 for current running targets taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: ATT00004.zip
    TimeTypeDescription
    16:25:23API Interceptor3942595x Sleep call for process: unarchiver.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\unarchiver.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):3337
    Entropy (8bit):4.983741366665018
    Encrypted:false
    SSDEEP:48:RNUtM0Nd9LSLG8LGb8LG8LGpmLGN+bLG8LGpStM0NLGbSLGbtM0NLGcNLGHLG8Lb:LOBzHa5RYm7
    MD5:2E990A3870FA519FB875431804384180
    SHA1:07A178312CDFB3E289189982943092E152E7868C
    SHA-256:4B52FE759FD54D851C31463FDA4F1622A872CC9001E4FDB8BF1CF937443595D0
    SHA-512:C81CCEB9CE920F9F66A43FE578459A129E8A135D8AD9C82A3A4293B434F36F723FF48ADF0870DEB22E63F77CB9222F33B447F841603BDFDF96664299231DC7B9
    Malicious:false
    Reputation:low
    Preview:10/29/2024 2:39 PM: Unpack: C:\Users\user\Desktop\ATT00004.zip..10/29/2024 2:39 PM: Tmp dir: C:\Users\user\AppData\Local\Temp\b22xvwxz.elc..10/29/2024 2:39 PM: Received from standard error: ERROR: Wrong password : ATT00004..10/29/2024 2:39 PM: Received from standard out: ..10/29/2024 2:39 PM: Received from standard out: 7-Zip 18.05 (x86) : Copyright (c) 1999-2018 Igor Pavlov : 2018-04-30..10/29/2024 2:39 PM: Received from standard out: ..10/29/2024 2:39 PM: Received from standard out: Scanning the drive for archives:..10/29/2024 2:39 PM: Received from standard out: 1 file, 202 bytes (1 KiB)..10/29/2024 2:39 PM: Received from standard out: ..10/29/2024 2:39 PM: Received from standard out: Extracting archive: C:\Users\user\Desktop\ATT00004.zip..10/29/2024 2:39 PM: Received from standard out: --..10/29/2024 2:39 PM: Received from standard out: Path = C:\Users\user\Desktop\ATT00004.zip..10/29/2024 2:39 PM: Received from standard out: Type = zip..10/29/2024 2:39 PM: Rece
    File type:Zip archive data, at least v2.0 to extract, compression method=deflate
    Entropy (8bit):4.237858396304879
    TrID:
    • ZIP compressed archive (8000/1) 100.00%
    File name:ATT00004.zip
    File size:202 bytes
    MD5:1bdac065cd8abdafdad2aa0f8b881428
    SHA1:6657fc8396e80a79b4b2525dc5f27a92d5e2b7cb
    SHA256:35d26ed6734c6903e52a887fa243f46626bf4d8787352b79a6399a2d8b980edf
    SHA512:6fdf02d74f682139803d1463c0c41e8c4ca8cbacae0af24d7d19051f1e066eae7a8661cfeb808d8403adb175945337d9551cdaee02872dfa2b0df8ec65296a12
    SSDEEP:3:vhjkVgRntRlEdRXjkl6yHPcsQeK9K1ukcaXtVgRntRlUVdRXjkl6yHPz/+lOlXt:5juL/klvztcSDL/klt+lK9
    TLSH:00D080F71F62D384DD1D4F3C06D54300A4F0F41473131532150311015C814585FDB1A4
    File Content Preview:PK..........]Y..............$.ATT00004.. .............0*......0*......0*..Ru..<.#....;o..MPK..-.........]Y..............$...............ATT00004.. .............0*......0*......0*..PK..........Z...Z.....
    Icon Hash:90cececece8e8eb0
    TimestampSource PortDest PortSource IPDest IP
    Oct 29, 2024 19:39:44.852516890 CET5358785162.159.36.2192.168.2.7
    Oct 29, 2024 19:39:45.500020981 CET5442153192.168.2.71.1.1.1
    Oct 29, 2024 19:39:45.510052919 CET53544211.1.1.1192.168.2.7
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Oct 29, 2024 19:39:45.500020981 CET192.168.2.71.1.1.10xe271Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 29, 2024 19:39:45.510052919 CET1.1.1.1192.168.2.70xe271Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:14:39:09
    Start date:29/10/2024
    Path:C:\Windows\SysWOW64\unarchiver.exe
    Wow64 process (32bit):true
    Commandline:"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\ATT00004.zip"
    Imagebase:0xb20000
    File size:12'800 bytes
    MD5 hash:16FF3CC6CC330A08EED70CBC1D35F5D2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:14:39:10
    Start date:29/10/2024
    Path:C:\Windows\SysWOW64\7za.exe
    Wow64 process (32bit):true
    Commandline:"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\b22xvwxz.elc" "C:\Users\user\Desktop\ATT00004.zip"
    Imagebase:0xdb0000
    File size:289'792 bytes
    MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:14:39:10
    Start date:29/10/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff75da10000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:21.7%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:0%
      Total number of Nodes:80
      Total number of Limit Nodes:5
      execution_graph 1221 142a900 1222 142a932 SetFilePointer 1221->1222 1224 142a996 1222->1224 1147 142a7c6 1148 142a7f2 CloseHandle 1147->1148 1149 142a831 1147->1149 1150 142a800 1148->1150 1149->1148 1151 142b286 1152 142b2b2 GetSystemInfo 1151->1152 1153 142b2e8 1151->1153 1154 142b2c0 1152->1154 1153->1152 1225 142a784 1227 142a7c6 CloseHandle 1225->1227 1228 142a800 1227->1228 1166 142aa12 1167 142aa47 WriteFile 1166->1167 1169 142aa79 1167->1169 1182 142ac96 1183 142ace6 CreatePipe 1182->1183 1184 142acee 1183->1184 1189 142a2da 1190 142a306 SetErrorMode 1189->1190 1191 142a32f 1189->1191 1192 142a31b 1190->1192 1191->1190 1197 142a5dc 1198 142a5fe GetLongPathNameW 1197->1198 1200 142a63e 1198->1200 1139 142b062 1140 142b0c0 1139->1140 1141 142b08e FindClose 1139->1141 1140->1141 1142 142b0a3 1141->1142 1201 142a9e3 1203 142aa12 WriteFile 1201->1203 1204 142aa79 1203->1204 1229 142a120 1230 142a172 FindNextFileW 1229->1230 1232 142a1ca 1230->1232 1233 142ac26 1234 142ac96 CreatePipe 1233->1234 1236 142acee 1234->1236 1205 142b264 1206 142b286 GetSystemInfo 1205->1206 1208 142b2c0 1206->1208 1155 142a6ae 1157 142a6e6 CreateFileW 1155->1157 1158 142a735 1157->1158 1237 142a2ae 1239 142a2b2 SetErrorMode 1237->1239 1240 142a31b 1239->1240 1159 142a172 1160 142a1c2 FindNextFileW 1159->1160 1161 142a1ca 1160->1161 1170 142a932 1173 142a967 SetFilePointer 1170->1173 1172 142a996 1173->1172 1209 142a370 1211 142a392 RegQueryValueExW 1209->1211 1212 142a41b 1211->1212 1178 142aaf6 1181 142ab1c CreateDirectoryW 1178->1181 1180 142ab43 1181->1180 1213 142a676 1215 142a6ae CreateFileW 1213->1215 1216 142a735 1215->1216 1241 142adb4 1242 142adda DuplicateHandle 1241->1242 1244 142ae5f 1242->1244 1245 142b03b 1248 142b062 FindClose 1245->1248 1247 142b0a3 1248->1247 1249 142aabb 1250 142aaf6 CreateDirectoryW 1249->1250 1252 142ab43 1250->1252 1193 142a5fe 1194 142a630 GetLongPathNameW 1193->1194 1195 142a668 1193->1195 1196 142a63e 1194->1196 1195->1194 1253 142a83f 1254 142a872 GetFileType 1253->1254 1256 142a8d4 1254->1256

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_014A0648 8 Function_014A066A 0->8 1 Function_01422044 2 Function_015A0C50 3 Function_0142B54E 4 Function_0142B44E 5 Function_015A0748 6 Function_01422458 7 Function_0142A45C 9 Function_0142AF62 10 Function_0142B062 11 Function_0142A462 12 Function_0142A566 13 Function_0142B264 14 Function_01422364 15 Function_01422264 16 Function_0142A172 17 Function_0142A872 18 Function_0142A370 19 Function_0142A676 20 Function_014A067F 21 Function_015A0C60 22 Function_0142A078 23 Function_0142B102 24 Function_014A0808 25 Function_015A0E18 105 Function_015A0BA0 25->105 26 Function_0142A900 27 Function_0142B401 28 Function_01422006 29 Function_014A000C 30 Function_0142A005 31 Function_014A0001 32 Function_014A0606 33 Function_0142A50F 34 Function_0142B20D 35 Function_0142AA12 36 Function_015A0E08 36->105 37 Function_01422310 38 Function_015A0006 39 Function_0142AD1C 40 Function_0142A120 41 Function_0142B520 42 Function_015A0739 43 Function_014A082E 44 Function_0142B326 45 Function_0142AC26 46 Function_015A0C3D 47 Function_0142A02E 48 Function_0142A932 49 Function_01422430 50 Function_0142A23A 51 Function_0142B03B 52 Function_0142AD3E 53 Function_0142A83F 54 Function_0142213C 55 Function_0142A33D 56 Function_0142A7C6 57 Function_014A05C0 58 Function_015A0DD1 58->105 59 Function_0142B0CE 60 Function_0142AFD2 61 Function_014220D0 62 Function_0142B1D1 63 Function_0142ADDA 64 Function_0142A2DA 65 Function_014A05D0 66 Function_015A02C0 66->32 69 Function_014A05E0 66->69 77 Function_015A0799 66->77 89 Function_015A0B8F 66->89 66->105 67 Function_0142A5DC 68 Function_0142A9E3 70 Function_014221F0 71 Function_0142AAF6 72 Function_0142B2F6 73 Function_0142A1F4 74 Function_014223F4 75 Function_015A0DE0 75->105 76 Function_0142A5FE 77->2 77->21 77->32 77->69 78 Function_015A0C99 77->78 77->89 97 Function_015A0CA8 77->97 77->105 79 Function_01422581 80 Function_0142A486 81 Function_0142B286 82 Function_0142A784 83 Function_0142AB8A 84 Function_014A0784 85 Function_0142A392 86 Function_014A009B 87 Function_0142AB90 88 Function_0142AC96 90 Function_01422194 91 Function_0142A09A 92 Function_01422098 93 Function_015A02B0 93->32 93->69 93->77 93->89 93->105 94 Function_015A05B1 95 Function_0142A6AE 96 Function_0142A2AE 98 Function_0142AFB0 99 Function_0142ABB6 100 Function_0142ADB4 101 Function_0142AEB5 102 Function_014A07B2 103 Function_015A0DA2 103->105 104 Function_0142AABB 106 Function_014A07B6 107 Function_014223BC
      APIs
      • GetSystemInfo.KERNELBASE(?), ref: 0142B2B8
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: InfoSystem
      • String ID:
      • API String ID: 31276548-0
      • Opcode ID: debb0adb4ab9de2c9a2e35df7b01e72b7fe3d4d3be4ce6f11748c974fa72dea7
      • Instruction ID: 0b609c63aa74a598aa9e8073bed664425a8a66f77f9078ddd86359bdf7087452
      • Opcode Fuzzy Hash: debb0adb4ab9de2c9a2e35df7b01e72b7fe3d4d3be4ce6f11748c974fa72dea7
      • Instruction Fuzzy Hash: AA01A2758043508FEB10CF16D889756FBE4DF05220F48C4ABDD488F256D2B5A584CBB2

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 15a0c99-15a0ce1 3 15a0d0e-15a0d16 0->3 4 15a0ce3-15a0d0c 0->4 7 15a0d1e-15a0d92 3->7 4->7 18 15a0d99-15a0dcb 7->18
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID: P@l$`>l$`>l
      • API String ID: 0-677101323
      • Opcode ID: 5169dc83cb44d0e67f4b7a1f034efd7579542e3df55a592890f16f7abadadc23
      • Instruction ID: b405be847cad20135009ce29064b0fbb508456541066eea320122a470cd36aa7
      • Opcode Fuzzy Hash: 5169dc83cb44d0e67f4b7a1f034efd7579542e3df55a592890f16f7abadadc23
      • Instruction Fuzzy Hash: 9F216B307006208FC714DB7684517AE7AE6EFC9204B84842DD646DB350CFBAEE078BD2

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 21 15a0ca8-15a0ce1 24 15a0d0e-15a0d16 21->24 25 15a0ce3-15a0d0c 21->25 28 15a0d1e-15a0d92 24->28 25->28 39 15a0d99-15a0dcb 28->39
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID: P@l$`>l$`>l
      • API String ID: 0-677101323
      • Opcode ID: d528ca9cc71448de9847d9bc60b68cd6adee85ecc46e4cfefcfcb8b899202b75
      • Instruction ID: 2f701f5e84ae5ca98b047cead44f9bb88f1286b290d658c3e8095fac5e36988c
      • Opcode Fuzzy Hash: d528ca9cc71448de9847d9bc60b68cd6adee85ecc46e4cfefcfcb8b899202b75
      • Instruction Fuzzy Hash: B42149307007208BC710EB7684506AEBBE6AFC9204B80842DD246DB740CFB9EE028BD5

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 42 142a120-142a1f3 FindNextFileW
      APIs
      • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 0142A1C2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: FileFindNext
      • String ID: Z
      • API String ID: 2029273394-1505515367
      • Opcode ID: 7cbbd44f1ca99d4f1c420ed2d56f9a2fcb0b3ee89bcd8154096a7d3ba327c94d
      • Instruction ID: 1b3caa5f3ca93bf51521d7f8e7fa9c730f2c77c93524c3cfd0400e7c416a7e6b
      • Opcode Fuzzy Hash: 7cbbd44f1ca99d4f1c420ed2d56f9a2fcb0b3ee89bcd8154096a7d3ba327c94d
      • Instruction Fuzzy Hash: 2721E27150D3C06FD3028B258C65B62BFB4EF87710F0A85DBD8C48F193D265A919C7A2

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 47 15a0799-15a07c7 49 15a07cd-15a07da 47->49 50 15a0b77 47->50 141 15a07dc call 15a0b8f 49->141 142 15a07dc call 15a0ba0 49->142 143 15a07dc call 14a05e0 49->143 144 15a07dc call 14a0606 49->144 51 15a0b83-15a0b8d 50->51 53 15a07e2 145 15a07e2 call 15a0c50 53->145 146 15a07e2 call 15a0c60 53->146 54 15a07e8-15a07f8 147 15a07fa call 15a0b8f 54->147 148 15a07fa call 15a0ba0 54->148 56 15a0800-15a0802 57 15a0810 56->57 58 15a0804-15a080e 56->58 59 15a0815-15a0817 57->59 58->59 60 15a089b-15a0940 59->60 61 15a081d-15a088e 59->61 78 15a0948 60->78 151 15a0890 call 15a0ca8 61->151 152 15a0890 call 15a0c99 61->152 153 15a0890 call 14a05e0 61->153 154 15a0890 call 14a0606 61->154 76 15a0896 76->78 137 15a094e call 15a0b8f 78->137 138 15a094e call 15a0ba0 78->138 80 15a0954-15a0985 139 15a0987 call 15a0b8f 80->139 140 15a0987 call 15a0ba0 80->140 86 15a098d-15a09a9 88 15a09af 86->88 89 15a0b63-15a0b67 86->89 90 15a09b2-15a09d1 88->90 89->51 91 15a0b69 89->91 95 15a09d8-15a09da 90->95 149 15a0b6f call 15a0b8f 91->149 150 15a0b6f call 15a0ba0 91->150 93 15a0b75 93->51 96 15a09e0-15a09e4 95->96 97 15a0b51-15a0b5d 95->97 98 15a09ea-15a09fd 96->98 99 15a0b39-15a0b46 96->99 97->89 97->90 100 15a09ff 98->100 101 15a0a70-15a0a74 98->101 105 15a0b4e 99->105 103 15a0a02-15a0a24 100->103 104 15a0a7a-15a0aa7 101->104 101->105 110 15a0a2b-15a0a5e 103->110 111 15a0a26 103->111 116 15a0aa9 104->116 117 15a0aae-15a0ad5 104->117 105->97 122 15a0a60 110->122 123 15a0a67-15a0a6e 110->123 111->110 116->117 125 15a0b1d-15a0b25 117->125 126 15a0ad7-15a0aed 117->126 122->123 123->101 123->103 125->105 130 15a0aef 126->130 131 15a0af4-15a0b1b 126->131 130->131 131->125 135 15a0b27-15a0b37 131->135 135->105 137->80 138->80 139->86 140->86 141->53 142->53 143->53 144->53 145->54 146->54 147->56 148->56 149->93 150->93 151->76 152->76 153->76 154->76
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID: :@Yl$:@Yl
      • API String ID: 0-1237330149
      • Opcode ID: e18d0ddf07335e01283a575a10f3973fd5224f503a3c1269a23ae8f9254b7c92
      • Instruction ID: f8574b52d1670b1c3ffa62c9d46c51c0ab414dc2fa5664737eefbb102d79c493
      • Opcode Fuzzy Hash: e18d0ddf07335e01283a575a10f3973fd5224f503a3c1269a23ae8f9254b7c92
      • Instruction Fuzzy Hash: 40A18E34B002158BDB149FB6D5687BEB7B7FB88308F158029DA069B398DFB98D41CB51

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 155 142a676-142a706 159 142a70b-142a717 155->159 160 142a708 155->160 161 142a719 159->161 162 142a71c-142a725 159->162 160->159 161->162 163 142a776-142a77b 162->163 164 142a727-142a74b CreateFileW 162->164 163->164 167 142a77d-142a782 164->167 168 142a74d-142a773 164->168 167->168
      APIs
      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0142A72D
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: CreateFile
      • String ID:
      • API String ID: 823142352-0
      • Opcode ID: 842c51088a68a65142b054a1e689200063b4caf6568dfd4ad5a64b173e54489a
      • Instruction ID: 5d56f8cc0e68efabfb2df9adf516b29a654d0df848cce4f6dd26a671c9dd83fc
      • Opcode Fuzzy Hash: 842c51088a68a65142b054a1e689200063b4caf6568dfd4ad5a64b173e54489a
      • Instruction Fuzzy Hash: 7B3190715093806FE722CB65DC44B62BFF8EF06210F08849AE9858B663D275E809DB71

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 171 142b2f6-142b39b 176 142b3f3-142b3f8 171->176 177 142b39d-142b3a5 DuplicateHandle 171->177 176->177 178 142b3ab-142b3bd 177->178 180 142b3fa-142b3ff 178->180 181 142b3bf-142b3f0 178->181 180->181
      APIs
      • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0142B3A3
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID:
      • API String ID: 3793708945-0
      • Opcode ID: 3b1419c596c69d78289fe7ed83365c2182219bd6aa899c648ad3c532c982d9ca
      • Instruction ID: 23db1f5fd3b277403cecfe32eb57dce3b000ec6ec60eb9c802b62ea20bb1db59
      • Opcode Fuzzy Hash: 3b1419c596c69d78289fe7ed83365c2182219bd6aa899c648ad3c532c982d9ca
      • Instruction Fuzzy Hash: CF319476408344AFE7228B65DC45FA7BFFCEF05214F09849AEA85CB162D364A909CB71

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 185 142adb4-142ae4f 190 142ae51-142ae59 DuplicateHandle 185->190 191 142aea7-142aeac 185->191 193 142ae5f-142ae71 190->193 191->190 194 142ae73-142aea4 193->194 195 142aeae-142aeb3 193->195 195->194
      APIs
      • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0142AE57
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID:
      • API String ID: 3793708945-0
      • Opcode ID: 05dca6647010a8692306cfd103ce1ef2671ec1b75913a1bc4a5a9263c5fb4825
      • Instruction ID: 78eb33ae2a0db80139c4340bfa91357f5e68b98aeaba16e0698cdd2fc9d45523
      • Opcode Fuzzy Hash: 05dca6647010a8692306cfd103ce1ef2671ec1b75913a1bc4a5a9263c5fb4825
      • Instruction Fuzzy Hash: 4C31B571548344AFEB228F65DC44F67BFECEF05224F09889AF985CB552D364A409CB61

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 199 142ac26-142ad17 CreatePipe
      APIs
      • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 0142ACE6
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: CreatePipe
      • String ID:
      • API String ID: 2719314638-0
      • Opcode ID: d5dd8b70dfb0def3680a764e425ae63bc5fa0daa013432d2297723cabd71a667
      • Instruction ID: e4a033a965295eecfc9fc6feb629897b25d471556963f906f1dd49ee4223285b
      • Opcode Fuzzy Hash: d5dd8b70dfb0def3680a764e425ae63bc5fa0daa013432d2297723cabd71a667
      • Instruction Fuzzy Hash: 86318C7250E3C06FD3138B618C65A61BFB4AF47610F1A84CBD8848F1A3D2686809C7A2

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 221 142adda-142ae4f 225 142ae51-142ae59 DuplicateHandle 221->225 226 142aea7-142aeac 221->226 228 142ae5f-142ae71 225->228 226->225 229 142ae73-142aea4 228->229 230 142aeae-142aeb3 228->230 230->229
      APIs
      • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0142AE57
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID:
      • API String ID: 3793708945-0
      • Opcode ID: 2db1006c2035142f2f34ef3f38a7bfeba8363a0073d590fb4c55aa05b0e47e5a
      • Instruction ID: cc5323f7ab2d73ee80b9791e8598ccbdac622103399641c1653ced4b544deed3
      • Opcode Fuzzy Hash: 2db1006c2035142f2f34ef3f38a7bfeba8363a0073d590fb4c55aa05b0e47e5a
      • Instruction Fuzzy Hash: 6521C172544204AFEB219F55DC44F6BBBECEF04324F04886AEE45CB656D370E4498BA1

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 204 142a370-142a3cf 207 142a3d1 204->207 208 142a3d4-142a3dd 204->208 207->208 209 142a3e2-142a3e8 208->209 210 142a3df 208->210 211 142a3ea 209->211 212 142a3ed-142a404 209->212 210->209 211->212 214 142a406-142a419 RegQueryValueExW 212->214 215 142a43b-142a440 212->215 216 142a442-142a447 214->216 217 142a41b-142a438 214->217 215->214 216->217
      APIs
      • RegQueryValueExW.KERNELBASE(?,00000E24,E21542A3,00000000,00000000,00000000,00000000), ref: 0142A40C
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: QueryValue
      • String ID:
      • API String ID: 3660427363-0
      • Opcode ID: ce904d81b3eca5c6adc904c779336d32db3026647b0ffb5684e02c63482846eb
      • Instruction ID: 5c71ad115f1dfb1b610586e26ea27ce6ac503351454c44361842f123d6f36dcb
      • Opcode Fuzzy Hash: ce904d81b3eca5c6adc904c779336d32db3026647b0ffb5684e02c63482846eb
      • Instruction Fuzzy Hash: F0218DB5508740AFE721CF15DC84F63BBF8EF05610F18849AEA45CB662D3A4E948CB61

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 234 142b326-142b39b 238 142b3f3-142b3f8 234->238 239 142b39d-142b3a5 DuplicateHandle 234->239 238->239 240 142b3ab-142b3bd 239->240 242 142b3fa-142b3ff 240->242 243 142b3bf-142b3f0 240->243 242->243
      APIs
      • DuplicateHandle.KERNELBASE(?,00000E24), ref: 0142B3A3
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID:
      • API String ID: 3793708945-0
      • Opcode ID: b3e45c25acb8819fd41861155b4a055a639750052b9f42e572c903bc389496b0
      • Instruction ID: 6428d93ac15f60291d7ab0502fa79f182e73cb52b3befe582fd75b9e79465908
      • Opcode Fuzzy Hash: b3e45c25acb8819fd41861155b4a055a639750052b9f42e572c903bc389496b0
      • Instruction Fuzzy Hash: 5921C176504304AFEB21CF65DC45F6BBBECEF08214F04886AEE45CB665D7B0E5488BA1

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 247 142a900-142a986 251 142a9ca-142a9cf 247->251 252 142a988-142a9a8 SetFilePointer 247->252 251->252 255 142a9d1-142a9d6 252->255 256 142a9aa-142a9c7 252->256 255->256
      APIs
      • SetFilePointer.KERNELBASE(?,00000E24,E21542A3,00000000,00000000,00000000,00000000), ref: 0142A98E
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: FilePointer
      • String ID:
      • API String ID: 973152223-0
      • Opcode ID: 09323007fbd756de6f81fee2343658cba4c228a6b8dfc106b11c06a5e8b6f427
      • Instruction ID: 2e3193144f591ca8e03983e33380277b1a046bdc0c638083c181d4309ff99e39
      • Opcode Fuzzy Hash: 09323007fbd756de6f81fee2343658cba4c228a6b8dfc106b11c06a5e8b6f427
      • Instruction Fuzzy Hash: E921C1B55083806FEB228B15DC44F62BFB8EF46614F0984DBED848B553C264A909CBB1

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 259 142a9e3-142aa69 263 142aa6b-142aa8b WriteFile 259->263 264 142aaad-142aab2 259->264 267 142aab4-142aab9 263->267 268 142aa8d-142aaaa 263->268 264->263 267->268
      APIs
      • WriteFile.KERNELBASE(?,00000E24,E21542A3,00000000,00000000,00000000,00000000), ref: 0142AA71
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: FileWrite
      • String ID:
      • API String ID: 3934441357-0
      • Opcode ID: 44a690490552adaac9cc78e8fff576b46ecfa217a7206e1823407e4fb5980fb9
      • Instruction ID: 26f493ffa456ff30f6428e955567c1d5d4a23047976afc30dffe3074b6b10b1c
      • Opcode Fuzzy Hash: 44a690490552adaac9cc78e8fff576b46ecfa217a7206e1823407e4fb5980fb9
      • Instruction Fuzzy Hash: AA21A175409380AFDB228F51DC44F66BFB8EF06210F0884DAE9848B162C275A508CBA2

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 271 142a6ae-142a706 274 142a70b-142a717 271->274 275 142a708 271->275 276 142a719 274->276 277 142a71c-142a725 274->277 275->274 276->277 278 142a776-142a77b 277->278 279 142a727-142a72f CreateFileW 277->279 278->279 281 142a735-142a74b 279->281 282 142a77d-142a782 281->282 283 142a74d-142a773 281->283 282->283
      APIs
      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0142A72D
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: CreateFile
      • String ID:
      • API String ID: 823142352-0
      • Opcode ID: fc319a526fbd890e1fc20a3a3815c51c8feebeacefbb3806376dc5c5d1536bab
      • Instruction ID: 77f6eaf485803c05b4f85591890f40244c8fb8ee4ceb0c8fd6cbe816f19d5de8
      • Opcode Fuzzy Hash: fc319a526fbd890e1fc20a3a3815c51c8feebeacefbb3806376dc5c5d1536bab
      • Instruction Fuzzy Hash: 6721B275504240AFEB21CF65DD85F66FBF8EF08210F18885AEE468B752D371E444CB65

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 286 142a83f-142a8bd 290 142a8f2-142a8f7 286->290 291 142a8bf-142a8d2 GetFileType 286->291 290->291 292 142a8d4-142a8f1 291->292 293 142a8f9-142a8fe 291->293 293->292
      APIs
      • GetFileType.KERNELBASE(?,00000E24,E21542A3,00000000,00000000,00000000,00000000), ref: 0142A8C5
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: FileType
      • String ID:
      • API String ID: 3081899298-0
      • Opcode ID: bb55a00001614816fa0bbb658a90caafc7c5546c6f272b0f7a8653878d51cdc5
      • Instruction ID: 2ff804b6927631e9ee54d61d01f3377f3cbf4fcee23d6e119055821d8e967d81
      • Opcode Fuzzy Hash: bb55a00001614816fa0bbb658a90caafc7c5546c6f272b0f7a8653878d51cdc5
      • Instruction Fuzzy Hash: 8B21D5B540D3806FE7128B15DC44BA2BFB8EF46314F0980DBED84CB293D2A4A909C771
      APIs
      • CreateDirectoryW.KERNELBASE(?,?), ref: 0142AB3B
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: CreateDirectory
      • String ID:
      • API String ID: 4241100979-0
      • Opcode ID: 8f85c0ae1c0aa759c117886ff2c01a6f8eab27670b7ea35e7053eda6fd7d23fc
      • Instruction ID: d41c87c16b3d266487404e32b7d0e5e90e556d859e86bd6f4e3f1b9f50609560
      • Opcode Fuzzy Hash: 8f85c0ae1c0aa759c117886ff2c01a6f8eab27670b7ea35e7053eda6fd7d23fc
      • Instruction Fuzzy Hash: 912183755083C05FEB12CB29DC55B92BFE8AF06214F0984EBD984CB663D274D949CB61
      APIs
      • RegQueryValueExW.KERNELBASE(?,00000E24,E21542A3,00000000,00000000,00000000,00000000), ref: 0142A40C
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: QueryValue
      • String ID:
      • API String ID: 3660427363-0
      • Opcode ID: cd62e01224f2ad3e4fbd928fd7375f4b1c1e7436574206f9552750c0f9496b89
      • Instruction ID: 6bdd355c502f406ecae7026d792759ac5fe5bd98b6e5750b71edf28ee6050256
      • Opcode Fuzzy Hash: cd62e01224f2ad3e4fbd928fd7375f4b1c1e7436574206f9552750c0f9496b89
      • Instruction Fuzzy Hash: 7F21AE755046109FEB20CE15DC84F63F7ECEF04610F18846AEE45CB661D3B0E949CA71
      APIs
      • WriteFile.KERNELBASE(?,00000E24,E21542A3,00000000,00000000,00000000,00000000), ref: 0142AA71
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: FileWrite
      • String ID:
      • API String ID: 3934441357-0
      • Opcode ID: 823cc4b150391f16a69b629f23561ad0d8061bfc826991d944450b9c6635ec98
      • Instruction ID: 0034c4fad0e0a083502f7b7e945204851099fca01135d0032c03ca27501bdaf0
      • Opcode Fuzzy Hash: 823cc4b150391f16a69b629f23561ad0d8061bfc826991d944450b9c6635ec98
      • Instruction Fuzzy Hash: F0110176404300AFEB21CF15DD40F66FBE8EF04324F18845AEE458B655C3B4A548CBB2
      APIs
      • SetFilePointer.KERNELBASE(?,00000E24,E21542A3,00000000,00000000,00000000,00000000), ref: 0142A98E
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: FilePointer
      • String ID:
      • API String ID: 973152223-0
      • Opcode ID: 76884a46a2447a313e1349bb11ad7006b4a2746f35f92841188a9ce915697f5c
      • Instruction ID: c8a9804c0d52e1f4fcde585b0d3c60051dc761f4f9f3aaeb1f60803ba36495ee
      • Opcode Fuzzy Hash: 76884a46a2447a313e1349bb11ad7006b4a2746f35f92841188a9ce915697f5c
      • Instruction Fuzzy Hash: 1E112376504200AFEB21CF55DC80B66FBE8EF04320F19C85BEE488B655C3B0A448CBB2
      APIs
      • SetErrorMode.KERNELBASE(?), ref: 0142A30C
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: ErrorMode
      • String ID:
      • API String ID: 2340568224-0
      • Opcode ID: 84b43007cbf68d8165a1db102691dbbea4f086e8c82e0da901596abd888b79c6
      • Instruction ID: 6db6d55beb320a71c8e1e72e25d78ff883495725a2864bf5265d24188d934443
      • Opcode Fuzzy Hash: 84b43007cbf68d8165a1db102691dbbea4f086e8c82e0da901596abd888b79c6
      • Instruction Fuzzy Hash: F21191754093C09FDB228B25DC54B52BFB4DF07220F0980DBDD848F663D275A949CB62
      APIs
      • GetLongPathNameW.KERNELBASE(?,?,?), ref: 0142A636
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: LongNamePath
      • String ID:
      • API String ID: 82841172-0
      • Opcode ID: 2f7595a6204c30f1ba6fb94f94f3c3edaeaf4621227dc7b229bd9964637eaecf
      • Instruction ID: 860e2fa80c763ad4f5149d4f7a8ec2e4ce312f3b24873ab234abd7be070a5024
      • Opcode Fuzzy Hash: 2f7595a6204c30f1ba6fb94f94f3c3edaeaf4621227dc7b229bd9964637eaecf
      • Instruction Fuzzy Hash: 99116D714093849FDB21CF55DC89B52FFA4EF46220F0984AAED888B262D375A408CB61
      APIs
      • GetSystemInfo.KERNELBASE(?), ref: 0142B2B8
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: InfoSystem
      • String ID:
      • API String ID: 31276548-0
      • Opcode ID: 30c647165c6031a2f090dc5f3101b2a3ab3d310da0b985d088c229a6a18227e8
      • Instruction ID: aea90444c4511622456752547c1cff30287c7d34f24c6c85a6b7543d6ed4e9b9
      • Opcode Fuzzy Hash: 30c647165c6031a2f090dc5f3101b2a3ab3d310da0b985d088c229a6a18227e8
      • Instruction Fuzzy Hash: 561170754093809FDB12CF15DC99B56BFB4DF46220F0984EBED848F253D275A948CB62
      APIs
      • GetFileType.KERNELBASE(?,00000E24,E21542A3,00000000,00000000,00000000,00000000), ref: 0142A8C5
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: FileType
      • String ID:
      • API String ID: 3081899298-0
      • Opcode ID: a526bf010b0ee2a11bfbb2dfff749a8373eca149b696176e7c7e259bc7c09acd
      • Instruction ID: 727e1868ab8e817c190b661f274e47dd700af7126a00de14dcc352f4ccfba864
      • Opcode Fuzzy Hash: a526bf010b0ee2a11bfbb2dfff749a8373eca149b696176e7c7e259bc7c09acd
      • Instruction Fuzzy Hash: B1010075508250AEE7208B05DC84B66F7A8DF04324F18809AEE048B656D3F4A9898AA2
      APIs
      • CreateDirectoryW.KERNELBASE(?,?), ref: 0142AB3B
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: CreateDirectory
      • String ID:
      • API String ID: 4241100979-0
      • Opcode ID: d407a93d3cecaf9209fd125e0f7d96e966a3f60e5d1d5f7d7006f8b122c67b68
      • Instruction ID: 05dbd20436e90637bdfc2f4ac069a2e9cf4c4d9aa0bd9fef712fe5389ccbb40e
      • Opcode Fuzzy Hash: d407a93d3cecaf9209fd125e0f7d96e966a3f60e5d1d5f7d7006f8b122c67b68
      • Instruction Fuzzy Hash: F311A5716042408FEB10CF19D884756FFD8EF04210F18C8ABDE05CB756E674D484CB61
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: CloseFind
      • String ID:
      • API String ID: 1863332320-0
      • Opcode ID: be0df99f4e24e55b8ea618c27e6092dd5aaa051148ce0990b4809c0ff6719f81
      • Instruction ID: ab0157b785b2cc8cceaf9754cf480c0126cd9c636e5ef7facd772a962b55701c
      • Opcode Fuzzy Hash: be0df99f4e24e55b8ea618c27e6092dd5aaa051148ce0990b4809c0ff6719f81
      • Instruction Fuzzy Hash: 22119E755093809FDB128B29DC85B52BFF4EF06220F0984DBED858B263D278A848CB61
      APIs
      • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 0142A1C2
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: FileFindNext
      • String ID:
      • API String ID: 2029273394-0
      • Opcode ID: 9781d3df73417f562dc1fc6019db1a7204420b60311ddd3542e1a8f1380ca261
      • Instruction ID: 02d3d966e1dd926c62bd4af89056765eebbdca4c2bf11d35eea5bc45093dcfaf
      • Opcode Fuzzy Hash: 9781d3df73417f562dc1fc6019db1a7204420b60311ddd3542e1a8f1380ca261
      • Instruction Fuzzy Hash: 0001D471940600AFD310DF16DC46B26FBE8FB88A20F14816AED089B741D771F915CBE1
      APIs
      • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 0142ACE6
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: CreatePipe
      • String ID:
      • API String ID: 2719314638-0
      • Opcode ID: a501ffc9afe19d523adf9d6b375c540095d2ca89c8c7af53605f6283d2a9942f
      • Instruction ID: 8d492720d8a15be5098832c67d37e2b17b5fbc9994269df23b1125123d20fa1a
      • Opcode Fuzzy Hash: a501ffc9afe19d523adf9d6b375c540095d2ca89c8c7af53605f6283d2a9942f
      • Instruction Fuzzy Hash: 7B01B171940600ABD350DF16DC46B26FBE8FB88A20F14816AED089B641D771F915CBE1
      APIs
      • GetLongPathNameW.KERNELBASE(?,?,?), ref: 0142A636
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: LongNamePath
      • String ID:
      • API String ID: 82841172-0
      • Opcode ID: 5b0dd87976fe8f77be14c941935657586d0d5fc5c2c8a4850514f78250092c4a
      • Instruction ID: c9ddfada21c3dcaceff1d052f1e83c63c75d1ab89437bfedf85c03f5d616b42d
      • Opcode Fuzzy Hash: 5b0dd87976fe8f77be14c941935657586d0d5fc5c2c8a4850514f78250092c4a
      • Instruction Fuzzy Hash: 2501A7758042409FDB20CF55D885B56FBE4EF44720F18C4ABDD898F656D375A448CF62
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: CloseFind
      • String ID:
      • API String ID: 1863332320-0
      • Opcode ID: 6069f31114fa5f30b55cedd84867b5ea389c9484b4f87c611c4f88e6cb87de9d
      • Instruction ID: d48dce31758b63cea04f57e62ee4028f08b86350e264eb32a88a34af614e9d7e
      • Opcode Fuzzy Hash: 6069f31114fa5f30b55cedd84867b5ea389c9484b4f87c611c4f88e6cb87de9d
      • Instruction Fuzzy Hash: D201F9755042408FDB118F19D885762FBD4DF04220F08C09BDD058B766D3B9E584CEA1
      APIs
      • SetErrorMode.KERNELBASE(?), ref: 0142A30C
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: ErrorMode
      • String ID:
      • API String ID: 2340568224-0
      • Opcode ID: 191ab62811f6d466697f73d6f218dfee47cda6fa1fb3d5df8aa9897f5942ab26
      • Instruction ID: 8700e2379fee6b080277aad81aa7d8350ddd8c899df29e33b13426b14f7fd41e
      • Opcode Fuzzy Hash: 191ab62811f6d466697f73d6f218dfee47cda6fa1fb3d5df8aa9897f5942ab26
      • Instruction Fuzzy Hash: 4AF0A4354042908FDB108F0AE885762FBE0DF04625F58C09BDD054B766D3F5A584CAA2
      APIs
      • CloseHandle.KERNELBASE(?), ref: 0142A7F8
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: CloseHandle
      • String ID:
      • API String ID: 2962429428-0
      • Opcode ID: 007bcaa531a1805de2669ca1ae7318d577b0f1cf6433127c2174d0fa97d088fc
      • Instruction ID: 33e9341f736a82f4c3a74e402e68d0cf8da2e4c2656f9a38e024dada3adbc708
      • Opcode Fuzzy Hash: 007bcaa531a1805de2669ca1ae7318d577b0f1cf6433127c2174d0fa97d088fc
      • Instruction Fuzzy Hash: 3721B0755093C05FDB138B25DC95652BFA8AF07220F0980DBDC858B6A3D2649909C762
      APIs
      • CloseHandle.KERNELBASE(?), ref: 0142A7F8
      Memory Dump Source
      • Source File: 00000000.00000002.3704353238.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_142a000_unarchiver.jbxd
      Similarity
      • API ID: CloseHandle
      • String ID:
      • API String ID: 2962429428-0
      • Opcode ID: 1a39b7c6977bf92c2c1d372b612a417180445a151c74e624d2283eab1074d1df
      • Instruction ID: 7af7aeb45aec7fb2de1d11bccd9470998e0720da385f0731acec19e5370bf09a
      • Opcode Fuzzy Hash: 1a39b7c6977bf92c2c1d372b612a417180445a151c74e624d2283eab1074d1df
      • Instruction Fuzzy Hash: 83018F759042908FEB108F19E885766FBE4EF04220F58C4ABDD098B656D2B5E589CAA2
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 07e950e5a8f6a0834ff0680b2a1454cd682b2aa2a28fe6b499e5bc7449e3d6cf
      • Instruction ID: 4c37d9b88455a84c485ced4cdb1f1931ff93c851d6e83dc64e8be72febd8b7a9
      • Opcode Fuzzy Hash: 07e950e5a8f6a0834ff0680b2a1454cd682b2aa2a28fe6b499e5bc7449e3d6cf
      • Instruction Fuzzy Hash: A6B13D78701110CFD718DFA7E968A5E7BBAFF88250B508169E9069F3D8DB389C85CB50
      Memory Dump Source
      • Source File: 00000000.00000002.3704725580.00000000014A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_14a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fe3427a69e9741bfd1924c3f03f7910697b5cefa3730ee8ebeed695f12157ead
      • Instruction ID: 330af70c826f5bcb784a75e53c6e0425b234f9dc40d1014aafd33741a77e7a7a
      • Opcode Fuzzy Hash: fe3427a69e9741bfd1924c3f03f7910697b5cefa3730ee8ebeed695f12157ead
      • Instruction Fuzzy Hash: 4D11B7B284D2046FD300DF15EC41CA7BBE8DF95525F09C47FED498B201E276A9188BE2
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3d45b3218572d54856072f09f21aacb6300c64507a5576d0d919ce58d2fa6533
      • Instruction ID: 8c3882818de1748662593df73c90e8ba8695babe74c90b5015cafa1e463d484c
      • Opcode Fuzzy Hash: 3d45b3218572d54856072f09f21aacb6300c64507a5576d0d919ce58d2fa6533
      • Instruction Fuzzy Hash: B911D635A101185FCB148BF5D9589DE7BF6FF88214B044579E505D7370DF319D1A8790
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1bea04b3e3bd63ec932b0772713cbb69839812f64e9603c600d14a547dc62df4
      • Instruction ID: 6bcc348ea1c00f7a32d3bc52ed26b881f9b3fbfc94272c0b204906ded045d978
      • Opcode Fuzzy Hash: 1bea04b3e3bd63ec932b0772713cbb69839812f64e9603c600d14a547dc62df4
      • Instruction Fuzzy Hash: 43119135A10118AFCB049BF5D95C9DE7BFAFF88214B054475E605EB760EF31AD0A8790
      Memory Dump Source
      • Source File: 00000000.00000002.3704725580.00000000014A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_14a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7bdd585820bdd7ffe2d59a2159d9b8ab9ad0a415095f95c1054a6082cf7d2078
      • Instruction ID: 5a07b7420056891d42c89209fcc460db10bfcf32f4dc6f1e2282f157695fd04a
      • Opcode Fuzzy Hash: 7bdd585820bdd7ffe2d59a2159d9b8ab9ad0a415095f95c1054a6082cf7d2078
      • Instruction Fuzzy Hash: BD01FE7150D3C05FC7128B16DC44862BFA8DF5712074984DFE885CB653D1696909C762
      Memory Dump Source
      • Source File: 00000000.00000002.3704725580.00000000014A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_14a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 472c03c7a0eb9ef26c6a3f1fb2f01648e9f3235c0b316b16a0063b734eb7b01c
      • Instruction ID: 7ed83d4c83f62980d2258d941bee5ae21d61383eaef72d41cc19fc22037adbb0
      • Opcode Fuzzy Hash: 472c03c7a0eb9ef26c6a3f1fb2f01648e9f3235c0b316b16a0063b734eb7b01c
      • Instruction Fuzzy Hash: 48F082B28492046F9240DF05ED85856F7ECDF84521F04C57EED088B700E276AA154AE2
      Memory Dump Source
      • Source File: 00000000.00000002.3704725580.00000000014A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_14a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b9a2f8dceb07b878bd2a7dc7f9df57016b79bcdab60de88c239457d2b000e99d
      • Instruction ID: 1e17f992dd189be1e161d513aecb951371f7edc41a466bdd37057dafaf5c1482
      • Opcode Fuzzy Hash: b9a2f8dceb07b878bd2a7dc7f9df57016b79bcdab60de88c239457d2b000e99d
      • Instruction Fuzzy Hash: 8BE092B6A456004B9650CF0BFC41452F7D8EB88630718C07FDC0D8B701E675B504CAA5
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 94fbded5da317e0f6296949fd6e431d1bcb7173729694c0adfe72914f12237a5
      • Instruction ID: 1642742517fc7ca36036e93b8e71cf4dc9ba169a3e4532d797f22e458428e7e0
      • Opcode Fuzzy Hash: 94fbded5da317e0f6296949fd6e431d1bcb7173729694c0adfe72914f12237a5
      • Instruction Fuzzy Hash: 52E0DF31F152241FCB44DFFA98481DEBFF5EB95260B5885BAC408EB751EB3488068780
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 4c40b00e9bb59a19cdf97699263850c70f55b2e9688830e4d0e95ab070bb6c60
      • Instruction ID: 373bcac830d1760d2077867cc772fc769c6f3e99cfa13ac08b399719776ed1fa
      • Opcode Fuzzy Hash: 4c40b00e9bb59a19cdf97699263850c70f55b2e9688830e4d0e95ab070bb6c60
      • Instruction Fuzzy Hash: 01D01231F052281B8B54EBFA59485DF7AEA9B84164B588479910DE7740EE3198058780
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5311feffb7647fc37ebc30c0a46b2335bbc7b5abf95c2be0afd0b5438f573fa4
      • Instruction ID: 62e49f7c6d9f5fddc6206aaa7ea6428e8c5599da384ee154b762bef6664abef0
      • Opcode Fuzzy Hash: 5311feffb7647fc37ebc30c0a46b2335bbc7b5abf95c2be0afd0b5438f573fa4
      • Instruction Fuzzy Hash: 7AE0C2352903108FC7059768E5595D83BA0EF92220B85C1A6D8448F2A2CB3CCC4BCB00
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6218453dc6f55a78ab4bd7f709000fd5cf30c7bed99df1cffed470f0ff4e1b43
      • Instruction ID: fd13de1e3cda414ec8a94da2c671cec8bdbc09ec8f4b0c56d204273c26656509
      • Opcode Fuzzy Hash: 6218453dc6f55a78ab4bd7f709000fd5cf30c7bed99df1cffed470f0ff4e1b43
      • Instruction Fuzzy Hash: 44E0CD301C03044FC7058B74D5645DD3BA1FB91214F4582A5C8458F1A1C73C9C45DB40
      Memory Dump Source
      • Source File: 00000000.00000002.3704310347.0000000001422000.00000040.00000800.00020000.00000000.sdmp, Offset: 01422000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1422000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ffae9d62bc2f8e3db89cbed97a147e5f00411e2a7b982d724f960ca184fd132f
      • Instruction ID: 6a10a45c5a251eb7de044ba72cd8958aa595f5152ab19dab4110c4e15802d4b1
      • Opcode Fuzzy Hash: ffae9d62bc2f8e3db89cbed97a147e5f00411e2a7b982d724f960ca184fd132f
      • Instruction Fuzzy Hash: 1ED05E79205AE14FE316DA1CC1A4F963BE8AB51714F8A44FAEC008B777C7A8D5C1D610
      Memory Dump Source
      • Source File: 00000000.00000002.3704310347.0000000001422000.00000040.00000800.00020000.00000000.sdmp, Offset: 01422000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1422000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5e7905fca156cdb50d7baa8438d6ac3112182f3e82d6de16e888c456863873c8
      • Instruction ID: ed9a775c78c3aaf4beb515d09d3e9e259d35e4840185e7a990eddb8438b58f0e
      • Opcode Fuzzy Hash: 5e7905fca156cdb50d7baa8438d6ac3112182f3e82d6de16e888c456863873c8
      • Instruction Fuzzy Hash: A6D05E342002814BD719DA1CC2D4F5A37D4AF40714F0644E9AC10CB376C7F4D9C0CA00
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: aac99fa32bc22ce69b4cd8d0b5b9f2b19c2de36087fdac6bdd3b32f76ed9ffd4
      • Instruction ID: 8c2047bc7022c9623818d1706eb6d09e911f8c1f415e8b6a18ac135d55e439d8
      • Opcode Fuzzy Hash: aac99fa32bc22ce69b4cd8d0b5b9f2b19c2de36087fdac6bdd3b32f76ed9ffd4
      • Instruction Fuzzy Hash: 98C012342502088FC70497A9E61CA2D779967D5204FC4C06555080F391CB74EC40C740
      Memory Dump Source
      • Source File: 00000000.00000002.3704821347.00000000015A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015A0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_15a0000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 63ee7e15e2be29eea741aa9ca0147dbb0822761432f4a0417f80a80098890dca
      • Instruction ID: d2559ca8fecb2aa20e86e937dd8115c24687ee90226d4dbf4e53a72d5fd03a3d
      • Opcode Fuzzy Hash: 63ee7e15e2be29eea741aa9ca0147dbb0822761432f4a0417f80a80098890dca
      • Instruction Fuzzy Hash: 32C012302902088FD7049BA9E51CA2E779A67D0204F85C06495090F391CB74EC80D680