Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
systempreter.exe

Overview

General Information

Sample name:systempreter.exe
Analysis ID:1582633
MD5:d07714b594ae5d7f674c7fcf6a803807
SHA1:938efbba8d8e34c2d1dcc0db37a84f887ae6724f
SHA256:ad8248e7dafb0a1b3d6c22dac544f0abcfab093a75561e534a473d46917f1d47
Tags:AsyncRATexeuser-lontze7
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • systempreter.exe (PID: 7348 cmdline: "C:\Users\user\Desktop\systempreter.exe" MD5: D07714B594AE5D7F674C7FCF6A803807)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "6.tcp.eu.ngrok.io", "Ports": "12925", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "MK91XYMOqmeCC1gruq5zLNqgxLkrjgzK", "Mutex": "hDtjdONRXVCh", "Certificate": "MIIE8jCCAtqgAwIBAgIQAP0oyiOz3B6IlGmGQxDdOTANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjQxMjI3MTYwODExWhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOL81KWlg/fnIqdbRhcZAWTJXSZyblsfdmVXtpoDKqUW3mZW6wAser7vp+5ZFOyoziZ07q+uPix+p8mU7pYPRk5AdXEE3etHPJsuF3vU89lwDU8EzLnFSqILEX27yUQDCczwhG8coxKU7+Etmj90VXH+GqBDAf0rhEEQ79pxnSxVsZrTVntMm150OmFaXglX80L1s1LbBW5k2U4kjR6MVsVr4++8kH3/1PQIl/9u4RxWSipRCC+0ko5YlGuMtDiURgAfWJaDqp55MyPJdaads/c5VpUKHgpp3QHYyKxwHfook/IxJv7F69mJIOGtIx0WoH/A5n6BC7GVoZBo10rJQ/K/PqxUZtLxtLPqb2tR1z4AbGcNJs1GJ65HnFZbl4JlRJSZUNkCloNollmUomImI61vsgvrX7eds+KAGnIR/FA3ZqcsGi0HOybcL7cLq/C53cxD6de6zjL6E3Y6cnOaJVcEZiL/Ht1DLvPjYi0oGYGYnrQmnfuvTMHXdENymDdkr5UzuzAmbLqfMoIr/VhYxFE2yFB58yfGgyCIIjq2f8CsnW4FVvBlj8wu9pgaLJDfaIt/kk10smBJrHmApWM2dBNfuAH81aOC5wH7D9NCJQsjI6t5Z8STEOUEieRlGSDGHYDD1V/mNz7W0quApyUzp2BxnNLbxwvI1i6QOUMwVf+LAgMBAAGjMjAwMB0GA1UdDgQWBBRXDQJGYiU2B9aIEfynLf86NKMKxDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQDgWGOa86eW1S706lfEMR3eHEOG8aheW1bclqFdCU//CEMTVj5y+jxgmdDi6D1VPyj6BY7xrRIc2dxK77fA3G6mnzf2NGatOUuWtfTQml2K6M8Lmsjut/G05hAM3R/DLalds1qmqmvs3+9jwguSd6FMDkZ1/we+yP3zPzByqJM2+cnAPKisGcimf/XTlImc86Qs1aCn1UW86vNsDFjHPeLKRkem23zZf1CGMxTrg1n5YWvYcLwoRK238te99h10XMVF4VzMAg6M0lMqsRcn+59P9SFNO2uHOXCpc5Z5u1b2ueP1YZ58jZMpxSyrRTByb5tomHR5C9MWdAR0Uf2KZvtN8QX0WmmxxjXzltoy9eunK57DJ7pYbFXw2WtIK31AObxL8k7d/Tj7tMtX0xD3PVT52sfdyL1B7VejcOGaia3IqmIyy3HmVaBWLqNaVLz02VTmMhfGgdufs2ElNstaIvkMVIr9sAdPhIcvi4so7oavxc3fFcZ5FMRBaOytYgmi4NIFKqdIOVWWKyKFyALDaI9ltTxeDDA9DGXFgaPWr+607z0suV4gi//RZNePt88/ofSKXJSzGHCwE+pVhMJPOT/s9Hxo/q4UtJ6sytT/10GNJ7t18uvtF5HeMXPLS3h4K/B47Zv2sjWfoApzSbGkcViHo8NRFRQkiudAt/u3zu3afQ==", "ServerSignature": "DHvyoNyX5eL00U2I93ULMTiza3OmiuwwIPWMljP1fsu+AdOByxC0k8/oQBKf+BOD3inmIcpFsumEaRGH+dtEgJJtVwE9G6lELNPRbS0LWDCuBRB/4d9jpmKq3onz+2N/IW0xab/zBqbmOXgVMMCkx6jgdMK6z0uv//JN3+72hxOUAnniVBq2wOTSQ63Bk87IXgOzJCBRbd+yX0erjd0bdnz+3rtd9wHEVaewq96DmNTiMXwlkr3mZBzwJEEQK7tpHk9rmJrxkltcJeVKO+XjA4dd/suYAaafydb34RwIDIC2kQjkxzCPHMeY0peBuWRSlFBeQ3Fer6bSm+b9Nb0iHvvHzhCTNEv6cQQPxiz2vUtmOhAMx7t6ZnBsch9/6m4M0knc5oLiEJ9rCR1kDmtOBIsnlsam/icBdip8XdQYwQgl/AB1isOpFtVCDEnadkXojpy+/4YC3wE/ojiWzofXn5Y5QBrwyBzk8ZzZwt1Meg63VGmvunBXQCHb3YG0dzzLgZksvaXRZt5IecW8qlUoJa9IoGDaDd9+nB17vcSsL6xu7cZa0YuTWHQzjlHHsdzKDIk4rMutviZBZVzyfIE2Uab+llp2eT7QNIOgclX3bZo/ubaMd6Y6QtUwtfUHNAfK6nvEDeB/8xhgHwUv8vqAlqYTbVbCmz0OhL/YWXjeCGg=", "BDOS": "false", "External_config_on_Pastebin": "null"}
SourceRuleDescriptionAuthorStrings
systempreter.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    systempreter.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      systempreter.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xa25b:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xc9b8:$a2: Stub.exe
      • 0xca48:$a2: Stub.exe
      • 0x6ff9:$a3: get_ActivatePong
      • 0xa473:$a4: vmware
      • 0xa2eb:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x7cd5:$a6: get_SslClient
      systempreter.exerat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
      • 0x6ff9:$str01: get_ActivatePong
      • 0x7cd5:$str02: get_SslClient
      • 0x7cf1:$str03: get_TcpClient
      • 0x662a:$str04: get_SendSync
      • 0x66ba:$str05: get_IsConnected
      • 0x6d63:$str06: set_UseShellExecute
      • 0xa591:$str07: Pastebin
      • 0xa613:$str08: Select * from AntivirusProduct
      • 0xc9b8:$str09: Stub.exe
      • 0xca48:$str09: Stub.exe
      • 0xa36b:$str10: timeout 3 > NUL
      • 0xa25b:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
      • 0xa2eb:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      systempreter.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xa2ed:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1650931356.0000000000662000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.1650931356.0000000000662000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0xa0ed:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        Process Memory Space: systempreter.exe PID: 7348JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Process Memory Space: systempreter.exe PID: 7348INDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0xd631:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          SourceRuleDescriptionAuthorStrings
          0.0.systempreter.exe.660000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            0.0.systempreter.exe.660000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0xa25b:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0xc9b8:$a2: Stub.exe
            • 0xca48:$a2: Stub.exe
            • 0x6ff9:$a3: get_ActivatePong
            • 0xa473:$a4: vmware
            • 0xa2eb:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0x7cd5:$a6: get_SslClient
            0.0.systempreter.exe.660000.0.unpackrat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
            • 0x6ff9:$str01: get_ActivatePong
            • 0x7cd5:$str02: get_SslClient
            • 0x7cf1:$str03: get_TcpClient
            • 0x662a:$str04: get_SendSync
            • 0x66ba:$str05: get_IsConnected
            • 0x6d63:$str06: set_UseShellExecute
            • 0xa591:$str07: Pastebin
            • 0xa613:$str08: Select * from AntivirusProduct
            • 0xc9b8:$str09: Stub.exe
            • 0xca48:$str09: Stub.exe
            • 0xa36b:$str10: timeout 3 > NUL
            • 0xa25b:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
            • 0xa2eb:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            0.0.systempreter.exe.660000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0xa2ed:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: systempreter.exeAvira: detected
            Source: 6.tcp.eu.ngrok.ioAvira URL Cloud: Label: malware
            Source: systempreter.exeMalware Configuration Extractor: AsyncRAT {"Server": "6.tcp.eu.ngrok.io", "Ports": "12925", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "MK91XYMOqmeCC1gruq5zLNqgxLkrjgzK", "Mutex": "hDtjdONRXVCh", "Certificate": "MIIE8jCCAtqgAwIBAgIQAP0oyiOz3B6IlGmGQxDdOTANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjQxMjI3MTYwODExWhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOL81KWlg/fnIqdbRhcZAWTJXSZyblsfdmVXtpoDKqUW3mZW6wAser7vp+5ZFOyoziZ07q+uPix+p8mU7pYPRk5AdXEE3etHPJsuF3vU89lwDU8EzLnFSqILEX27yUQDCczwhG8coxKU7+Etmj90VXH+GqBDAf0rhEEQ79pxnSxVsZrTVntMm150OmFaXglX80L1s1LbBW5k2U4kjR6MVsVr4++8kH3/1PQIl/9u4RxWSipRCC+0ko5YlGuMtDiURgAfWJaDqp55MyPJdaads/c5VpUKHgpp3QHYyKxwHfook/IxJv7F69mJIOGtIx0WoH/A5n6BC7GVoZBo10rJQ/K/PqxUZtLxtLPqb2tR1z4AbGcNJs1GJ65HnFZbl4JlRJSZUNkCloNollmUomImI61vsgvrX7eds+KAGnIR/FA3ZqcsGi0HOybcL7cLq/C53cxD6de6zjL6E3Y6cnOaJVcEZiL/Ht1DLvPjYi0oGYGYnrQmnfuvTMHXdENymDdkr5UzuzAmbLqfMoIr/VhYxFE2yFB58yfGgyCIIjq2f8CsnW4FVvBlj8wu9pgaLJDfaIt/kk10smBJrHmApWM2dBNfuAH81aOC5wH7D9NCJQsjI6t5Z8STEOUEieRlGSDGHYDD1V/mNz7W0quApyUzp2BxnNLbxwvI1i6QOUMwVf+LAgMBAAGjMjAwMB0GA1UdDgQWBBRXDQJGYiU2B9aIEfynLf86NKMKxDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQDgWGOa86eW1S706lfEMR3eHEOG8aheW1bclqFdCU//CEMTVj5y+jxgmdDi6D1VPyj6BY7xrRIc2dxK77fA3G6mnzf2NGatOUuWtfTQml2K6M8Lmsjut/G05hAM3R/DLalds1qmqmvs3+9jwguSd6FMDkZ1/we+yP3zPzByqJM2+cnAPKisGcimf/XTlImc86Qs1aCn1UW86vNsDFjHPeLKRkem23zZf1CGMxTrg1n5YWvYcLwoRK238te99h10XMVF4VzMAg6M0lMqsRcn+59P9SFNO2uHOXCpc5Z5u1b2ueP1YZ58jZMpxSyrRTByb5tomHR5C9MWdAR0Uf2KZvtN8QX0WmmxxjXzltoy9eunK57DJ7pYbFXw2WtIK31AObxL8k7d/Tj7tMtX0xD3PVT52sfdyL1B7VejcOGaia3IqmIyy3HmVaBWLqNaVLz02VTmMhfGgdufs2ElNstaIvkMVIr9sAdPhIcvi4so7oavxc3fFcZ5FMRBaOytYgmi4NIFKqdIOVWWKyKFyALDaI9ltTxeDDA9DGXFgaPWr+607z0suV4gi//RZNePt88/ofSKXJSzGHCwE+pVhMJPOT/s9Hxo/q4UtJ6sytT/10GNJ7t18uvtF5HeMXPLS3h4K/B47Zv2sjWfoApzSbGkcViHo8NRFRQkiudAt/u3zu3afQ==", "ServerSignature": "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", "BDOS": "false", "External_config_on_Pastebin": "null"}
            Source: systempreter.exeVirustotal: Detection: 68%Perma Link
            Source: systempreter.exeReversingLabs: Detection: 81%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: systempreter.exeJoe Sandbox ML: detected
            Source: systempreter.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: systempreter.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Malware configuration extractorURLs: 6.tcp.eu.ngrok.io
            Source: Yara matchFile source: systempreter.exe, type: SAMPLE
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 52.28.247.255:12925
            Source: global trafficTCP traffic: 192.168.2.4:49770 -> 3.68.171.119:12925
            Source: global trafficTCP traffic: 192.168.2.4:50020 -> 3.69.157.220:12925
            Source: Joe Sandbox ViewIP Address: 52.28.247.255 52.28.247.255
            Source: Joe Sandbox ViewIP Address: 3.68.171.119 3.68.171.119
            Source: Joe Sandbox ViewIP Address: 3.69.157.220 3.69.157.220
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: 6.tcp.eu.ngrok.io

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: systempreter.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.systempreter.exe.660000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1650931356.0000000000662000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: systempreter.exe PID: 7348, type: MEMORYSTR

            System Summary

            barindex
            Source: systempreter.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: systempreter.exe, type: SAMPLEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: systempreter.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.0.systempreter.exe.660000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.0.systempreter.exe.660000.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 0.0.systempreter.exe.660000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000000.00000000.1650931356.0000000000662000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: systempreter.exe PID: 7348, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: systempreter.exe, 00000000.00000000.1650931356.000000000066E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs systempreter.exe
            Source: systempreter.exeBinary or memory string: OriginalFilenameStub.exe" vs systempreter.exe
            Source: systempreter.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: systempreter.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: systempreter.exe, type: SAMPLEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: systempreter.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.0.systempreter.exe.660000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.0.systempreter.exe.660000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 0.0.systempreter.exe.660000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000000.00000000.1650931356.0000000000662000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: systempreter.exe PID: 7348, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: systempreter.exe, BJPVcoiNkUCc.csBase64 encoded string: 'wxU5BDdsUDGV7yg69fQaXtKF1lR3icLL4vwX5D4OJeKj5icDbrljh1HZ6AYvE0woda/OQDKKHd+kdX05vC/qzg==', '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', 'glrFacwSSK2KIg+4FZlO/HqGottNJVC/T5xHG34i+eirG/wHVDGxSQcYLM4pKACetc+AvSugmXMbN6vXLKPb2g=='
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@3/3
            Source: C:\Users\user\Desktop\systempreter.exeMutant created: NULL
            Source: C:\Users\user\Desktop\systempreter.exeMutant created: \Sessions\1\BaseNamedObjects\hDtjdONRXVCh
            Source: systempreter.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: systempreter.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\systempreter.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: systempreter.exeVirustotal: Detection: 68%
            Source: systempreter.exeReversingLabs: Detection: 81%
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeSection loaded: schannel.dllJump to behavior
            Source: systempreter.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: systempreter.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: systempreter.exe, BmMKmFunjdrwCJ.csHigh entropy of concatenated method names: 'QsakBLZLbaELC', 'nYcaIAZYDYlgEfEq', 'vtSydVRqGISO', 'oIFMNsBIdJaI', 'mLeuYBBSmnwIc', 'ZheGVjJCrfSi', 'yNoyLbOLiUmB', 'ceGZqehiIZaXXzsR', 'ldPXbEJvGR', 'VbqyFcLdzfCRZyU'

            Boot Survival

            barindex
            Source: Yara matchFile source: systempreter.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.systempreter.exe.660000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1650931356.0000000000662000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: systempreter.exe PID: 7348, type: MEMORYSTR
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: systempreter.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.systempreter.exe.660000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1650931356.0000000000662000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: systempreter.exe PID: 7348, type: MEMORYSTR
            Source: systempreter.exeBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\Desktop\systempreter.exeMemory allocated: DD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeMemory allocated: 2A70000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeMemory allocated: 2800000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exe TID: 7352Thread sleep time: -75000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: systempreter.exeBinary or memory string: vmware
            Source: systempreter.exe, 00000000.00000002.2904615907.0000000000CF2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllp
            Source: C:\Users\user\Desktop\systempreter.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeQueries volume information: C:\Users\user\Desktop\systempreter.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\systempreter.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: systempreter.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.systempreter.exe.660000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1650931356.0000000000662000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: systempreter.exe PID: 7348, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            2
            Virtualization/Sandbox Evasion
            OS Credential Dumping11
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory2
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager13
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive11
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Obfuscated Files or Information
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            systempreter.exe68%VirustotalBrowse
            systempreter.exe82%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
            systempreter.exe100%AviraTR/Dropper.Gen
            systempreter.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            6.tcp.eu.ngrok.io100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            6.tcp.eu.ngrok.io
            52.28.247.255
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              6.tcp.eu.ngrok.iotrue
              • Avira URL Cloud: malware
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              52.28.247.255
              6.tcp.eu.ngrok.ioUnited States
              16509AMAZON-02UStrue
              3.68.171.119
              unknownUnited States
              16509AMAZON-02USfalse
              3.69.157.220
              unknownUnited States
              16509AMAZON-02USfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1582633
              Start date and time:2024-12-31 07:47:06 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 0s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:systempreter.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/0@3/3
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 18
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target systempreter.exe, PID 7348 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              52.28.247.255enai2.exeGet hashmaliciousNjratBrowse
                NYQbqD59m8.exeGet hashmaliciousNanocoreBrowse
                  mhYCwt8wBz.exeGet hashmaliciousNjratBrowse
                    592CDAD0A5B0AE90E0C812AECB2677096AF06CF941CE2.exeGet hashmaliciousNjratBrowse
                      U22p1GcCSb.exeGet hashmaliciousNjratBrowse
                        M5vARlA2c4.exeGet hashmaliciousNjratBrowse
                          1.exeGet hashmaliciousNjratBrowse
                            rkIcS0Y2WY.exeGet hashmaliciousNjratBrowse
                              N1aqZIb7KG.exeGet hashmaliciousNjratBrowse
                                QsKtlzYaKF.exeGet hashmaliciousNjratBrowse
                                  3.68.171.119aaa (3).exeGet hashmaliciousAsyncRATBrowse
                                    NYQbqD59m8.exeGet hashmaliciousNanocoreBrowse
                                      1iZH7aeO5F.exeGet hashmaliciousNjratBrowse
                                        mhYCwt8wBz.exeGet hashmaliciousNjratBrowse
                                          592CDAD0A5B0AE90E0C812AECB2677096AF06CF941CE2.exeGet hashmaliciousNjratBrowse
                                            U22p1GcCSb.exeGet hashmaliciousNjratBrowse
                                              M5vARlA2c4.exeGet hashmaliciousNjratBrowse
                                                YTYyFVemXR.exeGet hashmaliciousNjratBrowse
                                                  zyx3qItgQK.exeGet hashmaliciousNjratBrowse
                                                    NfJ0jC2dPr.exeGet hashmaliciousNjratBrowse
                                                      3.69.157.220NYQbqD59m8.exeGet hashmaliciousNanocoreBrowse
                                                        ClientAny.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
                                                          mhYCwt8wBz.exeGet hashmaliciousNjratBrowse
                                                            Client.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                              YTYyFVemXR.exeGet hashmaliciousNjratBrowse
                                                                NfJ0jC2dPr.exeGet hashmaliciousNjratBrowse
                                                                  ziTLBa3N50.exeGet hashmaliciousNjratBrowse
                                                                    1.exeGet hashmaliciousNjratBrowse
                                                                      226dVJ2zRZ.exeGet hashmaliciousNjratBrowse
                                                                        myidJB8lDL.exeGet hashmaliciousNjratBrowse
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          6.tcp.eu.ngrok.ioenai2.exeGet hashmaliciousNjratBrowse
                                                                          • 52.28.247.255
                                                                          aaa (3).exeGet hashmaliciousAsyncRATBrowse
                                                                          • 3.66.38.117
                                                                          NYQbqD59m8.exeGet hashmaliciousNanocoreBrowse
                                                                          • 3.69.115.178
                                                                          ClientAny.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
                                                                          • 3.69.115.178
                                                                          1iZH7aeO5F.exeGet hashmaliciousNjratBrowse
                                                                          • 3.68.171.119
                                                                          mhYCwt8wBz.exeGet hashmaliciousNjratBrowse
                                                                          • 3.68.171.119
                                                                          592CDAD0A5B0AE90E0C812AECB2677096AF06CF941CE2.exeGet hashmaliciousNjratBrowse
                                                                          • 52.28.247.255
                                                                          U22p1GcCSb.exeGet hashmaliciousNjratBrowse
                                                                          • 3.66.38.117
                                                                          Client.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                          • 3.69.157.220
                                                                          M5vARlA2c4.exeGet hashmaliciousNjratBrowse
                                                                          • 3.68.171.119
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          AMAZON-02UShttp://ghostbin.cafe24.com/Get hashmaliciousUnknownBrowse
                                                                          • 13.32.99.103
                                                                          rjnven64.elfGet hashmaliciousMiraiBrowse
                                                                          • 54.171.230.55
                                                                          https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                          • 18.245.31.129
                                                                          Epsilon.exeGet hashmaliciousUnknownBrowse
                                                                          • 185.166.143.48
                                                                          boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                                                          • 34.249.145.219
                                                                          kwari.arm.elfGet hashmaliciousUnknownBrowse
                                                                          • 54.168.12.166
                                                                          kwari.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                          • 52.63.235.181
                                                                          kwari.arm7.elfGet hashmaliciousMiraiBrowse
                                                                          • 52.17.112.151
                                                                          boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                          • 54.171.230.55
                                                                          dlr.arm7.elfGet hashmaliciousUnknownBrowse
                                                                          • 34.249.145.219
                                                                          AMAZON-02UShttp://ghostbin.cafe24.com/Get hashmaliciousUnknownBrowse
                                                                          • 13.32.99.103
                                                                          rjnven64.elfGet hashmaliciousMiraiBrowse
                                                                          • 54.171.230.55
                                                                          https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                          • 18.245.31.129
                                                                          Epsilon.exeGet hashmaliciousUnknownBrowse
                                                                          • 185.166.143.48
                                                                          boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                                                          • 34.249.145.219
                                                                          kwari.arm.elfGet hashmaliciousUnknownBrowse
                                                                          • 54.168.12.166
                                                                          kwari.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                          • 52.63.235.181
                                                                          kwari.arm7.elfGet hashmaliciousMiraiBrowse
                                                                          • 52.17.112.151
                                                                          boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                          • 54.171.230.55
                                                                          dlr.arm7.elfGet hashmaliciousUnknownBrowse
                                                                          • 34.249.145.219
                                                                          AMAZON-02UShttp://ghostbin.cafe24.com/Get hashmaliciousUnknownBrowse
                                                                          • 13.32.99.103
                                                                          rjnven64.elfGet hashmaliciousMiraiBrowse
                                                                          • 54.171.230.55
                                                                          https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                          • 18.245.31.129
                                                                          Epsilon.exeGet hashmaliciousUnknownBrowse
                                                                          • 185.166.143.48
                                                                          boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                                                          • 34.249.145.219
                                                                          kwari.arm.elfGet hashmaliciousUnknownBrowse
                                                                          • 54.168.12.166
                                                                          kwari.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                          • 52.63.235.181
                                                                          kwari.arm7.elfGet hashmaliciousMiraiBrowse
                                                                          • 52.17.112.151
                                                                          boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                          • 54.171.230.55
                                                                          dlr.arm7.elfGet hashmaliciousUnknownBrowse
                                                                          • 34.249.145.219
                                                                          No context
                                                                          No context
                                                                          No created / dropped files found
                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Entropy (8bit):5.871614204932907
                                                                          TrID:
                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                          File name:systempreter.exe
                                                                          File size:53'760 bytes
                                                                          MD5:d07714b594ae5d7f674c7fcf6a803807
                                                                          SHA1:938efbba8d8e34c2d1dcc0db37a84f887ae6724f
                                                                          SHA256:ad8248e7dafb0a1b3d6c22dac544f0abcfab093a75561e534a473d46917f1d47
                                                                          SHA512:487306ea6bdd7e247c9b194eae6d1e22fe898161f6417eb773c84144584cfb96c4d47d188f38a349cee7b13887f3fdf81b5542ac914cfe072beb564899553250
                                                                          SSDEEP:1536:RuPfZTgKa2pvKBk+cabGrpgaQFezdDFdKHx:RuPBTgKa2FKBk+TbGOYzV2x
                                                                          TLSH:1D334C0477E9812AF3BE8F746CF25215857BF2673603E64D2CC4519B5A23FC28A429F9
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....-e............................N.... ........@.. ....................... ............@................................
                                                                          Icon Hash:0f9b98995d291b0e
                                                                          Entrypoint:0x40d04e
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x652DADE5 [Mon Oct 16 21:40:53 2023 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                          Instruction
                                                                          jmp dword ptr [00402000h]
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xcff40x57.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x1b80.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x20000xb0540xb200e996bff240d39bb787c93f6ff72c0bf9False0.5405986657303371data5.612583093172456IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rsrc0xe0000x1b800x1c0089176ee62eb6bcb546e3db18443c712eFalse0.77734375data7.271210236709125IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0x100000xc0x20091caef5211b2a1365e139b0b7bf07352False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0xe1300x12dcPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9391052195526097
                                                                          RT_GROUP_ICON0xf40c0x14data0.95
                                                                          RT_VERSION0xf4200x2ccdata0.43575418994413406
                                                                          RT_MANIFEST0xf6ec0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                                                                          DLLImport
                                                                          mscoree.dll_CorExeMain
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 31, 2024 07:47:59.556441069 CET4973012925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:47:59.561599016 CET129254973052.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:47:59.561695099 CET4973012925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:47:59.573543072 CET4973012925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:47:59.578393936 CET129254973052.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:01.190330029 CET129254973052.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:01.190577984 CET4973012925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:06.255949020 CET4973012925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:06.261038065 CET129254973052.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:06.267894030 CET4973112925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:06.272819042 CET129254973152.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:06.272897959 CET4973112925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:06.278692961 CET4973112925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:06.283540010 CET129254973152.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:07.907382011 CET129254973152.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:07.907449961 CET4973112925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:12.921602011 CET4973112925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:12.922456980 CET4973312925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:12.926592112 CET129254973152.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:12.927366018 CET129254973352.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:12.927443027 CET4973312925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:12.927753925 CET4973312925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:12.932662964 CET129254973352.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:14.565468073 CET129254973352.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:14.565546989 CET4973312925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:19.577899933 CET4973312925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:19.579251051 CET4973912925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:19.582835913 CET129254973352.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:19.584172010 CET129254973952.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:19.584263086 CET4973912925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:19.584609032 CET4973912925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:19.589489937 CET129254973952.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:21.220940113 CET129254973952.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:21.221029997 CET4973912925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:26.249933004 CET4973912925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:26.251238108 CET4974012925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:26.254828930 CET129254973952.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:26.256175041 CET129254974052.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:26.256253958 CET4974012925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:26.256593943 CET4974012925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:26.261415005 CET129254974052.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:27.891948938 CET129254974052.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:27.892066002 CET4974012925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:32.929754019 CET4974012925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:32.933684111 CET4974112925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:32.934803009 CET129254974052.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:32.938668013 CET129254974152.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:32.938749075 CET4974112925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:32.939076900 CET4974112925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:32.943902969 CET129254974152.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:34.563517094 CET129254974152.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:34.563606024 CET4974112925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:39.577929020 CET4974112925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:39.578835964 CET4974212925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:39.582954884 CET129254974152.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:39.583760023 CET129254974252.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:39.583846092 CET4974212925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:39.584115982 CET4974212925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:39.588964939 CET129254974252.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:41.223684072 CET129254974252.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:41.223839998 CET4974212925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:46.234083891 CET4974212925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:46.235025883 CET4974312925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:46.238969088 CET129254974252.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:46.239835978 CET129254974352.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:46.239912033 CET4974312925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:46.240160942 CET4974312925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:46.244976044 CET129254974352.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:47.877999067 CET129254974352.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:47.878103971 CET4974312925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:52.890522957 CET4974312925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:52.891688108 CET4974512925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:52.895457983 CET129254974352.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:52.896619081 CET129254974552.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:52.896703959 CET4974512925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:52.897038937 CET4974512925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:52.901874065 CET129254974552.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:54.583868027 CET129254974552.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:54.583952904 CET4974512925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:59.593529940 CET4974512925192.168.2.452.28.247.255
                                                                          Dec 31, 2024 07:48:59.598350048 CET129254974552.28.247.255192.168.2.4
                                                                          Dec 31, 2024 07:48:59.603467941 CET4977012925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:48:59.608350992 CET12925497703.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:48:59.608427048 CET4977012925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:48:59.608675003 CET4977012925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:48:59.613504887 CET12925497703.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:01.254146099 CET12925497703.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:01.255491018 CET4977012925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:06.314870119 CET4977012925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:06.319761992 CET12925497703.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:06.351495028 CET4981312925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:06.356379032 CET12925498133.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:06.356467962 CET4981312925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:06.356775045 CET4981312925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:06.361618042 CET12925498133.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:08.008217096 CET12925498133.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:08.008383989 CET4981312925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:13.015333891 CET4981312925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:13.016061068 CET4985812925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:13.020207882 CET12925498133.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:13.020936012 CET12925498583.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:13.020993948 CET4985812925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:13.021300077 CET4985812925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:13.026117086 CET12925498583.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:14.657023907 CET12925498583.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:14.657089949 CET4985812925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:19.671828985 CET4985812925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:19.676090956 CET4989912925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:19.676692009 CET12925498583.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:19.680864096 CET12925498993.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:19.680958033 CET4989912925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:19.685019016 CET4989912925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:19.689821005 CET12925498993.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:21.336112022 CET12925498993.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:21.336210012 CET4989912925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:26.343463898 CET4989912925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:26.344388008 CET4994112925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:26.348196030 CET12925498993.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:26.349175930 CET12925499413.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:26.349240065 CET4994112925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:26.349546909 CET4994112925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:26.354305983 CET12925499413.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:27.987178087 CET12925499413.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:27.987246037 CET4994112925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:32.999825001 CET4994112925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:33.000515938 CET4998712925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:33.005639076 CET12925499413.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:33.006093025 CET12925499873.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:33.006164074 CET4998712925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:33.006429911 CET4998712925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:33.012228012 CET12925499873.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:34.646500111 CET12925499873.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:34.646570921 CET4998712925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:39.656047106 CET4998712925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:39.656856060 CET5001712925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:39.660875082 CET12925499873.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:39.661664963 CET12925500173.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:39.661998987 CET5001712925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:39.661998987 CET5001712925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:39.666862965 CET12925500173.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:41.334784031 CET12925500173.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:41.334866047 CET5001712925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:46.345911026 CET5001712925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:46.346745014 CET5001812925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:46.350858927 CET12925500173.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:46.351615906 CET12925500183.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:46.351685047 CET5001812925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:46.351982117 CET5001812925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:46.358218908 CET12925500183.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:47.987051010 CET12925500183.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:47.987258911 CET5001812925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:52.999809027 CET5001812925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:53.000613928 CET5001912925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:53.004700899 CET12925500183.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:53.005455971 CET12925500193.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:53.005533934 CET5001912925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:53.005747080 CET5001912925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:53.010478973 CET12925500193.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:54.644020081 CET12925500193.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:54.644109011 CET5001912925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:59.656024933 CET5001912925192.168.2.43.68.171.119
                                                                          Dec 31, 2024 07:49:59.660933018 CET12925500193.68.171.119192.168.2.4
                                                                          Dec 31, 2024 07:49:59.666923046 CET5002012925192.168.2.43.69.157.220
                                                                          Dec 31, 2024 07:49:59.671720028 CET12925500203.69.157.220192.168.2.4
                                                                          Dec 31, 2024 07:49:59.671788931 CET5002012925192.168.2.43.69.157.220
                                                                          Dec 31, 2024 07:49:59.672070980 CET5002012925192.168.2.43.69.157.220
                                                                          Dec 31, 2024 07:49:59.676855087 CET12925500203.69.157.220192.168.2.4
                                                                          Dec 31, 2024 07:50:01.300278902 CET12925500203.69.157.220192.168.2.4
                                                                          Dec 31, 2024 07:50:01.300441980 CET5002012925192.168.2.43.69.157.220
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 31, 2024 07:47:59.545031071 CET6127253192.168.2.41.1.1.1
                                                                          Dec 31, 2024 07:47:59.554557085 CET53612721.1.1.1192.168.2.4
                                                                          Dec 31, 2024 07:48:59.594152927 CET5719153192.168.2.41.1.1.1
                                                                          Dec 31, 2024 07:48:59.602905035 CET53571911.1.1.1192.168.2.4
                                                                          Dec 31, 2024 07:49:59.657412052 CET6081653192.168.2.41.1.1.1
                                                                          Dec 31, 2024 07:49:59.666197062 CET53608161.1.1.1192.168.2.4
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Dec 31, 2024 07:47:59.545031071 CET192.168.2.41.1.1.10xc148Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                          Dec 31, 2024 07:48:59.594152927 CET192.168.2.41.1.1.10x11c7Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                          Dec 31, 2024 07:49:59.657412052 CET192.168.2.41.1.1.10x51b6Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Dec 31, 2024 07:47:59.554557085 CET1.1.1.1192.168.2.40xc148No error (0)6.tcp.eu.ngrok.io52.28.247.255A (IP address)IN (0x0001)false
                                                                          Dec 31, 2024 07:48:59.602905035 CET1.1.1.1192.168.2.40x11c7No error (0)6.tcp.eu.ngrok.io3.68.171.119A (IP address)IN (0x0001)false
                                                                          Dec 31, 2024 07:49:59.666197062 CET1.1.1.1192.168.2.40x51b6No error (0)6.tcp.eu.ngrok.io3.69.157.220A (IP address)IN (0x0001)false

                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Target ID:0
                                                                          Start time:01:47:54
                                                                          Start date:31/12/2024
                                                                          Path:C:\Users\user\Desktop\systempreter.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\systempreter.exe"
                                                                          Imagebase:0x660000
                                                                          File size:53'760 bytes
                                                                          MD5 hash:D07714B594AE5D7F674C7FCF6A803807
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1650931356.0000000000662000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.1650931356.0000000000662000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Reset < >
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: a^q$ a^q$xbq
                                                                            • API String ID: 0-2081302502
                                                                            • Opcode ID: 661fb3ef5e2c43c4a7976cae53186bb25014abea03418d7f89d9b29dd2f770a0
                                                                            • Instruction ID: 24c08270485e697f8602504690aa46f015984ef6d602d47e6173871c753445f8
                                                                            • Opcode Fuzzy Hash: 661fb3ef5e2c43c4a7976cae53186bb25014abea03418d7f89d9b29dd2f770a0
                                                                            • Instruction Fuzzy Hash: E6028E34700214CFCB15AF64E994B6EBBE2FB84304F248969E4059B3A9DF75DD86CB81
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: a^q$ a^q$xbq
                                                                            • API String ID: 0-2081302502
                                                                            • Opcode ID: dc176cd9d1043f99e8224cb39b204ef9558dd46d62c3d9287bc829d541289e69
                                                                            • Instruction ID: 05d72303d6570578205378a5529b6fa0185dbe8b6a2f77c19e4463e181c0faf5
                                                                            • Opcode Fuzzy Hash: dc176cd9d1043f99e8224cb39b204ef9558dd46d62c3d9287bc829d541289e69
                                                                            • Instruction Fuzzy Hash: 19619E747002108FC709EF28E894B5EBBE2FB85314F208969E5059F3A6DBB1ED458BC1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: (bq$Te^q
                                                                            • API String ID: 0-2856382362
                                                                            • Opcode ID: 7e26b55b8aef036431076e3244183003fbcdb87ae4f988879404d432148c6a56
                                                                            • Instruction ID: a513563853c6984b4b4eed3fa2a39d457ba0cc6440b0f5ac24ab7c31f584d96e
                                                                            • Opcode Fuzzy Hash: 7e26b55b8aef036431076e3244183003fbcdb87ae4f988879404d432148c6a56
                                                                            • Instruction Fuzzy Hash: 8651A030B101148FC754DF69D498A5EBBF6FF89700F2580AAE805EB3A6CB75DD058B90
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Hbq$dLdq
                                                                            • API String ID: 0-411705877
                                                                            • Opcode ID: c2b4617064fd6ba9513936b6a937ec7dc6b13bd6a7a507610a65f6c5decd4214
                                                                            • Instruction ID: dc8b8a10597f0e9b0a8895fe17deec29c6affba4d5334e0db7bb745996232c56
                                                                            • Opcode Fuzzy Hash: c2b4617064fd6ba9513936b6a937ec7dc6b13bd6a7a507610a65f6c5decd4214
                                                                            • Instruction Fuzzy Hash: F441BF317002148FCB15DF69D494AAEBBF6BF89300F1544AAE506EB3A2CA359C09CB91
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LR^q
                                                                            • API String ID: 0-2625958711
                                                                            • Opcode ID: 1ba78c384e7b679631b54ac4032f69d171af5d4f11da2f29000aff189ed0bf85
                                                                            • Instruction ID: c3bf884f898e9e0cf9baad23cc233a4a46a83fdf94d7daebccc1e9ed8ebf8bde
                                                                            • Opcode Fuzzy Hash: 1ba78c384e7b679631b54ac4032f69d171af5d4f11da2f29000aff189ed0bf85
                                                                            • Instruction Fuzzy Hash: 6A31E234F002658FCB04EB7C949066EBBF6EFC5214B1041A9E509EB3A5EE30CD028792
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: dLdq
                                                                            • API String ID: 0-3390252261
                                                                            • Opcode ID: f221aabc8e87a3ef3fc308d8dd20c09386fd342dcca98019f43bc2b17a4b9616
                                                                            • Instruction ID: 13192981f379c00a3a4f73350a816d0003db4e0289d2d031b7b9936c7f7b9be2
                                                                            • Opcode Fuzzy Hash: f221aabc8e87a3ef3fc308d8dd20c09386fd342dcca98019f43bc2b17a4b9616
                                                                            • Instruction Fuzzy Hash: 2E316135A002148FDB14DF69D488B9EBBF2FF88304F149569D401AB3A2CB75ED49CB91
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Hbq
                                                                            • API String ID: 0-1245868
                                                                            • Opcode ID: f69ccabf6f4e7d56bd5ee1c5fe34cd7b94b64d8ab5bcc14e0360e31deb5e8c4f
                                                                            • Instruction ID: fc282acc913b00de5733a5750e3aa91dde42ce6f07e623fd49ed6f3e1601c02a
                                                                            • Opcode Fuzzy Hash: f69ccabf6f4e7d56bd5ee1c5fe34cd7b94b64d8ab5bcc14e0360e31deb5e8c4f
                                                                            • Instruction Fuzzy Hash: 2FF0C8313042945FC355AB7DA85452E3BE7BFCB25076508F6E109DB3A3DD248C0A8365
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a571b8ee20163da08b1cd1bf7d9a5d15d59a81de106b74d3192c6398c33eecdf
                                                                            • Instruction ID: fdb7d443c999c72512b5d3a7e662044ce433d6fc13a3d20096abdd29515948ac
                                                                            • Opcode Fuzzy Hash: a571b8ee20163da08b1cd1bf7d9a5d15d59a81de106b74d3192c6398c33eecdf
                                                                            • Instruction Fuzzy Hash: 7A51F978200215CFCB06FB74EDC465A7B62FB853857118668D4068B3ADDB75A94BEFC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 261bbbde5aab2c0e11699892bfd7db281cfe1c79e96ac44ad8e4580fbfada26a
                                                                            • Instruction ID: d1bfe1a86568b59b72b8e1181173bb5c199478a3d2ee4f3d608726875e551413
                                                                            • Opcode Fuzzy Hash: 261bbbde5aab2c0e11699892bfd7db281cfe1c79e96ac44ad8e4580fbfada26a
                                                                            • Instruction Fuzzy Hash: 3241A271F04219AFCB04EFB9D54466EBBFAEF88300F2085A9D449E7355DA349E418B91
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5197a338f3243837066fcc2db073d6c845814adabbf3f18e1496e1ea6056833b
                                                                            • Instruction ID: 2369251a7a33ec3f0e0788ac9187a4fd9667335e2689338029b4d1083900abd7
                                                                            • Opcode Fuzzy Hash: 5197a338f3243837066fcc2db073d6c845814adabbf3f18e1496e1ea6056833b
                                                                            • Instruction Fuzzy Hash: 6621CFB8B003628FDF69AB74B84836E3BA4BF51349B54642DD407E21E3EB208941CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904539111.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c3d000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8a0c8cc8db5d5227029ee62d63f0e6d56b7542ebbb6f53b00f8cdab84fd74037
                                                                            • Instruction ID: cc858e52f657e6d179213865a157037dc3507c30e07f755f444a270cecc02cf0
                                                                            • Opcode Fuzzy Hash: 8a0c8cc8db5d5227029ee62d63f0e6d56b7542ebbb6f53b00f8cdab84fd74037
                                                                            • Instruction Fuzzy Hash: 8F2137B1554200DFDB05DF14E9C0B27BF65FB98318F20C169E90B0B256C336D956CBA2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1ee634c8ae1a6e667de8569d2a7696e60aa9be73dddeb8102b0f8f4215a6633a
                                                                            • Instruction ID: 06280608a2cd0d69f2563d8f4f580c8d38ce611187d30644af86eca6914e7c4c
                                                                            • Opcode Fuzzy Hash: 1ee634c8ae1a6e667de8569d2a7696e60aa9be73dddeb8102b0f8f4215a6633a
                                                                            • Instruction Fuzzy Hash: 27219FB87003268FDF68ABB5B84836E3BA4BF4134975064299407E21D3EA30C941DBA2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fb714cb9cca7b683fac9326fbc1ef31d1c006de502f9a701f880943632ff06f3
                                                                            • Instruction ID: 9f40e9454ecb2702f2e599e77fbe7ec9bf814ca5cf7853d1de6904a3d9587f0f
                                                                            • Opcode Fuzzy Hash: fb714cb9cca7b683fac9326fbc1ef31d1c006de502f9a701f880943632ff06f3
                                                                            • Instruction Fuzzy Hash: 7411AC74A00229DFCB50EBB8D884A9A7BF5EF89344B2504B9D009DB364EB30DD06DB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904539111.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c3d000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                            • Instruction ID: 6830b3543a885ad5250c6f963b5470026f195452370f425ada68f6923aa412c3
                                                                            • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                            • Instruction Fuzzy Hash: D811D3B6904240CFDB16CF14D5C4B16BF72FB94324F24C5A9D90A0B256C336D95ACBA2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 16d5970d908eab58b9863c906473d0fa4027f666cd59b8ca8825308bb525dd4f
                                                                            • Instruction ID: a22cd50f7c80fde593f5ebc7b79cd690c699efa2d3ab8ed57a35038237ae2604
                                                                            • Opcode Fuzzy Hash: 16d5970d908eab58b9863c906473d0fa4027f666cd59b8ca8825308bb525dd4f
                                                                            • Instruction Fuzzy Hash: 1D116D74B00218DFCB54EBB9E944A6A7BE6FF8934571108B9D40ADB354EA31DD02CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4e8efed0e1a6ab587b9ec9d9fd66f0505b278578ade2e83c4c012fcfec81e261
                                                                            • Instruction ID: 62828e58996def9b25c26e97f1fa354a4761f708b6174af0935c9f8324d5c876
                                                                            • Opcode Fuzzy Hash: 4e8efed0e1a6ab587b9ec9d9fd66f0505b278578ade2e83c4c012fcfec81e261
                                                                            • Instruction Fuzzy Hash: 26018F75B012228FDF18EFA8A491BAE77F0EF54304B0540AEC816A7692DB705E06DB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 18657d852a24010bf324d0c76c4b65948955b7dda5a6abbc71ef86eb375d0bf1
                                                                            • Instruction ID: df5ee73c9a02ec1c69499392fc5e67696b7456960ff8e863c5087230a4afdf3a
                                                                            • Opcode Fuzzy Hash: 18657d852a24010bf324d0c76c4b65948955b7dda5a6abbc71ef86eb375d0bf1
                                                                            • Instruction Fuzzy Hash: 5CC08CB820472BCFD72527A0F90C76C3D10BB82306F902152A003540F38EB40940871B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2904801949.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_e20000_systempreter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3cc8416c5ec48aa8f0f5c13e70c7ddb5fb24b2d3448bf8afebbc76e275fbe092
                                                                            • Instruction ID: 6812c7a56fbe976b6e041d32de6c6eea4baf97d9a22acff4ef6e94a355698549
                                                                            • Opcode Fuzzy Hash: 3cc8416c5ec48aa8f0f5c13e70c7ddb5fb24b2d3448bf8afebbc76e275fbe092
                                                                            • Instruction Fuzzy Hash: 19C08CB8204B6ECFDB2527A0F90C76C3E10B782306F902157A003540F38EB409808B1B