File name:

VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe

Full analysis: https://app.any.run/tasks/69457b17-f928-4bc3-b10a-9b9155217318
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: August 01, 2025, 04:30:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generic
stealer
ims-api
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

2DC1D0932FCD6833C6E4950E72BD3995

SHA1:

EA3BB173F094CE4FEE05A6B9A59C02D8F74C0305

SHA256:

8E065CD2C77408DA4958095AD3849FE1F623DC12396B459939EDBD4E3D8AF4E0

SSDEEP:

12288:wvGOU2dP0OVBTy4n/7O8PnFw+f2bvSiAO7gmqtR:UP0OVBTy4n/7ni+f2bdAOUmqv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals Discord credentials and data (YARA)

      • VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe (PID: 6264)
  • SUSPICIOUS

    • Executes application which crashes

      • VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe (PID: 6264)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe (PID: 6264)
  • INFO

    • Checks supported languages

      • VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe (PID: 6264)
    • Reads the computer name

      • VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe (PID: 6264)
    • Reads Environment values

      • VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe (PID: 6264)
    • Reads the machine GUID from the registry

      • VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe (PID: 6264)
    • Create files in a temporary directory

      • VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe (PID: 6264)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 1728)
    • Checks proxy server information

      • WerFault.exe (PID: 1728)
    • Reads the software policy settings

      • WerFault.exe (PID: 1728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

ims-api

(PID) Process(6264) VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe
Discord-Webhook-Tokens (1)904787107028041778/hVFv6PnoESYHVVgHBeUDJK3s0ZZ--JISCgnwxAcpwU2PY1YGp-Ar6z7ixM-stfN8m1Hi
Discord-Info-Links
904787107028041778/hVFv6PnoESYHVVgHBeUDJK3s0ZZ--JISCgnwxAcpwU2PY1YGp-Ar6z7ixM-stfN8m1Hi
Get Webhook Infohttps://discord.com/api/webhooks/904787107028041778/hVFv6PnoESYHVVgHBeUDJK3s0ZZ--JISCgnwxAcpwU2PY1YGp-Ar6z7ixM-stfN8m1Hi
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (62)
.exe | Win64 Executable (generic) (23.3)
.dll | Win32 Dynamic Link Library (generic) (5.5)
.exe | Win32 Executable (generic) (3.8)
.exe | Win16/32 Executable Delphi generic (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2095:03:27 23:44:54+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 260096
InitializedDataSize: 159744
UninitializedDataSize: -
EntryPoint: 0x4158a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 2.0.0.0
ProductVersionNumber: 2.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: CrabGame Cheats
CompanyName: CrabGame Cheats
FileDescription: CrabGame | Undetected cheats
FileVersion: 2.0.0.0
InternalName: CrabCheat.exe
LegalCopyright: Copyright © 2021 CrabGame
LegalTrademarks: aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa
OriginalFileName: CrabCheat.exe
ProductName: CrabGame Cheats
ProductVersion: 2.0.0.0
AssemblyVersion: 2.0.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start virusshare_2dc1d0932fcd6833c6e4950e72bd3995.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
1728C:\WINDOWS\system32\WerFault.exe -u -p 6264 -s 1728C:\Windows\System32\WerFault.exe
VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
6264"C:\Users\admin\AppData\Local\Temp\VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe" C:\Users\admin\AppData\Local\Temp\VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe
explorer.exe
User:
admin
Company:
CrabGame Cheats
Integrity Level:
MEDIUM
Description:
CrabGame | Undetected cheats
Version:
2.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\virusshare_2dc1d0932fcd6833c6e4950e72bd3995.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
ims-api
(PID) Process(6264) VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe
Discord-Webhook-Tokens (1)904787107028041778/hVFv6PnoESYHVVgHBeUDJK3s0ZZ--JISCgnwxAcpwU2PY1YGp-Ar6z7ixM-stfN8m1Hi
Discord-Info-Links
904787107028041778/hVFv6PnoESYHVVgHBeUDJK3s0ZZ--JISCgnwxAcpwU2PY1YGp-Ar6z7ixM-stfN8m1Hi
Get Webhook Infohttps://discord.com/api/webhooks/904787107028041778/hVFv6PnoESYHVVgHBeUDJK3s0ZZ--JISCgnwxAcpwU2PY1YGp-Ar6z7ixM-stfN8m1Hi
Total events
4 118
Read events
4 118
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
2
Unknown types
3

Dropped files

PID
Process
Filename
Type
1728WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREBB4.tmp.WERInternalMetadata.xmlxml
MD5:AAF789EA4E0026EF1BC578303F55D50C
SHA256:AFC8AF68845948DF37AD66F35A6D7F00AABEB541EA62175A0D839F99F1F3A1FA
1728WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785der
MD5:D310523737A0D4D05066857AC157F458
SHA256:0A0520D498306689AFA3CAC09ACE82E09229108FC9FABA5A906291D077004484
1728WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:9E5758783161BAD63465087D2BBE3EE5
SHA256:9B38F01AA610A031F6430F0FB34AA0A0E6B7A82B8F382566536618FD7E41BB90
1728WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:88C5253994A1BC421F4E84BFCCF15F9F
SHA256:EE2D617396347DE5434B3F8D0BA2E5D16E669D8424DC75B43250C565C5214051
1728WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREAC8.tmp.dmpdmp
MD5:BF844D44F9110B1E0320EED7B1DFA92D
SHA256:565D52E8054A59E00EB84F8F56C95922BD2EB72E75A6637B679687A261BF394B
1728WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREBD4.tmp.xmlxml
MD5:34BC4B274F10E7E368251C17DC327201
SHA256:7561D799ACFBAFA636BC8BB40EA34EEAA124D4DAB7B7DDA807045B8803AAA02B
1728WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:399B8A260A3FE6BB6F2D2DAE89FB82BB
SHA256:0DC7CEC07635BC159BA8B7FB1D7FC9AA00DE1C0C045BD688351878B65EAFF57B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
28
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2232
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1728
WerFault.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1728
WerFault.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1568
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1568
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5432
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6264
VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe
162.125.66.18:443
www.dropbox.com
DROPBOX
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2232
svchost.exe
20.190.160.5:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2232
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
6264
VirusShare_2dc1d0932fcd6833c6e4950e72bd3995.exe
162.159.133.233:443
cdn.discordapp.com
CLOUDFLARENET
whitelisted
1268
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.142
whitelisted
www.dropbox.com
  • 162.125.66.18
whitelisted
login.live.com
  • 20.190.160.5
  • 20.190.160.66
  • 20.190.160.3
  • 20.190.160.4
  • 20.190.160.20
  • 40.126.32.68
  • 20.190.160.22
  • 20.190.160.130
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
cdn.discordapp.com
  • 162.159.133.233
  • 162.159.129.233
  • 162.159.130.233
  • 162.159.135.233
  • 162.159.134.233
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
watson.events.data.microsoft.com
  • 135.233.45.222
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted

Threats

No threats detected
No debug info