Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IwSPayUcGx.exe

Overview

General Information

Sample name:IwSPayUcGx.exe
renamed because original name is a hash value
Original sample name:210e2e98bf88e3dd17e8ac1b8bdef59cd8fd93dcc5c579bf3a59830b30bc9052.exe
Analysis ID:1546360
MD5:610f78dab4043f4ab8d964e226d6edcb
SHA1:383a33247a84f1e5a23334ea1a353d2e6aa7e855
SHA256:210e2e98bf88e3dd17e8ac1b8bdef59cd8fd93dcc5c579bf3a59830b30bc9052
Tags:exeuser-Chainskilabs
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
One or more processes crash
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • IwSPayUcGx.exe (PID: 4764 cmdline: "C:\Users\user\Desktop\IwSPayUcGx.exe" MD5: 610F78DAB4043F4AB8D964E226D6EDCB)
    • WerFault.exe (PID: 3276 cmdline: C:\Windows\system32\WerFault.exe -u -p 4764 -s 1652 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
{"C2 url": ["23.ip.gl.ply.gg", "147.185.221.23"], "Port": "40630", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
IwSPayUcGx.exeJoeSecurity_XWormYara detected XWormJoe Security
    IwSPayUcGx.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      IwSPayUcGx.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xc7ed:$s6: VirtualBox
      • 0xc74b:$s8: Win32_ComputerSystem
      • 0xd5db:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xd678:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xd78d:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xd363:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2303303400.000000000263C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000000.2032779166.0000000000332000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          00000000.00000000.2032779166.0000000000332000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0xc5ed:$s6: VirtualBox
          • 0xc54b:$s8: Win32_ComputerSystem
          • 0xd3db:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0xd478:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0xd58d:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0xd163:$cnc4: POST / HTTP/1.1
          Process Memory Space: IwSPayUcGx.exe PID: 4764JoeSecurity_XWormYara detected XWormJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.IwSPayUcGx.exe.330000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
              0.0.IwSPayUcGx.exe.330000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.0.IwSPayUcGx.exe.330000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                • 0xc7ed:$s6: VirtualBox
                • 0xc74b:$s8: Win32_ComputerSystem
                • 0xd5db:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                • 0xd678:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                • 0xd78d:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                • 0xd363:$cnc4: POST / HTTP/1.1
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-31T20:11:18.944503+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549712TCP
                2024-10-31T20:11:56.923215+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549918TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: IwSPayUcGx.exeAvira: detected
                Source: IwSPayUcGx.exeMalware Configuration Extractor: Xworm {"C2 url": ["23.ip.gl.ply.gg", "147.185.221.23"], "Port": "40630", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
                Source: IwSPayUcGx.exeReversingLabs: Detection: 84%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: IwSPayUcGx.exeJoe Sandbox ML: detected
                Source: IwSPayUcGx.exeString decryptor: 23.ip.gl.ply.gg,147.185.221.23
                Source: IwSPayUcGx.exeString decryptor: 40630
                Source: IwSPayUcGx.exeString decryptor: <123456789>
                Source: IwSPayUcGx.exeString decryptor: <Xwormmm>
                Source: IwSPayUcGx.exeString decryptor: XWorm V5.6
                Source: IwSPayUcGx.exeString decryptor: USB.exe
                Source: IwSPayUcGx.exeString decryptor: %AppData%
                Source: IwSPayUcGx.exeString decryptor: svchost.exe
                Source: IwSPayUcGx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: IwSPayUcGx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Xml.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: mscorlib.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.ni.pdbRSDS source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.pdbq1 source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Management.ni.pdbRSDSJ< source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Management.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: mscorlib.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Management.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Core.pdb_ source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Core.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Configuration.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Configuration.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Xml.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Core.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WEREE8F.tmp.dmp.4.dr

                Networking

                barindex
                Source: Malware configuration extractorURLs: 23.ip.gl.ply.gg
                Source: Malware configuration extractorURLs: 147.185.221.23
                Source: Yara matchFile source: IwSPayUcGx.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.IwSPayUcGx.exe.330000.0.unpack, type: UNPACKEDPE
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                Source: unknownDNS query: name: ip-api.com
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49712
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49918
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: ip-api.com
                Source: IwSPayUcGx.exe, 00000000.00000002.2303303400.00000000026D9000.00000004.00000800.00020000.00000000.sdmp, IwSPayUcGx.exe, 00000000.00000002.2303303400.00000000026F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                Source: IwSPayUcGx.exeString found in binary or memory: http://ip-api.com/line/?fields=hosting
                Source: IwSPayUcGx.exe, 00000000.00000002.2303303400.00000000026D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

                System Summary

                barindex
                Source: IwSPayUcGx.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 0.0.IwSPayUcGx.exe.330000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000000.00000000.2032779166.0000000000332000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeCode function: 0_2_00007FF848E96BF20_2_00007FF848E96BF2
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeCode function: 0_2_00007FF848E921110_2_00007FF848E92111
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeCode function: 0_2_00007FF848E916D90_2_00007FF848E916D9
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeCode function: 0_2_00007FF848E95E460_2_00007FF848E95E46
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeCode function: 0_2_00007FF848E925EE0_2_00007FF848E925EE
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeCode function: 0_2_00007FF848E90FF80_2_00007FF848E90FF8
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4764 -s 1652
                Source: IwSPayUcGx.exe, 00000000.00000000.2032795412.0000000000384000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename771c52bb91daf4db02a5.exe4 vs IwSPayUcGx.exe
                Source: IwSPayUcGx.exeBinary or memory string: OriginalFilename771c52bb91daf4db02a5.exe4 vs IwSPayUcGx.exe
                Source: IwSPayUcGx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: IwSPayUcGx.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 0.0.IwSPayUcGx.exe.330000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000000.00000000.2032779166.0000000000332000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: IwSPayUcGx.exe, ItRQGkfHmRTnb3UaaUyPcxLdtyfIk4uvxqJKeUZfG6HokcNro5lAya56OAzyWlsYe4nUI0.csCryptographic APIs: 'TransformFinalBlock'
                Source: IwSPayUcGx.exe, ItRQGkfHmRTnb3UaaUyPcxLdtyfIk4uvxqJKeUZfG6HokcNro5lAya56OAzyWlsYe4nUI0.csCryptographic APIs: 'TransformFinalBlock'
                Source: IwSPayUcGx.exe, 0kbHdTnYMVZJnJ7eBqAY21TiTOET3uflaL5yWlccI8dfcopefQT01yy8yYvcoSd6mAVS8R.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@1/1
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeMutant created: NULL
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeMutant created: \Sessions\1\BaseNamedObjects\9EabU8PCoH81Ulv6
                Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4764
                Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e5f31d4d-ae0e-4322-a8b8-fe6287c9097aJump to behavior
                Source: IwSPayUcGx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: IwSPayUcGx.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: IwSPayUcGx.exeReversingLabs: Detection: 84%
                Source: unknownProcess created: C:\Users\user\Desktop\IwSPayUcGx.exe "C:\Users\user\Desktop\IwSPayUcGx.exe"
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4764 -s 1652
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: IwSPayUcGx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: IwSPayUcGx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Xml.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: mscorlib.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.ni.pdbRSDS source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.pdbq1 source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Management.ni.pdbRSDSJ< source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Management.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: mscorlib.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Management.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Core.pdb_ source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Core.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Configuration.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Configuration.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Xml.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: System.Core.ni.pdb source: WEREE8F.tmp.dmp.4.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WEREE8F.tmp.dmp.4.dr

                Data Obfuscation

                barindex
                Source: IwSPayUcGx.exe, HiHvEN3q7E4EXFa1w4GjyxzzabOuDPWLPqkB79Bs7VmcdqvT8XLwkqJ5SO3gRnyOHRToXkmToznlqGOjPnKtW.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{KsJt8tAoMDStvhDRg9pCig6k9pACgeas6QIyqlULuUZTD2Pj0408USYIVZb7OwoM1mxUbMU6Iot40VWd4BYIY._79PWGXonsEtgobZrnnqEKfAGcMEvgIzSuJsHrArPCHppBhqXJeIo8ORbSicOkifbFV0oCiuQstRBdiHd8H7oO,KsJt8tAoMDStvhDRg9pCig6k9pACgeas6QIyqlULuUZTD2Pj0408USYIVZb7OwoM1mxUbMU6Iot40VWd4BYIY.OxLg3BsZxN8QuGvksgiRgmd9VZx0EjM04pf2FJD9ZPVUQ6hFP6gmY7B1GJsevDRWcLylZLP3eaNN73LN0gNT5,KsJt8tAoMDStvhDRg9pCig6k9pACgeas6QIyqlULuUZTD2Pj0408USYIVZb7OwoM1mxUbMU6Iot40VWd4BYIY.H03EGrfAshI1KBsuEb73NbjuJG1Ki61uz1zMGaBbe9CMAsdKDou1vWtASyQx4ZdjYlOsf9BEhZOB6Vcipf1AQ,KsJt8tAoMDStvhDRg9pCig6k9pACgeas6QIyqlULuUZTD2Pj0408USYIVZb7OwoM1mxUbMU6Iot40VWd4BYIY.UQoHPRpZAlIaSljA5Pw80UKNHQQohxxzVzXheDbBARTYMFXHIw4SL0CWC8gfwrN0j8xxHLNC2eHCFLNq6yD0c,ItRQGkfHmRTnb3UaaUyPcxLdtyfIk4uvxqJKeUZfG6HokcNro5lAya56OAzyWlsYe4nUI0.YKFsaQfEYqCFFgzWKf4seja9WTIyNcz1nZuhzoMH3wI3ZUZqucvqs0hjoN7R1dCiqryS6K()}}, (string[])null, (Type[])null, (bool[])null, true)
                Source: IwSPayUcGx.exe, HiHvEN3q7E4EXFa1w4GjyxzzabOuDPWLPqkB79Bs7VmcdqvT8XLwkqJ5SO3gRnyOHRToXkmToznlqGOjPnKtW.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{H2K2Yr7yGt0Kj0uPdcK3q9CXwVL5vqlbIg6MC3654mY7v2LlhAskoaF7ENypIxKfveEqgk[2],ItRQGkfHmRTnb3UaaUyPcxLdtyfIk4uvxqJKeUZfG6HokcNro5lAya56OAzyWlsYe4nUI0.cnGyv04GrkulpbkZQ7twu5J72TitBoGzLpLOAxfJrRZZc2JMYx6oSrakLixKWBZVvHox6M(Convert.FromBase64String(H2K2Yr7yGt0Kj0uPdcK3q9CXwVL5vqlbIg6MC3654mY7v2LlhAskoaF7ENypIxKfveEqgk[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                Source: IwSPayUcGx.exe, HiHvEN3q7E4EXFa1w4GjyxzzabOuDPWLPqkB79Bs7VmcdqvT8XLwkqJ5SO3gRnyOHRToXkmToznlqGOjPnKtW.cs.Net Code: fBcNUTM5FMFo5XgzuKWwO8tzzPRGrMLGtDNqgB9HluP1SCHPLhqlAoSC9MGAyiRkgO8JpguRuHTfCTMUWdAYF System.AppDomain.Load(byte[])
                Source: IwSPayUcGx.exe, HiHvEN3q7E4EXFa1w4GjyxzzabOuDPWLPqkB79Bs7VmcdqvT8XLwkqJ5SO3gRnyOHRToXkmToznlqGOjPnKtW.cs.Net Code: fHz2DN9dbTjxn1uzf6b7MpIB3Uof0O7GfkP14roXeQOVgvFE4wCAGZ4qhnEpe9s4r3eUaF System.AppDomain.Load(byte[])
                Source: IwSPayUcGx.exe, HiHvEN3q7E4EXFa1w4GjyxzzabOuDPWLPqkB79Bs7VmcdqvT8XLwkqJ5SO3gRnyOHRToXkmToznlqGOjPnKtW.cs.Net Code: fHz2DN9dbTjxn1uzf6b7MpIB3Uof0O7GfkP14roXeQOVgvFE4wCAGZ4qhnEpe9s4r3eUaF
                Source: IwSPayUcGx.exe, rNi7Uc0PJlUmHvWx4lEe1U5uOU1RJh2elX5knW7YYnaxubZW3Pi5w5l1fDjLe5APUkPKmA.csHigh entropy of concatenated method names: 'PzRhFTCcHIluvhkwUrPkwN18fOMHXQ99Ch4WrksLLRoTfpyAHpb6veBVo8vcmTRyLhqi3n', 'iIDx64fp0c5nMQt53PrbvfGlrDaK11Ts6ZaqOYABJ9tVFySjtK12ymkXj6ZE8qu8wsu1nD', 'vrGjI8pRNd19NHdw7joE1q595fgCp7LLIeGhDhR9JfAkSb7o7eVYwsGtvd3oUjrX4lbaZ5', '_3RmeH2PDLPTA', 'qDqK9zl1oGdE', 'vxeud1EOLUdl', 'PcUeZWGzGxVe', '_04GrTvQaUdAX', '_2QZv7rDob0d5', 'LHwVDDnATyys'
                Source: IwSPayUcGx.exe, lVzG122TJzLRYVJjDCFUummbVfjrrw3YKSg2ODIXIbCZx9ZWoGPG5e1BgsmiNlCwCXdGRN.csHigh entropy of concatenated method names: 'xKA7pmZsLpVXm5uXbIrsSDrweXoujNdzifvtkiNEVxLWgpiypCCMX6TT6qZdZsCQP6NB8e', 'DNrmBuOlM5lw26e802qrY5yr23R1s23XTXpQVnI6e0WzpEg8YvyD9Y4gbXpUDBzk4ff5Sv', 'yqRSmGPXPbsMOMx30o2E2OZIFhBiwN73kjNxjtqiNCk1r0Oa1NTDpS0CG3bjM01ijmRddD', 'DqTnHbsjIAYNt5bBkRt2vUnDLC3gHkJIi3soiSWAk1Uu4ZBUQCpZAJxiphZnNXSAacaMGD', 'SRukC8WQ9TTH', '_8RFKPpyOahkZ', '_1I8fcBEg3WWm', 'Zn0dCZNKwbwk', 'soeDZA8VG3Q3', 'trezy31LSwRi'
                Source: IwSPayUcGx.exe, ItRQGkfHmRTnb3UaaUyPcxLdtyfIk4uvxqJKeUZfG6HokcNro5lAya56OAzyWlsYe4nUI0.csHigh entropy of concatenated method names: '_3GPZropu44ZYdQVLmYzOEm7pXSiI10QMInafRLupvxNWtTowelZo9wvnoyCnry7vTujHo9', 'ip7NEBGkzfGd4FjKRzwBmcFI4tGQLdOre0MyyaoAbnUhqXKaZJ9Lm3M4FS1xbJ07nJvU4n', 'GqdizgcxT9TkZiB638IGgjOZdfvsAUiTieRYJf7eoGTGd04itRu2aMvi9YULVFrWye8hn8', 'HHo6Jxt9T5aumuDB0po7A6T8bHu1QLdDt0CHdGE2WGrmBhj5HjQ1ksfbYqCAARfvNFDNpQ', 'dzrzEDLdTfzAicJFlPYRC4LlnRYT8B3FHcOwdifKPNrHTdy2HCBRrKKkkBlcHlXDfZ6Rqa', 'R3cGoBuLKmPSinEmqEnN4hE4HKa5ycWHFurFDq2BjmYwZ2o2mTMfsHR6DaUontzcNxtEkO', 'nY91ZecuPTm1cCHfKX6Cx87NjFuW4Fu0wMrYJO05442woANwhF6R6BwG1icBeC7x06XGLP', 'MW1RZJYvITY19NtIdq35TY4bL9pJiLfb0bddjFQI2ljJdZFAQxQBYsukbj4aPDc1r0pxGJ', 'XuDj1E21FKKcY2afnE9jL0CoR44Bx5X1VVAZdK33MK8eVwngS09AQXl9J0j50bSvcZI9Ir', 'CkbqyEpR6jwakmgCY8N3Umff0pRSS3WDoBAmDlYkJ7EB8VYFV4JkSOSkaxAHxyu17WWVmp'
                Source: IwSPayUcGx.exe, HiHvEN3q7E4EXFa1w4GjyxzzabOuDPWLPqkB79Bs7VmcdqvT8XLwkqJ5SO3gRnyOHRToXkmToznlqGOjPnKtW.csHigh entropy of concatenated method names: 'ceq4Ykx4tqeMFN5ZqXUfahAZ6CfaoQbBrdzhwF4caX9p3GH8XB6MqVMoZiph0B2gtrmpak1Ne9kFl1cmjWDxw', 'fBcNUTM5FMFo5XgzuKWwO8tzzPRGrMLGtDNqgB9HluP1SCHPLhqlAoSC9MGAyiRkgO8JpguRuHTfCTMUWdAYF', 'sRmziQqBht6ckxMXSvKFWvKNF8mK5zcQst8GueI110wzC8UUly2X6mGxdvINposzr46eqDLx7WmrVuwJ06xAM', 'wbeTv3oGF7U0BlcBU0xtpfwNuEWAP7DSLauk1QponQZXjXjIhMcAJHKSbqi61BNWnajEWPhzJgUqJ4BQfRgfs', 'kTWfaxIlaA8U22iTbvULlJvsBo1Co9Y8s3bhqLp2iu4TyuTa3JbhKMtGzdh3KW6Z5aqomCKDhDZI1Cn3A42UY', 'jiyBMmC0P9DF5S0njyF8AT8NhC91bZgnq9y0zb7oshC3HUGIP3JuGenv5f6JzWQiPBWdH2onxRhgcvV2pJt4E', 'HtmOma1uuXklTzExms8RYbyXda4OikwhsKqnqqFzV5TCCrwPUXYmSfG3oiRG6dx5bMY3Yrlm5oMzYF41uZaML', 'loYhPQJfkia3nFeDK2xhOZbu8UIgOuF5jb808SrHXrMo7MrKNInyZf2Ed7PjL49Iqer6tInhRMe3CoufH366M', '_372IdHiBk6RFZcEt2ZhfLrWFrv7IxJFIEzgC72zMfbuZWHJZ5TbTsLQuoulrwWcp8urrEe', 'dnhZeymVz3PHo2RAwIJJRzcZbfh0UiMEjuDbYmaymJik9VddgdKHUrqx7KYF94DGl9trQN'
                Source: IwSPayUcGx.exe, E4PT1mgw7QVVYZsmXEkGc2At16Yl6k10IL8saJ9Qh7SJS5wIuWayOBEU36AiJPeMnMxPjXyYGxurj5Zxqruy7.csHigh entropy of concatenated method names: 'ihxL652rxHcTHNn9C6U08RavvazjB6kKUfw1HbOqMSYqS6D8CRkOhxUT07EZr6dAhl4of4EjDGuI3gGi6TQ1z', 'pJMkT7YJLTeEHdkRe3kwZGteLbeJ4k5m3v9ueOGOHSYNyVpyNfiZP44mBiNmCTs15DzhEoZ6TgbQ2Ig1ZcUUU', '_2OhLGWLqNrLmFm1s3vw3JTSXkWWlQZdUzDQ044GmHac2clF9SGVhkt1aZ5lVattInsLtQjO1XTMyJkx8RlFiB', '_7VahGlXtyIbBSFNeXBAedKSUkhonIAbd1bR9rez7ImW9F7dD3Sn2YpnwnUNPjnVXfaQyKMZ1hVgsz1K6jeBjB', 'LP2yjlbWeDkbqp1pIl6Uw3KBAgyYAIdqRDNWIez440yfu9PtjAP39c6q3NqaA8AtrxJXR4FdbPJz0pWiTgCit', 'EkjPddWj0cKU1HcR768wntd5llSv2so2hhRlnL9AXBo664TwpUIhPuK0ycKsRdUR6ICG7tnlfXtupGLTh3CQT', '_5MJvQfFdoJJJ1B4M7s7nf7j7hz7y3x8l5LVX1ORbOiRXcLlElFIQbbPlin8gfSPCrInyUhuzqFmL5VCipAL3W', 'bnYXGyurNrdwzHCr8ypkb73pmAUD1XQ102dlBKuEpQgopw7UZrA1HvFzHehf3yMToggeCQV081iBXV1EoqWUb', 'CRr7W63p40cMqK6BY8PdOdd2Sh72Y1fLF2eizYux9haEyZu3yES8YHAes1eiPqMHjrJVNI1rejLd1aFvbHYBE', 'JBRSJHKRX8CI3IfwL7yE8mozuVyh1zuG0kHtHB7PSpsZ9cD0DJ19ellub8iNGIRmxb5b2j0FHPB4gomcB49rR'
                Source: IwSPayUcGx.exe, 0kbHdTnYMVZJnJ7eBqAY21TiTOET3uflaL5yWlccI8dfcopefQT01yy8yYvcoSd6mAVS8R.csHigh entropy of concatenated method names: 'v0YZpkp9EQ0syFMl2e4Ph9qiELU4dURWQjJQGLphhXuEnVkbSzD7gMaJyxmJIEU32GUac9', 'I6X6PoXcS6ev', 'hiw88A5ozT8f', 'actmcwEvEfWD', 'M63emJqC4Xhf'
                Source: IwSPayUcGx.exe, KbuXevNnjb2x7ITRbIxUZwkpHIcK7klEeyzg5Aukh33K6NLGSp5S4FFgS5aLOCdlpM4eoHYwmDbmDCtBZx5cS.csHigh entropy of concatenated method names: 'Bz6OSJmHCPvhWzk6cVZ4OyoyLAb1pnm7MATiKOxI3uKoskvA8WhPzHrXPaGgZOY2kkajtA3JcXeMWbBhXz9x5', '_3z0Zw5YEhGL6dLN0d8CPDUL06Z3fAi54e52QknLqMLXvzBYxp2aZWlx3AkmyvTVxqq9CyoZ5xjDYRY0AgFEFk', 'mci10o1uDwdRX5KOaiAfENGHNmGX3jQKNhTmjAGBG06wyuAhTlR3YnzsiAIcFzXT68uk2uO71W2VOFfQWa1H9', 'FkvtjZdjSa53QfSPwjhbp5lWRWWUUmB1KbrqcGjl61TnMt3WjphZ8Ma4GjBiXyHisLVYpxDIyxnPoCl3WKJ0m', 'aYEZA14Q3SHBdxpJsrFqm4tNqGBMF1OCQWQ0D4UckWI0y9fXTIp5wN6zdcaDF4W4wEgsFntLdBctfTMGPoYv7', '_8wwGwALyQICuTRdzV0hRTRhUmQm27An8Pus3adCDlugbt0W0EfT0LmOhR2GRySSy0qJokZ2VCjdN5U9Vwj6TM', 'x5tEZOx9jmNdofLe58obIJtN7e9jGg4eykDNt2Nt83stdUEvqkqHpVVlzFZqVVeT8f02EA8uLNThJgrlQ4xHs', '_3yjBQKTbRu9pcOPSrgD2n9H0mznLzaEfgf2VtMwQdCGeDCfuzjP4oGTJsFGSt2V2hLLJZBuHFrwEYIbW2NcNM', 'oJreHdc0NBfjby2Fnh9DTqOo7Bh4IhLI0RsNotjZ5gaXi4A7ShId2K13FV9b2FPzdyqwu7dHwSTAEiK9EeCG8', 'RgmKWbQyWEwsHrRZ7NnIRtVGVw5IaXvIdEoV9xdBTJ9osRd8C2BCGbKPLEmIzikrsCFZzRsmPjs9SpBGQrxad'
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: IwSPayUcGx.exeBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeMemory allocated: BC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeMemory allocated: 1A630000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: Amcache.hve.4.drBinary or memory string: VMware
                Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: IwSPayUcGx.exe, 00000000.00000002.2303854817.000000001B441000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                Source: IwSPayUcGx.exeBinary or memory string: vmware
                Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeCode function: 0_2_00007FF848E97801 CheckRemoteDebuggerPresent,0_2_00007FF848E97801
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeQueries volume information: C:\Users\user\Desktop\IwSPayUcGx.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\IwSPayUcGx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: IwSPayUcGx.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.IwSPayUcGx.exe.330000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2303303400.000000000263C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.2032779166.0000000000332000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: IwSPayUcGx.exe PID: 4764, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: IwSPayUcGx.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.IwSPayUcGx.exe.330000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2303303400.000000000263C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.2032779166.0000000000332000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: IwSPayUcGx.exe PID: 4764, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Process Injection
                3
                Virtualization/Sandbox Evasion
                OS Credential Dumping331
                Security Software Discovery
                Remote Services11
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory3
                Virtualization/Sandbox Evasion
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                Process Injection
                Security Account Manager1
                System Network Configuration Discovery
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Deobfuscate/Decode Files or Information
                NTDS23
                System Information Discovery
                Distributed Component Object ModelInput Capture12
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                Software Packing
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                IwSPayUcGx.exe84%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                IwSPayUcGx.exe100%AviraHEUR/AGEN.1311620
                IwSPayUcGx.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://upx.sf.net0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                http://ip-api.com0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                ip-api.com
                208.95.112.1
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  23.ip.gl.ply.ggtrue
                    unknown
                    147.185.221.23true
                      unknown
                      http://ip-api.com/line/?fields=hostingfalse
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.4.drfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameIwSPayUcGx.exe, 00000000.00000002.2303303400.00000000026D9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ip-api.comIwSPayUcGx.exe, 00000000.00000002.2303303400.00000000026D9000.00000004.00000800.00020000.00000000.sdmp, IwSPayUcGx.exe, 00000000.00000002.2303303400.00000000026F2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      208.95.112.1
                      ip-api.comUnited States
                      53334TUT-ASUStrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1546360
                      Start date and time:2024-10-31 20:10:09 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 12s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:8
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:IwSPayUcGx.exe
                      renamed because original name is a hash value
                      Original Sample Name:210e2e98bf88e3dd17e8ac1b8bdef59cd8fd93dcc5c579bf3a59830b30bc9052.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@2/5@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 5
                      • Number of non-executed functions: 2
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.42.73.29
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • Report size getting too big, too many NtSetInformationFile calls found.
                      • VT rate limit hit for: IwSPayUcGx.exe
                      TimeTypeDescription
                      15:11:25API Interceptor1x Sleep call for process: WerFault.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      208.95.112.1gMd6of50Do.exeGet hashmaliciousBlank GrabberBrowse
                      • ip-api.com/json/?fields=225545
                      PZKAQY0bX5.exeGet hashmaliciousBlank GrabberBrowse
                      • ip-api.com/json/?fields=225545
                      El9HaBFrFM.exeGet hashmaliciousBlank GrabberBrowse
                      • ip-api.com/json/?fields=225545
                      aLRjksjY78.exeGet hashmaliciousHackBrowserBrowse
                      • ip-api.com/json/?fields=225545
                      PCuK01wybv.exeGet hashmaliciousBlank GrabberBrowse
                      • ip-api.com/line/?fields=hosting
                      qbE2mhhzCq.exeGet hashmaliciousBlank GrabberBrowse
                      • ip-api.com/line/?fields=hosting
                      jF5cZUXeQm.exeGet hashmaliciousBlank GrabberBrowse
                      • ip-api.com/json/?fields=225545
                      New Order (2).exeGet hashmaliciousAgentTeslaBrowse
                      • ip-api.com/line/?fields=hosting
                      whatsappjpg.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • ip-api.com/line/?fields=hosting
                      file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, Vidar, WhiteSnake StealerBrowse
                      • ip-api.com/line?fields=query,country
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      ip-api.comgMd6of50Do.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      PZKAQY0bX5.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      El9HaBFrFM.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      aLRjksjY78.exeGet hashmaliciousHackBrowserBrowse
                      • 208.95.112.1
                      PCuK01wybv.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      qbE2mhhzCq.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      jF5cZUXeQm.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      New Order (2).exeGet hashmaliciousAgentTeslaBrowse
                      • 208.95.112.1
                      whatsappjpg.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • 208.95.112.1
                      file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, Vidar, WhiteSnake StealerBrowse
                      • 208.95.112.1
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      TUT-ASUSgMd6of50Do.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      PZKAQY0bX5.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      El9HaBFrFM.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      aLRjksjY78.exeGet hashmaliciousHackBrowserBrowse
                      • 208.95.112.1
                      PCuK01wybv.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      qbE2mhhzCq.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      jF5cZUXeQm.exeGet hashmaliciousBlank GrabberBrowse
                      • 208.95.112.1
                      New Order (2).exeGet hashmaliciousAgentTeslaBrowse
                      • 208.95.112.1
                      whatsappjpg.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • 208.95.112.1
                      file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, Vidar, WhiteSnake StealerBrowse
                      • 208.95.112.1
                      No context
                      No context
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):1.208851484286332
                      Encrypted:false
                      SSDEEP:192:c57I3c9IJZFIfF0NxMJaHaWj8iyU1lxPzuiFWZ24lO8EI7nQ:I74cmZFLNxMgaY8iFxPzuiFWY4lO8EO
                      MD5:AF09C52F70FA6502921D1E570451C9F9
                      SHA1:800714160A0541AB6D5CEB60455636EBAD3AEE0C
                      SHA-256:7DFEE03978A246FB2013B8C52C0C8DD6D2BDA1C52AED0EC321FF13B75FB5337C
                      SHA-512:997779ACE7CEDAEF625BAB95641D94D8565BDB6577523D0618DC4EADEE030452D20AF30ECEF980643A07AA2872421CFB247FF64CFBB6368343699DC1BD6C0951
                      Malicious:true
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.8.7.5.4.6.3.6.9.2.7.7.7.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.8.7.5.4.6.4.2.2.4.0.2.5.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.a.6.c.2.c.1.a.-.4.8.7.7.-.4.9.d.3.-.8.1.4.e.-.e.b.8.5.5.b.3.6.6.1.7.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.c.c.4.4.3.4.6.-.4.b.8.2.-.4.d.1.0.-.8.6.2.d.-.2.3.9.6.f.c.2.9.0.6.0.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.I.w.S.P.a.y.U.c.G.x...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.7.7.1.c.5.2.b.b.9.1.d.a.f.4.d.b.0.2.a.5...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.9.c.-.0.0.0.1.-.0.0.1.4.-.f.8.6.5.-.4.8.9.e.c.8.2.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.5.1.1.a.3.2.8.b.e.0.5.4.3.6.e.a.6.4.8.9.2.a.3.f.a.1.0.3.b.b.a.0.0.0.0.0.0.0.0.!.0.0.0.0.3.8.3.a.3.3.2.4.7.a.8.4.f.1.e.5.a.2.3.3.3.4.e.a.1.a.3.5.3.d.2.e.6.a.a.7.e.8.5.5.
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Mini DuMP crash report, 16 streams, Thu Oct 31 19:11:03 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):451662
                      Entropy (8bit):3.048441330255679
                      Encrypted:false
                      SSDEEP:6144:Ir/GmSgm1hYzCn0v8qDbZllG8fIztB3Q12t:4/ZR2wv8qPu1Q12t
                      MD5:CEB217C0CAD4CCF4E971AE2100C829BD
                      SHA1:7F15F0C9C2D815A39B809B5DBE7F0C086E6A1834
                      SHA-256:660DE373B337F0174F8EB9BEEF8993F9C6DD4A55286FED4D37B73CA3D3EED5EE
                      SHA-512:69BC320EE4FCB20655B6526C5DE6E33AD317D50CF7727BB838732BFB84ED243A5C8769E4C70BBB0980C1EACC3DF7E85561CAB6405F8412466C47E8192CDCDCE4
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... .......G.#g........................d...........<...X(...........(.......7..L...........l.......8...........T............@..f............6...........8..............................................................................eJ......$9......Lw......................T...........B.#g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8782
                      Entropy (8bit):3.69897925559322
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJXEjDY6YEInYNBMgmfZPAUpDv89bxa9fgY7m:R6lXJ4c6YEYYNKgmfipxwfg5
                      MD5:4A75C363E72BD0355C0C53E3AF9246AA
                      SHA1:1D952F76D9999B08F8949BB3B2C43956A2DC7E04
                      SHA-256:21178F82B48CB109261F757B9D85B2B25EF8152F77DDC6CA2EB1A067CD34322F
                      SHA-512:FDC274F0CD6E78E44C5503BEC6B34B42412FCF0D2424D92DF215211036D8F94AFE79B42AB62D0ABBDF58DDDD888225D8833349C31BC8C6EB3EDDD18F321ECFCB
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.7.6.4.<./.P.i.
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4793
                      Entropy (8bit):4.463127444048213
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsTJg771I9AbWpW8VYUYm8M4JutD0PF4yq8vmtD0c6GIKYsd:uIjftI7/q7VYJkWpWYsd
                      MD5:3372711F7F75B6D9EAD04991A0E8AC7D
                      SHA1:C6B1D4EB026E1F48972A8A1936280D21BF4D4CA0
                      SHA-256:6F7973DB96AFC32C96339E058D7DF13669206AC1EA39EAA71FE1B06BD5CE6200
                      SHA-512:3A8FA7F20C7AF739C294FBA4FE3DF3D747E869C9C2FF05422777DD5086C3FABCAE982A7B1B88FF958668C5BDAEF54C11D321CBAC79AD444EAFE0D9F8D34F516B
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="567973" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.4216714972802365
                      Encrypted:false
                      SSDEEP:6144:PSvfpi6ceLP/9skLmb0OTIWSPHaJG8nAgeMZMMhA2fX4WABlEnNS0uhiTw:avloTIW+EZMM6DFyc03w
                      MD5:C14BC50CFF0CF59EC3F59487C6FBA4FF
                      SHA1:3C9FA5268BD498D304BFF958BD7F08508FF59E49
                      SHA-256:A0AC9C00C89CB5E5C653E4388BA418397179C596A487D405CA4F42283658B3A3
                      SHA-512:C764E64AF2362FA427CDE56AE2F6D2B92F838A791DDDB3B109324D28411A814C5A159C5445803C1B97B77F0C7C260892B54699B00A935E5AC64C372205004A81
                      Malicious:false
                      Reputation:low
                      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.N6..+................................................................................................................................................................................................................................................................................................................................................!.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):5.4644203011133285
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      • Win32 Executable (generic) a (10002005/4) 49.78%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      • DOS Executable Generic (2002/1) 0.01%
                      File name:IwSPayUcGx.exe
                      File size:331'776 bytes
                      MD5:610f78dab4043f4ab8d964e226d6edcb
                      SHA1:383a33247a84f1e5a23334ea1a353d2e6aa7e855
                      SHA256:210e2e98bf88e3dd17e8ac1b8bdef59cd8fd93dcc5c579bf3a59830b30bc9052
                      SHA512:0303eeb10caa59274e75676b9f1ad4c5baa7455fb8e3cb4d0a856ecc7d02224931df6c90c18e87fb2cf4212e97f33fa088ba1ae6eb93d39439bee5fbc48e7861
                      SSDEEP:3072:gA5ta1bMRRlOXk12l4mJe7UmuLchHPHo4bqRH33qGCNxxOe:xAbIMl4miUdLchvo4OlnqR
                      TLSH:AB640A259FC6CA9FF12ED07F55FACD65A29FC058070F11C2EE7EC0E6A3AC9686506142
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...N."g.....................(......n.... ... ....@.. ....................................@................................
                      Icon Hash:cd993679681c94b4
                      Entrypoint:0x41046e
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x67229B4E [Wed Oct 30 20:47:10 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x104180x53.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x425d2.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x560000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xe4740xe600f500f25630419764f21a20821bd32591False0.6109714673913044data6.1811501896005465IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x120000x425d20x42600420d222cdfffe04bbc95a6a4549a5978False0.2891139948210923data4.8922178251996495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x560000xc0x200ba6328c3991f22c3c40f92743aeccd23False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x121300x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144, resolution 39 x 39 px/m0.28785838979791106
                      RT_GROUP_ICON0x541580x14data0.9
                      RT_VERSION0x5416c0x27cdata0.45440251572327045
                      RT_MANIFEST0x543e80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-10-31T20:11:18.944503+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549712TCP
                      2024-10-31T20:11:56.923215+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549918TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 31, 2024 20:11:03.756484032 CET4970480192.168.2.5208.95.112.1
                      Oct 31, 2024 20:11:03.761445999 CET8049704208.95.112.1192.168.2.5
                      Oct 31, 2024 20:11:03.761519909 CET4970480192.168.2.5208.95.112.1
                      Oct 31, 2024 20:11:03.762079954 CET4970480192.168.2.5208.95.112.1
                      Oct 31, 2024 20:11:03.766890049 CET8049704208.95.112.1192.168.2.5
                      Oct 31, 2024 20:11:04.357561111 CET8049704208.95.112.1192.168.2.5
                      Oct 31, 2024 20:11:04.404866934 CET4970480192.168.2.5208.95.112.1
                      Oct 31, 2024 20:11:27.234313011 CET4970480192.168.2.5208.95.112.1
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 31, 2024 20:11:03.741502047 CET6389253192.168.2.51.1.1.1
                      Oct 31, 2024 20:11:03.749727964 CET53638921.1.1.1192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Oct 31, 2024 20:11:03.741502047 CET192.168.2.51.1.1.10xe543Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 31, 2024 20:11:03.749727964 CET1.1.1.1192.168.2.50xe543No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                      • ip-api.com
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549704208.95.112.1804764C:\Users\user\Desktop\IwSPayUcGx.exe
                      TimestampBytes transferredDirectionData
                      Oct 31, 2024 20:11:03.762079954 CET80OUTGET /line/?fields=hosting HTTP/1.1
                      Host: ip-api.com
                      Connection: Keep-Alive
                      Oct 31, 2024 20:11:04.357561111 CET174INHTTP/1.1 200 OK
                      Date: Thu, 31 Oct 2024 19:11:03 GMT
                      Content-Type: text/plain; charset=utf-8
                      Content-Length: 5
                      Access-Control-Allow-Origin: *
                      X-Ttl: 60
                      X-Rl: 44
                      Data Raw: 74 72 75 65 0a
                      Data Ascii: true


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:15:10:58
                      Start date:31/10/2024
                      Path:C:\Users\user\Desktop\IwSPayUcGx.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\IwSPayUcGx.exe"
                      Imagebase:0x330000
                      File size:331'776 bytes
                      MD5 hash:610F78DAB4043F4AB8D964E226D6EDCB
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.2303303400.000000000263C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.2032779166.0000000000332000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.2032779166.0000000000332000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                      Reputation:low
                      Has exited:true

                      Target ID:4
                      Start time:15:11:03
                      Start date:31/10/2024
                      Path:C:\Windows\System32\WerFault.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\WerFault.exe -u -p 4764 -s 1652
                      Imagebase:0x7ff79eb20000
                      File size:570'736 bytes
                      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:13.1%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:100%
                        Total number of Nodes:3
                        Total number of Limit Nodes:0
                        execution_graph 2541 7ff848e97801 2542 7ff848e9781f CheckRemoteDebuggerPresent 2541->2542 2544 7ff848e978bf 2542->2544

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2304363079.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff848e90000_IwSPayUcGx.jbxd
                        Similarity
                        • API ID: CheckDebuggerPresentRemote
                        • String ID:
                        • API String ID: 3662101638-0
                        • Opcode ID: 95304c52ff5c8e10b26a7e53ce62c17fa97d99699ab8a32cac33db6e5f6a6ee7
                        • Instruction ID: 9585a26f761c1eadb422ef4d0c54dcdd8edf796189905a6092303c755e349803
                        • Opcode Fuzzy Hash: 95304c52ff5c8e10b26a7e53ce62c17fa97d99699ab8a32cac33db6e5f6a6ee7
                        • Instruction Fuzzy Hash: FD31F13180C7588FCB58DF58888A6E97BE0FF65311F05416BD489D7282DB74A846CB91

                        Control-flow Graph

                        Memory Dump Source
                        • Source File: 00000000.00000002.2304363079.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff848e90000_IwSPayUcGx.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b0003958724e900f21b5785d3606ae4a815261ca53e14265d210fb1fe99007b5
                        • Instruction ID: 98c56bc58f275d00aa8cd0e73d3fcee7c2518838c7facfe4106bfe2ed4348b53
                        • Opcode Fuzzy Hash: b0003958724e900f21b5785d3606ae4a815261ca53e14265d210fb1fe99007b5
                        • Instruction Fuzzy Hash: B912BD61A2CA495FE798FB7884692B9B7E2FF88744F44057DE00EC32C2DF39A8418745

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 154 7ff848e95e46-7ff848e95e53 155 7ff848e95e55-7ff848e95e5d 154->155 156 7ff848e95e5e-7ff848e95f27 154->156 155->156 160 7ff848e95f93 156->160 161 7ff848e95f29-7ff848e95f32 156->161 162 7ff848e95f95-7ff848e95fba 160->162 161->160 163 7ff848e95f34-7ff848e95f40 161->163 169 7ff848e96026 162->169 170 7ff848e95fbc-7ff848e95fc5 162->170 164 7ff848e95f42-7ff848e95f54 163->164 165 7ff848e95f79-7ff848e95f91 163->165 167 7ff848e95f56 164->167 168 7ff848e95f58-7ff848e95f6b 164->168 165->162 167->168 168->168 171 7ff848e95f6d-7ff848e95f75 168->171 173 7ff848e96028-7ff848e960d0 169->173 170->169 172 7ff848e95fc7-7ff848e95fd3 170->172 171->165 174 7ff848e95fd5-7ff848e95fe7 172->174 175 7ff848e9600c-7ff848e96024 172->175 184 7ff848e960d2-7ff848e960dc 173->184 185 7ff848e9613e 173->185 176 7ff848e95fe9 174->176 177 7ff848e95feb-7ff848e95ffe 174->177 175->173 176->177 177->177 179 7ff848e96000-7ff848e96008 177->179 179->175 184->185 186 7ff848e960de-7ff848e960eb 184->186 187 7ff848e96140-7ff848e96169 185->187 188 7ff848e96124-7ff848e9613c 186->188 189 7ff848e960ed-7ff848e960ff 186->189 193 7ff848e961d3 187->193 194 7ff848e9616b-7ff848e96176 187->194 188->187 190 7ff848e96101 189->190 191 7ff848e96103-7ff848e96116 189->191 190->191 191->191 195 7ff848e96118-7ff848e96120 191->195 197 7ff848e961d5-7ff848e96266 193->197 194->193 196 7ff848e96178-7ff848e96186 194->196 195->188 198 7ff848e96188-7ff848e9619a 196->198 199 7ff848e961bf-7ff848e961d1 196->199 205 7ff848e9626c-7ff848e9627b 197->205 200 7ff848e9619c 198->200 201 7ff848e9619e-7ff848e961b1 198->201 199->197 200->201 201->201 203 7ff848e961b3-7ff848e961bb 201->203 203->199 206 7ff848e96283-7ff848e962e8 call 7ff848e96304 205->206 207 7ff848e9627d 205->207 214 7ff848e962ea 206->214 215 7ff848e962ef-7ff848e96303 206->215 207->206 214->215
                        Memory Dump Source
                        • Source File: 00000000.00000002.2304363079.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff848e90000_IwSPayUcGx.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6eebb14b0354b450737ff6f4be5fc18f3ab6f8c9dacda3d9b7c0da53f7549644
                        • Instruction ID: c7efaab223884412e7792be61a2a858b99a5a27b7673ce4f6b7486e642f450ed
                        • Opcode Fuzzy Hash: 6eebb14b0354b450737ff6f4be5fc18f3ab6f8c9dacda3d9b7c0da53f7549644
                        • Instruction Fuzzy Hash: 45F1B33090CA8D8FEBA8EF28D8557E93BE1FF54350F04426EE84DC7291DB74A9458B81

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 216 7ff848e96bf2-7ff848e96bff 217 7ff848e96c01-7ff848e96c09 216->217 218 7ff848e96c0a-7ff848e96cd7 216->218 217->218 221 7ff848e96d43 218->221 222 7ff848e96cd9-7ff848e96ce2 218->222 224 7ff848e96d45-7ff848e96d6a 221->224 222->221 223 7ff848e96ce4-7ff848e96cf0 222->223 225 7ff848e96cf2-7ff848e96d04 223->225 226 7ff848e96d29-7ff848e96d41 223->226 230 7ff848e96dd6 224->230 231 7ff848e96d6c-7ff848e96d75 224->231 228 7ff848e96d06 225->228 229 7ff848e96d08-7ff848e96d1b 225->229 226->224 228->229 229->229 232 7ff848e96d1d-7ff848e96d25 229->232 234 7ff848e96dd8-7ff848e96dfd 230->234 231->230 233 7ff848e96d77-7ff848e96d83 231->233 232->226 235 7ff848e96d85-7ff848e96d97 233->235 236 7ff848e96dbc-7ff848e96dd4 233->236 241 7ff848e96e6b 234->241 242 7ff848e96dff-7ff848e96e09 234->242 237 7ff848e96d99 235->237 238 7ff848e96d9b-7ff848e96dae 235->238 236->234 237->238 238->238 240 7ff848e96db0-7ff848e96db8 238->240 240->236 243 7ff848e96e6d-7ff848e96e9b 241->243 242->241 244 7ff848e96e0b-7ff848e96e18 242->244 251 7ff848e96f0b 243->251 252 7ff848e96e9d-7ff848e96ea8 243->252 245 7ff848e96e51-7ff848e96e69 244->245 246 7ff848e96e1a-7ff848e96e2c 244->246 245->243 248 7ff848e96e30-7ff848e96e43 246->248 249 7ff848e96e2e 246->249 248->248 250 7ff848e96e45-7ff848e96e4d 248->250 249->248 250->245 254 7ff848e96f0d-7ff848e96fe5 251->254 252->251 253 7ff848e96eaa-7ff848e96eb8 252->253 255 7ff848e96ef1-7ff848e96f09 253->255 256 7ff848e96eba-7ff848e96ecc 253->256 264 7ff848e96feb-7ff848e96ffa 254->264 255->254 258 7ff848e96ed0-7ff848e96ee3 256->258 259 7ff848e96ece 256->259 258->258 261 7ff848e96ee5-7ff848e96eed 258->261 259->258 261->255 265 7ff848e97002-7ff848e97064 call 7ff848e97080 264->265 266 7ff848e96ffc 264->266 273 7ff848e97066 265->273 274 7ff848e9706b-7ff848e9707f 265->274 266->265 273->274
                        Memory Dump Source
                        • Source File: 00000000.00000002.2304363079.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff848e90000_IwSPayUcGx.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a44f46513b1caaa87e7b8bff3553af899c18817b09cf23b4247c6ef1068bd86f
                        • Instruction ID: 62370f1771444bb6c3e92b1b2f847f1c4ef7fe7856c300cf240f4f9188b1597d
                        • Opcode Fuzzy Hash: a44f46513b1caaa87e7b8bff3553af899c18817b09cf23b4247c6ef1068bd86f
                        • Instruction Fuzzy Hash: 80E1A13090CA8E8FEBA8EF28C8557E977D1FF54350F04426EE84DC7291DB74A9458B81

                        Control-flow Graph

                        Memory Dump Source
                        • Source File: 00000000.00000002.2304363079.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff848e90000_IwSPayUcGx.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5d130d5de8fdaf1f5a9c9f3274025a9bb826571d2d30705b8f7d93dd3fb82be1
                        • Instruction ID: fde3f7d88b60d3a1bd1e66d396daa494ce00639ddfdd7ed7f61810e7d8a4296a
                        • Opcode Fuzzy Hash: 5d130d5de8fdaf1f5a9c9f3274025a9bb826571d2d30705b8f7d93dd3fb82be1
                        • Instruction Fuzzy Hash: B5C19C20F1C94A9FEB98FB6884556B976D2FF98384F044179D05EC32C3DF68A8428786
                        Memory Dump Source
                        • Source File: 00000000.00000002.2304363079.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff848e90000_IwSPayUcGx.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b711a6440705240ab77c19ab168a6644421042a73506c532f60ac511b8754c87
                        • Instruction ID: c62f5bfb5f264410e27549862f58c64ab1f075c13cc4e936dd7e036d31cc5a25
                        • Opcode Fuzzy Hash: b711a6440705240ab77c19ab168a6644421042a73506c532f60ac511b8754c87
                        • Instruction Fuzzy Hash: CB812252C0EAC25FE71767B458290A5BFE1FF13654B0D00FBC8A48B497D65A580EC356
                        Memory Dump Source
                        • Source File: 00000000.00000002.2304363079.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff848e90000_IwSPayUcGx.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 146841fd9a23bbec7c455a7491041945b83fdd38188a2b53ff0842adc99a30b5
                        • Instruction ID: 5f3e3c0352d5e03eea7a1d7155e7c069b68ac4549849fdbb35c899f802cb212e
                        • Opcode Fuzzy Hash: 146841fd9a23bbec7c455a7491041945b83fdd38188a2b53ff0842adc99a30b5
                        • Instruction Fuzzy Hash: AB519797A8D9623DE21A77FDB4510F96B10EF813B5F0C9177D18C8D0A39E1920868AFD