C:\b\tyrande-1\discord\discord-rpc\builds\win64-dynamic\src\RelWithDebInfo\discord-rpc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
discord-rpc.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
discord-rpc.dll
Resource
win10v2004-20231222-en
General
-
Target
discord-rpc.dll
-
Size
134KB
-
MD5
be5fd1416a23d23055cc7cf5aabe1ece
-
SHA1
89b41fdf7656ac7b06882221cfd3c0580d338d6b
-
SHA256
a4f44fe3f69bc6c8506b941be65689e714662b2a7ef98fa7033aaad9f86a1107
-
SHA512
bbbdf3b3a9893290cd36e1838c9cb4d9880ab04e373906ae5a505a2fcca5cff796f868f85477d9bd12ad80c2a007d060763c6f584f288953d6665074154c2637
-
SSDEEP
1536:FVeRb9bB9Hdkjg2bWa9nIYACAs35lk24F23GnkdCbUf13huQx9:FVe1p9kjnIYp5S3F23Gnkg8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource discord-rpc.dll
Files
-
discord-rpc.dll.dll windows:6 windows x64 arch:x64
dac59aa6126f01d7b2f5cf01eb9375de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegCloseKey
kernel32
CreateFileW
ReadFile
WriteFile
CloseHandle
GetLastError
PeekNamedPipe
WaitNamedPipeW
GetCurrentProcessId
GetModuleFileNameW
lstrlenW
MultiByteToWideChar
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetProcAddress
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeSListHead
msvcp140
_Mtx_init
?_Throw_C_error@std@@YAXH@Z
_Cnd_do_broadcast_at_thread_exit
_Cnd_signal
_Cnd_broadcast
_Cnd_timedwait
_Cnd_wait
_Cnd_destroy_in_situ
_Cnd_init_in_situ
_Cnd_destroy
_Cnd_init
_Mtx_unlock
_Mtx_lock
_Thrd_start
_Xtime_get_ticks
_Thrd_join
_Thrd_id
?_Throw_Cpp_error@std@@YAXH@Z
_Mtx_destroy
_Mtx_init_in_situ
_Mtx_destroy_in_situ
_Mtx_current_owns
vcruntime140
_CxxThrowException
__std_exception_destroy
__std_exception_copy
__vcrt_InitializeCriticalSectionEx
__C_specific_handler
memmove
memset
memcpy
__std_type_info_destroy_list
memcmp
__CxxFrameHandler3
__std_terminate
_purecall
api-ms-win-crt-heap-l1-1-0
free
_callnewh
malloc
api-ms-win-crt-math-l1-1-0
log2
ceil
api-ms-win-crt-runtime-l1-1-0
_initterm
_cexit
_initterm_e
_execute_onexit_table
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
terminate
_crt_atexit
_crt_at_quick_exit
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-string-l1-1-0
strcmp
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vswprintf
__stdio_common_vfprintf
__acrt_iob_func
Exports
Exports
Discord_ClearPresence
Discord_Initialize
Discord_Register
Discord_RegisterSteamGame
Discord_Respond
Discord_RunCallbacks
Discord_Shutdown
Discord_UpdateHandlers
Discord_UpdatePresence
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 266KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 342B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 669B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ