Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Discord3.exe

Overview

General Information

Sample name:Discord3.exe
Analysis ID:1575587
MD5:dcec31da98141bb5ebb57d474de65edc
SHA1:56b0db53fb20b171291d2ad1066b2aea09bad38d
SHA256:cf1597d08ba3eddf6839c3b54c723ccc1db8d1c6edc1f416d05de29cec36aa49
Tags:AsyncRATexeuser-lontze7
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Discord3.exe (PID: 4248 cmdline: "C:\Users\user\Desktop\Discord3.exe" MD5: DCEC31DA98141BB5EBB57D474DE65EDC)
    • cmd.exe (PID: 3648 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 6964 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' MD5: 48C2FE20575769DE916F48EF0676A965)
    • cmd.exe (PID: 3404 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp73DE.tmp.bat"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 6756 cmdline: timeout 3 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • Discord.exe (PID: 6828 cmdline: "C:\Users\user\AppData\Roaming\Discord.exe" MD5: DCEC31DA98141BB5EBB57D474DE65EDC)
  • Discord.exe (PID: 6764 cmdline: C:\Users\user\AppData\Roaming\Discord.exe MD5: DCEC31DA98141BB5EBB57D474DE65EDC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"External_config_on_Pastebin": "null", "Server": "18.ip.gl.ply.gg", "Ports": "6606,7707,8808,9028", "Version": "0.5.8", "Autorun": "true", "Install_Folder": "Discord.exe", "Install_File": "VUJXV1czS1hWRGRISkVMRTJNbFU5TUFycGMzTmNCaFE="}
SourceRuleDescriptionAuthorStrings
Discord3.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    Discord3.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Discord3.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xa287:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xb638:$a2: Stub.exe
      • 0xb6c8:$a2: Stub.exe
      • 0x6e2d:$a3: get_ActivatePong
      • 0xa49f:$a4: vmware
      • 0xa317:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x7c82:$a6: get_SslClient
      Discord3.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xa319:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\Discord.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        C:\Users\user\AppData\Roaming\Discord.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\Discord.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
          • 0xa287:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
          • 0xb638:$a2: Stub.exe
          • 0xb6c8:$a2: Stub.exe
          • 0x6e2d:$a3: get_ActivatePong
          • 0xa49f:$a4: vmware
          • 0xa317:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
          • 0x7c82:$a6: get_SslClient
          C:\Users\user\AppData\Roaming\Discord.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0xa319:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1737150977.00000000005E2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            00000000.00000000.1737150977.00000000005E2000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0xa119:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0xaf87:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0xc338:$a2: Stub.exe
              • 0xc3c8:$a2: Stub.exe
              • 0x7b2d:$a3: get_ActivatePong
              • 0xb19f:$a4: vmware
              • 0xb017:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0x8982:$a6: get_SslClient
              00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0xb019:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              Click to see the 8 entries
              SourceRuleDescriptionAuthorStrings
              0.0.Discord3.exe.5e0000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                0.0.Discord3.exe.5e0000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
                • 0xa287:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
                • 0xb638:$a2: Stub.exe
                • 0xb6c8:$a2: Stub.exe
                • 0x6e2d:$a3: get_ActivatePong
                • 0xa49f:$a4: vmware
                • 0xa317:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
                • 0x7c82:$a6: get_SslClient
                0.0.Discord3.exe.5e0000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
                • 0xa319:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
                0.2.Discord3.exe.2b0bd00.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                  0.2.Discord3.exe.2b0bd00.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
                  • 0x8487:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
                  • 0x9838:$a2: Stub.exe
                  • 0x98c8:$a2: Stub.exe
                  • 0x502d:$a3: get_ActivatePong
                  • 0x869f:$a4: vmware
                  • 0x8517:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
                  • 0x5e82:$a6: get_SslClient
                  Click to see the 5 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Discord3.exe", ParentImage: C:\Users\user\Desktop\Discord3.exe, ParentProcessId: 4248, ParentProcessName: Discord3.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, ProcessId: 3648, ProcessName: cmd.exe
                  Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Discord3.exe", ParentImage: C:\Users\user\Desktop\Discord3.exe, ParentProcessId: 4248, ParentProcessName: Discord3.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, ProcessId: 3648, ProcessName: cmd.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' , CommandLine: schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' , CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 3648, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' , ProcessId: 6964, ProcessName: schtasks.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Discord3.exeAvira: detected
                  Source: 18.ip.gl.ply.ggAvira URL Cloud: Label: malware
                  Source: C:\Users\user\AppData\Roaming\Discord.exeAvira: detection malicious, Label: TR/Dropper.Gen
                  Source: Discord3.exeMalware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "18.ip.gl.ply.gg", "Ports": "6606,7707,8808,9028", "Version": "0.5.8", "Autorun": "true", "Install_Folder": "Discord.exe", "Install_File": "VUJXV1czS1hWRGRISkVMRTJNbFU5TUFycGMzTmNCaFE="}
                  Source: C:\Users\user\AppData\Roaming\Discord.exeReversingLabs: Detection: 89%
                  Source: Discord3.exeReversingLabs: Detection: 89%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Roaming\Discord.exeJoe Sandbox ML: detected
                  Source: Discord3.exeJoe Sandbox ML: detected
                  Source: Discord3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Discord3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 18.ip.gl.ply.gg
                  Source: global trafficTCP traffic: 147.185.221.18 ports 9028,0,8808,7,7707,6606
                  Source: Yara matchFile source: Discord3.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED
                  Source: global trafficTCP traffic: 192.168.2.8:49705 -> 147.185.221.18:7707
                  Source: Joe Sandbox ViewIP Address: 147.185.221.18 147.185.221.18
                  Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficDNS traffic detected: DNS query: 18.ip.gl.ply.gg
                  Source: Discord3.exe, 00000000.00000002.1790617597.0000000002B00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: Discord3.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Discord3.exe.5e0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Discord3.exe.2b0bd00.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1737150977.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2979794460.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1790617597.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Discord3.exe PID: 4248, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 6764, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED

                  System Summary

                  barindex
                  Source: Discord3.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                  Source: Discord3.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 0.0.Discord3.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                  Source: 0.0.Discord3.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 0.2.Discord3.exe.2b0bd00.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                  Source: 0.2.Discord3.exe.2b0bd00.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                  Source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 00000000.00000000.1737150977.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                  Source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 00000008.00000002.2979794460.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: 00000000.00000002.1790617597.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: Process Memory Space: Discord3.exe PID: 4248, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: Process Memory Space: Discord.exe PID: 6764, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                  Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D440880_2_00D44088
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D449580_2_00D44958
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D43D400_2_00D43D40
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D407D00_2_00D407D0
                  Source: C:\Users\user\AppData\Roaming\Discord.exeCode function: 8_2_012F49588_2_012F4958
                  Source: C:\Users\user\AppData\Roaming\Discord.exeCode function: 8_2_012F40888_2_012F4088
                  Source: C:\Users\user\AppData\Roaming\Discord.exeCode function: 8_2_012F5B208_2_012F5B20
                  Source: C:\Users\user\AppData\Roaming\Discord.exeCode function: 8_2_012F3D408_2_012F3D40
                  Source: Discord3.exe, 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStub.exe" vs Discord3.exe
                  Source: Discord3.exe, 00000000.00000000.1737150977.00000000005EE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs Discord3.exe
                  Source: Discord3.exeBinary or memory string: OriginalFilenameStub.exe" vs Discord3.exe
                  Source: Discord3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Discord3.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                  Source: Discord3.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 0.0.Discord3.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                  Source: 0.0.Discord3.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 0.2.Discord3.exe.2b0bd00.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                  Source: 0.2.Discord3.exe.2b0bd00.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                  Source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 00000000.00000000.1737150977.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                  Source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 00000008.00000002.2979794460.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: 00000000.00000002.1790617597.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: Process Memory Space: Discord3.exe PID: 4248, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: Process Memory Space: Discord.exe PID: 6764, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                  Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                  Source: Discord3.exe, GsevYmlEcE.csBase64 encoded string: 'L+HCewG7Po0dkj/sD8aG3EYQhgfCUPMiOCVGGw8B9sIr2JhqRojNOymNPd1SvkQ+9l7evxb2nXO5QaTrJeKNjA==', 'gtyPiiF7nm/nKy+CDcU/ipenAiMt7FHE/Jmgvf7ys88J3F2jJritZOTWAo1F33rvgcjsjtKl0XiGee3+RDFsAw==', 'lYQjt6wN6kGfRI96IvdX9CYUyT8ykY1vvfAkjzXDPr3bS7r9GeBrJekDAt84gExuQYXZ/Pw4DsbnIVvA2MQFbA==', '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', '+TpKBg7CbNBesv9C8PxMIPo/YfcdGMPPw/VPaB/1c5uS2/I0g1C/kezK3vBLUx7ZrIQLPBTfGz4Wx4xuG9D9hTTSZg8U4ouCm/syjHMHmuEhhUESkWgRED/hMyhAlo88KyCrFvdFPX7frmn/eEgR8h40kV13w3n4AFRDsEbt7rPINre9lmzBx5JcDF2Tk7oXsJR4jQIZYZaGSIh9ybl23cXzugBf5gwmpBWqMnZp3QcfQQYWXuympc0I2P1mSpcJs2Uu4dWnFyRjxxdRUVlVzSArtNLMHgll/G0KB+51UHnFfv5KffFoDyyyEpb0W0rebUqROzs3U6b7cp0tX13lFCcl9gkcyU0T4AC8RV+jJIcZGV/21Yf
                  Source: Discord.exe.0.dr, GsevYmlEcE.csBase64 encoded string: 'L+HCewG7Po0dkj/sD8aG3EYQhgfCUPMiOCVGGw8B9sIr2JhqRojNOymNPd1SvkQ+9l7evxb2nXO5QaTrJeKNjA==', 'gtyPiiF7nm/nKy+CDcU/ipenAiMt7FHE/Jmgvf7ys88J3F2jJritZOTWAo1F33rvgcjsjtKl0XiGee3+RDFsAw==', 'lYQjt6wN6kGfRI96IvdX9CYUyT8ykY1vvfAkjzXDPr3bS7r9GeBrJekDAt84gExuQYXZ/Pw4DsbnIVvA2MQFbA==', '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', '+TpKBg7CbNBesv9C8PxMIPo/YfcdGMPPw/VPaB/1c5uS2/I0g1C/kezK3vBLUx7ZrIQLPBTfGz4Wx4xuG9D9hTTSZg8U4ouCm/syjHMHmuEhhUESkWgRED/hMyhAlo88KyCrFvdFPX7frmn/eEgR8h40kV13w3n4AFRDsEbt7rPINre9lmzBx5JcDF2Tk7oXsJR4jQIZYZaGSIh9ybl23cXzugBf5gwmpBWqMnZp3QcfQQYWXuympc0I2P1mSpcJs2Uu4dWnFyRjxxdRUVlVzSArtNLMHgll/G0KB+51UHnFfv5KffFoDyyyEpb0W0rebUqROzs3U6b7cp0tX13lFCcl9gkcyU0T4AC8RV+jJIcZGV/21Yf
                  Source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, GsevYmlEcE.csBase64 encoded string: 'L+HCewG7Po0dkj/sD8aG3EYQhgfCUPMiOCVGGw8B9sIr2JhqRojNOymNPd1SvkQ+9l7evxb2nXO5QaTrJeKNjA==', 'gtyPiiF7nm/nKy+CDcU/ipenAiMt7FHE/Jmgvf7ys88J3F2jJritZOTWAo1F33rvgcjsjtKl0XiGee3+RDFsAw==', 'lYQjt6wN6kGfRI96IvdX9CYUyT8ykY1vvfAkjzXDPr3bS7r9GeBrJekDAt84gExuQYXZ/Pw4DsbnIVvA2MQFbA==', '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', '+TpKBg7CbNBesv9C8PxMIPo/YfcdGMPPw/VPaB/1c5uS2/I0g1C/kezK3vBLUx7ZrIQLPBTfGz4Wx4xuG9D9hTTSZg8U4ouCm/syjHMHmuEhhUESkWgRED/hMyhAlo88KyCrFvdFPX7frmn/eEgR8h40kV13w3n4AFRDsEbt7rPINre9lmzBx5JcDF2Tk7oXsJR4jQIZYZaGSIh9ybl23cXzugBf5gwmpBWqMnZp3QcfQQYWXuympc0I2P1mSpcJs2Uu4dWnFyRjxxdRUVlVzSArtNLMHgll/G0KB+51UHnFfv5KffFoDyyyEpb0W0rebUqROzs3U6b7cp0tX13lFCcl9gkcyU0T4AC8RV+jJIcZGV/21Yf
                  Source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, jhSVFDDChaQlX.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, jhSVFDDChaQlX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: Discord.exe.0.dr, jhSVFDDChaQlX.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: Discord.exe.0.dr, jhSVFDDChaQlX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: Discord3.exe, jhSVFDDChaQlX.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: Discord3.exe, jhSVFDDChaQlX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@15/5@1/1
                  Source: C:\Users\user\Desktop\Discord3.exeFile created: C:\Users\user\AppData\Roaming\Discord.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeMutant created: NULL
                  Source: C:\Users\user\AppData\Roaming\Discord.exeMutant created: \Sessions\1\BaseNamedObjects\7U2HW8ZYjc9H
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2952:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2556:120:WilError_03
                  Source: C:\Users\user\Desktop\Discord3.exeFile created: C:\Users\user\AppData\Local\Temp\tmp73DE.tmpJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp73DE.tmp.bat""
                  Source: Discord3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Discord3.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\Discord3.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Discord3.exeReversingLabs: Detection: 89%
                  Source: C:\Users\user\Desktop\Discord3.exeFile read: C:\Users\user\Desktop\Discord3.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Discord3.exe "C:\Users\user\Desktop\Discord3.exe"
                  Source: C:\Users\user\Desktop\Discord3.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Discord3.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp73DE.tmp.bat""
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"'
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Discord.exe C:\Users\user\AppData\Roaming\Discord.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Discord.exe "C:\Users\user\AppData\Roaming\Discord.exe"
                  Source: C:\Users\user\Desktop\Discord3.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exitJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp73DE.tmp.bat""Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Discord.exe "C:\Users\user\AppData\Roaming\Discord.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: Discord3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Discord3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D40D20 push ebp; iretd 0_2_00D40EA0
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D411D0 push ebp; iretd 0_2_00D41246
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D46947 push eax; iretd 0_2_00D46956
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D45204 push esp; iretd 0_2_00D45256
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D41343 push ebp; iretd 0_2_00D41346
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D40565 push ebx; iretd 0_2_00D40572
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D41565 push eax; iretd 0_2_00D41576
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D45538 push esp; iretd 0_2_00D45546
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D40E78 push ebp; iretd 0_2_00D40E7E
                  Source: Discord3.exe, FuruXoQQhbyJxxp.csHigh entropy of concatenated method names: 'ybdIbqaiceDab', 'aKiIlxCApjr', 'pSmvRivdgvLqO', 'wPvphkrKhVpE', 'ASJENryWXWVrequg', 'QQMBuRNTMndGX', 'RbhSLEBSTRaJQdB', 'mnGoBCFSUuBJC', 'CqJSXJGYiC', 'KHlkPqkAZWZOsp'
                  Source: Discord.exe.0.dr, FuruXoQQhbyJxxp.csHigh entropy of concatenated method names: 'ybdIbqaiceDab', 'aKiIlxCApjr', 'pSmvRivdgvLqO', 'wPvphkrKhVpE', 'ASJENryWXWVrequg', 'QQMBuRNTMndGX', 'RbhSLEBSTRaJQdB', 'mnGoBCFSUuBJC', 'CqJSXJGYiC', 'KHlkPqkAZWZOsp'
                  Source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, FuruXoQQhbyJxxp.csHigh entropy of concatenated method names: 'ybdIbqaiceDab', 'aKiIlxCApjr', 'pSmvRivdgvLqO', 'wPvphkrKhVpE', 'ASJENryWXWVrequg', 'QQMBuRNTMndGX', 'RbhSLEBSTRaJQdB', 'mnGoBCFSUuBJC', 'CqJSXJGYiC', 'KHlkPqkAZWZOsp'
                  Source: C:\Users\user\Desktop\Discord3.exeFile created: C:\Users\user\AppData\Roaming\Discord.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: Yara matchFile source: Discord3.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Discord3.exe.5e0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Discord3.exe.2b0bd00.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1737150977.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2979794460.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1790617597.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Discord3.exe PID: 4248, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 6764, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"'
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Discord3.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Discord3.exe.5e0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Discord3.exe.2b0bd00.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1737150977.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2979794460.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1790617597.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Discord3.exe PID: 4248, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 6764, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED
                  Source: Discord3.exe, Discord.exe.0.drBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\Discord3.exeMemory allocated: D40000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeMemory allocated: 29B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeMemory allocated: 27E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: 12F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: 2E70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: 4E70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: EE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: 2A80000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeMemory allocated: 29A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exe TID: 5852Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exe TID: 2648Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Users\user\AppData\Roaming\Discord.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Discord3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: Discord.exe.0.drBinary or memory string: vmware
                  Source: Discord.exe, 00000008.00000002.2982402897.000000000550E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\Discord3.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\Discord3.exeCode function: 0_2_00D42D4C CheckRemoteDebuggerPresent,0_2_00D42D4C
                  Source: C:\Users\user\Desktop\Discord3.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exitJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp73DE.tmp.bat""Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Discord.exe "C:\Users\user\AppData\Roaming\Discord.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeQueries volume information: C:\Users\user\Desktop\Discord3.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeQueries volume information: C:\Users\user\AppData\Roaming\Discord.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Discord.exeQueries volume information: C:\Users\user\AppData\Roaming\Discord.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Discord3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: Yara matchFile source: Discord3.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Discord3.exe.5e0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Discord3.exe.2b0bd00.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Discord3.exe.2b0bd00.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1737150977.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2979794460.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1790617597.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Discord3.exe PID: 4248, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 6764, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid Accounts1
                  Windows Management Instrumentation
                  2
                  Scheduled Task/Job
                  11
                  Process Injection
                  1
                  Masquerading
                  OS Credential Dumping321
                  Security Software Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts2
                  Scheduled Task/Job
                  1
                  Scripting
                  2
                  Scheduled Task/Job
                  1
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  51
                  Virtualization/Sandbox Evasion
                  Security Account Manager51
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                  Process Injection
                  NTDS1
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture11
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
                  Obfuscated Files or Information
                  LSA Secrets23
                  System Information Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1575587 Sample: Discord3.exe Startdate: 16/12/2024 Architecture: WINDOWS Score: 100 34 18.ip.gl.ply.gg 2->34 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 Antivirus detection for URL or domain 2->42 44 11 other signatures 2->44 8 Discord3.exe 7 2->8         started        12 Discord.exe 2 2->12         started        signatures3 process4 dnsIp5 30 C:\Users\user\AppData\Roaming\Discord.exe, PE32 8->30 dropped 32 C:\Users\user\AppData\...\Discord3.exe.log, ASCII 8->32 dropped 46 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 8->46 15 cmd.exe 1 8->15         started        18 cmd.exe 1 8->18         started        36 18.ip.gl.ply.gg 147.185.221.18, 49705, 49710, 49748 SALSGIVERUS United States 12->36 48 Antivirus detection for dropped file 12->48 50 Multi AV Scanner detection for dropped file 12->50 52 Machine Learning detection for dropped file 12->52 file6 signatures7 process8 signatures9 54 Uses schtasks.exe or at.exe to add and modify task schedules 15->54 20 conhost.exe 15->20         started        22 schtasks.exe 1 15->22         started        24 Discord.exe 3 18->24         started        26 conhost.exe 18->26         started        28 timeout.exe 1 18->28         started        process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Discord3.exe89%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
                  Discord3.exe100%AviraTR/Dropper.Gen
                  Discord3.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\Discord.exe100%AviraTR/Dropper.Gen
                  C:\Users\user\AppData\Roaming\Discord.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\Discord.exe89%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  18.ip.gl.ply.gg100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  18.ip.gl.ply.gg
                  147.185.221.18
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    18.ip.gl.ply.ggtrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDiscord3.exe, 00000000.00000002.1790617597.0000000002B00000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      147.185.221.18
                      18.ip.gl.ply.ggUnited States
                      12087SALSGIVERUStrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1575587
                      Start date and time:2024-12-16 06:17:18 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 42s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:14
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Discord3.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@15/5@1/1
                      EGA Information:
                      • Successful, ratio: 66.7%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 18
                      • Number of non-executed functions: 2
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target Discord.exe, PID 6828 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • VT rate limit hit for: Discord3.exe
                      TimeTypeDescription
                      06:18:58Task SchedulerRun new task: Discord path: "C:\Users\user\AppData\Roaming\Discord.exe"
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      147.185.221.187laJ4zKd8O.exeGet hashmaliciousXWormBrowse
                        Discord.exeGet hashmaliciousAsyncRATBrowse
                          r8k29DBraE.exeGet hashmaliciousXWormBrowse
                            Lr87y2w72r.exeGet hashmaliciousXWormBrowse
                              7LwVrYH7sy.exeGet hashmaliciousXWormBrowse
                                1c8DbXc5r0.exeGet hashmaliciousXWormBrowse
                                  6Mt223MA25.exeGet hashmaliciousArrowRATBrowse
                                    b34J4bxnmN.exeGet hashmaliciousNjratBrowse
                                      01koiHnedL.exeGet hashmaliciousNjratBrowse
                                        i231IEP3oh.exeGet hashmaliciousAsyncRATBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          18.ip.gl.ply.ggDiscord.exeGet hashmaliciousAsyncRATBrowse
                                          • 147.185.221.18
                                          Crbq30Oxg6.exeGet hashmaliciousCyberGateBrowse
                                          • 147.185.221.18
                                          bwPgQVKx29.exeGet hashmaliciousNjratBrowse
                                          • 147.185.221.18
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          SALSGIVERUSLoader.exeGet hashmaliciousAsyncRATBrowse
                                          • 147.185.221.20
                                          72OWK7wBVH.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.24
                                          aZDwfEKorn.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.24
                                          HdTSntLSMB.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.24
                                          7laJ4zKd8O.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.18
                                          file.exeGet hashmaliciousXWormBrowse
                                          • 147.185.221.24
                                          testingg.exeGet hashmaliciousNjratBrowse
                                          • 147.185.221.19
                                          Bloxflip Predictor.exeGet hashmaliciousNjratBrowse
                                          • 147.185.221.224
                                          system404.exeGet hashmaliciousMetasploitBrowse
                                          • 147.185.221.19
                                          Discord.exeGet hashmaliciousAsyncRATBrowse
                                          • 147.185.221.18
                                          No context
                                          No context
                                          Process:C:\Users\user\AppData\Roaming\Discord.exe
                                          File Type:CSV text
                                          Category:dropped
                                          Size (bytes):425
                                          Entropy (8bit):5.353683843266035
                                          Encrypted:false
                                          SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                          MD5:859802284B12C59DDBB85B0AC64C08F0
                                          SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                          SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                          SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                          Process:C:\Users\user\Desktop\Discord3.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):739
                                          Entropy (8bit):5.348505694476449
                                          Encrypted:false
                                          SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaWzAbDLI4MNldKZat92n4M6:ML9E4KlKDE4KhKiKhBsXE4qdK284j
                                          MD5:A65F13C4355387C4645D260206AE915F
                                          SHA1:F8857636BB3B50E634E96E7B0ECE6AD77656BA5F
                                          SHA-256:DB8CA2E253F03395ABECD812505666B3BD5CE699B798E3F624D22EE605FB290E
                                          SHA-512:0584E8911FD08CC0BB833C6373AE5D161D00CF40FB4533B5DD0D31F38CF1783BB25E34084995A2D116AFB01ABAD14005D62EE51A1D9B79E262EF28775B878AB6
                                          Malicious:true
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Management\96012833bebd5f21714fc508603cda97\System.Management.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                          Process:C:\Users\user\Desktop\Discord3.exe
                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):153
                                          Entropy (8bit):5.039931469491485
                                          Encrypted:false
                                          SSDEEP:3:mKDDCMNqTtvL5oCHyg4EaKC5dodASmqRDCHyg4E2J5xAInTRI4WhOAHVZPy:hWKqTtT6CHhJaZ5LSmq1CHhJ23fTZWhg
                                          MD5:FBDB531203A840C63791D28BE0F45CAF
                                          SHA1:76D414E4CED6F9E9655833B8B1E17E600CC60721
                                          SHA-256:41BABE61DFE417D4B4FF0FE4BFFC18F7C823CD5D678B3A3250729CFCFA1481D5
                                          SHA-512:DB6E3CB74B50A62FB634D14C52ABCC1BDBF062614EE3E2B9FF3EDAFD5C8F094057D2402F2530B686FAB76E18F74C4129B1EC0BAE27CA94E39B0E0C6A9BEFD60C
                                          Malicious:false
                                          Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\Discord.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmp73DE.tmp.bat" /f /q..
                                          Process:C:\Users\user\Desktop\Discord3.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):48640
                                          Entropy (8bit):5.557903555436354
                                          Encrypted:false
                                          SSDEEP:768:AuyJNTAoZjRWUJd9bmo2qL0i120YsvdPI5SqK20bbld2UVuVSUnJ5ScNBDZwx:AuyJNTAGL2MvaEqKZbbldX0l3Sudwx
                                          MD5:DCEC31DA98141BB5EBB57D474DE65EDC
                                          SHA1:56B0DB53FB20B171291D2AD1066B2AEA09BAD38D
                                          SHA-256:CF1597D08BA3EDDF6839C3B54C723CCC1DB8D1C6EDC1F416D05DE29CEC36AA49
                                          SHA-512:5B9332FDB1E21A0559E1C8052F7FEF46465E4D7EA2D49D6894CA2CE575BA8158F2166BB40CE26AD5F7AD4E9A93728E565959D49583981AC7DFB20C659DBAEE99
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: Joe Security
                                          • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: Joe Security
                                          • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: ditekSHen
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 89%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-e............................n.... ........@.. ....................... ............@................................. ...K.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........Y..,v.............................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(>......*2~.....o?...*.s.........*.()...:(...(*...:....(+...:....('...:....((...9.....(v...*V(....s.... ...o....*n~....9....~....o..........*~~....(....9....(0...9....(@...*Vrv%.p~....(o....#...*.s...
                                          Process:C:\Windows\SysWOW64\timeout.exe
                                          File Type:ASCII text, with CRLF line terminators, with overstriking
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.41440934524794
                                          Encrypted:false
                                          SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                                          MD5:3DD7DD37C304E70A7316FE43B69F421F
                                          SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                                          SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                                          SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                                          Malicious:false
                                          Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):5.557903555436354
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:Discord3.exe
                                          File size:48'640 bytes
                                          MD5:dcec31da98141bb5ebb57d474de65edc
                                          SHA1:56b0db53fb20b171291d2ad1066b2aea09bad38d
                                          SHA256:cf1597d08ba3eddf6839c3b54c723ccc1db8d1c6edc1f416d05de29cec36aa49
                                          SHA512:5b9332fdb1e21a0559e1c8052f7fef46465e4d7ea2d49d6894ca2ce575ba8158f2166bb40ce26ad5f7ad4e9a93728e565959d49583981ac7dfb20c659dbaee99
                                          SSDEEP:768:AuyJNTAoZjRWUJd9bmo2qL0i120YsvdPI5SqK20bbld2UVuVSUnJ5ScNBDZwx:AuyJNTAGL2MvaEqKZbbldX0l3Sudwx
                                          TLSH:8D232C003BE9C227F2BE4F7499F3224585BAF2673602D55E1CC4419B5A23FC68A536F9
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....-e............................n.... ........@.. ....................... ............@................................
                                          Icon Hash:00928e8e8686b000
                                          Entrypoint:0x40d06e
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x652DADE5 [Mon Oct 16 21:40:53 2023 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xd0200x4b.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x7ff.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xb0740xb20077ec82c8aa788de69d4ac97d1680904eFalse0.5421128862359551data5.615305100598126IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xe0000x7ff0x8000f68ce4dd77ed0bb9c1e6b31f6995d94False0.41748046875data4.88506844918463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x100000xc0x200901bc1e24f7398f4cb868060ee1eb1a5False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_VERSION0xe0a00x2ccdata0.43575418994413406
                                          RT_MANIFEST0xe36c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 16, 2024 06:19:04.622337103 CET497057707192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:04.742587090 CET770749705147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:19:04.742677927 CET497057707192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:04.772659063 CET497057707192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:04.892354965 CET770749705147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:19:26.656673908 CET770749705147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:19:26.656779051 CET497057707192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:31.679541111 CET497057707192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:31.680351019 CET497108808192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:31.799205065 CET770749705147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:19:31.800014973 CET880849710147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:19:31.800427914 CET497108808192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:31.800795078 CET497108808192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:31.920448065 CET880849710147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:19:53.734774113 CET880849710147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:19:53.735944033 CET497108808192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:58.740494967 CET497108808192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:58.741640091 CET497489028192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:58.860301971 CET880849710147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:19:58.861288071 CET902849748147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:19:58.861387968 CET497489028192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:58.861783028 CET497489028192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:19:58.981431961 CET902849748147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:20:20.762783051 CET902849748147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:20:20.762877941 CET497489028192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:20:25.787631989 CET497489028192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:20:25.788666964 CET498109028192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:20:25.907296896 CET902849748147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:20:25.908317089 CET902849810147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:20:25.908405066 CET498109028192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:20:25.908808947 CET498109028192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:20:26.028462887 CET902849810147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:20:47.810288906 CET902849810147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:20:47.810373068 CET498109028192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:20:52.819006920 CET498109028192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:20:52.820017099 CET498726606192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:20:52.938611031 CET902849810147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:20:52.939671040 CET660649872147.185.221.18192.168.2.8
                                          Dec 16, 2024 06:20:52.939769983 CET498726606192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:20:52.940283060 CET498726606192.168.2.8147.185.221.18
                                          Dec 16, 2024 06:20:53.059999943 CET660649872147.185.221.18192.168.2.8
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 16, 2024 06:19:04.225260019 CET5117053192.168.2.81.1.1.1
                                          Dec 16, 2024 06:19:04.618765116 CET53511701.1.1.1192.168.2.8
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Dec 16, 2024 06:19:04.225260019 CET192.168.2.81.1.1.10x5d39Standard query (0)18.ip.gl.ply.ggA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Dec 16, 2024 06:19:04.618765116 CET1.1.1.1192.168.2.80x5d39No error (0)18.ip.gl.ply.gg147.185.221.18A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:00:18:51
                                          Start date:16/12/2024
                                          Path:C:\Users\user\Desktop\Discord3.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\Discord3.exe"
                                          Imagebase:0x5e0000
                                          File size:48'640 bytes
                                          MD5 hash:DCEC31DA98141BB5EBB57D474DE65EDC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1737150977.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.1737150977.00000000005E2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.1790617597.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.1790617597.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.1790617597.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:00:18:56
                                          Start date:16/12/2024
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"' & exit
                                          Imagebase:0xa40000
                                          File size:236'544 bytes
                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:00:18:56
                                          Start date:16/12/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6ee680000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:00:18:56
                                          Start date:16/12/2024
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp73DE.tmp.bat""
                                          Imagebase:0xa40000
                                          File size:236'544 bytes
                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:00:18:56
                                          Start date:16/12/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6ee680000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:00:18:56
                                          Start date:16/12/2024
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\user\AppData\Roaming\Discord.exe"'
                                          Imagebase:0x8d0000
                                          File size:187'904 bytes
                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:00:18:56
                                          Start date:16/12/2024
                                          Path:C:\Windows\SysWOW64\timeout.exe
                                          Wow64 process (32bit):true
                                          Commandline:timeout 3
                                          Imagebase:0xc60000
                                          File size:25'088 bytes
                                          MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:00:18:58
                                          Start date:16/12/2024
                                          Path:C:\Users\user\AppData\Roaming\Discord.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\Discord.exe
                                          Imagebase:0xb00000
                                          File size:48'640 bytes
                                          MD5 hash:DCEC31DA98141BB5EBB57D474DE65EDC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000008.00000002.2979794460.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000008.00000002.2979794460.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: Joe Security
                                          • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: Joe Security
                                          • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\Discord.exe, Author: ditekSHen
                                          Antivirus matches:
                                          • Detection: 100%, Avira
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 89%, ReversingLabs
                                          Reputation:low
                                          Has exited:false

                                          Target ID:9
                                          Start time:00:18:59
                                          Start date:16/12/2024
                                          Path:C:\Users\user\AppData\Roaming\Discord.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Discord.exe"
                                          Imagebase:0x670000
                                          File size:48'640 bytes
                                          MD5 hash:DCEC31DA98141BB5EBB57D474DE65EDC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:12.6%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:20%
                                            Total number of Nodes:15
                                            Total number of Limit Nodes:0
                                            execution_graph 4136 d409a8 4137 d409ca 4136->4137 4138 d40a27 4137->4138 4140 d415b8 4137->4140 4141 d415d1 4140->4141 4142 d415db 4141->4142 4145 d45258 4141->4145 4149 d45257 4141->4149 4142->4138 4146 d45277 4145->4146 4153 d42d4c 4146->4153 4150 d45277 4149->4150 4151 d42d4c CheckRemoteDebuggerPresent 4150->4151 4152 d4528a 4151->4152 4152->4142 4154 d452b8 CheckRemoteDebuggerPresent 4153->4154 4156 d4528a 4154->4156 4156->4142

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 d42d4c-d4533c CheckRemoteDebuggerPresent 3 d45345-d45380 0->3 4 d4533e-d45344 0->4 4->3
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 00D4532F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1790027495.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d40000_Discord3.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: 9d1beff6c6efa656a5ea98d285c5bc7de1e5bb8ca67f2fdd042d1694c67669d7
                                            • Instruction ID: 9ca78009976546ab370f14a47ad8694dac60ee000bac625527ae8972dd1ac8fe
                                            • Opcode Fuzzy Hash: 9d1beff6c6efa656a5ea98d285c5bc7de1e5bb8ca67f2fdd042d1694c67669d7
                                            • Instruction Fuzzy Hash: 692148B18016598FCB10CF9AD884BEEBBF4AF49310F14842AE859A7351D778A944CF61

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 13 d44088-d440ee 15 d440f0-d440fb 13->15 16 d44138-d4413a 13->16 15->16 18 d440fd-d44109 15->18 17 d4413c-d44155 16->17 24 d44157-d44163 17->24 25 d441a1-d441a3 17->25 19 d4412c-d44136 18->19 20 d4410b-d44115 18->20 19->17 22 d44117 20->22 23 d44119-d44128 20->23 22->23 23->23 26 d4412a 23->26 24->25 27 d44165-d44171 24->27 28 d441a5-d441fd 25->28 26->19 29 d44194-d4419f 27->29 30 d44173-d4417d 27->30 37 d44247-d44249 28->37 38 d441ff-d4420a 28->38 29->28 31 d44181-d44190 30->31 32 d4417f 30->32 31->31 34 d44192 31->34 32->31 34->29 40 d4424b-d44263 37->40 38->37 39 d4420c-d44218 38->39 41 d4421a-d44224 39->41 42 d4423b-d44245 39->42 47 d44265-d44270 40->47 48 d442ad-d442af 40->48 43 d44226 41->43 44 d44228-d44237 41->44 42->40 43->44 44->44 46 d44239 44->46 46->42 47->48 49 d44272-d4427e 47->49 50 d442b1-d44302 48->50 51 d44280-d4428a 49->51 52 d442a1-d442ab 49->52 58 d44308-d44316 50->58 53 d4428c 51->53 54 d4428e-d4429d 51->54 52->50 53->54 54->54 56 d4429f 54->56 56->52 59 d4431f-d4437f 58->59 60 d44318-d4431e 58->60 67 d44381-d44385 59->67 68 d4438f-d44393 59->68 60->59 67->68 69 d44387 67->69 70 d44395-d44399 68->70 71 d443a3-d443a7 68->71 69->68 70->71 72 d4439b 70->72 73 d443b7-d443bb 71->73 74 d443a9-d443ad 71->74 72->71 76 d443bd-d443c1 73->76 77 d443cb-d443cf 73->77 74->73 75 d443af-d443b2 call d40418 74->75 75->73 76->77 79 d443c3-d443c6 call d40418 76->79 80 d443d1-d443d5 77->80 81 d443df-d443e3 77->81 79->77 80->81 83 d443d7-d443da call d40418 80->83 84 d443e5-d443e9 81->84 85 d443f3-d443f7 81->85 83->81 84->85 86 d443eb 84->86 87 d44407 85->87 88 d443f9-d443fd 85->88 86->85 91 d44408 87->91 88->87 90 d443ff 88->90 90->87 91->91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1790027495.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d40000_Discord3.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vin
                                            • API String ID: 0-3600523701
                                            • Opcode ID: 7bffeb2ccc72c8eb324c727db65fa9c2dd2de028c671101b63032f6489762ca8
                                            • Instruction ID: 2e6c57f71a82f629aa9e8f3d4eaff5f1a91f7ee2c0c90fae4fcce3755dc01457
                                            • Opcode Fuzzy Hash: 7bffeb2ccc72c8eb324c727db65fa9c2dd2de028c671101b63032f6489762ca8
                                            • Instruction Fuzzy Hash: 8EB15170E00209CFDF14CFA9D88579DBBF2BF88714F188129E855E7294EB749885CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 285 d44958-d449be 287 d449c0-d449cb 285->287 288 d44a08-d44a0a 285->288 287->288 289 d449cd-d449d9 287->289 290 d44a0c-d44a25 288->290 291 d449fc-d44a06 289->291 292 d449db-d449e5 289->292 297 d44a27-d44a33 290->297 298 d44a71-d44a73 290->298 291->290 293 d449e7 292->293 294 d449e9-d449f8 292->294 293->294 294->294 296 d449fa 294->296 296->291 297->298 300 d44a35-d44a41 297->300 299 d44a75-d44a8d 298->299 307 d44ad7-d44ad9 299->307 308 d44a8f-d44a9a 299->308 301 d44a64-d44a6f 300->301 302 d44a43-d44a4d 300->302 301->299 303 d44a51-d44a60 302->303 304 d44a4f 302->304 303->303 306 d44a62 303->306 304->303 306->301 309 d44adb-d44af3 307->309 308->307 310 d44a9c-d44aa8 308->310 316 d44af5-d44b00 309->316 317 d44b3d-d44b3f 309->317 311 d44aaa-d44ab4 310->311 312 d44acb-d44ad5 310->312 314 d44ab6 311->314 315 d44ab8-d44ac7 311->315 312->309 314->315 315->315 318 d44ac9 315->318 316->317 319 d44b02-d44b0e 316->319 320 d44b41-d44bb4 317->320 318->312 321 d44b10-d44b1a 319->321 322 d44b31-d44b3b 319->322 329 d44bba-d44bc8 320->329 323 d44b1c 321->323 324 d44b1e-d44b2d 321->324 322->320 323->324 324->324 326 d44b2f 324->326 326->322 330 d44bd1-d44c31 329->330 331 d44bca-d44bd0 329->331 338 d44c41-d44c45 330->338 339 d44c33-d44c37 330->339 331->330 341 d44c55-d44c59 338->341 342 d44c47-d44c4b 338->342 339->338 340 d44c39 339->340 340->338 344 d44c69-d44c6d 341->344 345 d44c5b-d44c5f 341->345 342->341 343 d44c4d 342->343 343->341 347 d44c7d-d44c81 344->347 348 d44c6f-d44c73 344->348 345->344 346 d44c61 345->346 346->344 349 d44c91-d44c95 347->349 350 d44c83-d44c87 347->350 348->347 351 d44c75 348->351 353 d44ca5 349->353 354 d44c97-d44c9b 349->354 350->349 352 d44c89-d44c8c call d40418 350->352 351->347 352->349 358 d44ca6 353->358 354->353 356 d44c9d-d44ca0 call d40418 354->356 356->353 358->358
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1790027495.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d40000_Discord3.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 30cab0a3cfb7782fbca5244f432ffc586b2ecd4c1ec60e2deba365b89478470c
                                            • Instruction ID: 0194007e9917e6379205044f5d9e13e81346f3d4d826e71bf9980629da30ecfb
                                            • Opcode Fuzzy Hash: 30cab0a3cfb7782fbca5244f432ffc586b2ecd4c1ec60e2deba365b89478470c
                                            • Instruction Fuzzy Hash: 89B16E70E00209CFDF14CFA9C8867ADBBF2AF88714F188529D815E7294EB749885DB95

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 7 d452b0-d4533c CheckRemoteDebuggerPresent 9 d45345-d45380 7->9 10 d4533e-d45344 7->10 10->9
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 00D4532F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1790027495.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d40000_Discord3.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: dcb980704321bb5bd9ac787dc4851bedf955cd3f86ffc8fb517d363544f717b8
                                            • Instruction ID: 31a0c4f8d7c3cb55ddd84616e88847c479dadd07ea4abe11af11fbfd49f3787c
                                            • Opcode Fuzzy Hash: dcb980704321bb5bd9ac787dc4851bedf955cd3f86ffc8fb517d363544f717b8
                                            • Instruction Fuzzy Hash: B02178B1C0125A8FCB00CFAAD884BEEBBF4AF49310F14846EE454A3351D3789944CF60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1790027495.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d40000_Discord3.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vin
                                            • API String ID: 0-3600523701
                                            • Opcode ID: 979dd193fa1c8864feb371b276dd79f6b565e358b5e52d99ce0dc2690b2e5387
                                            • Instruction ID: 6f4d0710a4ed8010edc68ddea38db1fd1cef148637b1472e3a80ccde3900813a
                                            • Opcode Fuzzy Hash: 979dd193fa1c8864feb371b276dd79f6b565e358b5e52d99ce0dc2690b2e5387
                                            • Instruction Fuzzy Hash: 3D917F70E00249CFDF14CFA9C98579EBBF2AF88314F188529E415A7294EB749945CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1790027495.0000000000D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d40000_Discord3.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e34a589eb3bd1a2b01f1636d630e7b72ec8749ae12e6bd861b816d5e86368cc7
                                            • Instruction ID: 67b53a2ac2975549c6658ba433f7eacd8697ad23558e7eae975b0c4b2774262f
                                            • Opcode Fuzzy Hash: e34a589eb3bd1a2b01f1636d630e7b72ec8749ae12e6bd861b816d5e86368cc7
                                            • Instruction Fuzzy Hash: 13210BF5C78742BBDF41CF38E6D960A7794FAEA9023490991A419CF41DD274E018CB70

                                            Execution Graph

                                            Execution Coverage:12.9%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:15
                                            Total number of Limit Nodes:0
                                            execution_graph 4847 12f09a8 4848 12f09ca 4847->4848 4849 12f0a27 4848->4849 4851 12f15b8 4848->4851 4852 12f15d1 4851->4852 4853 12f15db 4852->4853 4856 12f5248 4852->4856 4860 12f5258 4852->4860 4853->4849 4857 12f5277 4856->4857 4864 12f2d4c 4857->4864 4861 12f5277 4860->4861 4862 12f2d4c CheckRemoteDebuggerPresent 4861->4862 4863 12f528a 4862->4863 4863->4853 4865 12f52b8 CheckRemoteDebuggerPresent 4864->4865 4867 12f528a 4865->4867 4867->4853

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 134 12f52b0-12f533c CheckRemoteDebuggerPresent 137 12f533e-12f5344 134->137 138 12f5345-12f5380 134->138 137->138
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 012F532F
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2979535334.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_12f0000_Discord.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: 20afcac3e42894de2e8f046de8082d0311ab8be797538a3dc1f6c2485522544e
                                            • Instruction ID: 39e0273ccbe68bbd09746e1ebd241e324c0af7b32112f45193a9e22d6e0af3fe
                                            • Opcode Fuzzy Hash: 20afcac3e42894de2e8f046de8082d0311ab8be797538a3dc1f6c2485522544e
                                            • Instruction Fuzzy Hash: EE2125718002598FDB14CF9AD484BEEFBF4EF49220F14846AE958A7250D778A945CF61

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 141 12f2d4c-12f533c CheckRemoteDebuggerPresent 144 12f533e-12f5344 141->144 145 12f5345-12f5380 141->145 144->145
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 012F532F
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2979535334.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_12f0000_Discord.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: 3cb7aaa76a148e07cfcbd078edccc2acd52b3f1e9d34e7d0c492df4a3cdc325c
                                            • Instruction ID: b8b909756d13220cd83d6297ddda12111b73a811251d18eccace6e0180b7641e
                                            • Opcode Fuzzy Hash: 3cb7aaa76a148e07cfcbd078edccc2acd52b3f1e9d34e7d0c492df4a3cdc325c
                                            • Instruction Fuzzy Hash: 682136718012598FDB14CF9AC484BEEFBF4EF49210F14842EE959A7340D778A944CF61
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2979325622.00000000010BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_10bd000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1cb54877ce9314e12188aad97a952eaff52e6ae82d5f9ed83446ce24015df08b
                                            • Instruction ID: b35cf8067b8dbd5034d3055daaa0f84689565b77a71dc6e5a7a4c6ac40236094
                                            • Opcode Fuzzy Hash: 1cb54877ce9314e12188aad97a952eaff52e6ae82d5f9ed83446ce24015df08b
                                            • Instruction Fuzzy Hash: 5B210675504304DFDB05DF54D9C0B56FFA5FB8432CF24C1A9D9490A256C33AD456CBA2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2979325622.00000000010BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_10bd000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                            • Instruction ID: d92da3ac3e808900b4c801b4a739159d78c2b7ddfb2d395c7f6f7c14819840f0
                                            • Opcode Fuzzy Hash: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                            • Instruction Fuzzy Hash: D211DF76504240CFCB02CF48D5C0B56FFA2FB84328F2481A9D9490B257C33AD456CBA2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1860824447.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_ee0000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D@$D@
                                            • API String ID: 0-3862852415
                                            • Opcode ID: 0ddec3ae4059412b215474ac7da771ebd15c8d4a5ffa33818f16fd3bdf82afb3
                                            • Instruction ID: f028e10f35b80038db11fee4b7f516b8a9e1263b3ecdea0c4398c79a3f82bdad
                                            • Opcode Fuzzy Hash: 0ddec3ae4059412b215474ac7da771ebd15c8d4a5ffa33818f16fd3bdf82afb3
                                            • Instruction Fuzzy Hash: 9951C030B001089FD754DF69C858A5EBBF6EF88700F2581A9E802EB3A6DA75DC01CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1860824447.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_ee0000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D@
                                            • API String ID: 0-2222373746
                                            • Opcode ID: ef92aad246f715861ac649cac6ee8ff722bb776f3bb15c22484dd9a4747fe22d
                                            • Instruction ID: 7c371b144a2313d5bbd70d9d952b0ffc7e907652bb03bb77c30721a825c4ad1d
                                            • Opcode Fuzzy Hash: ef92aad246f715861ac649cac6ee8ff722bb776f3bb15c22484dd9a4747fe22d
                                            • Instruction Fuzzy Hash: 8E41D231B042088FDB18DF69D454A9EBBF6EF89300F1488A9E405EB3A1CB75DC45CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1860824447.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_ee0000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D@
                                            • API String ID: 0-2222373746
                                            • Opcode ID: 904b6f2cdfccb9290103e1007604c1a4ec8aa4c20a8b6165033208334a07049d
                                            • Instruction ID: e8ff4acf31b0f9423470eb603d4148794215a3806baab9a4d4775fe8ad005045
                                            • Opcode Fuzzy Hash: 904b6f2cdfccb9290103e1007604c1a4ec8aa4c20a8b6165033208334a07049d
                                            • Instruction Fuzzy Hash: E9F046317082504FD349A73E681052E3BEBDFCB21032548BAE145EB3A2DE25CC0683A5
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1860824447.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_ee0000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b80e358d83431e05e2a69b661289f26d5fdc99cbd9ced0703f7bbd7713dccb02
                                            • Instruction ID: b27818100f1d85981832328b57c5fcb8ea02d5c82605c9474ba6736800f0494a
                                            • Opcode Fuzzy Hash: b80e358d83431e05e2a69b661289f26d5fdc99cbd9ced0703f7bbd7713dccb02
                                            • Instruction Fuzzy Hash: 0D51B83D502315CFCB0EEB34F8649597762FF84B067508A68D8029B2ADEB71A947CF81
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1860824447.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_ee0000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5a50935ad16cbeb65c1d1b6e6ae9a23affe0d17574f283fc34d403665d6a2e24
                                            • Instruction ID: 8ab739670c01bcd031dc5e9b468a2f684e7d2ab582ed1876d6c00e30369a245a
                                            • Opcode Fuzzy Hash: 5a50935ad16cbeb65c1d1b6e6ae9a23affe0d17574f283fc34d403665d6a2e24
                                            • Instruction Fuzzy Hash: 0931F234F0029A8FDB48AB79985066EBBF6EFC9311B1445A9E506EB391DF30DC428790
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1860824447.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_ee0000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4cb12c3bee8f21e3c6b5c71ccf163944f2211b84f359e15a09fecc50f28bc905
                                            • Instruction ID: 03db6758b8ecaf9121badfea4ac8b5f723a52705daee88cab587bd41079d8b93
                                            • Opcode Fuzzy Hash: 4cb12c3bee8f21e3c6b5c71ccf163944f2211b84f359e15a09fecc50f28bc905
                                            • Instruction Fuzzy Hash: 2D419070B00249AFDB04EBB9884466EFBFAFFC8700F208569D449E7345DB34AD429B91
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1860685608.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_e4d000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d02f01d760afda4509ed9a9ca9dc6452d80fc5b8e58da4548b887b9c2afadd1a
                                            • Instruction ID: 31fac44a7f71abf6da5fa5c515d57f9703d1b8edb945b61bdcf30ab26c0f78fd
                                            • Opcode Fuzzy Hash: d02f01d760afda4509ed9a9ca9dc6452d80fc5b8e58da4548b887b9c2afadd1a
                                            • Instruction Fuzzy Hash: FB2103B1608300DFDB05DF14EDC0B26BF65FB98328F20C169E9091B256C73AD856CBA2
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1860824447.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_ee0000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 816de09d69cb3fa831463e701bccb96320c0d3dd8e0c4d417dbab1d7b23c4402
                                            • Instruction ID: eeae7a8a794f6a57d4987b0aac6c639b343fcbf1b8331a6fca2d27de279e12b8
                                            • Opcode Fuzzy Hash: 816de09d69cb3fa831463e701bccb96320c0d3dd8e0c4d417dbab1d7b23c4402
                                            • Instruction Fuzzy Hash: 36218E3470138F8FDF9CAF77E82466E37A5AF40706B10683D980AF1191EBB0C9849B61
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1860685608.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_e4d000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                            • Instruction ID: fba9bf90b73937d1aee1c207912ad6d77dc07afe270ce65a87b8add79af1a054
                                            • Opcode Fuzzy Hash: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                            • Instruction Fuzzy Hash: AC11D376508240CFCF16CF14E9C4B16BF72FB94328F24C5A9D9090B256C33AD856CBA2
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1860824447.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_ee0000_Discord.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 84e8e6e14a38f83a5d1aa8e6ce26d280a3c6769b3a0fcaff479e354edb0d7bec
                                            • Instruction ID: 10a3ab1b9153fbd5a36eee9800d22f8ce2a25443c729fb19f920fb8b6d91032e
                                            • Opcode Fuzzy Hash: 84e8e6e14a38f83a5d1aa8e6ce26d280a3c6769b3a0fcaff479e354edb0d7bec
                                            • Instruction Fuzzy Hash: 1211A134B01209CFCB48EBBAD50866A7BF6EF887117600478D406DB354EA31DC42CB90