Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Discord.exe

Overview

General Information

Sample name:Discord.exe
Analysis ID:1574526
MD5:05b54deb0e3e6a3fb9155a14642b50ba
SHA1:77bf6744502a5946861baf104c1cf4babc171b9c
SHA256:c759cde09cf057c2430ceb74bd7f15427d2ad27f0b77dcc8630c8a148486cf27
Tags:AsyncRATexeuser-lontze7
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Electron Application Child Processes
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • Discord.exe (PID: 7148 cmdline: "C:\Users\user\Desktop\Discord.exe" MD5: 05B54DEB0E3E6A3FB9155A14642B50BA)
    • cmd.exe (PID: 4180 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 1028 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' MD5: 48C2FE20575769DE916F48EF0676A965)
    • cmd.exe (PID: 2124 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp8ED9.tmp.bat"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 2668 cmdline: timeout 3 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • Discord.exe (PID: 5932 cmdline: "C:\Users\user\AppData\Roaming\Discord.exe" MD5: 05B54DEB0E3E6A3FB9155A14642B50BA)
  • Discord.exe (PID: 2108 cmdline: C:\Users\user\AppData\Roaming\Discord.exe MD5: 05B54DEB0E3E6A3FB9155A14642B50BA)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"External_config_on_Pastebin": "null", "Server": "18.ip.gl.ply.gg,", "Ports": "6606,7707,8808,9028", "Version": "0.5.8", "Autorun": "true", "Install_Folder": "Discord.exe", "Install_File": "RUQ5NjdZYkk3M3E5aFYwVkJCR0ZkQjlqc2lEcExuOGc="}
SourceRuleDescriptionAuthorStrings
Discord.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    Discord.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Discord.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0x9963:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xac38:$a2: Stub.exe
      • 0xacc8:$a2: Stub.exe
      • 0x66ff:$a3: get_ActivatePong
      • 0x9b7b:$a4: vmware
      • 0x99f3:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x745a:$a6: get_SslClient
      Discord.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0x99f5:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\Discord.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        C:\Users\user\AppData\Roaming\Discord.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\Discord.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
          • 0x9963:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
          • 0xac38:$a2: Stub.exe
          • 0xacc8:$a2: Stub.exe
          • 0x66ff:$a3: get_ActivatePong
          • 0x9b7b:$a4: vmware
          • 0x99f3:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
          • 0x745a:$a6: get_SslClient
          C:\Users\user\AppData\Roaming\Discord.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0x99f5:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0x97f5:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0xa67f:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0xb954:$a2: Stub.exe
              • 0xb9e4:$a2: Stub.exe
              • 0x741b:$a3: get_ActivatePong
              • 0xa897:$a4: vmware
              • 0xa70f:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0x8176:$a6: get_SslClient
              00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0xa711:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              Click to see the 5 entries
              SourceRuleDescriptionAuthorStrings
              0.0.Discord.exe.820000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                0.0.Discord.exe.820000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  0.0.Discord.exe.820000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
                  • 0x9963:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
                  • 0xac38:$a2: Stub.exe
                  • 0xacc8:$a2: Stub.exe
                  • 0x66ff:$a3: get_ActivatePong
                  • 0x9b7b:$a4: vmware
                  • 0x99f3:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
                  • 0x745a:$a6: get_SslClient
                  0.0.Discord.exe.820000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
                  • 0x99f5:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
                  0.2.Discord.exe.2ca3d1c.0.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                    Click to see the 6 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Discord.exe", ParentImage: C:\Users\user\Desktop\Discord.exe, ParentProcessId: 7148, ParentProcessName: Discord.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, ProcessId: 4180, ProcessName: cmd.exe
                    Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Discord.exe", ParentImage: C:\Users\user\Desktop\Discord.exe, ParentProcessId: 7148, ParentProcessName: Discord.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, ProcessId: 4180, ProcessName: cmd.exe
                    Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Discord.exe", ParentImage: C:\Users\user\Desktop\Discord.exe, ParentProcessId: 7148, ParentProcessName: Discord.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, ProcessId: 4180, ProcessName: cmd.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' , CommandLine: schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' , CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4180, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' , ProcessId: 1028, ProcessName: schtasks.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Discord.exeAvira: detected
                    Source: 18.ip.gl.ply.ggAvira URL Cloud: Label: malware
                    Source: C:\Users\user\AppData\Roaming\Discord.exeAvira: detection malicious, Label: TR/Dropper.Gen
                    Source: Discord.exeMalware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "18.ip.gl.ply.gg,", "Ports": "6606,7707,8808,9028", "Version": "0.5.8", "Autorun": "true", "Install_Folder": "Discord.exe", "Install_File": "RUQ5NjdZYkk3M3E5aFYwVkJCR0ZkQjlqc2lEcExuOGc="}
                    Source: C:\Users\user\AppData\Roaming\Discord.exeReversingLabs: Detection: 89%
                    Source: Discord.exeReversingLabs: Detection: 89%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\Discord.exeJoe Sandbox ML: detected
                    Source: Discord.exeJoe Sandbox ML: detected
                    Source: Discord.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Discord.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 18.ip.gl.ply.gg
                    Source: Malware configuration extractorURLs:
                    Source: Yara matchFile source: Discord.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED
                    Source: global trafficTCP traffic: 192.168.2.4:49732 -> 147.185.221.18:7707
                    Source: Joe Sandbox ViewIP Address: 147.185.221.18 147.185.221.18
                    Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                    Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
                    Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
                    Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
                    Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: 18.ip.gl.ply.gg
                    Source: Discord.exe, 00000000.00000002.1731807083.0000000002C71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: Discord.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 7148, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED

                    System Summary

                    barindex
                    Source: Discord.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: Discord.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 00000007.00000002.2949588314.00000000027FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 00000000.00000002.1731807083.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: Process Memory Space: Discord.exe PID: 7148, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: Process Memory Space: Discord.exe PID: 2108, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: Discord.exe, 00000000.00000000.1684289899.000000000082E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs Discord.exe
                    Source: Discord.exe, 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStub.exe" vs Discord.exe
                    Source: Discord.exeBinary or memory string: OriginalFilenameStub.exe" vs Discord.exe
                    Source: Discord.exe.0.drBinary or memory string: OriginalFilenameStub.exe" vs Discord.exe
                    Source: Discord.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Discord.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: Discord.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 00000007.00000002.2949588314.00000000027FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 00000000.00000002.1731807083.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: Process Memory Space: Discord.exe PID: 7148, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: Process Memory Space: Discord.exe PID: 2108, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: Discord.exe, Settings.csBase64 encoded string: 'JQKmmiOaY+Mgh8iuvfMjtIQJMipBJws+gNta2M1ZQbBasT3P4obWWXOYyydNYzRqnxGuzU9d9X/b4iBxQQfut1zAywR81fJHLpjUsY8xv1w=', 'mixPQrpXdTG9MhKe2E8S7PqEPNQ3DN9uhmv8XD9tH8dI/FP6r1cA2RXOOrn7bmuOLbbI/M2/JyxC2AXIFAtBzF8W62no/jSbyxvCXUbZw9k=', 'W3RZKSUMAp9HKnzGkgTSy6eRXUaa2tGzRe0QwLn/EYFi03sg1LEud6qFbPhcLp3obQ51D8WQ42NBMFNRsyIErg==', 'GRucBX1R4HqlFdI5wxwA/32oQD/ZamuzmYAU+Ltba+NpjyvYSRcGNC3LS0f2vQab25ZF/G7Z43q2UTucPLkCcA==', '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', 'YY9lyNrseL2h06EdMku7BfPMYELzgD9Wn/K/Kqqt2aO2abrgv9JXAvVBBWyyYF1t5ANmv7D1lE0s/NyKmP/rwf6ZKcf6BFsyubOTfPBdpjOQRlcPxmxoRuFb4Kklc3qCX9dtHiEgyCj/MiTN+Ni5HTWYLXwBfZ87vlb5uOvcAFZXwlSustpLk479XVTbm9rrSqlXWdUqbdg4qzfuOImnHBj0+e70XoI4WNmxBhSkcOri2Gi
                    Source: Discord.exe.0.dr, Settings.csBase64 encoded string: 'JQKmmiOaY+Mgh8iuvfMjtIQJMipBJws+gNta2M1ZQbBasT3P4obWWXOYyydNYzRqnxGuzU9d9X/b4iBxQQfut1zAywR81fJHLpjUsY8xv1w=', 'mixPQrpXdTG9MhKe2E8S7PqEPNQ3DN9uhmv8XD9tH8dI/FP6r1cA2RXOOrn7bmuOLbbI/M2/JyxC2AXIFAtBzF8W62no/jSbyxvCXUbZw9k=', 'W3RZKSUMAp9HKnzGkgTSy6eRXUaa2tGzRe0QwLn/EYFi03sg1LEud6qFbPhcLp3obQ51D8WQ42NBMFNRsyIErg==', 'GRucBX1R4HqlFdI5wxwA/32oQD/ZamuzmYAU+Ltba+NpjyvYSRcGNC3LS0f2vQab25ZF/G7Z43q2UTucPLkCcA==', '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', 'YY9lyNrseL2h06EdMku7BfPMYELzgD9Wn/K/Kqqt2aO2abrgv9JXAvVBBWyyYF1t5ANmv7D1lE0s/NyKmP/rwf6ZKcf6BFsyubOTfPBdpjOQRlcPxmxoRuFb4Kklc3qCX9dtHiEgyCj/MiTN+Ni5HTWYLXwBfZ87vlb5uOvcAFZXwlSustpLk479XVTbm9rrSqlXWdUqbdg4qzfuOImnHBj0+e70XoI4WNmxBhSkcOri2Gi
                    Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, Settings.csBase64 encoded string: 'JQKmmiOaY+Mgh8iuvfMjtIQJMipBJws+gNta2M1ZQbBasT3P4obWWXOYyydNYzRqnxGuzU9d9X/b4iBxQQfut1zAywR81fJHLpjUsY8xv1w=', 'mixPQrpXdTG9MhKe2E8S7PqEPNQ3DN9uhmv8XD9tH8dI/FP6r1cA2RXOOrn7bmuOLbbI/M2/JyxC2AXIFAtBzF8W62no/jSbyxvCXUbZw9k=', 'W3RZKSUMAp9HKnzGkgTSy6eRXUaa2tGzRe0QwLn/EYFi03sg1LEud6qFbPhcLp3obQ51D8WQ42NBMFNRsyIErg==', 'GRucBX1R4HqlFdI5wxwA/32oQD/ZamuzmYAU+Ltba+NpjyvYSRcGNC3LS0f2vQab25ZF/G7Z43q2UTucPLkCcA==', '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', 'YY9lyNrseL2h06EdMku7BfPMYELzgD9Wn/K/Kqqt2aO2abrgv9JXAvVBBWyyYF1t5ANmv7D1lE0s/NyKmP/rwf6ZKcf6BFsyubOTfPBdpjOQRlcPxmxoRuFb4Kklc3qCX9dtHiEgyCj/MiTN+Ni5HTWYLXwBfZ87vlb5uOvcAFZXwlSustpLk479XVTbm9rrSqlXWdUqbdg4qzfuOImnHBj0+e70XoI4WNmxBhSkcOri2Gi
                    Source: Discord.exe, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: Discord.exe, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: Discord.exe.0.dr, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: Discord.exe.0.dr, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@15/4@1/2
                    Source: C:\Users\user\Desktop\Discord.exeFile created: C:\Users\user\AppData\Roaming\Discord.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4348:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2032:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\Discord.exeMutant created: \Sessions\1\BaseNamedObjects\lmk8StbxTzvz
                    Source: C:\Users\user\Desktop\Discord.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8ED9.tmpJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp8ED9.tmp.bat""
                    Source: Discord.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Discord.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\Discord.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Discord.exeReversingLabs: Detection: 89%
                    Source: C:\Users\user\Desktop\Discord.exeFile read: C:\Users\user\Desktop\Discord.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Discord.exe "C:\Users\user\Desktop\Discord.exe"
                    Source: C:\Users\user\Desktop\Discord.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Discord.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp8ED9.tmp.bat""
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"'
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Discord.exe C:\Users\user\AppData\Roaming\Discord.exe
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Discord.exe "C:\Users\user\AppData\Roaming\Discord.exe"
                    Source: C:\Users\user\Desktop\Discord.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exitJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp8ED9.tmp.bat""Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Discord.exe "C:\Users\user\AppData\Roaming\Discord.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E5F29CE-E0A8-49D3-AF32-7A7BDC173478}\InProcServer32Jump to behavior
                    Source: Discord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Discord.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\Discord.exeFile created: C:\Users\user\AppData\Roaming\Discord.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: Yara matchFile source: Discord.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 7148, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"'
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Discord.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 7148, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED
                    Source: Discord.exe, Discord.exe.0.drBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\Discord.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: C10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: 27F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: 47F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: A80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: 2540000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: 2350000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Discord.exe TID: 6308Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exe TID: 2084Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exe TID: 6904Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\Discord.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\Discord.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Discord.exe.0.drBinary or memory string: vmware
                    Source: Discord.exe, 00000007.00000002.2948661174.0000000000B61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll*
                    Source: C:\Users\user\Desktop\Discord.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exitJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp8ED9.tmp.bat""Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Discord.exe "C:\Users\user\AppData\Roaming\Discord.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeQueries volume information: C:\Users\user\Desktop\Discord.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeQueries volume information: C:\Users\user\AppData\Roaming\Discord.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Discord.exeQueries volume information: C:\Users\user\AppData\Roaming\Discord.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Discord.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: Yara matchFile source: Discord.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 7148, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information1
                    Scripting
                    Valid Accounts2
                    Scheduled Task/Job
                    2
                    Scheduled Task/Job
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping21
                    Security Software Discovery
                    Remote ServicesData from Local System2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    Scripting
                    2
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    31
                    Virtualization/Sandbox Evasion
                    Security Account Manager31
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS1
                    File and Directory Discovery
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                    Obfuscated Files or Information
                    LSA Secrets13
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574526 Sample: Discord.exe Startdate: 13/12/2024 Architecture: WINDOWS Score: 100 34 18.ip.gl.ply.gg 2->34 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus detection for URL or domain 2->44 46 10 other signatures 2->46 8 Discord.exe 2 2->8         started        12 Discord.exe 7 2->12         started        signatures3 process4 dnsIp5 36 18.ip.gl.ply.gg 147.185.221.18, 49732, 49739, 49786 SALSGIVERUS United States 8->36 38 192.168.2.4, 138, 443, 49723 unknown unknown 8->38 48 Antivirus detection for dropped file 8->48 50 Multi AV Scanner detection for dropped file 8->50 52 Machine Learning detection for dropped file 8->52 30 C:\Users\user\AppData\Roaming\Discord.exe, PE32 12->30 dropped 32 C:\Users\user\AppData\...\Discord.exe.log, ASCII 12->32 dropped 15 cmd.exe 1 12->15         started        18 cmd.exe 1 12->18         started        file6 signatures7 process8 signatures9 54 Uses schtasks.exe or at.exe to add and modify task schedules 15->54 20 conhost.exe 15->20         started        22 schtasks.exe 1 15->22         started        24 Discord.exe 2 18->24         started        26 conhost.exe 18->26         started        28 timeout.exe 1 18->28         started        process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Discord.exe89%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
                    Discord.exe100%AviraTR/Dropper.Gen
                    Discord.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Discord.exe100%AviraTR/Dropper.Gen
                    C:\Users\user\AppData\Roaming\Discord.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\Discord.exe89%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    18.ip.gl.ply.gg100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    18.ip.gl.ply.gg
                    147.185.221.18
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      18.ip.gl.ply.ggtrue
                      • Avira URL Cloud: malware
                      unknown
                      true
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDiscord.exe, 00000000.00000002.1731807083.0000000002C71000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          147.185.221.18
                          18.ip.gl.ply.ggUnited States
                          12087SALSGIVERUStrue
                          IP
                          192.168.2.4
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1574526
                          Start date and time:2024-12-13 11:58:19 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 44s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:13
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Discord.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@15/4@1/2
                          EGA Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 49
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                          • Excluded IPs from analysis (whitelisted): 217.20.58.101, 192.229.221.95, 20.12.23.50, 13.107.246.63, 4.245.163.56
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target Discord.exe, PID 2108 because it is empty
                          • Execution Graph export aborted for target Discord.exe, PID 5932 because it is empty
                          • Execution Graph export aborted for target Discord.exe, PID 7148 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • VT rate limit hit for: Discord.exe
                          TimeTypeDescription
                          10:59:16Task SchedulerRun new task: Discord path: "C:\Users\user\AppData\Roaming\Discord.exe"
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          147.185.221.18r8k29DBraE.exeGet hashmaliciousXWormBrowse
                            Lr87y2w72r.exeGet hashmaliciousXWormBrowse
                              7LwVrYH7sy.exeGet hashmaliciousXWormBrowse
                                1c8DbXc5r0.exeGet hashmaliciousXWormBrowse
                                  6Mt223MA25.exeGet hashmaliciousArrowRATBrowse
                                    b34J4bxnmN.exeGet hashmaliciousNjratBrowse
                                      01koiHnedL.exeGet hashmaliciousNjratBrowse
                                        i231IEP3oh.exeGet hashmaliciousAsyncRATBrowse
                                          killer.exeGet hashmaliciousXWormBrowse
                                            system47.exeGet hashmaliciousXWormBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              18.ip.gl.ply.ggCrbq30Oxg6.exeGet hashmaliciousCyberGateBrowse
                                              • 147.185.221.18
                                              bwPgQVKx29.exeGet hashmaliciousNjratBrowse
                                              • 147.185.221.18
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              SALSGIVERUSCVmkXJ7e0a.exeGet hashmaliciousSheetRatBrowse
                                              • 147.185.221.22
                                              file.exeGet hashmaliciousXWormBrowse
                                              • 147.185.221.24
                                              NhoqAfkhHL.batGet hashmaliciousUnknownBrowse
                                              • 147.185.221.24
                                              sora.mpsl.elfGet hashmaliciousMiraiBrowse
                                              • 147.160.103.28
                                              a4lIk1Jrla.exeGet hashmaliciousNjrat, RevengeRATBrowse
                                              • 147.185.221.24
                                              W6s1vzcRdj.exeGet hashmaliciousXWormBrowse
                                              • 147.185.221.24
                                              u7e3vb5dfk.exeGet hashmaliciousXWormBrowse
                                              • 147.185.221.24
                                              aOi4JyF92S.exeGet hashmaliciousXWormBrowse
                                              • 147.185.221.24
                                              ozgpPwVAu1.exeGet hashmaliciousXWormBrowse
                                              • 147.185.221.22
                                              PG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                              • 147.185.221.24
                                              No context
                                              No context
                                              Process:C:\Users\user\Desktop\Discord.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):522
                                              Entropy (8bit):5.358731107079437
                                              Encrypted:false
                                              SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhat92n4M6:ML9E4KlKDE4KhKiKhg84j
                                              MD5:AE6AF1A0CB468ECBA64E2D77CB4517DB
                                              SHA1:09BD6366ED569ADB79274BBAB0BBF09C8244FD97
                                              SHA-256:3A917DCBC4952EA9A1135B379B56604B3B63198E540C653683D522445258B710
                                              SHA-512:E578CD0D9BF43FD1BA737B9C44B70130462CE55B4F368E2E341BB94A3A3FFA47D4A9FE714EB86926620D1B4BE9FFF4582C219DF9ACC923C765650B13C5451500
                                              Malicious:true
                                              Reputation:moderate, very likely benign file
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                              Process:C:\Users\user\Desktop\Discord.exe
                                              File Type:DOS batch file, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):151
                                              Entropy (8bit):5.049262186078458
                                              Encrypted:false
                                              SSDEEP:3:mKDDCMNqTtvL5ot+kiEaKC5dodASmqRDt+kiE2J5xAInTRI3hAHVZPy:hWKqTtT6wknaZ5LSmq1wkn23fTXHVk
                                              MD5:4815A017287AEE5BEFEDB0F2A49B1C40
                                              SHA1:22295AFF20EF05545B70F6D1BC75F144D8322EE8
                                              SHA-256:A71F38B2ABFF159A883ECE304EA74BB678FE601A402B293906266E2355454F6B
                                              SHA-512:B41C2BC2148FDDF834BD3178BCF07B29A20847B16DF24DBB1440EF96CC78C08173F17C5D18AA56CA1DB785A77E5CDF4244486B5C5D40ECF1DD21BA94CFC5791E
                                              Malicious:false
                                              Reputation:low
                                              Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\Discord.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmp8ED9.tmp.bat" /f /q..
                                              Process:C:\Users\user\Desktop\Discord.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):46080
                                              Entropy (8bit):5.450776774971557
                                              Encrypted:false
                                              SSDEEP:768:6uKQ9TH4EjZWUR/ejmo2qrYKjPGaG6PIyzjbFgX3i6cpxs298YBDZTx:6uKQ9THfe2BKTkDy3bCXSpF9LdTx
                                              MD5:05B54DEB0E3E6A3FB9155A14642B50BA
                                              SHA1:77BF6744502A5946861BAF104C1CF4BABC171B9C
                                              SHA-256:C759CDE09CF057C2430CEB74BD7F15427D2AD27F0B77DCC8630C8A148486CF27
                                              SHA-512:3668E77850ACFB0C42F1D15DE08FCD737F0C6D7087F25F6404B1F378AEA94CA34AB0D85F2BEA1C8A9D11692A039D0FA42AEEC4876BB802AE2C192608E5BC5A9B
                                              Malicious:true
                                              Yara Hits:
                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: Joe Security
                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: Joe Security
                                              • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: unknown
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: ditekSHen
                                              Antivirus:
                                              • Antivirus: Avira, Detection: 100%
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 89%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-e............................N.... ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text...T.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................0.......H........Y...m.............................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(>......*2~.....o?...*.s.........*.()...:(...(*...:....(+...:....('...:....((...9.....(v...*V(....s.... ...o....*n~....9....~....o..........*~~....(....9....(0...9....(@...*Vr.%.p~....(o....#...*.s...
                                              Process:C:\Windows\SysWOW64\timeout.exe
                                              File Type:ASCII text, with CRLF line terminators, with overstriking
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.41440934524794
                                              Encrypted:false
                                              SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                                              MD5:3DD7DD37C304E70A7316FE43B69F421F
                                              SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                                              SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                                              SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                                              Malicious:false
                                              Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):5.450776774971557
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:Discord.exe
                                              File size:46'080 bytes
                                              MD5:05b54deb0e3e6a3fb9155a14642b50ba
                                              SHA1:77bf6744502a5946861baf104c1cf4babc171b9c
                                              SHA256:c759cde09cf057c2430ceb74bd7f15427d2ad27f0b77dcc8630c8a148486cf27
                                              SHA512:3668e77850acfb0c42f1d15de08fcd737f0c6d7087f25f6404b1f378aea94ca34ab0d85f2bea1c8a9d11692a039d0fa42aeec4876bb802ae2c192608e5bc5a9b
                                              SSDEEP:768:6uKQ9TH4EjZWUR/ejmo2qrYKjPGaG6PIyzjbFgX3i6cpxs298YBDZTx:6uKQ9THfe2BKTkDy3bCXSpF9LdTx
                                              TLSH:01231B003BE9822BF2BE4F789CF26145467AF2A37603D54D2CC451975A13FC69A426FE
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....-e............................N.... ........@.. ....................... ............@................................
                                              Icon Hash:90cececece8e8eb0
                                              Entrypoint:0x40c74e
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x652DADE5 [Mon Oct 16 21:40:53 2023 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc6fc0x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x7ff.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xa7540xa800cde4af3abd1cde8da55e6fd58c27b146False0.5003952752976191data5.5063619556286IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0xe0000x7ff0x8000f68ce4dd77ed0bb9c1e6b31f6995d94False0.41748046875data4.88506844918463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x100000xc0x200befe45ae6d36b117ec9664968e15c14dFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_VERSION0xe0a00x2ccdata0.43575418994413406
                                              RT_MANIFEST0xe36c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 13, 2024 11:59:16.065865993 CET49675443192.168.2.4173.222.162.32
                                              Dec 13, 2024 11:59:29.696707010 CET497327707192.168.2.4147.185.221.18
                                              Dec 13, 2024 11:59:29.816450119 CET770749732147.185.221.18192.168.2.4
                                              Dec 13, 2024 11:59:29.816740990 CET497327707192.168.2.4147.185.221.18
                                              Dec 13, 2024 11:59:29.947354078 CET497327707192.168.2.4147.185.221.18
                                              Dec 13, 2024 11:59:30.067055941 CET770749732147.185.221.18192.168.2.4
                                              Dec 13, 2024 11:59:35.153037071 CET4972380192.168.2.4199.232.214.172
                                              Dec 13, 2024 11:59:35.273098946 CET8049723199.232.214.172192.168.2.4
                                              Dec 13, 2024 11:59:35.273199081 CET4972380192.168.2.4199.232.214.172
                                              Dec 13, 2024 11:59:51.747463942 CET770749732147.185.221.18192.168.2.4
                                              Dec 13, 2024 11:59:51.747606039 CET497327707192.168.2.4147.185.221.18
                                              Dec 13, 2024 11:59:56.776813030 CET497327707192.168.2.4147.185.221.18
                                              Dec 13, 2024 11:59:56.896771908 CET770749732147.185.221.18192.168.2.4
                                              Dec 13, 2024 12:00:03.801559925 CET497396606192.168.2.4147.185.221.18
                                              Dec 13, 2024 12:00:03.921459913 CET660649739147.185.221.18192.168.2.4
                                              Dec 13, 2024 12:00:03.922257900 CET497396606192.168.2.4147.185.221.18
                                              Dec 13, 2024 12:00:03.922828913 CET497396606192.168.2.4147.185.221.18
                                              Dec 13, 2024 12:00:04.042886019 CET660649739147.185.221.18192.168.2.4
                                              Dec 13, 2024 12:00:21.238168001 CET4972480192.168.2.4199.232.214.172
                                              Dec 13, 2024 12:00:21.358685970 CET8049724199.232.214.172192.168.2.4
                                              Dec 13, 2024 12:00:21.358877897 CET4972480192.168.2.4199.232.214.172
                                              Dec 13, 2024 12:00:25.842031002 CET660649739147.185.221.18192.168.2.4
                                              Dec 13, 2024 12:00:25.843748093 CET497396606192.168.2.4147.185.221.18
                                              Dec 13, 2024 12:00:30.847527027 CET497396606192.168.2.4147.185.221.18
                                              Dec 13, 2024 12:00:30.848810911 CET497866606192.168.2.4147.185.221.18
                                              Dec 13, 2024 12:00:30.967725992 CET660649739147.185.221.18192.168.2.4
                                              Dec 13, 2024 12:00:30.968662977 CET660649786147.185.221.18192.168.2.4
                                              Dec 13, 2024 12:00:30.968786001 CET497866606192.168.2.4147.185.221.18
                                              Dec 13, 2024 12:00:30.969280005 CET497866606192.168.2.4147.185.221.18
                                              Dec 13, 2024 12:00:31.090096951 CET660649786147.185.221.18192.168.2.4
                                              Dec 13, 2024 12:00:52.905050039 CET660649786147.185.221.18192.168.2.4
                                              Dec 13, 2024 12:00:52.905215979 CET497866606192.168.2.4147.185.221.18
                                              Dec 13, 2024 12:00:57.910336971 CET497866606192.168.2.4147.185.221.18
                                              Dec 13, 2024 12:00:58.030554056 CET660649786147.185.221.18192.168.2.4
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 13, 2024 11:59:29.255146027 CET6199153192.168.2.41.1.1.1
                                              Dec 13, 2024 11:59:29.645051956 CET53619911.1.1.1192.168.2.4
                                              Dec 13, 2024 11:59:32.768434048 CET138138192.168.2.4192.168.2.255
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Dec 13, 2024 11:59:29.255146027 CET192.168.2.41.1.1.10x7a43Standard query (0)18.ip.gl.ply.ggA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Dec 13, 2024 11:59:29.645051956 CET1.1.1.1192.168.2.40x7a43No error (0)18.ip.gl.ply.gg147.185.221.18A (IP address)IN (0x0001)false

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:05:59:11
                                              Start date:13/12/2024
                                              Path:C:\Users\user\Desktop\Discord.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\Discord.exe"
                                              Imagebase:0x820000
                                              File size:46'080 bytes
                                              MD5 hash:05B54DEB0E3E6A3FB9155A14642B50BA
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.1731807083.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:true

                                              Target ID:1
                                              Start time:05:59:16
                                              Start date:13/12/2024
                                              Path:C:\Windows\SysWOW64\cmd.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit
                                              Imagebase:0x240000
                                              File size:236'544 bytes
                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:2
                                              Start time:05:59:16
                                              Start date:13/12/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7699e0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:3
                                              Start time:05:59:16
                                              Start date:13/12/2024
                                              Path:C:\Windows\SysWOW64\cmd.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp8ED9.tmp.bat""
                                              Imagebase:0x240000
                                              File size:236'544 bytes
                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:05:59:16
                                              Start date:13/12/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7699e0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:05:59:16
                                              Start date:13/12/2024
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"'
                                              Imagebase:0x470000
                                              File size:187'904 bytes
                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:6
                                              Start time:05:59:16
                                              Start date:13/12/2024
                                              Path:C:\Windows\SysWOW64\timeout.exe
                                              Wow64 process (32bit):true
                                              Commandline:timeout 3
                                              Imagebase:0x560000
                                              File size:25'088 bytes
                                              MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:7
                                              Start time:05:59:17
                                              Start date:13/12/2024
                                              Path:C:\Users\user\AppData\Roaming\Discord.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Roaming\Discord.exe
                                              Imagebase:0x4a0000
                                              File size:46'080 bytes
                                              MD5 hash:05B54DEB0E3E6A3FB9155A14642B50BA
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000007.00000002.2949588314.00000000027FC000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: Joe Security
                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: Joe Security
                                              • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: unknown
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: ditekSHen
                                              Antivirus matches:
                                              • Detection: 100%, Avira
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 89%, ReversingLabs
                                              Reputation:low
                                              Has exited:false

                                              Target ID:8
                                              Start time:05:59:19
                                              Start date:13/12/2024
                                              Path:C:\Users\user\AppData\Roaming\Discord.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\Discord.exe"
                                              Imagebase:0x320000
                                              File size:46'080 bytes
                                              MD5 hash:05B54DEB0E3E6A3FB9155A14642B50BA
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Reset < >
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (bq$Te^q$d7p
                                                • API String ID: 0-1699803613
                                                • Opcode ID: 8657d73478102509c22d6a90311fbb5b5486509940276d656df78bf0a0a51067
                                                • Instruction ID: 14ead2e1085ebb939e2cbf4daef94b6560796a89ba4422f14d1837d98fe977e2
                                                • Opcode Fuzzy Hash: 8657d73478102509c22d6a90311fbb5b5486509940276d656df78bf0a0a51067
                                                • Instruction Fuzzy Hash: 35516D30B102148FCB98DF69C458A5DBBF6FF89710F2581A9E906EB3A5CB759C01CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hbq$dLdq
                                                • API String ID: 0-411705877
                                                • Opcode ID: ab453be2e9539d65bf043986aa372c403efbaeea6ccef71105cfdeeb8bbb8735
                                                • Instruction ID: 49876bb84c20b40d6f6425561d29e934f01fe3623d517af3b0599fa57057c8ee
                                                • Opcode Fuzzy Hash: ab453be2e9539d65bf043986aa372c403efbaeea6ccef71105cfdeeb8bbb8735
                                                • Instruction Fuzzy Hash: B341B031B002048FCB599F69C454AAEBBFAFF89204F1484AAE505DB3A6DB759C05CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR^q
                                                • API String ID: 0-2625958711
                                                • Opcode ID: 603f185818eafb03bea53afcdc0c7b3b9f73dcca55dbee5ed168cd834fc64e26
                                                • Instruction ID: bf2163f433939b9a81e863b9a4e8fe29fb625e261a5efa22ed6efedf82b70823
                                                • Opcode Fuzzy Hash: 603f185818eafb03bea53afcdc0c7b3b9f73dcca55dbee5ed168cd834fc64e26
                                                • Instruction Fuzzy Hash: 0231BF34F002168FCB89EB79C550A6EBBF6BFC9204B144069D609DB3A4EB719C028791
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dLdq
                                                • API String ID: 0-3390252261
                                                • Opcode ID: 42aa13de5bcec344782259091e408d3a0fd772a487c085399f5568a63d23cb61
                                                • Instruction ID: 569ed0452a132605b62169f552d07ce6483c100d01ac21ff0e3e9574b8ac0500
                                                • Opcode Fuzzy Hash: 42aa13de5bcec344782259091e408d3a0fd772a487c085399f5568a63d23cb61
                                                • Instruction Fuzzy Hash: 1731B035A002048FDB59DF68C448BAEBBF6FF88304F148569D505AB3A6DB75ED44CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hbq
                                                • API String ID: 0-1245868
                                                • Opcode ID: 20ac0898cfd6dd0563d64366ec494fefcd04336a88a0f6876f488aac16c0ac11
                                                • Instruction ID: 4e6904ebf603033221a1662f5f68e29584eda7bec44b8fb42a67ece481d3f438
                                                • Opcode Fuzzy Hash: 20ac0898cfd6dd0563d64366ec494fefcd04336a88a0f6876f488aac16c0ac11
                                                • Instruction Fuzzy Hash: 30F0C8317052445FC38A5B3D981446E7BEBEFC765432944FAE505CB397DE398C068355
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1d840865b7ec17299f55a4ff4953271912c430063837c15cbdd12371df4a13f2
                                                • Instruction ID: 921869a33eda20d8d99f4c47f08ec1fb0b21e957034da9f830b7a1ae779d699b
                                                • Opcode Fuzzy Hash: 1d840865b7ec17299f55a4ff4953271912c430063837c15cbdd12371df4a13f2
                                                • Instruction Fuzzy Hash: 58C14A34B00204CFDB88EF68D594A6D77F6EF88714B214468E906EB3A5DB75EC42CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4c4da1eb481485dac311f08f0b10d775acd91f055059c9f417415ffc2db942f6
                                                • Instruction ID: 00b4244909e45cd58f9585036d97c95f763bb65c2cf4d9a995fd12ce72ee88b2
                                                • Opcode Fuzzy Hash: 4c4da1eb481485dac311f08f0b10d775acd91f055059c9f417415ffc2db942f6
                                                • Instruction Fuzzy Hash: EF6139387002018FD748EF68D594A6D77F6EF88718B214468E9069B7BACB75EC42CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 48d63ca597dec11e6829db034ffd4992db52ba88a821bbe9c4b508b107a7c190
                                                • Instruction ID: 045ffc9a6302e6bb0fc1d2193f81eb03fe550d810bcf6741c3c6617e1e6f7865
                                                • Opcode Fuzzy Hash: 48d63ca597dec11e6829db034ffd4992db52ba88a821bbe9c4b508b107a7c190
                                                • Instruction Fuzzy Hash: 0B51E638510205CFC79AEB24E664549B7B3FB85309750856AD409CBBBEEB399986CF80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: acc71fe95f1de3ca955497c73e9924bc95dbf45529f5d619131562467510979b
                                                • Instruction ID: 50359813a032cb8e4bda918c18513d71c20cad1b67c3ef207c60c0043de3c984
                                                • Opcode Fuzzy Hash: acc71fe95f1de3ca955497c73e9924bc95dbf45529f5d619131562467510979b
                                                • Instruction Fuzzy Hash: 63419C70E00209EFCB88EFB9C54466EBBFAFF88310F208569D559D7349DA319D428B91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9d859cbcf95d0cd0a415a54573849ee7a7461cf1dde279903af89ee0fc6ac21f
                                                • Instruction ID: 728db91888e9f54558326c7419c06b40bdf736ee46f155d98412d25d41bf6367
                                                • Opcode Fuzzy Hash: 9d859cbcf95d0cd0a415a54573849ee7a7461cf1dde279903af89ee0fc6ac21f
                                                • Instruction Fuzzy Hash: 44215C31610302DFDBE8AB74D65C66E7BADAF41709B10487DEA07C219EEB34C980CB52
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 53f42fb7ff7caa2d86f849b840a1f53e19331439ca3c891bc83d0ef9cf8f7185
                                                • Instruction ID: 87fd1a9301600af480f689a5de67dea86293d6a7bb45a0f4e4b3e6d7fb21f6e1
                                                • Opcode Fuzzy Hash: 53f42fb7ff7caa2d86f849b840a1f53e19331439ca3c891bc83d0ef9cf8f7185
                                                • Instruction Fuzzy Hash: CD2133307103038FDFF8ABB5E65C62EBAADAF416097004439DA1BC214EEB34C581CB56
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c19c35638773a714fce67ba11860275389bcff6f1eda6338352fc2e53043378b
                                                • Instruction ID: 83e2c444fb03248e277458fee4b425da9a28a496bee23d5a4e9e7e52cb3ade77
                                                • Opcode Fuzzy Hash: c19c35638773a714fce67ba11860275389bcff6f1eda6338352fc2e53043378b
                                                • Instruction Fuzzy Hash: 1511A070A00205DFCB95EB78D50465A77F6BF8931871408BAD509CB3A5EB358D52CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7d68727af109972ef3f9093739d87ad49b280522383881df1103cc6cf5992b4a
                                                • Instruction ID: 295b7516f84fc0a8ed1d01bfdc52ff6ae1218b49a7588fe0e5228623da06f746
                                                • Opcode Fuzzy Hash: 7d68727af109972ef3f9093739d87ad49b280522383881df1103cc6cf5992b4a
                                                • Instruction Fuzzy Hash: 3711A170B00205DFCB94EBB9D514A2A77E6BFC8255710087AD10DCB3A5EA35CC41CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 65036ed25ae4cef485826add9c9a85f095301c65a4f953e2bfab6c0459343637
                                                • Instruction ID: c1490818033852acb6afb147023480fba64577017816d33688fcd92bc7d9f5d0
                                                • Opcode Fuzzy Hash: 65036ed25ae4cef485826add9c9a85f095301c65a4f953e2bfab6c0459343637
                                                • Instruction Fuzzy Hash: E6E092307487958EDB25D3B8E01039EBFE29F41318F00496DD68657681CBFBB94983A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1731695571.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_29f0000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bf86efad8380e284dd633cc353f8a6c3086ab6ea96e6a929c0e57f64bca2a585
                                                • Instruction ID: d224478a8ed69827c2db3f0f90c65abcaf3f08ba93a81d356dde5f9e86f7f3ec
                                                • Opcode Fuzzy Hash: bf86efad8380e284dd633cc353f8a6c3086ab6ea96e6a929c0e57f64bca2a585
                                                • Instruction Fuzzy Hash: 13D0A9327101289FC604A7FDE40489E37DEAFCA6557A040A9E009CB3A8CE61EC0207C5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: a^q$ a^q$,$xbq$q^
                                                • API String ID: 0-232472449
                                                • Opcode ID: 358105c4db0d26df22e321eaebca4defdeaa3a69facdc967ef26e55a1d93d0a3
                                                • Instruction ID: 874ce6edaf3859cf83d5c7cc41c869bd70edbaf2ec106a6f370f725a9bba9c71
                                                • Opcode Fuzzy Hash: 358105c4db0d26df22e321eaebca4defdeaa3a69facdc967ef26e55a1d93d0a3
                                                • Instruction Fuzzy Hash: 5802AD387002008FDB05EF78D984B6ABBA2FF8A304F148568E4159F3A5DB75DD86DB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: a^q$ a^q$xbq$q^
                                                • API String ID: 0-2069382562
                                                • Opcode ID: 2dcb5da110692d68d71d1696a897ee328cac634fa66c8a820a4b478984223b5c
                                                • Instruction ID: 051f293d31e9fa319831e7b8d1202f018f2291ceaf8a726db44ed8991e17effc
                                                • Opcode Fuzzy Hash: 2dcb5da110692d68d71d1696a897ee328cac634fa66c8a820a4b478984223b5c
                                                • Instruction Fuzzy Hash: 2061A0787002008FDB05DF78D944B6A7BA2FFCA304F148528E5069F3A5DBB5ED858B91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (bq$Te^q$d7p
                                                • API String ID: 0-1699803613
                                                • Opcode ID: d859c33769c6197dc4f21a3707bcdc6fc3f4e011cd1e5c9165f23bbe4e39ae43
                                                • Instruction ID: fac17d338f48fededc24e5d68b9cb1d5a2d3e2a990cac90c1a5bcd51531b651a
                                                • Opcode Fuzzy Hash: d859c33769c6197dc4f21a3707bcdc6fc3f4e011cd1e5c9165f23bbe4e39ae43
                                                • Instruction Fuzzy Hash: 2251AF34B001149FCB54DF79C499AAEBBF2FF89700F2581A9E906DB3A5CA75DD418B80
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hbq$dLdq
                                                • API String ID: 0-411705877
                                                • Opcode ID: e9584dd0b2b6fe283aa83263935c69a0b0230db0ee5181fd1a40d38b3ca0cb88
                                                • Instruction ID: 9b1577a97e63c7a975ab073926637b785cedebce7d0c1ec8a4839dbe88b75620
                                                • Opcode Fuzzy Hash: e9584dd0b2b6fe283aa83263935c69a0b0230db0ee5181fd1a40d38b3ca0cb88
                                                • Instruction Fuzzy Hash: 5841F3317042448FCB15DF79D494A9EBFF2BF8A300F2485AAE405DB3A2CA759D45CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ]q
                                                • API String ID: 0-3425105455
                                                • Opcode ID: 5ff5ab65159c88e44f5c59a65154022b16582525e147c9ab94027de9f7a091ae
                                                • Instruction ID: 83c76b14480af474154b8e608d1283ece4fae8aa5b3a1388c03c5019f2606200
                                                • Opcode Fuzzy Hash: 5ff5ab65159c88e44f5c59a65154022b16582525e147c9ab94027de9f7a091ae
                                                • Instruction Fuzzy Hash: 32C15C387002048FCB05EB68D458AAD77F2FF89714B258469E906EB3A6CB75DC82CB51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR^q
                                                • API String ID: 0-2625958711
                                                • Opcode ID: b2f7f8cc0359cef51df77b542315826b3b593628fde93fad308e9424c3f51f2f
                                                • Instruction ID: 02a134762fac6e506c393a2dedc4cf845cc316259d885a5856124e2b7f88a4ee
                                                • Opcode Fuzzy Hash: b2f7f8cc0359cef51df77b542315826b3b593628fde93fad308e9424c3f51f2f
                                                • Instruction Fuzzy Hash: E1310734F002168FCB04AB7D94515AE7BF2EFCA310B14416DD556DB3A5DE34CD428782
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dLdq
                                                • API String ID: 0-3390252261
                                                • Opcode ID: 4ec4ffc5f684162fb30e79f303a7c6f7a6344bb8398609f8d36daa5d5d99dd37
                                                • Instruction ID: 2e3afdc6e4beabfab39c5f6a8ca4ea6a1bc373c48ffa42b9af92d90fa5f5cae9
                                                • Opcode Fuzzy Hash: 4ec4ffc5f684162fb30e79f303a7c6f7a6344bb8398609f8d36daa5d5d99dd37
                                                • Instruction Fuzzy Hash: B2317075A042048FCB14DF69C558BAEBBF2BF89300F248569E401AB361CB75AD85CB51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hbq
                                                • API String ID: 0-1245868
                                                • Opcode ID: c884ac0318664da1435167daa7bc68665c34ed0ffcf9438ec31cafa274e05f27
                                                • Instruction ID: 7b6f17ef43e528c91b0c50d07ca2f7f17a07a57d1e729f0dcb94273da5299ca2
                                                • Opcode Fuzzy Hash: c884ac0318664da1435167daa7bc68665c34ed0ffcf9438ec31cafa274e05f27
                                                • Instruction Fuzzy Hash: D101F42430C2800FC346E73D686586E2FE29FDB20032948FBD049CB3A3CC298C0A8352
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 34a7385402ec88b6dceb29673e1dae3ee11cf8db5eeed85f711a8ba4a47b228c
                                                • Instruction ID: 383c3dd33f37c43445dbb3f89d8d10ee15d532ac5216a6f82ea5161821f31da1
                                                • Opcode Fuzzy Hash: 34a7385402ec88b6dceb29673e1dae3ee11cf8db5eeed85f711a8ba4a47b228c
                                                • Instruction Fuzzy Hash: 2F51D47C601205CFDB06EF78E9449697772FBC5305750C668D4058B36EEB3AA94ACF81
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f373ddce45f83b460b3e2215dafabd59ac313d7bb9e0989768166a19fee895c4
                                                • Instruction ID: 856e5f737c12c23b423b2fdfacef3b5e001e7616682268b401b642774387d7d2
                                                • Opcode Fuzzy Hash: f373ddce45f83b460b3e2215dafabd59ac313d7bb9e0989768166a19fee895c4
                                                • Instruction Fuzzy Hash: 2241C270F04209AFCB08EFB9854466EFBFAEF89300F248569E449D7345DA349D828B91
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 412de3013a8a8af4b04dfa2754fdde2cf60ff21498c7e02b9b6a5cbb5c94d86f
                                                • Instruction ID: c0fad2660bda9e1c63c6cf1da64886d3e6ea89387e24a90957f0c2255c461368
                                                • Opcode Fuzzy Hash: 412de3013a8a8af4b04dfa2754fdde2cf60ff21498c7e02b9b6a5cbb5c94d86f
                                                • Instruction Fuzzy Hash: 5321833CB007028FEB64EBB599586BE3BA4BF97341B20842D9417C6152DBB08AC1FB51
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3f9d06e08d2da3bf8c288cfb271fbaaafb1fb7f6a439068984b8cf6eb085a2d7
                                                • Instruction ID: 2359ad207dd9c50c4753fa555bed99ccd50782ab017e551509dd6d583ee55083
                                                • Opcode Fuzzy Hash: 3f9d06e08d2da3bf8c288cfb271fbaaafb1fb7f6a439068984b8cf6eb085a2d7
                                                • Instruction Fuzzy Hash: A6216538B007028FDF64EBB599146BE3BA4BF93341720442D9417C6151EEB5CAC2F752
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b607b8ecd5e7e33feecb96a7764eceea2b41902cd8ae47492bfcf5e1299966fa
                                                • Instruction ID: 812e2cc989897ddc67620b9cd3fffb13abdd11c4bfbe552f8f7fe08fbf03771a
                                                • Opcode Fuzzy Hash: b607b8ecd5e7e33feecb96a7764eceea2b41902cd8ae47492bfcf5e1299966fa
                                                • Instruction Fuzzy Hash: BB11CE74A00245DFCB51EBB8D4045AA7BF2FF8A70531448BDD805CB354DB349C52DB80
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 524bd88081ecec9189087abb396d2d1c2b2970954de7169ef5fd4416abe7f97b
                                                • Instruction ID: 3fd29278c517a7584e948ac5fe326b8110b7d648a12f70967ec7969cbe03ac21
                                                • Opcode Fuzzy Hash: 524bd88081ecec9189087abb396d2d1c2b2970954de7169ef5fd4416abe7f97b
                                                • Instruction Fuzzy Hash: AA11AD74B00209DFCB54EBB9D404AAA7BE6FF8970571448B9D50ACB354EA35CD42CB90
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f934e249271cf97aad9a6298a5d90c9307861d39959fa4bc3119a2c0db437b02
                                                • Instruction ID: 6832e0544a5a57bf0d201076b577691324766c0ab5c0002ce5a847798b9bd2b3
                                                • Opcode Fuzzy Hash: f934e249271cf97aad9a6298a5d90c9307861d39959fa4bc3119a2c0db437b02
                                                • Instruction Fuzzy Hash: 63019E78B05211CFDB08EFB9D025ABD7BA4FF46700F048098C825DB261CB385A91EB91
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 67a1559a974a00f9b6ec5868f5a7157ace605ab9b6d4cf6e6b4dd8ee5d1afc86
                                                • Instruction ID: eb388cc4fbd679692b78782ce177e930bfb4bebdec12dc21324044cbd31195ec
                                                • Opcode Fuzzy Hash: 67a1559a974a00f9b6ec5868f5a7157ace605ab9b6d4cf6e6b4dd8ee5d1afc86
                                                • Instruction Fuzzy Hash: B9E08C363001045F8344967EE88885AB7EAEBC962431448BAE109C7326DD61CC024690
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4f5e064b2002a66d37015657326d46e1b6135aed1037781c4965f93d7fffbe3f
                                                • Instruction ID: 81cc830fd548e9391ac7e162cb2e54a7a050fc21da8ea82288d579d720895341
                                                • Opcode Fuzzy Hash: 4f5e064b2002a66d37015657326d46e1b6135aed1037781c4965f93d7fffbe3f
                                                • Instruction Fuzzy Hash: D5E0EC70C882095EDB81EFB954112AE7FF5EB0E210F2042AED90DD2611E63106519B52
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8a419f279162b4c570553a705a8d681f3fbfd48e385f772b886d6ae77a680e4c
                                                • Instruction ID: d69743e6876c8d47d06ae272645f9559f11757b1765d5fbf5ffd6cd8a688102f
                                                • Opcode Fuzzy Hash: 8a419f279162b4c570553a705a8d681f3fbfd48e385f772b886d6ae77a680e4c
                                                • Instruction Fuzzy Hash: E2C0122C904B06CFD750A7F1990C6EC2914AFC3302F200012A002040A2CEE609C2761B
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2949307751.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_c10000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a1d336704ff095a2497fe3693aefeeef7472ef0ee66856bd24cc078a728f9ef5
                                                • Instruction ID: 6fd7d3eb6f2477ae0dc089cd787d10e4dac63baf217aa52d50adba8a7472571d
                                                • Opcode Fuzzy Hash: a1d336704ff095a2497fe3693aefeeef7472ef0ee66856bd24cc078a728f9ef5
                                                • Instruction Fuzzy Hash: 03C0122C904B4ACBDB50A7F1990C6EC2A14ABC3302F200017A002040A2CEE609C2BA1B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (bq$Te^q$d7p
                                                • API String ID: 0-1699803613
                                                • Opcode ID: c7438d7839270700752f6a98e386450f3a4d0780671a28467833906dace976da
                                                • Instruction ID: 508a71e91f3a550961859d50f6e04776e2f741fde68796caec12b25b24c8163a
                                                • Opcode Fuzzy Hash: c7438d7839270700752f6a98e386450f3a4d0780671a28467833906dace976da
                                                • Instruction Fuzzy Hash: 7A516D34B101148FCB54EF79C498A5EBBF6EF88700F25C1AAE906DB3A5CA75DD018B91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hbq$dLdq
                                                • API String ID: 0-411705877
                                                • Opcode ID: 36c5842704a96da5bf34b16f887290f651e1c296e3bd4d142b0747c7256355d4
                                                • Instruction ID: fdaf42f9b178211d744ff06d795354740257f4f8d08257960e9bafae1e258f61
                                                • Opcode Fuzzy Hash: 36c5842704a96da5bf34b16f887290f651e1c296e3bd4d142b0747c7256355d4
                                                • Instruction Fuzzy Hash: BB4191317042448FCB15DF79D494A9EBFF2BF89300F1885AAE405EB3A2CA759C09CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR^q
                                                • API String ID: 0-2625958711
                                                • Opcode ID: 9a3de7d58b2d5958db71729cbb3b60d3264d6266429122e2b3f12e09f42f9433
                                                • Instruction ID: 195755a99c4af5216653e19475e33b2bd692002d32f65933c1208b9e95ea3dc1
                                                • Opcode Fuzzy Hash: 9a3de7d58b2d5958db71729cbb3b60d3264d6266429122e2b3f12e09f42f9433
                                                • Instruction Fuzzy Hash: DB31F234F002168FCB44AB7C9851A6EBBF6EFC5214B14416DE54ADB3A5EE30CC038792
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dLdq
                                                • API String ID: 0-3390252261
                                                • Opcode ID: 8bd18bd2d7d2e9e4bf0e2a530743c0bcecb25ebc30b27a7e60abbe8a733bb373
                                                • Instruction ID: 3a473a520c865ce03099917ec3630b3c2d5d05c972ef5254846d16e131ddfa6d
                                                • Opcode Fuzzy Hash: 8bd18bd2d7d2e9e4bf0e2a530743c0bcecb25ebc30b27a7e60abbe8a733bb373
                                                • Instruction Fuzzy Hash: F5317075A002048FDB15DF79C458BAEBBF2BF88300F18856AE401AB361CB75ED49CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hbq
                                                • API String ID: 0-1245868
                                                • Opcode ID: 076dc0f1fe13c306b4aac38b04452a6a1f97752822e9de0ec4bc50b6d66fa71a
                                                • Instruction ID: 0af7c6b84158a2659e76126b553df88893a0813489e7aac28a51e54fbbff1386
                                                • Opcode Fuzzy Hash: 076dc0f1fe13c306b4aac38b04452a6a1f97752822e9de0ec4bc50b6d66fa71a
                                                • Instruction Fuzzy Hash: 3201A42030D2D04FC3869B3D586582E2FE3DFC665031989FBD14ACB3A3CD288C0A8766
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c6b53e608d1bcde7aa428e830fd976c7960fa8c63f7095a8bf4589a722bd04f4
                                                • Instruction ID: aadcfa7b5e724e70b306cdbc05c533af7a2526b060fee9f410eb28c40ab1c714
                                                • Opcode Fuzzy Hash: c6b53e608d1bcde7aa428e830fd976c7960fa8c63f7095a8bf4589a722bd04f4
                                                • Instruction Fuzzy Hash: 0351937C5112058FC70AFB24E9889997BB2FF843097508669D4018B379EB31ED6AEF80
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fe63b748e4190ab3974225b00b884eb6d0b4bab067ab9c4f3bd069f227df808c
                                                • Instruction ID: 604157655a77982b07c564bf62ec9b7daa0c1425f4c106cc6adb5c86968596c8
                                                • Opcode Fuzzy Hash: fe63b748e4190ab3974225b00b884eb6d0b4bab067ab9c4f3bd069f227df808c
                                                • Instruction Fuzzy Hash: 8C418F70E04209AFCB44EFB9C54466EBBFAEF88300F20C56AD449D7355EA349D428B91
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f68bf04b6714e8c6595aef28661977d32418a17759fe26cd454fce3f9aa50014
                                                • Instruction ID: fcf10f8635279581cb32220a24edcc7dcb603af51cd1c91f41966cec46370bb2
                                                • Opcode Fuzzy Hash: f68bf04b6714e8c6595aef28661977d32418a17759fe26cd454fce3f9aa50014
                                                • Instruction Fuzzy Hash: 98212834B401049FD714EB68CA99BAE7BF6BF88720F248559E901EB3A5CB719C41CB80
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802028763.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_9dd000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 04d012810dab71fbda0dd34c78387948afdf3e1e4796d6cb0d9f5aa55ee0fc18
                                                • Instruction ID: a5896767fc1879ed2db7b65d35cda1575d0eb70d47c2270f1a724a9eada3a744
                                                • Opcode Fuzzy Hash: 04d012810dab71fbda0dd34c78387948afdf3e1e4796d6cb0d9f5aa55ee0fc18
                                                • Instruction Fuzzy Hash: 8C212871585200DFDB05DF14E9C0B27BF65FB94318F20C56AE9090B36AC33AD855C7A1
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 30d72f795398b3f65abf536526315db38ebfc8d2483a680f91cf79e89b740f99
                                                • Instruction ID: 7790b6d8f71a10a24199bc72fc2184e6fbe88716a0a7c1071567bda23983cdc6
                                                • Opcode Fuzzy Hash: 30d72f795398b3f65abf536526315db38ebfc8d2483a680f91cf79e89b740f99
                                                • Instruction Fuzzy Hash: 98219D307183429FDBACBB74D888E6EBBB4AF10789711442DE407C61A1EB208D09AB51
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 443bb7b99aa755cefb01a61b1220f4b449bc6fee8d1fd38850ca18c274a7079f
                                                • Instruction ID: def10d2cd5b10638b2ca3b766ceae75e8e77e9bd7e8a6cb8db77114174bbb55b
                                                • Opcode Fuzzy Hash: 443bb7b99aa755cefb01a61b1220f4b449bc6fee8d1fd38850ca18c274a7079f
                                                • Instruction Fuzzy Hash: C62180307243428FDFACBBB5E948E6EBBA4AF107897114429E407C6160EB20CD09E752
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 538f34dce3348d4d8ded111d499c1f2c01827c595bc6fe5192628c3aaf1baaa7
                                                • Instruction ID: c1457711561dc4760570de151338426c39955a4b70c8bba75f27dea079615e92
                                                • Opcode Fuzzy Hash: 538f34dce3348d4d8ded111d499c1f2c01827c595bc6fe5192628c3aaf1baaa7
                                                • Instruction Fuzzy Hash: DB118E74A00245DFCB55EBB8D80496A7BF6EF8970572449BDD005CB368EB30DC22DB90
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802028763.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_9dd000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                • Instruction ID: 80abb94db7afbab9aec3229bc577342456d2bd0a53183e76d4524ee46f979a2a
                                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                • Instruction Fuzzy Hash: AB11D376544240DFDB16CF14D9C4B16BF71FB94324F24C5AAE9090B35AC336D85ACBA2
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b5fd5981133f96466ce328dedead008dbe9548f5de95f5971fff478c844bd0df
                                                • Instruction ID: 3aadf1b90f3e657869a330b2991dafe40f3bce4894b6cad4e2c4d56ff2ab267c
                                                • Opcode Fuzzy Hash: b5fd5981133f96466ce328dedead008dbe9548f5de95f5971fff478c844bd0df
                                                • Instruction Fuzzy Hash: 6D116174B00209DFCB54FBB9D504A6A7BFAAF887557200879D405DB364EB31DC52DB90
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.1802168782.0000000000A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_a80000_Discord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 49cecf205b9674784730145f45279247a12a0a08b019721382d2c052909db037
                                                • Instruction ID: 76c8b2986c4c247a92c1a2aece91ee8d29408e55b7c21715b691c44baf9e29bc
                                                • Opcode Fuzzy Hash: 49cecf205b9674784730145f45279247a12a0a08b019721382d2c052909db037
                                                • Instruction Fuzzy Hash: F9E08C323001045F8344962EE88885AB7DAEBC862431548BAF109C7321DD60CC014690