Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
systemms.exe

Overview

General Information

Sample name:systemms.exe
Analysis ID:1542815
MD5:b9a90c673713f61195b6e695d5f57ba4
SHA1:17831341f6b113bb3da1ffe536c1861c96839180
SHA256:1b55754dc53235978759ae3474e144a3e3ebd0b43d5cd1a722372408bf982b51
Tags:exeuser-karneth
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • systemms.exe (PID: 6180 cmdline: "C:\Users\user\Desktop\systemms.exe" MD5: B9A90C673713F61195B6E695D5F57BA4)
    • schtasks.exe (PID: 6548 cmdline: "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 5480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • systemms.exe (PID: 3612 cmdline: "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" MD5: B9A90C673713F61195B6E695D5F57BA4)
      • schtasks.exe (PID: 3668 cmdline: "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • systemms.exe (PID: 6160 cmdline: C:\Users\user\AppData\Roaming\Systemms\systemms.exe MD5: B9A90C673713F61195B6E695D5F57BA4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "192.168.18.54:8000;", "SubDirectory": "Systemms", "InstallName": "systemms.exe", "MutexName": "00b3e629-d348-4f5c-a497-f354aac050f8", "StartupKey": "Systemmso", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
systemms.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    systemms.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      systemms.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28ef85:$x1: Quasar.Common.Messages
      • 0x29f2e9:$x1: Quasar.Common.Messages
      • 0x2ab802:$x4: Uninstalling... good bye :-(
      • 0x2acff7:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      systemms.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aadb4:$f1: FileZilla\recentservers.xml
      • 0x2aadf4:$f2: FileZilla\sitemanager.xml
      • 0x2aae36:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab082:$b1: Chrome\User Data\
      • 0x2ab0d8:$b1: Chrome\User Data\
      • 0x2ab3b0:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4ac:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd408:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab604:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6be:$b5: YandexBrowser\User Data\
      • 0x2ab72c:$b5: YandexBrowser\User Data\
      • 0x2ab400:$s4: logins.json
      • 0x2ab136:$a1: username_value
      • 0x2ab154:$a2: password_value
      • 0x2ab440:$a3: encryptedUsername
      • 0x2fd34c:$a3: encryptedUsername
      • 0x2ab464:$a4: encryptedPassword
      • 0x2fd36a:$a4: encryptedPassword
      • 0x2fd2e8:$a5: httpRealm
      systemms.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab8ec:$s3: Process already elevated.
      • 0x28ec84:$s4: get_PotentiallyVulnerablePasswords
      • 0x278d40:$s5: GetKeyloggerLogsDirectory
      • 0x29ea48:$s5: GetKeyloggerLogsDirectory
      • 0x28eca7:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea36:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\Systemms\systemms.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Users\user\AppData\Roaming\Systemms\systemms.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\Systemms\systemms.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28ef85:$x1: Quasar.Common.Messages
          • 0x29f2e9:$x1: Quasar.Common.Messages
          • 0x2ab802:$x4: Uninstalling... good bye :-(
          • 0x2acff7:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Users\user\AppData\Roaming\Systemms\systemms.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2aadb4:$f1: FileZilla\recentservers.xml
          • 0x2aadf4:$f2: FileZilla\sitemanager.xml
          • 0x2aae36:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2ab082:$b1: Chrome\User Data\
          • 0x2ab0d8:$b1: Chrome\User Data\
          • 0x2ab3b0:$b2: Mozilla\Firefox\Profiles
          • 0x2ab4ac:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fd408:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2ab604:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ab6be:$b5: YandexBrowser\User Data\
          • 0x2ab72c:$b5: YandexBrowser\User Data\
          • 0x2ab400:$s4: logins.json
          • 0x2ab136:$a1: username_value
          • 0x2ab154:$a2: password_value
          • 0x2ab440:$a3: encryptedUsername
          • 0x2fd34c:$a3: encryptedUsername
          • 0x2ab464:$a4: encryptedPassword
          • 0x2fd36a:$a4: encryptedPassword
          • 0x2fd2e8:$a5: httpRealm
          C:\Users\user\AppData\Roaming\Systemms\systemms.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ab8ec:$s3: Process already elevated.
          • 0x28ec84:$s4: get_PotentiallyVulnerablePasswords
          • 0x278d40:$s5: GetKeyloggerLogsDirectory
          • 0x29ea48:$s5: GetKeyloggerLogsDirectory
          • 0x28eca7:$s6: set_PotentiallyVulnerablePasswords
          • 0x2fea36:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          00000003.00000002.4137316139.0000000002929000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000000.00000000.1674697555.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              Process Memory Space: systemms.exe PID: 6180JoeSecurity_QuasarYara detected Quasar RATJoe Security
                Process Memory Space: systemms.exe PID: 3612JoeSecurity_QuasarYara detected Quasar RATJoe Security
                  SourceRuleDescriptionAuthorStrings
                  0.0.systemms.exe.ee0000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                    0.0.systemms.exe.ee0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      0.0.systemms.exe.ee0000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                      • 0x28ef85:$x1: Quasar.Common.Messages
                      • 0x29f2e9:$x1: Quasar.Common.Messages
                      • 0x2ab802:$x4: Uninstalling... good bye :-(
                      • 0x2acff7:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                      0.0.systemms.exe.ee0000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                      • 0x2aadb4:$f1: FileZilla\recentservers.xml
                      • 0x2aadf4:$f2: FileZilla\sitemanager.xml
                      • 0x2aae36:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                      • 0x2ab082:$b1: Chrome\User Data\
                      • 0x2ab0d8:$b1: Chrome\User Data\
                      • 0x2ab3b0:$b2: Mozilla\Firefox\Profiles
                      • 0x2ab4ac:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                      • 0x2fd408:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                      • 0x2ab604:$b4: Opera Software\Opera Stable\Login Data
                      • 0x2ab6be:$b5: YandexBrowser\User Data\
                      • 0x2ab72c:$b5: YandexBrowser\User Data\
                      • 0x2ab400:$s4: logins.json
                      • 0x2ab136:$a1: username_value
                      • 0x2ab154:$a2: password_value
                      • 0x2ab440:$a3: encryptedUsername
                      • 0x2fd34c:$a3: encryptedUsername
                      • 0x2ab464:$a4: encryptedPassword
                      • 0x2fd36a:$a4: encryptedPassword
                      • 0x2fd2e8:$a5: httpRealm
                      0.0.systemms.exe.ee0000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                      • 0x2ab8ec:$s3: Process already elevated.
                      • 0x28ec84:$s4: get_PotentiallyVulnerablePasswords
                      • 0x278d40:$s5: GetKeyloggerLogsDirectory
                      • 0x29ea48:$s5: GetKeyloggerLogsDirectory
                      • 0x28eca7:$s6: set_PotentiallyVulnerablePasswords
                      • 0x2fea36:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Systemms\systemms.exe", ParentImage: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, ParentProcessId: 3612, ParentProcessName: systemms.exe, ProcessCommandLine: "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f, ProcessId: 3668, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\systemms.exe", ParentImage: C:\Users\user\Desktop\systemms.exe, ParentProcessId: 6180, ParentProcessName: systemms.exe, ProcessCommandLine: "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f, ProcessId: 6548, ProcessName: schtasks.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: systemms.exeAvira: detected
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeAvira: detection malicious, Label: HEUR/AGEN.1305769
                      Source: systemms.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "192.168.18.54:8000;", "SubDirectory": "Systemms", "InstallName": "systemms.exe", "MutexName": "00b3e629-d348-4f5c-a497-f354aac050f8", "StartupKey": "Systemmso", "LogDirectoryName": "Logs", "ServerSignature": "lydGi97hjDEjhULrVgVS5PErE4hDdgcrGn/U6DKJsKi2zm9/n5YkYMgCeTt5WRY8NpyQ3FQPxj6+R6sDetd4DHguGmNCg9hKhhC0JVqKGkCvv1Mw5AAtT0fvJRGVIW+NzcicQ8ExEnvtDALqzV0ik/NDDriud2+lRSfrq+Ygx9xxxVmIuHtAY81FmipQJuQ9frb9F7e9oWRm4YN2Pzt6XlPhxSU+LGGuIzCzj4zzrDwYWyD884K7WOLanCwW5cx6RiiFyy2QVU8Z5VOLm9w3fmnfFt5xvCf10C81PXS/JT3Rp8yYGfR5O4lpi8wAeeF0XgnsdNgegqijzuqFHFroCWCEbbahoLv9uwQ38EAF2D8mXMIGWS63Tntt3VEIbJmY7Y8tFnTsSSWH9/AlFB+wuW6bemwSp1MYHXtr/ovwbyMVfXd1d9oO+U8Su4nPQ4qHcFL9CxIfPf7c7vnj7Lg5xstFwd9hPAUsHuhytccwSGgfgkUooboWMrDeavmDh7fFJtHryj1hzrOjhhiOQKxVl8DcB5FZ556lWzHSSdglqfhvLOe9uije38//eWrw7yWtrJR+0IEzGIJC0BDeEg1CKLbvlS9Zz9AIUdEAPX1oyJ9hq2IIIpYUWI6oq+0M0emzI4sS1NL/yA4iWSsgT1yAQAioFDdvntHe2rtmQOcZcGo=", "ServerCertificate": "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"}
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeReversingLabs: Detection: 68%
                      Source: systemms.exeReversingLabs: Detection: 68%
                      Source: Yara matchFile source: systemms.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.4137316139.0000000002929000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1674697555.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: systemms.exe PID: 6180, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: systemms.exe PID: 3612, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeJoe Sandbox ML: detected
                      Source: systemms.exeJoe Sandbox ML: detected
                      Source: systemms.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: systemms.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 192.168.18.54
                      Source: Yara matchFile source: systemms.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPED
                      Source: systemms.exe, 00000000.00000002.1698107509.0000000003571000.00000004.00000800.00020000.00000000.sdmp, systemms.exe, 00000003.00000002.4137316139.0000000002929000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: systemms.exe, systemms.exe.0.drString found in binary or memory: https://api.ipify.org/
                      Source: systemms.exe, systemms.exe.0.drString found in binary or memory: https://ipwho.is/
                      Source: systemms.exe, systemms.exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: systemms.exe, systemms.exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: systemms.exe, systemms.exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\Systemms\systemms.exeJump to behavior

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: systemms.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.4137316139.0000000002929000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1674697555.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: systemms.exe PID: 6180, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: systemms.exe PID: 3612, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPED

                      System Summary

                      barindex
                      Source: systemms.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: systemms.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: systemms.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB1AAAD3_2_00007FFD9BB1AAAD
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB19AC43_2_00007FFD9BB19AC4
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB162433_2_00007FFD9BB16243
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB161873_2_00007FFD9BB16187
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB18D413_2_00007FFD9BB18D41
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB154B63_2_00007FFD9BB154B6
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB111FA3_2_00007FFD9BB111FA
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB10DD13_2_00007FFD9BB10DD1
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB110F23_2_00007FFD9BB110F2
                      Source: systemms.exe, 00000000.00000000.1675052364.0000000001210000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSystemmso4 vs systemms.exe
                      Source: systemms.exeBinary or memory string: OriginalFilenameSystemmso4 vs systemms.exe
                      Source: systemms.exe.0.drBinary or memory string: OriginalFilenameSystemmso4 vs systemms.exe
                      Source: systemms.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: systemms.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: systemms.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: systemms.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/2@0/1
                      Source: C:\Users\user\Desktop\systemms.exeFile created: C:\Users\user\AppData\Roaming\SystemmsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeMutant created: \Sessions\1\BaseNamedObjects\Local\00b3e629-d348-4f5c-a497-f354aac050f8
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:980:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5480:120:WilError_03
                      Source: systemms.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: systemms.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\systemms.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: systemms.exeReversingLabs: Detection: 68%
                      Source: systemms.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                      Source: C:\Users\user\Desktop\systemms.exeFile read: C:\Users\user\Desktop\systemms.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\systemms.exe "C:\Users\user\Desktop\systemms.exe"
                      Source: C:\Users\user\Desktop\systemms.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\systemms.exeProcess created: C:\Users\user\AppData\Roaming\Systemms\systemms.exe "C:\Users\user\AppData\Roaming\Systemms\systemms.exe"
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Systemms\systemms.exe C:\Users\user\AppData\Roaming\Systemms\systemms.exe
                      Source: C:\Users\user\Desktop\systemms.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess created: C:\Users\user\AppData\Roaming\Systemms\systemms.exe "C:\Users\user\AppData\Roaming\Systemms\systemms.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeSection loaded: msasn1.dllJump to behavior
                      Source: systemms.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: systemms.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: systemms.exeStatic file information: File size 3333120 > 1048576
                      Source: systemms.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c400
                      Source: systemms.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9B8AD9F2 push eax; iretd 3_2_00007FFD9B8ADA11
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9B8A752B push ebx; iretd 3_2_00007FFD9B8A756A
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB154B6 push ecx; retf 3_2_00007FFD9BB159DC
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB12F90 push eax; ret 3_2_00007FFD9BB12FFC
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeCode function: 3_2_00007FFD9BB15948 push ecx; retf 3_2_00007FFD9BB159DC
                      Source: C:\Users\user\Desktop\systemms.exeFile created: C:\Users\user\AppData\Roaming\Systemms\systemms.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\systemms.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Users\user\Desktop\systemms.exeFile opened: C:\Users\user\Desktop\systemms.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeFile opened: C:\Users\user\AppData\Roaming\Systemms\systemms.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeFile opened: C:\Users\user\AppData\Roaming\Systemms\systemms.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeMemory allocated: 1850000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeMemory allocated: 1B570000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeMemory allocated: EA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeMemory allocated: 1A8F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeMemory allocated: 11B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeMemory allocated: 1AD10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeWindow / User API: threadDelayed 2743Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeWindow / User API: threadDelayed 7092Jump to behavior
                      Source: C:\Users\user\Desktop\systemms.exe TID: 6456Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe TID: 6856Thread sleep time: -25825441703193356s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe TID: 6932Thread sleep count: 2743 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe TID: 6932Thread sleep count: 7092 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe TID: 5820Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\systemms.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: systemms.exe, 00000003.00000002.4144827859.000000001B450000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\systemms.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeProcess created: C:\Users\user\AppData\Roaming\Systemms\systemms.exe "C:\Users\user\AppData\Roaming\Systemms\systemms.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /fJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeQueries volume information: C:\Users\user\Desktop\systemms.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeQueries volume information: C:\Users\user\AppData\Roaming\Systemms\systemms.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exeQueries volume information: C:\Users\user\AppData\Roaming\Systemms\systemms.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\systemms.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: systemms.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.4137316139.0000000002929000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1674697555.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: systemms.exe PID: 6180, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: systemms.exe PID: 3612, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: systemms.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.systemms.exe.ee0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.4137316139.0000000002929000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1674697555.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: systemms.exe PID: 6180, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: systemms.exe PID: 3612, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      11
                      Process Injection
                      1
                      Masquerading
                      11
                      Input Capture
                      11
                      Security Software Discovery
                      Remote Services11
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      1
                      Disable or Modify Tools
                      LSASS Memory31
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      31
                      Virtualization/Sandbox Evasion
                      Security Account Manager1
                      Application Window Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS12
                      System Information Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Obfuscated Files or Information
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1542815 Sample: systemms.exe Startdate: 26/10/2024 Architecture: WINDOWS Score: 100 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 6 other signatures 2->38 8 systemms.exe 5 2->8         started        12 systemms.exe 2 2->12         started        process3 file4 26 C:\Users\user\AppData\...\systemms.exe, PE32 8->26 dropped 28 C:\Users\user\AppData\...\systemms.exe.log, CSV 8->28 dropped 40 Uses schtasks.exe or at.exe to add and modify task schedules 8->40 42 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->42 14 systemms.exe 2 8->14         started        18 schtasks.exe 1 8->18         started        signatures5 process6 dnsIp7 30 192.168.18.54, 49730, 49731, 49738 unknown unknown 14->30 44 Antivirus detection for dropped file 14->44 46 Multi AV Scanner detection for dropped file 14->46 48 Machine Learning detection for dropped file 14->48 50 2 other signatures 14->50 20 schtasks.exe 1 14->20         started        22 conhost.exe 18->22         started        signatures8 process9 process10 24 conhost.exe 20->24         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      systemms.exe68%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                      systemms.exe100%AviraHEUR/AGEN.1305769
                      systemms.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\Systemms\systemms.exe100%AviraHEUR/AGEN.1305769
                      C:\Users\user\AppData\Roaming\Systemms\systemms.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\Systemms\systemms.exe68%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://api.ipify.org/0%URL Reputationsafe
                      https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      192.168.18.54true
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/systemms.exe, systemms.exe.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://stackoverflow.com/q/14436606/23354systemms.exe, systemms.exe.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://stackoverflow.com/q/2152978/23354sCannotsystemms.exe, systemms.exe.0.drfalse
                          unknown
                          https://ipwho.is/systemms.exe, systemms.exe.0.drfalse
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesystemms.exe, 00000000.00000002.1698107509.0000000003571000.00000004.00000800.00020000.00000000.sdmp, systemms.exe, 00000003.00000002.4137316139.0000000002929000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://stackoverflow.com/q/11564914/23354;systemms.exe, systemms.exe.0.drfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            IP
                            192.168.18.54
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1542815
                            Start date and time:2024-10-26 14:02:06 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 7m 52s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:12
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:systemms.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@10/2@0/1
                            EGA Information:
                            • Successful, ratio: 66.7%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 29
                            • Number of non-executed functions: 3
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target systemms.exe, PID 6160 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • VT rate limit hit for: systemms.exe
                            TimeTypeDescription
                            08:03:01API Interceptor15700331x Sleep call for process: systemms.exe modified
                            13:03:00Task SchedulerRun new task: Systemmso path: C:\Users\user\AppData\Roaming\Systemms\systemms.exe
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\systemms.exe
                            File Type:CSV text
                            Category:dropped
                            Size (bytes):1281
                            Entropy (8bit):5.370111951859942
                            Encrypted:false
                            SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                            MD5:12C61586CD59AA6F2A21DF30501F71BD
                            SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                            SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                            SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                            Malicious:true
                            Reputation:high, very likely benign file
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                            Process:C:\Users\user\Desktop\systemms.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):3333120
                            Entropy (8bit):6.0967781653239665
                            Encrypted:false
                            SSDEEP:49152:0vht62XlaSFNWPjljiFa2RoUYIZKt86oGdSTHHB72eh2NT:0vL62XlaSFNWPjljiFXRoUYIZKtJ
                            MD5:B9A90C673713F61195B6E695D5F57BA4
                            SHA1:17831341F6B113BB3DA1FFE536C1861C96839180
                            SHA-256:1B55754DC53235978759AE3474E144A3E3EBD0B43D5CD1A722372408BF982B51
                            SHA-512:9A4A6EEA5604F08B71367EBFB59CEB05CC518D545F869360082817DE9B86625975E81751A25ADBA2E4B7FAF2DA95D0F98BC79E95180060A66E9677257C3CA78C
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, Author: Joe Security
                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, Author: Joe Security
                            • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, Author: Florian Roth
                            • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, Author: ditekSHen
                            • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, Author: ditekshen
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 68%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@3...........@.................................p.1.K.....2.`.................... 3...................................................... ............... ..H............text.....1.. ....1................. ..`.rsrc...`.....2.......1.............@..@.reloc....... 3.......2.............@..B..................1.....H...........`............k..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~w...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):6.0967781653239665
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:systemms.exe
                            File size:3'333'120 bytes
                            MD5:b9a90c673713f61195b6e695d5f57ba4
                            SHA1:17831341f6b113bb3da1ffe536c1861c96839180
                            SHA256:1b55754dc53235978759ae3474e144a3e3ebd0b43d5cd1a722372408bf982b51
                            SHA512:9a4a6eea5604f08b71367ebfb59ceb05cc518d545f869360082817de9b86625975e81751a25adba2e4b7faf2da95d0f98bc79e95180060a66e9677257c3ca78c
                            SSDEEP:49152:0vht62XlaSFNWPjljiFa2RoUYIZKt86oGdSTHHB72eh2NT:0vL62XlaSFNWPjljiFXRoUYIZKtJ
                            TLSH:D6F55A2437F85E33E16AD6B395B1501663F1FC6AB363EB0B2181777E1C63B4188426A7
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@3...........@................................
                            Icon Hash:7171696d697151a1
                            Entrypoint:0x71e3be
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3700x4b.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000x11360.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x3320000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x31c3c40x31c400ddd31b2ceeb4e2434ee637620d8e0fa6unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x3200000x113600x1140035af4eaf7a2f5f6779dfd470e3e13c7dFalse0.12119282155797101data4.862148946463795IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x3320000xc0x2004d500f037eed75b56776bd5a41faef15False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x3201300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.1068703418904531
                            RT_GROUP_ICON0x3309580x14data1.15
                            RT_VERSION0x33096c0x31cdata0.3969849246231156
                            RT_MANIFEST0x330c880x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 26, 2024 14:03:01.855597019 CEST497308000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:01.861054897 CEST800049730192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:01.861238956 CEST497308000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:01.871604919 CEST497308000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:01.876880884 CEST800049730192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:10.355956078 CEST800049730192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:10.356050968 CEST497308000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:10.367814064 CEST497308000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:10.373574972 CEST800049730192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:13.744982958 CEST497318000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:13.751009941 CEST800049731192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:13.751074076 CEST497318000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:13.751409054 CEST497318000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:13.757356882 CEST800049731192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:22.229399920 CEST800049731192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:22.230930090 CEST497318000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:22.237982988 CEST497318000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:22.243556976 CEST800049731192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:25.542023897 CEST497388000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:25.548746109 CEST800049738192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:25.548969030 CEST497388000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:25.549099922 CEST497388000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:25.555289030 CEST800049738192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:34.036586046 CEST800049738192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:34.036683083 CEST497388000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:34.037108898 CEST497388000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:34.044183969 CEST800049738192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:37.338749886 CEST497398000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:37.347038031 CEST800049739192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:37.347146988 CEST497398000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:37.347419024 CEST497398000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:37.353399992 CEST800049739192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:45.831398964 CEST800049739192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:45.831510067 CEST497398000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:45.831912994 CEST497398000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:45.837635040 CEST800049739192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:49.182478905 CEST497408000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:49.659852982 CEST800049740192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:49.659953117 CEST497408000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:49.660275936 CEST497408000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:49.665860891 CEST800049740192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:58.142056942 CEST800049740192.168.18.54192.168.2.4
                            Oct 26, 2024 14:03:58.143961906 CEST497408000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:58.144272089 CEST497408000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:03:58.149691105 CEST800049740192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:01.760512114 CEST497688000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:01.766354084 CEST800049768192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:01.766446114 CEST497688000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:01.766715050 CEST497688000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:01.772244930 CEST800049768192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:10.261950970 CEST800049768192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:10.262993097 CEST497688000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:10.263268948 CEST497688000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:10.268899918 CEST800049768192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:13.823029995 CEST498348000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:13.828551054 CEST800049834192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:13.828638077 CEST498348000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:13.828847885 CEST498348000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:13.834851980 CEST800049834192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:23.125905991 CEST800049834192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:23.125978947 CEST498348000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:23.126332045 CEST498348000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:23.126401901 CEST800049834192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:23.126487970 CEST498348000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:23.126564980 CEST800049834192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:23.126612902 CEST498348000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:23.132057905 CEST800049834192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:26.669749975 CEST499008000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:26.675501108 CEST800049900192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:26.677333117 CEST499008000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:26.677333117 CEST499008000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:26.682836056 CEST800049900192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:35.174269915 CEST800049900192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:35.174315929 CEST499008000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:35.174647093 CEST499008000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:35.180483103 CEST800049900192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:38.905231953 CEST499718000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:38.911072969 CEST800049971192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:38.911154985 CEST499718000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:38.911421061 CEST499718000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:38.917011976 CEST800049971192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:47.404344082 CEST800049971192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:47.404422045 CEST499718000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:47.404982090 CEST499718000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:47.410408020 CEST800049971192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:51.057785034 CEST500118000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:51.064682007 CEST800050011192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:51.064868927 CEST500118000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:51.065288067 CEST500118000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:51.071350098 CEST800050011192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:59.547225952 CEST800050011192.168.18.54192.168.2.4
                            Oct 26, 2024 14:04:59.547339916 CEST500118000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:59.547799110 CEST500118000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:04:59.555018902 CEST800050011192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:02.979795933 CEST500128000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:03.362219095 CEST800050012192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:03.362330914 CEST500128000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:03.362644911 CEST500128000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:03.368303061 CEST800050012192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:11.860133886 CEST800050012192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:11.860224962 CEST500128000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:11.860641956 CEST500128000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:11.866170883 CEST800050012192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:15.073333025 CEST500138000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:15.079482079 CEST800050013192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:15.079581022 CEST500138000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:15.080179930 CEST500138000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:15.085927010 CEST800050013192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:23.563447952 CEST800050013192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:23.563545942 CEST500138000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:23.563813925 CEST500138000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:23.569272041 CEST800050013192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:26.635740042 CEST500148000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:26.641647100 CEST800050014192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:26.641805887 CEST500148000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:26.642086983 CEST500148000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:26.648088932 CEST800050014192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:35.126408100 CEST800050014192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:35.126523972 CEST500148000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:35.127748966 CEST500148000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:35.133634090 CEST800050014192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:37.839165926 CEST500158000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:37.845496893 CEST800050015192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:37.845593929 CEST500158000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:37.845921993 CEST500158000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:37.851695061 CEST800050015192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:46.328346014 CEST800050015192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:46.328478098 CEST500158000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:46.330471039 CEST500158000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:46.336165905 CEST800050015192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:48.657699108 CEST500168000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:48.663743973 CEST800050016192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:48.665148973 CEST500168000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:48.672231913 CEST500168000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:48.678199053 CEST800050016192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:57.148437023 CEST800050016192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:57.148508072 CEST500168000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:57.149377108 CEST500168000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:57.154915094 CEST800050016192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:59.229943991 CEST500178000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:59.236160040 CEST800050017192.168.18.54192.168.2.4
                            Oct 26, 2024 14:05:59.236258030 CEST500178000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:59.236742020 CEST500178000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:05:59.243208885 CEST800050017192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:07.718213081 CEST800050017192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:07.718283892 CEST500178000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:07.718642950 CEST500178000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:07.724550009 CEST800050017192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:09.464087009 CEST500188000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:09.470347881 CEST800050018192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:09.470417976 CEST500188000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:09.470822096 CEST500188000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:09.476692915 CEST800050018192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:17.953303099 CEST800050018192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:17.953511000 CEST500188000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:17.953912020 CEST500188000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:17.959304094 CEST800050018192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:19.557853937 CEST500198000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:19.563544035 CEST800050019192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:19.563616037 CEST500198000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:19.564011097 CEST500198000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:19.569562912 CEST800050019192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:28.043874979 CEST800050019192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:28.043963909 CEST500198000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:28.044373035 CEST500198000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:28.051841974 CEST800050019192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:29.417352915 CEST500208000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:29.424801111 CEST800050020192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:29.424880981 CEST500208000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:29.425199032 CEST500208000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:29.432344913 CEST800050020192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:37.909770012 CEST800050020192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:37.909838915 CEST500208000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:37.910276890 CEST500208000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:37.915638924 CEST800050020192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:39.136156082 CEST500218000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:39.141860008 CEST800050021192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:39.141937017 CEST500218000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:39.142261028 CEST500218000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:39.148060083 CEST800050021192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:47.642157078 CEST800050021192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:47.642245054 CEST500218000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:47.642693996 CEST500218000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:47.648855925 CEST800050021192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:48.714514971 CEST500228000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:48.720273972 CEST800050022192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:48.720380068 CEST500228000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:48.720705032 CEST500228000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:48.726330042 CEST800050022192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:57.214648008 CEST800050022192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:57.214723110 CEST500228000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:57.215112925 CEST500228000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:57.220588923 CEST800050022192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:58.167337894 CEST500238000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:58.173125029 CEST800050023192.168.18.54192.168.2.4
                            Oct 26, 2024 14:06:58.173213005 CEST500238000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:58.177470922 CEST500238000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:06:58.182934046 CEST800050023192.168.18.54192.168.2.4
                            Oct 26, 2024 14:07:06.651947021 CEST800050023192.168.18.54192.168.2.4
                            Oct 26, 2024 14:07:06.652338982 CEST500238000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:07:06.652596951 CEST500238000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:07:06.658057928 CEST800050023192.168.18.54192.168.2.4
                            Oct 26, 2024 14:07:09.948460102 CEST500248000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:07:09.954278946 CEST800050024192.168.18.54192.168.2.4
                            Oct 26, 2024 14:07:09.954369068 CEST500248000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:07:09.954591990 CEST500248000192.168.2.4192.168.18.54
                            Oct 26, 2024 14:07:09.959924936 CEST800050024192.168.18.54192.168.2.4

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:08:02:57
                            Start date:26/10/2024
                            Path:C:\Users\user\Desktop\systemms.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\systemms.exe"
                            Imagebase:0xee0000
                            File size:3'333'120 bytes
                            MD5 hash:B9A90C673713F61195B6E695D5F57BA4
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1674697555.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:08:02:59
                            Start date:26/10/2024
                            Path:C:\Windows\System32\schtasks.exe
                            Wow64 process (32bit):false
                            Commandline:"schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f
                            Imagebase:0x7ff76f990000
                            File size:235'008 bytes
                            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:08:02:59
                            Start date:26/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:08:02:59
                            Start date:26/10/2024
                            Path:C:\Users\user\AppData\Roaming\Systemms\systemms.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\AppData\Roaming\Systemms\systemms.exe"
                            Imagebase:0x440000
                            File size:3'333'120 bytes
                            MD5 hash:B9A90C673713F61195B6E695D5F57BA4
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000003.00000002.4137316139.0000000002929000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, Author: Joe Security
                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, Author: Joe Security
                            • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, Author: Florian Roth
                            • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, Author: ditekSHen
                            • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\Systemms\systemms.exe, Author: ditekshen
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 68%, ReversingLabs
                            Reputation:low
                            Has exited:false

                            Target ID:4
                            Start time:08:03:00
                            Start date:26/10/2024
                            Path:C:\Windows\System32\schtasks.exe
                            Wow64 process (32bit):false
                            Commandline:"schtasks" /create /tn "Systemmso" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\Systemms\systemms.exe" /rl HIGHEST /f
                            Imagebase:0x7ff76f990000
                            File size:235'008 bytes
                            MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:08:03:00
                            Start date:26/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:08:03:00
                            Start date:26/10/2024
                            Path:C:\Users\user\AppData\Roaming\Systemms\systemms.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\AppData\Roaming\Systemms\systemms.exe
                            Imagebase:0x750000
                            File size:3'333'120 bytes
                            MD5 hash:B9A90C673713F61195B6E695D5F57BA4
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:15.6%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:13
                              Total number of Limit Nodes:0
                              execution_graph 1790 7ffd9b883811 1791 7ffd9b88382f 1790->1791 1792 7ffd9b8838c4 1791->1792 1795 7ffd9b883540 1792->1795 1794 7ffd9b8838d1 1796 7ffd9b883551 DeleteFileW 1795->1796 1798 7ffd9b883616 1796->1798 1798->1794 1799 7ffd9b883569 1800 7ffd9b883571 DeleteFileW 1799->1800 1802 7ffd9b883616 1800->1802 1803 7ffd9b883525 1804 7ffd9b883531 DeleteFileW 1803->1804 1806 7ffd9b883616 1804->1806

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1701363934.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffd9b880000_systemms.jbxd
                              Similarity
                              • API ID: DeleteFile
                              • String ID:
                              • API String ID: 4033686569-0
                              • Opcode ID: 6e219ff1d9bd73b7f5cdb44eb550223d905d69cb1835291f73e1e99183058b47
                              • Instruction ID: 7b68fe2560d4965ef47d404d288541810a264a492e12ef5075d66cfe3bbb7f4c
                              • Opcode Fuzzy Hash: 6e219ff1d9bd73b7f5cdb44eb550223d905d69cb1835291f73e1e99183058b47
                              • Instruction Fuzzy Hash: 4041393190DB9C5FDB19DBA888596E97FF0FF5A320F0542AFD049C71A2DA34A805C781

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 13 7ffd9b883569-7ffd9b8835d8 18 7ffd9b8835e2-7ffd9b883614 DeleteFileW 13->18 19 7ffd9b8835da-7ffd9b8835df 13->19 20 7ffd9b88361c-7ffd9b88364a 18->20 21 7ffd9b883616 18->21 19->18 21->20
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1701363934.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ffd9b880000_systemms.jbxd
                              Similarity
                              • API ID: DeleteFile
                              • String ID:
                              • API String ID: 4033686569-0
                              • Opcode ID: c87823c70b5dbe0b60253398e7de7fa240282a851b29ccffc4830fe4d050071e
                              • Instruction ID: b2e76d0e2bfb00927b5369b0959b0a7ff1eb24d15d7d8f276c36fa19ba93fbbe
                              • Opcode Fuzzy Hash: c87823c70b5dbe0b60253398e7de7fa240282a851b29ccffc4830fe4d050071e
                              • Instruction Fuzzy Hash: FD31E13190CB5C8FDB19DB588859AE9BBF0FF66320F04426BD049D3292DB74A8068B81

                              Execution Graph

                              Execution Coverage:11.4%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:8
                              Total number of Limit Nodes:1
                              execution_graph 11916 7ffd9b8a3569 11917 7ffd9b8a3571 DeleteFileW 11916->11917 11919 7ffd9b8a3616 11917->11919 11920 7ffd9bb1e1d9 11922 7ffd9bb1e1ef 11920->11922 11921 7ffd9bb1e29b 11922->11921 11923 7ffd9bb1e394 SetWindowsHookExW 11922->11923 11924 7ffd9bb1e3d6 11923->11924

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 32 7ffd9bb19ac4-7ffd9bb19ae8 35 7ffd9bb1a08e-7ffd9bb1a0a0 32->35 36 7ffd9bb19aee-7ffd9bb19b00 32->36 36->35 38 7ffd9bb19b06-7ffd9bb19b11 36->38 40 7ffd9bb19b13-7ffd9bb19b3f 38->40 41 7ffd9bb19a9c-7ffd9bb19ac1 38->41 40->35 46 7ffd9bb19b45-7ffd9bb19b86 40->46 49 7ffd9bb19c38-7ffd9bb19c4b 46->49 50 7ffd9bb19b8c-7ffd9bb19ba4 46->50 55 7ffd9bb19c4d-7ffd9bb19c6e 49->55 56 7ffd9bb19ca0 49->56 53 7ffd9bb19baa-7ffd9bb19bca 50->53 54 7ffd9bb19c2c-7ffd9bb19c32 50->54 53->54 70 7ffd9bb19bcc-7ffd9bb19bde 53->70 54->49 54->50 62 7ffd9bb19c70-7ffd9bb19c97 55->62 63 7ffd9bb19c99-7ffd9bb19c9e 55->63 57 7ffd9bb19ca2-7ffd9bb19ca7 56->57 58 7ffd9bb19cee-7ffd9bb19d11 57->58 59 7ffd9bb19ca9-7ffd9bb19cb0 57->59 67 7ffd9bb19e07-7ffd9bb19e13 58->67 68 7ffd9bb19d17-7ffd9bb19d3f 58->68 64 7ffd9bb19cb7-7ffd9bb19cd1 59->64 62->57 63->57 64->58 74 7ffd9bb19cd3-7ffd9bb19cec 64->74 67->35 71 7ffd9bb19e19-7ffd9bb19e2e 67->71 81 7ffd9bb19d45-7ffd9bb19d60 68->81 82 7ffd9bb19dfb-7ffd9bb19e01 68->82 70->54 76 7ffd9bb19be0-7ffd9bb19be4 70->76 71->35 74->58 79 7ffd9bb1a0a1-7ffd9bb1a143 76->79 80 7ffd9bb19bea-7ffd9bb19bff 76->80 90 7ffd9bb1a255-7ffd9bb1a270 79->90 91 7ffd9bb1a149-7ffd9bb1a14b 79->91 86 7ffd9bb19c06-7ffd9bb19c08 80->86 81->82 93 7ffd9bb19d66-7ffd9bb19d78 81->93 82->67 82->68 86->54 88 7ffd9bb19c0a-7ffd9bb19c28 call 7ffd9bb152a0 86->88 88->54 100 7ffd9bb1a20d-7ffd9bb1a222 90->100 101 7ffd9bb1a272-7ffd9bb1a27f 90->101 94 7ffd9bb1a14d-7ffd9bb1a15f 91->94 95 7ffd9bb1a165-7ffd9bb1a173 91->95 93->82 110 7ffd9bb19d7e-7ffd9bb19d82 93->110 94->95 111 7ffd9bb1a28f-7ffd9bb1a2c1 94->111 98 7ffd9bb1a2c8-7ffd9bb1a2e3 95->98 99 7ffd9bb1a179-7ffd9bb1a190 95->99 107 7ffd9bb1a280-7ffd9bb1a288 98->107 115 7ffd9bb1a2e5-7ffd9bb1a2fb 98->115 121 7ffd9bb1a192-7ffd9bb1a1a4 99->121 122 7ffd9bb1a1aa-7ffd9bb1a1ad 99->122 101->107 107->111 110->79 114 7ffd9bb19d88-7ffd9bb19dcb 110->114 111->98 114->82 144 7ffd9bb19dcd-7ffd9bb19df8 call 7ffd9bb152a0 114->144 131 7ffd9bb1a302-7ffd9bb1a341 115->131 121->122 121->131 125 7ffd9bb1a1af-7ffd9bb1a1c6 122->125 126 7ffd9bb1a1d6-7ffd9bb1a1f2 call 7ffd9bb17520 122->126 125->126 141 7ffd9bb1a1c8-7ffd9bb1a1cc 125->141 139 7ffd9bb1a1f4-7ffd9bb1a209 126->139 140 7ffd9bb1a223-7ffd9bb1a227 126->140 149 7ffd9bb1a34d 131->149 150 7ffd9bb1a343-7ffd9bb1a349 131->150 139->100 145 7ffd9bb1a22e-7ffd9bb1a254 140->145 146 7ffd9bb1a1d3-7ffd9bb1a1d4 141->146 144->82 146->126 153 7ffd9bb1a351-7ffd9bb1a386 149->153 155 7ffd9bb1a34f 149->155 150->153 154 7ffd9bb1a34b 150->154 157 7ffd9bb1a387-7ffd9bb1a38c 153->157 154->149 155->153 158 7ffd9bb1a38e-7ffd9bb1a3b5 157->158 159 7ffd9bb1a3cf-7ffd9bb1a3ea 157->159 166 7ffd9bb1a409-7ffd9bb1a451 158->166 170 7ffd9bb1a3b7-7ffd9bb1a3ce 158->170 159->157 162 7ffd9bb1a3ec-7ffd9bb1a3f1 159->162 162->166 174 7ffd9bb1a453 166->174 175 7ffd9bb1a455-7ffd9bb1a477 166->175 174->175 177 7ffd9bb1a47d-7ffd9bb1a48f 175->177 178 7ffd9bb1a55a-7ffd9bb1a563 175->178 181 7ffd9bb1a491-7ffd9bb1a49a 177->181 182 7ffd9bb1a49b-7ffd9bb1a4b3 call 7ffd9bb13f90 177->182 185 7ffd9bb1a4b5-7ffd9bb1a4e6 182->185 186 7ffd9bb1a517-7ffd9bb1a520 182->186 190 7ffd9bb1a511-7ffd9bb1a515 185->190 191 7ffd9bb1a4e8-7ffd9bb1a50f 185->191 190->185 190->186 191->190 193 7ffd9bb1a521-7ffd9bb1a559 191->193
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.4148074905.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9bb10000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID: A
                              • API String ID: 0-3554254475
                              • Opcode ID: 468107a46cc97136bbbd7c0f46031055f5f7bcb80b05ea2ec13fa3e8236e41aa
                              • Instruction ID: ae2356d8ee79de162306472704f5546a495f73fcbda5deb61818967a87350deb
                              • Opcode Fuzzy Hash: 468107a46cc97136bbbd7c0f46031055f5f7bcb80b05ea2ec13fa3e8236e41aa
                              • Instruction Fuzzy Hash: 9F520231B1D94D4FEBA8EB2C9469A7533D1FF99314B0500BAE49EC32E2DE24EC428741

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 196 7ffd9bb1aaad-7ffd9bb1ab49 198 7ffd9bb1ab4f-7ffd9bb1ab52 196->198 199 7ffd9bb1b1c1-7ffd9bb1b1d6 196->199 198->199 200 7ffd9bb1ab58-7ffd9bb1ab75 198->200 200->199 202 7ffd9bb1ab7b-7ffd9bb1ab9a 200->202 204 7ffd9bb1aba6-7ffd9bb1abb9 202->204 205 7ffd9bb1ab9c-7ffd9bb1ab9f 202->205 208 7ffd9bb1ac49-7ffd9bb1ac5b 204->208 206 7ffd9bb1abbe-7ffd9bb1abee 205->206 207 7ffd9bb1aba1 205->207 206->199 213 7ffd9bb1abf4-7ffd9bb1ac42 206->213 207->199 208->199 211 7ffd9bb1ac61-7ffd9bb1aca0 208->211 211->199 218 7ffd9bb1aca6-7ffd9bb1acb0 211->218 213->208 222 7ffd9bb1acb2-7ffd9bb1acc6 218->222 223 7ffd9bb1acc8-7ffd9bb1acd8 218->223 224 7ffd9bb1ace2-7ffd9bb1ad37 222->224 223->224 229 7ffd9bb1ad3d-7ffd9bb1ad45 224->229 230 7ffd9bb1ad47-7ffd9bb1ad5b 229->230 231 7ffd9bb1adab-7ffd9bb1adb3 229->231 230->231 235 7ffd9bb1ad5d-7ffd9bb1ada7 230->235 231->199 232 7ffd9bb1adb9-7ffd9bb1addb 231->232 236 7ffd9bb1aedf-7ffd9bb1af15 232->236 237 7ffd9bb1ade1-7ffd9bb1ae0a 232->237 235->231 236->199 249 7ffd9bb1af1b-7ffd9bb1af2d 236->249 243 7ffd9bb1ae10-7ffd9bb1ae36 237->243 244 7ffd9bb1ae91-7ffd9bb1aeb2 237->244 243->244 252 7ffd9bb1ae38-7ffd9bb1ae4e 243->252 244->237 245 7ffd9bb1aeb8 244->245 245->236 249->199 254 7ffd9bb1af33-7ffd9bb1af51 249->254 252->244 256 7ffd9bb1ae50-7ffd9bb1ae68 252->256 254->199 261 7ffd9bb1af57-7ffd9bb1af85 254->261 256->244 260 7ffd9bb1ae6a-7ffd9bb1ae8f 256->260 260->244 264 7ffd9bb1aeba-7ffd9bb1aed8 260->264 268 7ffd9bb1afa8-7ffd9bb1afb5 261->268 269 7ffd9bb1af87-7ffd9bb1afa1 261->269 264->236 272 7ffd9bb1b07a-7ffd9bb1b09a 268->272 273 7ffd9bb1afbb-7ffd9bb1afe8 268->273 269->268 276 7ffd9bb1b0a4-7ffd9bb1b0e0 272->276 277 7ffd9bb1b09c-7ffd9bb1b09d 272->277 281 7ffd9bb1afea-7ffd9bb1b004 273->281 282 7ffd9bb1b00b-7ffd9bb1b017 273->282 276->199 287 7ffd9bb1b0e6-7ffd9bb1b103 276->287 277->276 281->282 288 7ffd9bb1b068-7ffd9bb1b074 282->288 289 7ffd9bb1b019-7ffd9bb1b025 282->289 294 7ffd9bb1b10d-7ffd9bb1b148 287->294 295 7ffd9bb1b105-7ffd9bb1b106 287->295 288->199 288->272 290 7ffd9bb1b310-7ffd9bb1b327 289->290 291 7ffd9bb1b02b-7ffd9bb1b061 289->291 298 7ffd9bb1b331-7ffd9bb1b39f call 7ffd9bb14f50 call 7ffd9bb17840 call 7ffd9bb15250 call 7ffd9bb1b3a0 290->298 299 7ffd9bb1b329-7ffd9bb1b330 290->299 291->288 294->199 310 7ffd9bb1b14a-7ffd9bb1b15c 294->310 295->294 299->298 310->199 316 7ffd9bb1b15e-7ffd9bb1b17c 310->316 316->199 319 7ffd9bb1b17e-7ffd9bb1b19a 316->319 322 7ffd9bb1b1d7-7ffd9bb1b24c 319->322 323 7ffd9bb1b19c-7ffd9bb1b1bf 319->323 333 7ffd9bb1b252-7ffd9bb1b25e 322->333 334 7ffd9bb1b2f7-7ffd9bb1b30f 322->334 323->199 323->322 336 7ffd9bb1b290-7ffd9bb1b2f0 333->336 337 7ffd9bb1b260-7ffd9bb1b27a 333->337 336->334 337->334 340 7ffd9bb1b27c-7ffd9bb1b28f 337->340 340->336
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.4148074905.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9bb10000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID: x0_H
                              • API String ID: 0-4001381062
                              • Opcode ID: 28e18be339497c6448b9ea841f9993f34326d51568db1f3e7091fdbeab46741d
                              • Instruction ID: d5da84fc88f11192313dd0b026e97548d844ac47a531590a4ba7b0f7a5c56a9e
                              • Opcode Fuzzy Hash: 28e18be339497c6448b9ea841f9993f34326d51568db1f3e7091fdbeab46741d
                              • Instruction Fuzzy Hash: 48524C30B18A498FEBA8EF2CC468B6977E1FF99304F1545B9E44DC72A6DE34E8418741

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 733 7ffd9bb154b6-7ffd9bb154c8 735 7ffd9bb154ae-7ffd9bb154b3 733->735 736 7ffd9bb154ca-7ffd9bb15523 733->736 738 7ffd9bb15574-7ffd9bb155ac call 7ffd9bb13f90 call 7ffd9bb13e20 736->738 739 7ffd9bb15525-7ffd9bb15530 736->739 748 7ffd9bb155ae-7ffd9bb155c3 call 7ffd9bb151d0 738->748 749 7ffd9bb155c8-7ffd9bb155d0 738->749 741 7ffd9bb15537-7ffd9bb1553a 739->741 741->738 743 7ffd9bb1553c-7ffd9bb15551 call 7ffd9bb13e20 741->743 743->738 752 7ffd9bb15553-7ffd9bb1556f call 7ffd9bb13830 743->752 748->749 750 7ffd9bb155d2-7ffd9bb155ea 749->750 751 7ffd9bb155ec 749->751 754 7ffd9bb155ee-7ffd9bb155f5 750->754 751->754 752->738 757 7ffd9bb155f7-7ffd9bb15607 754->757 758 7ffd9bb15608-7ffd9bb1564a 754->758 759 7ffd9bb15650-7ffd9bb15683 758->759 760 7ffd9bb16126-7ffd9bb16130 758->760 772 7ffd9bb158de-7ffd9bb158f0 759->772 773 7ffd9bb15689-7ffd9bb1569b 759->773 761 7ffd9bb16132-7ffd9bb1613d 760->761 762 7ffd9bb16148 760->762 763 7ffd9bb1614d-7ffd9bb1614f 761->763 762->763 765 7ffd9bb16151-7ffd9bb16163 763->765 766 7ffd9bb1616a-7ffd9bb1616f 763->766 765->766 767 7ffd9bb16171 766->767 768 7ffd9bb16174-7ffd9bb16186 766->768 767->768 777 7ffd9bb159b3-7ffd9bb159b5 772->777 778 7ffd9bb158f6-7ffd9bb15922 772->778 773->772 776 7ffd9bb156a1-7ffd9bb156d3 773->776 784 7ffd9bb156d5-7ffd9bb15703 776->784 785 7ffd9bb15706-7ffd9bb1573a 776->785 779 7ffd9bb15a25-7ffd9bb15a37 777->779 780 7ffd9bb159b7-7ffd9bb159c9 777->780 778->777 786 7ffd9bb15928-7ffd9bb1592d 778->786 788 7ffd9bb15a3d-7ffd9bb15a69 779->788 789 7ffd9bb1600b-7ffd9bb1601d 779->789 780->779 792 7ffd9bb159cb-7ffd9bb159ce 780->792 784->785 804 7ffd9bb1576e-7ffd9bb157a5 785->804 805 7ffd9bb1573c-7ffd9bb1576b 785->805 786->777 791 7ffd9bb15933-7ffd9bb15936 786->791 809 7ffd9bb15a9f-7ffd9bb15ab6 788->809 810 7ffd9bb15a6b-7ffd9bb15a74 788->810 812 7ffd9bb1601f-7ffd9bb16027 789->812 813 7ffd9bb1608c-7ffd9bb1609e 789->813 795 7ffd9bb15938-7ffd9bb15943 791->795 796 7ffd9bb1595b-7ffd9bb15964 791->796 797 7ffd9bb159d0-7ffd9bb159dc 792->797 798 7ffd9bb159f4-7ffd9bb15a22 call 7ffd9bb152a0 792->798 800 7ffd9bb15966-7ffd9bb15989 796->800 801 7ffd9bb1598b-7ffd9bb159b0 call 7ffd9bb152a0 796->801 798->779 800->801 801->777 827 7ffd9bb15831-7ffd9bb1585e 804->827 828 7ffd9bb157ab-7ffd9bb157c3 804->828 805->804 835 7ffd9bb15bb2-7ffd9bb15bdf 809->835 836 7ffd9bb15abc-7ffd9bb15ae5 809->836 816 7ffd9bb15a76-7ffd9bb15a86 810->816 817 7ffd9bb15a98-7ffd9bb15a99 810->817 812->813 819 7ffd9bb16029-7ffd9bb16056 812->819 831 7ffd9bb160a0-7ffd9bb160aa 813->831 832 7ffd9bb16115-7ffd9bb16120 813->832 816->817 817->809 819->813 841 7ffd9bb16058-7ffd9bb16061 819->841 845 7ffd9bb15860-7ffd9bb15869 827->845 846 7ffd9bb15894-7ffd9bb1589e 827->846 829 7ffd9bb157c5-7ffd9bb157d5 828->829 830 7ffd9bb15828-7ffd9bb1582f 828->830 840 7ffd9bb157f5-7ffd9bb15826 829->840 830->840 838 7ffd9bb1613f-7ffd9bb16146 831->838 839 7ffd9bb160b0-7ffd9bb160dc 831->839 832->759 832->760 857 7ffd9bb15c0f-7ffd9bb15c38 835->857 858 7ffd9bb15be1-7ffd9bb15c0c 835->858 836->789 849 7ffd9bb15aeb-7ffd9bb15b1a 836->849 838->832 839->832 861 7ffd9bb160de-7ffd9bb160e7 839->861 840->846 843 7ffd9bb16063-7ffd9bb16073 841->843 844 7ffd9bb16085-7ffd9bb16086 841->844 843->844 844->813 855 7ffd9bb1588d-7ffd9bb1588e 845->855 856 7ffd9bb1586b-7ffd9bb1587b 845->856 852 7ffd9bb168fe-7ffd9bb16965 846->852 853 7ffd9bb158a4-7ffd9bb158c5 846->853 849->789 872 7ffd9bb15b20-7ffd9bb15b4c 849->872 903 7ffd9bb1696b-7ffd9bb169ae 852->903 853->772 876 7ffd9bb158c7-7ffd9bb158d6 853->876 855->846 856->855 873 7ffd9bb15c3e-7ffd9bb15c6d 857->873 874 7ffd9bb15ccf-7ffd9bb15cfc 857->874 858->857 868 7ffd9bb1610e-7ffd9bb1610f 861->868 869 7ffd9bb160e9-7ffd9bb160f9 861->869 868->832 869->868 872->789 884 7ffd9bb15b52-7ffd9bb15ba5 call 7ffd9bb151d0 872->884 873->874 885 7ffd9bb15c6f-7ffd9bb15c9b 873->885 882 7ffd9bb15cfe-7ffd9bb15d03 874->882 883 7ffd9bb15d37-7ffd9bb15d64 874->883 876->772 882->883 887 7ffd9bb15d05-7ffd9bb15d34 882->887 895 7ffd9bb15d66-7ffd9bb15db7 call 7ffd9bb151d0 883->895 896 7ffd9bb15dbc-7ffd9bb15de8 883->896 884->789 905 7ffd9bb15bab-7ffd9bb15bad 884->905 885->874 898 7ffd9bb15c9d-7ffd9bb15ccc 885->898 887->883 895->896 910 7ffd9bb15e2d-7ffd9bb15e59 896->910 911 7ffd9bb15dea-7ffd9bb15e28 call 7ffd9bb151d0 896->911 898->874 921 7ffd9bb169b0-7ffd9bb16a0d 903->921 905->789 917 7ffd9bb15e9e-7ffd9bb15eca 910->917 918 7ffd9bb15e5b-7ffd9bb15e99 call 7ffd9bb151d0 910->918 911->910 926 7ffd9bb15f32-7ffd9bb15f5f 917->926 927 7ffd9bb15ecc-7ffd9bb15f01 917->927 918->917 947 7ffd9bb16a0f-7ffd9bb16a17 921->947 948 7ffd9bb16a18-7ffd9bb16a29 921->948 934 7ffd9bb15f61-7ffd9bb15f9f call 7ffd9bb151d0 926->934 935 7ffd9bb15fa4-7ffd9bb15fd0 926->935 927->926 932 7ffd9bb15f03-7ffd9bb15f31 927->932 932->926 934->935 935->789 943 7ffd9bb15fd2-7ffd9bb15fdb 935->943 945 7ffd9bb15fdd-7ffd9bb16000 943->945 946 7ffd9bb16002-7ffd9bb16003 943->946 945->946 946->789 947->948 950 7ffd9bb16a34-7ffd9bb16a46 948->950 951 7ffd9bb16a2b-7ffd9bb16a33 948->951 953 7ffd9bb16a48-7ffd9bb16a4a 950->953 954 7ffd9bb16a4c-7ffd9bb16a56 950->954 951->950 955 7ffd9bb16a5a-7ffd9bb16a9b 953->955 954->955 960 7ffd9bb16a9d-7ffd9bb16ab3 955->960 961 7ffd9bb16ab6-7ffd9bb16ac7 955->961 960->961 962 7ffd9bb16afd-7ffd9bb16b03 961->962 963 7ffd9bb16ac9-7ffd9bb16ae8 961->963 963->962 965 7ffd9bb16aea-7ffd9bb16afb 963->965 965->962 966 7ffd9bb16b04-7ffd9bb16b5b 965->966 966->962
                              Memory Dump Source
                              • Source File: 00000003.00000002.4148074905.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9bb10000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7eed12701ce261177cdb57e4c14ac37955ad9cb32761a38102875dcbf7f1a4ce
                              • Instruction ID: 5e64bd9cee3549513870f83f8e2158b365ae041363cc095aa84eb5ddd2b328e4
                              • Opcode Fuzzy Hash: 7eed12701ce261177cdb57e4c14ac37955ad9cb32761a38102875dcbf7f1a4ce
                              • Instruction Fuzzy Hash: EEB2C170A19A4D8FDFA8DF58C8A4BA977E2FF58304F1140A9D44EC72E6DA35E941CB40
                              Memory Dump Source
                              • Source File: 00000003.00000002.4148074905.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9bb10000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3210669dafedb45a928eac8282673c8de2bc4ccb9c92508281c8a50b90145641
                              • Instruction ID: 7fbc42d9b86eeb8683579dbc897abd4f0f54c71c90088d41041b511484466e2d
                              • Opcode Fuzzy Hash: 3210669dafedb45a928eac8282673c8de2bc4ccb9c92508281c8a50b90145641
                              • Instruction Fuzzy Hash: 44229030B19A494FEBA8DF5888697B873E2FF98304F15417DD48ED32E6DE24A9428741
                              Memory Dump Source
                              • Source File: 00000003.00000002.4148074905.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9bb10000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 88d5af1284dc2ed46f314dcd4fbb880e5a4d50542f025cc62583bc80c0c53fa8
                              • Instruction ID: 5fe035fc75782d333402b12f9934172a0f4c60a875e8e472f8aa78ad4ea9976f
                              • Opcode Fuzzy Hash: 88d5af1284dc2ed46f314dcd4fbb880e5a4d50542f025cc62583bc80c0c53fa8
                              • Instruction Fuzzy Hash: 86025B70E18A1D8FEBA8DF58C4947A9B3E1FF98304F1545BAD44ED32A5DA34E981CB40
                              Memory Dump Source
                              • Source File: 00000003.00000002.4148074905.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9bb10000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a132150a68991cbaddc67c4753b9768562f14668b18897282f1eca970e364e4c
                              • Instruction ID: b5c5a6ab08961c27553aaa93f60b5ac2f69edca7845a028197693ecccb136818
                              • Opcode Fuzzy Hash: a132150a68991cbaddc67c4753b9768562f14668b18897282f1eca970e364e4c
                              • Instruction Fuzzy Hash: A8E1E230A19A4E8FEBA8DF6888606B973E1FF49304F1545B9D45EC72E6DA34F941CB40

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.4148074905.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9bb10000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID: U
                              • API String ID: 0-3372436214
                              • Opcode ID: 3e4228cad7c7dcdbd6db450d5cc2648de9d3c8bf86c42ecd760a6e4dad2b2a86
                              • Instruction ID: e5513b37f4b2a43ab93994e491dd3edf55d2e6b6334f6f0ec2b2acbba5848678
                              • Opcode Fuzzy Hash: 3e4228cad7c7dcdbd6db450d5cc2648de9d3c8bf86c42ecd760a6e4dad2b2a86
                              • Instruction Fuzzy Hash: A9711631B1DA4E4FDB59AB6C98665B97BE0FF58310B0441BEE05DC72D3DE24A84287C1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 587 7ffd9b8a3525-7ffd9b8a352f 588 7ffd9b8a3571-7ffd9b8a35d8 587->588 589 7ffd9b8a3531-7ffd9b8a3562 587->589 596 7ffd9b8a35da-7ffd9b8a35df 588->596 597 7ffd9b8a35e2-7ffd9b8a3614 DeleteFileW 588->597 589->588 596->597 598 7ffd9b8a3616 597->598 599 7ffd9b8a361c-7ffd9b8a364a 597->599 598->599
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.4145941677.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID: DeleteFile
                              • String ID:
                              • API String ID: 4033686569-0
                              • Opcode ID: 6e5a787c348a2ea99382d73f810c60c36c28293453407dcd2664670b76d785f6
                              • Instruction ID: f4d4eef1aa419b6933874fc6f3e360f73fa8be63a3f8feb0c78bf193a281587f
                              • Opcode Fuzzy Hash: 6e5a787c348a2ea99382d73f810c60c36c28293453407dcd2664670b76d785f6
                              • Instruction Fuzzy Hash: 9D41263190DB4C8FDB19DFAC8859AE97BF0FF5A310F0542ABD049C76A2DA24A805C791

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 601 7ffd9b8a3569-7ffd9b8a35d8 606 7ffd9b8a35da-7ffd9b8a35df 601->606 607 7ffd9b8a35e2-7ffd9b8a3614 DeleteFileW 601->607 606->607 608 7ffd9b8a3616 607->608 609 7ffd9b8a361c-7ffd9b8a364a 607->609 608->609
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.4145941677.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID: DeleteFile
                              • String ID:
                              • API String ID: 4033686569-0
                              • Opcode ID: 0e63543075d1d4351256806479b5e39717d0017eeeaf6532c55b68c6317da9da
                              • Instruction ID: 628fe22e929f854cb09ade58c7c7e51612aef935aaa4174f690e995104e73b71
                              • Opcode Fuzzy Hash: 0e63543075d1d4351256806479b5e39717d0017eeeaf6532c55b68c6317da9da
                              • Instruction Fuzzy Hash: B731F23190CB5C8FDB19DB98C859AE9BBF0FF66320F04426BD049D3292DB74A805CB91
                              Memory Dump Source
                              • Source File: 00000003.00000002.4148074905.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9bb10000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fdacafa5426dfa365cd0c21237676f09012c67c8f3820f27e175c15bbb284ae3
                              • Instruction ID: b8465abce3e0f7f520fb948697d657386b3ad2042598ee061ee6607436e304da
                              • Opcode Fuzzy Hash: fdacafa5426dfa365cd0c21237676f09012c67c8f3820f27e175c15bbb284ae3
                              • Instruction Fuzzy Hash: CD32B75BB0D1B28AE71A76BC78BA4EA3F50DF4223D70D41F3D1DD4A0D7AC48218B9295
                              Memory Dump Source
                              • Source File: 00000003.00000002.4148074905.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9bb10000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 88aa187d256f44cb0a0fe1b92fa6142c43ab4e079fb0f6beba19ebdf60864ed6
                              • Instruction ID: dcb716e6f89b2a014a64d5b5a640d24075c7a3e7f4e9b53a60620353868d1a6e
                              • Opcode Fuzzy Hash: 88aa187d256f44cb0a0fe1b92fa6142c43ab4e079fb0f6beba19ebdf60864ed6
                              • Instruction Fuzzy Hash: 40E1835BB0D1B28AE71B76BC78BA4EA7F50CF4223D70841F7E1DD4A0D7AC48118B9295
                              Memory Dump Source
                              • Source File: 00000003.00000002.4148074905.00007FFD9BB10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ffd9bb10000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d1a55fb8f03eaae630563a3a2aa59d6c30815fbdd32111a7ca918ba9c2aeed98
                              • Instruction ID: cba6d30bfdbcbc3f8365f918ddd92e61cd4a025781a4ab394cd4d4702224cb5c
                              • Opcode Fuzzy Hash: d1a55fb8f03eaae630563a3a2aa59d6c30815fbdd32111a7ca918ba9c2aeed98
                              • Instruction Fuzzy Hash: 8DC1505BB0D1B28AE31B76BC79BA4EA7F50CF4223D70C41F7E1DD4A097AC48118B9295
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID: ;M_I
                              • API String ID: 0-1276053120
                              • Opcode ID: 70f65eda97644cf70430cbf3c634427219a41ea7244a818fd503317a9d76f108
                              • Instruction ID: 626da1a250d5dd43fde93686b813e488de9e8ab3e1b0641d138c3409cdb12b94
                              • Opcode Fuzzy Hash: 70f65eda97644cf70430cbf3c634427219a41ea7244a818fd503317a9d76f108
                              • Instruction Fuzzy Hash: A7A16D22B0F6C54FE319976CA8B41A57FA1EF45314B9541FBE48C473EBED28A902C352
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID: .M_^
                              • API String ID: 0-2820351210
                              • Opcode ID: 9479c36bf1e6673d646cdc1a51307297d7325871d80abf0159297d1eeb1be9da
                              • Instruction ID: 319ff2e4591fe8266988bcaa8b9098c78f3bb3d6024dd20eb0006993d4f74b70
                              • Opcode Fuzzy Hash: 9479c36bf1e6673d646cdc1a51307297d7325871d80abf0159297d1eeb1be9da
                              • Instruction Fuzzy Hash: 9121C31270E9AD0FD769A76CAC755E47BE0EF5B62170E02F7C098CB1A3DC0859068361
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 71875ff4a45670498364d3b7e2b24f330e7f1a13be9b4d0427d8687416fc6915
                              • Instruction ID: 295e8ce39ae69c3daf4c4084dc59c674774db98e2ede00278c673e0806d30d97
                              • Opcode Fuzzy Hash: 71875ff4a45670498364d3b7e2b24f330e7f1a13be9b4d0427d8687416fc6915
                              • Instruction Fuzzy Hash: 2FA1E621B1A98E0FEBA5FBA884717B877D2EF99340F0501BAD44DC71E7DD28AD028351
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dc22095f899cbacd72ba62b050dcbd57e49e53e46ce004e48d26b63c54cf3e67
                              • Instruction ID: d735cd2c15a9a79aa5a7f6a7f3b8c5511330b563cd0e6c3ec084140fa8701604
                              • Opcode Fuzzy Hash: dc22095f899cbacd72ba62b050dcbd57e49e53e46ce004e48d26b63c54cf3e67
                              • Instruction Fuzzy Hash: 2861A261F09D0D4FDBA8EBA884656BCB3E2EF9C310F550179D05ED32E6CE28AC428750
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b6ea38edbb50fa3380c65e131c9d807df12e8419c3f0e518f1d9e766ddfce2bf
                              • Instruction ID: 4e2bcb69a04fae27268328eb6b73d90687fa4308af4f499cd6bfb0760dea0db8
                              • Opcode Fuzzy Hash: b6ea38edbb50fa3380c65e131c9d807df12e8419c3f0e518f1d9e766ddfce2bf
                              • Instruction Fuzzy Hash: 0E51E610B4DD5A0FEB95B7B895B16E92BD2DF8A29078540B5D00CC76EBDD2C9D03C352
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2f0e8a7ab3e84ff24e0d9721b20f65ffaab694d76acf755b5b94f4324fcbf743
                              • Instruction ID: 11ddf78f44c6ebcb6d5dea008ca04b7af3f802ecad2f5e724a6b6b4a08338ad3
                              • Opcode Fuzzy Hash: 2f0e8a7ab3e84ff24e0d9721b20f65ffaab694d76acf755b5b94f4324fcbf743
                              • Instruction Fuzzy Hash: 4041CA21B0E98D0FEBA5FBA85471AF97BA1EF59310F0501BAD05DC71D7DE18AD018351
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 70fe5ef0ecff8be440d4f76ebff4271f9dae9c706101fcc8fa163a9498ac0444
                              • Instruction ID: 1ea7512deb206febb276f79ce696db3ea1dc52b57ca418fbf5c75953c22a86fd
                              • Opcode Fuzzy Hash: 70fe5ef0ecff8be440d4f76ebff4271f9dae9c706101fcc8fa163a9498ac0444
                              • Instruction Fuzzy Hash: 32412D21B1DA494FE76C9BAC94267B977D1EF99310F04017EF05EC32D6DD286D428392
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 29b55896dc2bae9ba1e04d3161370b94d2ee28c1a15e6ce4b7487e3b7c580d09
                              • Instruction ID: bcef832e1ce3a15a7edae2c759c73f50c8b1bd3d800d0713dff5b9f862de4f88
                              • Opcode Fuzzy Hash: 29b55896dc2bae9ba1e04d3161370b94d2ee28c1a15e6ce4b7487e3b7c580d09
                              • Instruction Fuzzy Hash: 31217C31A0E54A4FDB55EF68C0E55A57B91EF5A310B1942F9C048CF1FBD928ED86C390
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1dde43a8ae94fc927380372174a467bc91317b3b94fcde31c7cfd01748e7724a
                              • Instruction ID: 58adf108b698f4a8d759f84d1059524b7b906d739216b19afec55b7b3298d434
                              • Opcode Fuzzy Hash: 1dde43a8ae94fc927380372174a467bc91317b3b94fcde31c7cfd01748e7724a
                              • Instruction Fuzzy Hash: 7F317020759A858FE34CE71CE4A1AE97F62EF84304FD041A5E45887BCEDE386946C752
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9d4354e42a049a19c0b256239cb84358394929ad05d7d7a2221c21cd242e4b26
                              • Instruction ID: 7dfe12c0584976685d62a5a9f54bddc3f455db0e58e1c1cb0a7a6793635e2025
                              • Opcode Fuzzy Hash: 9d4354e42a049a19c0b256239cb84358394929ad05d7d7a2221c21cd242e4b26
                              • Instruction Fuzzy Hash: BF21CF31F19A594FE7A8EB689869AB873E1EF58301B4504BAE00DC32A6DE24E841C741
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 91bb0ab6cff2f7bef623a7d1ebbdb4f9a59723e25486fddd8cba1bab9d38dc33
                              • Instruction ID: 25870228988afbe319c35ca917e1f4d9987913ae87d0ce3522816c901490f62d
                              • Opcode Fuzzy Hash: 91bb0ab6cff2f7bef623a7d1ebbdb4f9a59723e25486fddd8cba1bab9d38dc33
                              • Instruction Fuzzy Hash: 00214C92A2EECA4FF359A7744835AA4ABA1FF55780F0901FED09DC70E7DC0C68048392
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f600f327b4672eec84076d5f9e18fea68f7cf14db1bb7567c9488b19c810ee39
                              • Instruction ID: cc76f936abc87a9dd32442d6ea9b0b9819289cd618774ad81867d124b3dc26f6
                              • Opcode Fuzzy Hash: f600f327b4672eec84076d5f9e18fea68f7cf14db1bb7567c9488b19c810ee39
                              • Instruction Fuzzy Hash: 4D119C21B0EB850FE355E7386C698F17BD4DFA422070902BBE44DC31A3CD08A6868351
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 53f0ff3f3c9fdf53c3f12e113c7350ee10488024c71c9327b35488a5f537342f
                              • Instruction ID: 752e547283803902e9f5cf0c64e55cc1851957e331e66e932b666cef8ccc4b59
                              • Opcode Fuzzy Hash: 53f0ff3f3c9fdf53c3f12e113c7350ee10488024c71c9327b35488a5f537342f
                              • Instruction Fuzzy Hash: C611E921B0EACC0FE357E37858A8AA43FD1AF4B224B1A41F7E088CB0B7C9584945C352
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 734215c4a2288d734299e7b6069f061e44051885e55d4c4053c8a5446ad8fef5
                              • Instruction ID: d092d85103ba2e072ff7643d1345073beef712ec0130d6b050a758214694075f
                              • Opcode Fuzzy Hash: 734215c4a2288d734299e7b6069f061e44051885e55d4c4053c8a5446ad8fef5
                              • Instruction Fuzzy Hash: FE01BD23B7AC8E0FD7ADA32C58A45F5A3C2DFA9350B0406B6E00DC31E6ED143D428381
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e60333c39d6a36de0a0ef7ad8d85fb4d2b83adc6d444cbc53013f28159dfee9c
                              • Instruction ID: 81db52791d8ccd3d8cc008df5ba5da72ca856e83f4eace5d39eb63bb8386df82
                              • Opcode Fuzzy Hash: e60333c39d6a36de0a0ef7ad8d85fb4d2b83adc6d444cbc53013f28159dfee9c
                              • Instruction Fuzzy Hash: 94F0F622B0985C0FE754F2AD58E8EF967D0DBAC12531501B7E00CC72A7DC0458828391
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ab23a28d0e5e55cb5d753975e0d0e03fc8c21dcc760faac116368fd739d67d34
                              • Instruction ID: a1c440a9703a6822f267396826b78ab0f46366969a57f484ed4b64b8919341ad
                              • Opcode Fuzzy Hash: ab23a28d0e5e55cb5d753975e0d0e03fc8c21dcc760faac116368fd739d67d34
                              • Instruction Fuzzy Hash: C6E09221F19C1D1FEBA8F7AD48D9F7962D1EBAC21572505B6E40CC73BADC189C818391
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 09b70d7fbb28ffac7b5df1dbf34d3f8093e7b907dcff170f9eee48c5efe3fcd0
                              • Instruction ID: 01208c244af0a6087371bb5fa54c11e67be3e5fb9f5175baf9814ed9accbbf41
                              • Opcode Fuzzy Hash: 09b70d7fbb28ffac7b5df1dbf34d3f8093e7b907dcff170f9eee48c5efe3fcd0
                              • Instruction Fuzzy Hash: 32E08622F1A91B07E795337C20621FC21C19F58651F8555BAE50DC62E7EC1E6D420394
                              Memory Dump Source
                              • Source File: 00000006.00000002.1732372565.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_7ffd9b8a0000_systemms.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6c1b08e9813a4f254e72e9e8061243627f22882961227c65d8d46b6138ab7136
                              • Instruction ID: 09944aa1fc7557979a6908c764957c0e20963fba7df510a226fc611d8dfabc82
                              • Opcode Fuzzy Hash: 6c1b08e9813a4f254e72e9e8061243627f22882961227c65d8d46b6138ab7136
                              • Instruction Fuzzy Hash: 2DC01252A16D4E4BDB75CFCC25912F863A1FFCC7807950279D00CE1175CF2455529250