Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XZaysgiUfm.exe

Overview

General Information

Sample name:XZaysgiUfm.exe
renamed because original name is a hash value
Original sample name:74690cdf2edc26f42d100325241e1117.exe
Analysis ID:1569797
MD5:74690cdf2edc26f42d100325241e1117
SHA1:6905ea513cf4a9fcf94f5efff1933fdaf5e980f5
SHA256:520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4
Tags:exeuser-abuse_ch
Infos:

Detection

Discord Rat
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Discord Rat
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to disable the Task Manager (.Net Source)
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • XZaysgiUfm.exe (PID: 6336 cmdline: "C:\Users\user\Desktop\XZaysgiUfm.exe" MD5: 74690CDF2EDC26F42D100325241E1117)
    • WerFault.exe (PID: 4844 cmdline: C:\Windows\system32\WerFault.exe -u -p 6336 -s 2296 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
XZaysgiUfm.exeJoeSecurity_DiscordRatYara detected Discord RatJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2304771627.0000016ADB8A2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_DiscordRatYara detected Discord RatJoe Security
      Process Memory Space: XZaysgiUfm.exe PID: 6336JoeSecurity_DiscordRatYara detected Discord RatJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.XZaysgiUfm.exe.16adb8a0000.0.unpackJoeSecurity_DiscordRatYara detected Discord RatJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: XZaysgiUfm.exeAvira: detected
          Source: XZaysgiUfm.exeReversingLabs: Detection: 68%
          Source: XZaysgiUfm.exeVirustotal: Detection: 78%Perma Link
          Source: Yara matchFile source: XZaysgiUfm.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.XZaysgiUfm.exe.16adb8a0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2304771627.0000016ADB8A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: XZaysgiUfm.exe PID: 6336, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.8% probability
          Source: XZaysgiUfm.exeJoe Sandbox ML: detected
          Source: unknownHTTPS traffic detected: 162.159.130.234:443 -> 192.168.2.12:49711 version: TLS 1.2
          Source: XZaysgiUfm.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: System.Xml.ni.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: _D.pC:\Users\user\Desktop\XZaysgiUfm.PDB source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: b77a5c561934e089\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: mscorlib.ni.pdbRSDS source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Users\user\Desktop\XZaysgiUfm.PDBd6s5 source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5EE2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\System.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E9D000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.Xml.ni.pdbRSDS# source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.Core.ni.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: _D.indoC:\Windows\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\dll\System.pdb; source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\user\Desktop\XZaysgiUfm.PDBp source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.Web.Extensions.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E6A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5EE2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdboH^4 source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E6A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\System.pdbsr*4N source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E9D000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\user\Desktop\XZaysgiUfm.PDB source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdbRSDSw source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: XZaysgiUfm.PDB source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E6A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.ni.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E9D000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbBI5 source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E6A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Web.Extensions.pdbH source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: m.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb1 source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\dll\System.pdbn source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5EE2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb66 source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5EE2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.Core.ni.pdbRSDS source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbR source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: global trafficHTTP traffic detected: GET /?v=9&encording=json HTTP/1.1Connection: Upgrade,Keep-AliveUpgrade: websocketSec-WebSocket-Key: yG9dqYImYphIRk+ys8rh+w==Sec-WebSocket-Version: 13Host: gateway.discord.gg
          Source: Joe Sandbox ViewIP Address: 162.159.130.234 162.159.130.234
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /?v=9&encording=json HTTP/1.1Connection: Upgrade,Keep-AliveUpgrade: websocketSec-WebSocket-Key: yG9dqYImYphIRk+ys8rh+w==Sec-WebSocket-Version: 13Host: gateway.discord.gg
          Source: global trafficDNS traffic detected: DNS query: gateway.discord.gg
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 06 Dec 2024 09:17:53 GMTContent-Length: 0Connection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zdX0D6jXvL6gR6TUnSH%2FLkYB%2FEJRuxsPEDox5q1wAXfc76pJ5JwuKpFEuY19TGQwBXN9QPllchX1L1GxJVSiZWk0L%2FIn5%2Fp2Sc1WcXUqNYUASCvLEyPuQC%2F37J3y8sLjncKC%2FQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Strict-Transport-Security: max-age=31536000; includeSubDomains; preloadX-Content-Type-Options: nosniffServer: cloudflareCF-RAY: 8edb2f76d9c64381-EWR
          Source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
          Source: XZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD7F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gateway.discord.gg
          Source: XZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
          Source: XZaysgiUfm.exeString found in binary or memory: http://www.google.com/maps/place/
          Source: XZaysgiUfm.exeString found in binary or memory: https://discord.com/api/v9/channels/
          Source: XZaysgiUfm.exeString found in binary or memory: https://discord.com/api/v9/guilds/
          Source: XZaysgiUfm.exeString found in binary or memory: https://file.io/
          Source: XZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD7D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg
          Source: XZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD7D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg/?v=9&encording=json
          Source: XZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD7D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg/?v=9&encording=jsonX
          Source: XZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gateway.discord.gg:443/?v=9&encording=json
          Source: XZaysgiUfm.exeString found in binary or memory: https://geolocation-db.com/json
          Source: XZaysgiUfm.exeString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/PasswordSte
          Source: XZaysgiUfm.exeString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Token%20gra
          Source: XZaysgiUfm.exeString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Webcam.dll
          Source: XZaysgiUfm.exeString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/rootkit.dll
          Source: XZaysgiUfm.exeString found in binary or memory: https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/unrootkit.d
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
          Source: unknownHTTPS traffic detected: 162.159.130.234:443 -> 192.168.2.12:49711 version: TLS 1.2

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: XZaysgiUfm.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.XZaysgiUfm.exe.16adb8a0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2304771627.0000016ADB8A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: XZaysgiUfm.exe PID: 6336, type: MEMORYSTR
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6336 -s 2296
          Source: XZaysgiUfm.exeStatic PE information: No import functions for PE file found
          Source: XZaysgiUfm.exe, 00000000.00000000.2304771627.0000016ADB8B6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDiscord rat.exe8 vs XZaysgiUfm.exe
          Source: XZaysgiUfm.exeBinary or memory string: OriginalFilenameDiscord rat.exe8 vs XZaysgiUfm.exe
          Source: classification engineClassification label: mal80.troj.evad.winEXE@2/5@1/1
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeMutant created: NULL
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6336
          Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\0e4a96d2-2c90-427d-ab81-17f2e28116adJump to behavior
          Source: XZaysgiUfm.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: XZaysgiUfm.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: XZaysgiUfm.exeReversingLabs: Detection: 68%
          Source: XZaysgiUfm.exeVirustotal: Detection: 78%
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeFile read: C:\Users\user\Desktop\XZaysgiUfm.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\XZaysgiUfm.exe "C:\Users\user\Desktop\XZaysgiUfm.exe"
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6336 -s 2296
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: websocket.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: XZaysgiUfm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: XZaysgiUfm.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: XZaysgiUfm.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: System.Xml.ni.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: _D.pC:\Users\user\Desktop\XZaysgiUfm.PDB source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: b77a5c561934e089\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: mscorlib.ni.pdbRSDS source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Users\user\Desktop\XZaysgiUfm.PDBd6s5 source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5EE2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\System.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E9D000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.Xml.ni.pdbRSDS# source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.Core.ni.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: _D.indoC:\Windows\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\dll\System.pdb; source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\user\Desktop\XZaysgiUfm.PDBp source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.Web.Extensions.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E6A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5EE2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdboH^4 source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E6A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\System.pdbsr*4N source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E9D000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\user\Desktop\XZaysgiUfm.PDB source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdbRSDSw source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: XZaysgiUfm.PDB source: XZaysgiUfm.exe, 00000000.00000002.2744531678.0000002E445F1000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E6A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.ni.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\mscorlib.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E9D000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbBI5 source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5E6A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Web.Extensions.pdbH source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: m.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb1 source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\dll\System.pdbn source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5EE2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb66 source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5EE2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdb source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: System.Core.ni.pdbRSDS source: WER8CEB.tmp.dmp.4.dr
          Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbR source: XZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: XZaysgiUfm.exe, Program.cs.Net Code: LoadDll System.Reflection.Assembly.Load(byte[])
          Source: XZaysgiUfm.exe, Program.cs.Net Code: password
          Source: XZaysgiUfm.exe, Program.cs.Net Code: webcampic
          Source: XZaysgiUfm.exe, Program.cs.Net Code: select_cam
          Source: XZaysgiUfm.exe, Program.cs.Net Code: get_cams
          Source: XZaysgiUfm.exe, Program.cs.Net Code: get_tokens
          Source: XZaysgiUfm.exeStatic PE information: 0xD6D709DC [Mon Mar 20 18:56:28 2084 UTC]
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeMemory allocated: 16ADBD80000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeMemory allocated: 16AF5740000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exe TID: 6628Thread sleep count: 331 > 30Jump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exe TID: 6628Thread sleep count: 168 > 30Jump to behavior
          Source: Amcache.hve.4.drBinary or memory string: VMware
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.4.drBinary or memory string: vmci.sys
          Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 6e d0 59 6b 97 52-b4 9a 7f 42 1f 0e 66 9c
          Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.4.drBinary or memory string: VMware20,1
          Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: XZaysgiUfm.exe, 00000000.00000002.2744792299.0000016ADBA53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\\
          Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeQueries volume information: C:\Users\user\Desktop\XZaysgiUfm.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\XZaysgiUfm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: XZaysgiUfm.exe, Program.cs.Net Code: DisableTaskManager
          Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
          Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: XZaysgiUfm.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.XZaysgiUfm.exe.16adb8a0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2304771627.0000016ADB8A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: XZaysgiUfm.exe PID: 6336, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: XZaysgiUfm.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.XZaysgiUfm.exe.16adb8a0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2304771627.0000016ADB8A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: XZaysgiUfm.exe PID: 6336, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          Process Injection
          3
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          Query Registry
          Remote ServicesData from Local System1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          11
          Disable or Modify Tools
          LSASS Memory21
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media3
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Process Injection
          Security Account Manager3
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive3
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Software Packing
          NTDS12
          System Information Discovery
          Distributed Component Object ModelInput Capture4
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Timestomp
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          XZaysgiUfm.exe68%ReversingLabsByteCode-MSIL.Trojan.DiscordRAT
          XZaysgiUfm.exe78%VirustotalBrowse
          XZaysgiUfm.exe100%AviraTR/Agent.lsgui
          XZaysgiUfm.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          gateway.discord.gg
          162.159.130.234
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://gateway.discord.gg/?v=9&encording=jsonfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://crl.mXZaysgiUfm.exe, 00000000.00000002.2745564957.0000016AF5ECE000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://geolocation-db.com/jsonXZaysgiUfm.exefalse
                  high
                  https://file.io/XZaysgiUfm.exefalse
                    high
                    https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/PasswordSteXZaysgiUfm.exefalse
                      high
                      https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/rootkit.dllXZaysgiUfm.exefalse
                        high
                        https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/unrootkit.dXZaysgiUfm.exefalse
                          high
                          https://gateway.discord.gg:443/?v=9&encording=jsonXZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD741000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://upx.sf.netAmcache.hve.4.drfalse
                              high
                              http://gateway.discord.ggXZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD7F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://gateway.discord.ggXZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD7D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Webcam.dllXZaysgiUfm.exefalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameXZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD741000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://discord.com/api/v9/channels/XZaysgiUfm.exefalse
                                        high
                                        https://gateway.discord.gg/?v=9&encording=jsonXXZaysgiUfm.exe, 00000000.00000002.2745230458.0000016ADD7D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://discord.com/api/v9/guilds/XZaysgiUfm.exefalse
                                            high
                                            https://raw.githubusercontent.com/moom825/Discord-RAT-2.0/master/Discord%20rat/Resources/Token%20graXZaysgiUfm.exefalse
                                              high
                                              http://www.google.com/maps/place/XZaysgiUfm.exefalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                162.159.130.234
                                                gateway.discord.ggUnited States
                                                13335CLOUDFLARENETUSfalse
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1569797
                                                Start date and time:2024-12-06 10:16:55 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 5m 18s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Run name:Run with higher sleep bypass
                                                Number of analysed new started processes analysed:8
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:XZaysgiUfm.exe
                                                renamed because original name is a hash value
                                                Original Sample Name:74690cdf2edc26f42d100325241e1117.exe
                                                Detection:MAL
                                                Classification:mal80.troj.evad.winEXE@2/5@1/1
                                                EGA Information:Failed
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 11
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 13.89.179.12
                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                                                • Execution Graph export aborted for target XZaysgiUfm.exe, PID 6336 because it is empty
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                No simulations
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                162.159.130.234EsgeCzT4do.exeGet hashmaliciousXWormBrowse
                                                  Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                                                    SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeGet hashmaliciousDiscord RatBrowse
                                                      https://bafybeihvxlpwztcsbtbuj36rnn3o3ay7otib4fthnaja4oe34dddvnbfcm.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                                                        https://clicker.extremelyorange.com/Get hashmaliciousUnknownBrowse
                                                          Monolith.exeGet hashmaliciousUnknownBrowse
                                                            http://www.ms4x.netGet hashmaliciousUnknownBrowse
                                                              https://ipfs.io/ipfs/bafkreidlod2sf2qbeojthpzmf5gwqoobb7cnvdzcjrrzlcamwvyml57gry#electronics@victrex.comGet hashmaliciousUnknownBrowse
                                                                https://ipfs.io/ipfs/bafkreihautmmzqkuyabmbht3wi6czre2h5vr2nu626geog3db3d5676rma?filename=Session.htmlGet hashmaliciousUnknownBrowse
                                                                  Client-built.bin.exeGet hashmaliciousDiscord RatBrowse
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    gateway.discord.ggEeXJoO1J62.exeGet hashmaliciousDiscord RatBrowse
                                                                    • 162.159.136.234
                                                                    gcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
                                                                    • 162.159.135.234
                                                                    SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeGet hashmaliciousDiscord RatBrowse
                                                                    • 162.159.130.234
                                                                    BX7yRz7XqF.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                    • 162.159.135.234
                                                                    jKSjtQ8W7O.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                    • 162.159.135.234
                                                                    U7TJ7Rq13y.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                    • 162.159.133.234
                                                                    Sv6eQZzG0Z.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                    • 162.159.135.234
                                                                    https://bafybeihwopeeamsw6gk3vbg3wbftvt3n2qngbzo5a4hlnpvlv4hc3vvmyy.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                                                                    • 162.159.136.234
                                                                    https://mjj.aigc369.com/Get hashmaliciousUnknownBrowse
                                                                    • 162.159.133.234
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    CLOUDFLARENETUSEeXJoO1J62.exeGet hashmaliciousDiscord RatBrowse
                                                                    • 162.159.136.234
                                                                    gcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
                                                                    • 162.159.135.234
                                                                    pn866G3CCj.lnkGet hashmaliciousUnknownBrowse
                                                                    • 104.21.21.242
                                                                    QUOTATON-37839993.exeGet hashmaliciousFormBookBrowse
                                                                    • 172.67.178.93
                                                                    vZAhXkWkDT.lnkGet hashmaliciousUnknownBrowse
                                                                    • 104.21.21.242
                                                                    Voicemail_+Transcription001799.docxGet hashmaliciousUnknownBrowse
                                                                    • 104.21.96.1
                                                                    REQUEST FOR HOPPER SCALE AND CONVEYOR MACHINE.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.13.205
                                                                    fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 172.67.177.134
                                                                    http://www.javatpoint.com.cach3.com/Get hashmaliciousUnknownBrowse
                                                                    • 104.21.43.239
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    3b5074b1b5d032e5620f69f9f700ff0eEeXJoO1J62.exeGet hashmaliciousDiscord RatBrowse
                                                                    • 162.159.130.234
                                                                    gcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
                                                                    • 162.159.130.234
                                                                    REQUEST FOR HOPPER SCALE AND CONVEYOR MACHINE.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.130.234
                                                                    fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 162.159.130.234
                                                                    Fiyat Teklifi_2038900001-MOKAPTO-06122024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 162.159.130.234
                                                                    NewOrder12052024.jsGet hashmaliciousRemcosBrowse
                                                                    • 162.159.130.234
                                                                    16547.jsGet hashmaliciousMassLogger RATBrowse
                                                                    • 162.159.130.234
                                                                    PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.130.234
                                                                    965600.invoice.exeGet hashmaliciousFormBookBrowse
                                                                    • 162.159.130.234
                                                                    No context
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):65536
                                                                    Entropy (8bit):1.1653596509099398
                                                                    Encrypted:false
                                                                    SSDEEP:192:AYRnM75syP08rkxDna+LN6fmzuiFWZ24lO8r:bM75sR8rk9a1fmzuiFWY4lO8r
                                                                    MD5:5B15D5E0AD6A26B5DC7EC6B996FA5EF2
                                                                    SHA1:5500997F77C35F7927609B505BF19475321656A1
                                                                    SHA-256:BBF2B24C7F39E8587BC0170BB79D25449719771843D60DC7BC3A81DC26F45DB2
                                                                    SHA-512:52C0707A3FBF8FD70560C6D1DCD1D2983C1B20441B9C1463C77CEB234D9BFAD364B83E1BA99AD4122CC2A2C37C3CB6B9A6C5F1211F4F3400A46511ACD26466FA
                                                                    Malicious:true
                                                                    Reputation:low
                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.9.5.0.2.7.3.2.8.5.2.9.9.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.9.5.0.2.7.3.9.4.1.5.4.9.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.a.7.b.c.b.1.1.-.e.6.e.6.-.4.9.e.9.-.a.c.b.f.-.4.1.c.9.4.0.2.0.1.a.7.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.6.8.0.4.e.c.2.-.a.e.5.b.-.4.6.2.f.-.8.a.1.1.-.b.5.b.5.2.3.b.3.a.f.1.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.X.Z.a.y.s.g.i.U.f.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.D.i.s.c.o.r.d. .r.a.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.c.0.-.0.0.0.1.-.0.0.1.4.-.3.5.d.9.-.a.d.b.8.b.f.4.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.3.f.e.e.e.1.7.a.3.6.3.4.1.9.f.5.5.d.6.5.e.a.2.c.1.6.f.5.b.3.0.0.0.0.0.0.0.0.0.!.0.0.0.0.6.9.0.5.e.a.5.1.3.c.f.4.a.9.f.c.f.9.4.f.5.e.f.f.f.1.9.3.3.f.d.a.f.5.e.9.8.0.f.5.!.X.Z.a.y.s.g.i.U.
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:Mini DuMP crash report, 16 streams, Fri Dec 6 09:17:53 2024, 0x1205a4 type
                                                                    Category:dropped
                                                                    Size (bytes):516817
                                                                    Entropy (8bit):3.016194704414362
                                                                    Encrypted:false
                                                                    SSDEEP:3072:5ahklAE2amaSmI1fPs37mX1ehhi5rRMfECmud:5ahklvTSmI1fG7sU+Q7
                                                                    MD5:EB28542FEFA2C5D14CEC7A48118CB430
                                                                    SHA1:E969650B2140F741C1E3348A7C21EE4E0001E635
                                                                    SHA-256:0D02656E01670259CFBABA30417BC3E601A2584C66D8D101ADF268988B366DF1
                                                                    SHA-512:FDD796A3C5B245477A7FEA1C58CF03E84AC6E60CF8970D3662C98CBE164C447FB09571E0FB8357518C146C8F161FCCA5124907EDE8B1395140EB28C19A059AA8
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:MDMP..a..... .......A.Rg............d.......................<...|(...........(.......>..............l.......8...........T............Y..............3...........5..............................................................................eJ......H6......Lw......................T...........>.Rg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):8800
                                                                    Entropy (8bit):3.6990898204201144
                                                                    Encrypted:false
                                                                    SSDEEP:192:R6l7wVeJgV26Y+IGAsgmfZgnuD4pr+89bimUfxt2m:R6lXJa26YBigmfCpiNfT
                                                                    MD5:418AE45C37875A7811F450015A51493A
                                                                    SHA1:AFE332AC07E7F66C085186EBE048800915F85409
                                                                    SHA-256:96F7EF3A718FF9DBCA974ACD5A0F4B941C88A1569AE7694C95ACD3BAA2BFE09A
                                                                    SHA-512:A89809F1174E7C88544DD21F7822649034EB5915555090E75C1107CA77EBBC149E67B7241790CD1A70F842310404BCD656E4A9AACCD29BBD31F528303F05786F
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.3.6.<./.P.i.
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):4806
                                                                    Entropy (8bit):4.473542698265517
                                                                    Encrypted:false
                                                                    SSDEEP:48:cvIwWl8zsZQJg771I996WpW8VYzYm8M4JTlb6FQDyq8vilbIH1BKed:uIjfwI7C77VzJRbDWYEnKed
                                                                    MD5:B9FDBE3A627A782181C864131D24B261
                                                                    SHA1:A60ACE1190D89B56DC6A69802ADACD0AB80CCE8B
                                                                    SHA-256:7E1E1427EB8CC5D887A71F4E917B2CA3C9BE2C42F70555860DF140ABFEAC7537
                                                                    SHA-512:37D5A07E9EE1EC17D155CB9CB8E228205943CA67886C7F01AA2C325704092457F17AA4D9DF31ABECA0DC15D1DDAD10BFC40A7F1C48AE78F0D95CA690323A34A7
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="619220" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:MS Windows registry file, NT/2000 or above
                                                                    Category:dropped
                                                                    Size (bytes):1835008
                                                                    Entropy (8bit):4.568732215270913
                                                                    Encrypted:false
                                                                    SSDEEP:6144:2oPefZnQMa3tfLrbn90foomgsattlbSldrUHT7hSgkSNv0juQJYchUJvTGAPBsL6:jPTAooVJHnsg/d1T9qG
                                                                    MD5:A385A437AD3CA6102B51CE9FA11D385C
                                                                    SHA1:709E63F08E36EE77B33DFC9D6CF5186E80A044B5
                                                                    SHA-256:B1E86D3651C9ED4911086D940B2504173EA0B5CF39A07A6C8C5DA88FAE08838A
                                                                    SHA-512:A19040C706CE0C0007D49A3AEB14F9655AA4E85BA45C2F5AE4E9161A8D8A294C371CD39E29AB27C3930A4D4B2EB50A25933D94BE5E15E6B206A2BD271483842E
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:regfJ...J....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmfg...G........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                    Entropy (8bit):5.481944888680375
                                                                    TrID:
                                                                    • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                                                    • Win64 Executable GUI (202006/5) 46.43%
                                                                    • Win64 Executable (generic) (12005/4) 2.76%
                                                                    • Generic Win/DOS Executable (2004/3) 0.46%
                                                                    • DOS Executable Generic (2002/1) 0.46%
                                                                    File name:XZaysgiUfm.exe
                                                                    File size:80'384 bytes
                                                                    MD5:74690cdf2edc26f42d100325241e1117
                                                                    SHA1:6905ea513cf4a9fcf94f5efff1933fdaf5e980f5
                                                                    SHA256:520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4
                                                                    SHA512:1af915c6d421e5a3bb003985e513eaeb9a101a2006a2e338ae172da145ad98b2139bbca7e42a18b926ed7b489f6dcb347e85e6695f2f60ac7f80b0816110f255
                                                                    SSDEEP:1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+LPIC:5Zv5PDwbjNrmAE+jIC
                                                                    TLSH:C073B8C877AD8903FBBF5EBD147141524B72BB17E935F68D088C54E611A2B828C42B9B
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0..2............... .....@..... ....................................`...@......@............... .....
                                                                    Icon Hash:00928e8e8686b000
                                                                    Entrypoint:0x140000000
                                                                    Entrypoint Section:
                                                                    Digitally signed:false
                                                                    Imagebase:0x140000000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0xD6D709DC [Mon Mar 20 18:56:28 2084 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:
                                                                    Instruction
                                                                    dec ebp
                                                                    pop edx
                                                                    nop
                                                                    add byte ptr [ebx], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax+eax], al
                                                                    add byte ptr [eax], al
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x5b6.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x20000x130380x13200d583d9d45e1f2b5e013390fe773568eaFalse0.35835375816993464data5.507999017688776IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rsrc0x160000x5b60x600bea68bc442fa63fbe2807c2fdac84be0False0.416015625data4.08919936126734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_VERSION0x160a00x32cdata0.41995073891625617
                                                                    RT_MANIFEST0x163cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 6, 2024 10:17:51.407216072 CET49711443192.168.2.12162.159.130.234
                                                                    Dec 6, 2024 10:17:51.407248020 CET44349711162.159.130.234192.168.2.12
                                                                    Dec 6, 2024 10:17:51.407330036 CET49711443192.168.2.12162.159.130.234
                                                                    Dec 6, 2024 10:17:51.426363945 CET49711443192.168.2.12162.159.130.234
                                                                    Dec 6, 2024 10:17:51.426378965 CET44349711162.159.130.234192.168.2.12
                                                                    Dec 6, 2024 10:17:52.640260935 CET44349711162.159.130.234192.168.2.12
                                                                    Dec 6, 2024 10:17:52.640352964 CET49711443192.168.2.12162.159.130.234
                                                                    Dec 6, 2024 10:17:52.730704069 CET49711443192.168.2.12162.159.130.234
                                                                    Dec 6, 2024 10:17:52.730716944 CET44349711162.159.130.234192.168.2.12
                                                                    Dec 6, 2024 10:17:52.731009960 CET44349711162.159.130.234192.168.2.12
                                                                    Dec 6, 2024 10:17:52.791399002 CET49711443192.168.2.12162.159.130.234
                                                                    Dec 6, 2024 10:17:52.945669889 CET49711443192.168.2.12162.159.130.234
                                                                    Dec 6, 2024 10:17:52.987330914 CET44349711162.159.130.234192.168.2.12
                                                                    Dec 6, 2024 10:17:53.294447899 CET44349711162.159.130.234192.168.2.12
                                                                    Dec 6, 2024 10:17:53.294514894 CET44349711162.159.130.234192.168.2.12
                                                                    Dec 6, 2024 10:17:53.294590950 CET49711443192.168.2.12162.159.130.234
                                                                    Dec 6, 2024 10:17:53.303246975 CET49711443192.168.2.12162.159.130.234
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 6, 2024 10:17:51.166800022 CET6040953192.168.2.121.1.1.1
                                                                    Dec 6, 2024 10:17:51.393877983 CET53604091.1.1.1192.168.2.12
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Dec 6, 2024 10:17:51.166800022 CET192.168.2.121.1.1.10x3cf8Standard query (0)gateway.discord.ggA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Dec 6, 2024 10:17:51.393877983 CET1.1.1.1192.168.2.120x3cf8No error (0)gateway.discord.gg162.159.130.234A (IP address)IN (0x0001)false
                                                                    Dec 6, 2024 10:17:51.393877983 CET1.1.1.1192.168.2.120x3cf8No error (0)gateway.discord.gg162.159.134.234A (IP address)IN (0x0001)false
                                                                    Dec 6, 2024 10:17:51.393877983 CET1.1.1.1192.168.2.120x3cf8No error (0)gateway.discord.gg162.159.133.234A (IP address)IN (0x0001)false
                                                                    Dec 6, 2024 10:17:51.393877983 CET1.1.1.1192.168.2.120x3cf8No error (0)gateway.discord.gg162.159.136.234A (IP address)IN (0x0001)false
                                                                    Dec 6, 2024 10:17:51.393877983 CET1.1.1.1192.168.2.120x3cf8No error (0)gateway.discord.gg162.159.135.234A (IP address)IN (0x0001)false
                                                                    • gateway.discord.gg
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.1249711162.159.130.2344436336C:\Users\user\Desktop\XZaysgiUfm.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-12-06 09:17:52 UTC187OUTGET /?v=9&encording=json HTTP/1.1
                                                                    Connection: Upgrade,Keep-Alive
                                                                    Upgrade: websocket
                                                                    Sec-WebSocket-Key: yG9dqYImYphIRk+ys8rh+w==
                                                                    Sec-WebSocket-Version: 13
                                                                    Host: gateway.discord.gg
                                                                    2024-12-06 09:17:53 UTC620INHTTP/1.1 404 Not Found
                                                                    Date: Fri, 06 Dec 2024 09:17:53 GMT
                                                                    Content-Length: 0
                                                                    Connection: close
                                                                    CF-Cache-Status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zdX0D6jXvL6gR6TUnSH%2FLkYB%2FEJRuxsPEDox5q1wAXfc76pJ5JwuKpFEuY19TGQwBXN9QPllchX1L1GxJVSiZWk0L%2FIn5%2Fp2Sc1WcXUqNYUASCvLEyPuQC%2F37J3y8sLjncKC%2FQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                    X-Content-Type-Options: nosniff
                                                                    Server: cloudflare
                                                                    CF-RAY: 8edb2f76d9c64381-EWR


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:04:17:50
                                                                    Start date:06/12/2024
                                                                    Path:C:\Users\user\Desktop\XZaysgiUfm.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Users\user\Desktop\XZaysgiUfm.exe"
                                                                    Imagebase:0x16adb8a0000
                                                                    File size:80'384 bytes
                                                                    MD5 hash:74690CDF2EDC26F42D100325241E1117
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_DiscordRat, Description: Yara detected Discord Rat, Source: 00000000.00000000.2304771627.0000016ADB8A2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:4
                                                                    Start time:04:17:53
                                                                    Start date:06/12/2024
                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 6336 -s 2296
                                                                    Imagebase:0x7ff707290000
                                                                    File size:570'736 bytes
                                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Reset < >
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: K=M_^
                                                                      • API String ID: 0-2875964825
                                                                      • Opcode ID: aaaeaa015c9cb4acbd51557e2d13a089365c17b4670814edcb6fbc5412490c18
                                                                      • Instruction ID: 8f6af3a158e03dc21663606af508df8d427e05fd198f8609459e1eb4e3c5a82f
                                                                      • Opcode Fuzzy Hash: aaaeaa015c9cb4acbd51557e2d13a089365c17b4670814edcb6fbc5412490c18
                                                                      • Instruction Fuzzy Hash: 16E04F71418B058BC344DF08D48449AB7E0FF94320F800B6EF059C21B1DF759681CA82
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: s?M_^
                                                                      • API String ID: 0-2419295829
                                                                      • Opcode ID: ec10b2b3ec7ce931ac0e2e3b3647c767416dfd586ab1da763a55a5b94e206507
                                                                      • Instruction ID: 5222c4dd2b089f3c5dddf02d0916bf5ba1d26d58d071838bb3ae43221b3104eb
                                                                      • Opcode Fuzzy Hash: ec10b2b3ec7ce931ac0e2e3b3647c767416dfd586ab1da763a55a5b94e206507
                                                                      • Instruction Fuzzy Hash: 52D05B3141CB058BD344DF04D4404DAB790FF94330F400B2DF069821E1DF649285C681
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5b4a5628e0b759959e41142534804d0d01396bb5535cf4f311fa9f8d648db90e
                                                                      • Instruction ID: 8c92374c7dd438c06287d21ee710a7e128af9ccbf397e1d628a7311a70b4514d
                                                                      • Opcode Fuzzy Hash: 5b4a5628e0b759959e41142534804d0d01396bb5535cf4f311fa9f8d648db90e
                                                                      • Instruction Fuzzy Hash: 2651A071D18B1C8FDB48DF58C845AEDBBF1FB99310F00826AD449D7266CA34A845CBC2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 90c1095a9af5a7e7965649104b19609406bcbaf7c8cf8e41a0a4be803bc73b42
                                                                      • Instruction ID: 00a9bb5a27ca4f607ccec8ce304cd48b543157f6f5b274b2d8b64bfea7bdc31a
                                                                      • Opcode Fuzzy Hash: 90c1095a9af5a7e7965649104b19609406bcbaf7c8cf8e41a0a4be803bc73b42
                                                                      • Instruction Fuzzy Hash: E3216535A18A0ACFDB95DF58D4806EA73E1FF58360F149A79D019D7299CA34F881CB80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 292391d2b6233f828bc04b348a5e1473dc3c66e9966782617ae29199f8907080
                                                                      • Instruction ID: 476bbdd5b929f0ab0d291f16c8fac2634c17f0ecba49a4fc84b3f0361e4dcb1a
                                                                      • Opcode Fuzzy Hash: 292391d2b6233f828bc04b348a5e1473dc3c66e9966782617ae29199f8907080
                                                                      • Instruction Fuzzy Hash: 86F01C35328D0E8FDAA8EB1DC064B7963E2FFA8351755427AD40EC32B5CE28E8028701
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3c8bc71db6ea3593c4b12910b2eb13e1a8f463b304a7aa99f58a8d8234671179
                                                                      • Instruction ID: fbbdbf054a6d8176028cda59ccf652dee05ee0d141937b52292bc252e6636b73
                                                                      • Opcode Fuzzy Hash: 3c8bc71db6ea3593c4b12910b2eb13e1a8f463b304a7aa99f58a8d8234671179
                                                                      • Instruction Fuzzy Hash: 6BF0DA31608A4ECFCF85DF48D8419EFB3A2FF58310B108A66E519C7199CA30E855CBC0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e9ea510bc4556fa208fd2cf5a92726f98d9476b672db0c49c525e8691d9ad81f
                                                                      • Instruction ID: 0d021d37fbd151ef232157b7aae6abae256626a0cb01ae8e9cb8eec8f180d2c2
                                                                      • Opcode Fuzzy Hash: e9ea510bc4556fa208fd2cf5a92726f98d9476b672db0c49c525e8691d9ad81f
                                                                      • Instruction Fuzzy Hash: 02E0C212F6991A8DEA40B7B8B8461FDB245EFC4210BC058B5E42DC20E7CE1865100280
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b1b126200298aba8c70a788b5b350d8105bf3a02048213ef1e4065015af48760
                                                                      • Instruction ID: 662ecec26cda4b9afb12e2aeda3b0fbce40a301f7edaf02ee986cbfee9fdf1b1
                                                                      • Opcode Fuzzy Hash: b1b126200298aba8c70a788b5b350d8105bf3a02048213ef1e4065015af48760
                                                                      • Instruction Fuzzy Hash: 33E0C212F6680A49AB40B7B8A8462FDB246DF84220BC058B9E42DC20E7CE1865100280
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a17eeb4b71fcfebaa56590db74bd409df054572774c8ba315b301bb3067ad229
                                                                      • Instruction ID: 02b637e80ea290fad99f74f3a8d1544866d439f32c8c7b2e75a7d2477a56b7a4
                                                                      • Opcode Fuzzy Hash: a17eeb4b71fcfebaa56590db74bd409df054572774c8ba315b301bb3067ad229
                                                                      • Instruction Fuzzy Hash: 36D0A720B29D2A0BE7ACB2AD60413B560C3DF8C310F4054BF901DD27D9DC955C9143C1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a6862bd8848108d64837587fbd8ca1dbf59dc33275e609ae39efacac2bba1bb6
                                                                      • Instruction ID: 354ea120ca8fe48cdb2b7d415cbbf23e3601b4901b917807b6f62a7c9014fbb3
                                                                      • Opcode Fuzzy Hash: a6862bd8848108d64837587fbd8ca1dbf59dc33275e609ae39efacac2bba1bb6
                                                                      • Instruction Fuzzy Hash: 8DD05E76B24A1F6EE785E758CC187FD67A2FB84791F4006A6A419D61E6CF2468418700
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2745931888.00007FFE16520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16520000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ffe16520000_XZaysgiUfm.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4daec9f0103e26c5c83186549660440b8c91879bf5116cac9e8be4ea42c51d5e
                                                                      • Instruction ID: 71ff6651157cf1864e26c87d0dcde47e197b788284bc50c3951860e15338b18f
                                                                      • Opcode Fuzzy Hash: 4daec9f0103e26c5c83186549660440b8c91879bf5116cac9e8be4ea42c51d5e
                                                                      • Instruction Fuzzy Hash: A1D01211E1A80A8AF9D9F7BEC4923787191AF89350FD408B8F05DD72E6DC4DA8D5C352