Analysis

  • max time kernel
    203s
  • max time network
    305s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-05-2024 23:30

General

  • Target

    DiscordSetup.exe

  • Size

    107.7MB

  • MD5

    19b9a1d84b272a4279ca7ff84ff8ce70

  • SHA1

    e5faa0bfdb7ffc5b040fd7525d69ca3fb7e3241d

  • SHA256

    b515b5239d471fa26f37e816e7c7d5ed7c578348ffaf61aac2b99b4ccb1c292e

  • SHA512

    6906a007940024656cb4f811911c6aac606454b661e91f15d3abc98d4a78622c7c965ccee350c7e6bc8bdd90e1aa819f4c868f9902ae736106e73cd416832ed8

  • SSDEEP

    3145728:AvGOQGs9BFKW5NUIxM8hCMrrsLAVWhsiQ:BB7FKW5N4SC6rsAVSsiQ

Malware Config

Signatures

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 2 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 21 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 19 IoCs
  • Modifies registry key 1 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DiscordSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\DiscordSetup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe
      "C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --squirrel-install 1.0.9147
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4680
        • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
          C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\discord /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\discord\Crashpad --url=https://f.a.k/e --annotation=_productName=discord --annotation=_version=1.0.9147 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=28.2.10 --initial-client-data=0x4bc,0x4c4,0x4c8,0x4b4,0x4cc,0x7ff6725e3108,0x7ff6725e3114,0x7ff6725e3120
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4820
        • C:\Users\Admin\AppData\Local\Discord\Update.exe
          C:\Users\Admin\AppData\Local\Discord\Update.exe --createShortcut Discord.exe --setupIcon C:\Users\Admin\AppData\Local\Discord\app.ico
          4⤵
          • Executes dropped EXE
          PID:2440
        • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
          "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1952 --field-trial-handle=1956,i,12779667411309311596,6508500393740579393,262144 --enable-features=kWebSQLAccess --disable-features=CalculateNativeWinOcclusion,HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:2
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3216
        • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
          "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --mojo-platform-channel-handle=2524 --field-trial-handle=1956,i,12779667411309311596,6508500393740579393,262144 --enable-features=kWebSQLAccess --disable-features=CalculateNativeWinOcclusion,HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4340
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Discord /d "\"C:\Users\Admin\AppData\Local\Discord\Update.exe\" --processStart Discord.exe" /f
          4⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:4568
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord /ve /d "URL:Discord Protocol" /f
          4⤵
          • Modifies registry class
          • Modifies registry key
          PID:3108
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord /v "URL Protocol" /f
          4⤵
          • Modifies registry class
          • Modifies registry key
          PID:1400
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord\DefaultIcon /ve /d "\"C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe\",-1" /f
          4⤵
          • Modifies registry class
          • Modifies registry key
          PID:4848
        • C:\Windows\System32\reg.exe
          C:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord\shell\open\command /ve /d "\"C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe\" --url -- \"%1\"" /f
          4⤵
          • Modifies registry class
          • Modifies registry key
          PID:520
  • C:\Users\Admin\AppData\Local\Discord\Update.exe
    "C:\Users\Admin\AppData\Local\Discord\Update.exe" --processStart Discord.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
      "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3308
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\discord /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\discord\Crashpad --url=https://f.a.k/e --annotation=_productName=discord --annotation=_version=1.0.9147 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=28.2.10 --initial-client-data=0x4a8,0x4ac,0x4b0,0x4a4,0x4b4,0x7ff6725e3108,0x7ff6725e3114,0x7ff6725e3120
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:772
      • C:\Windows\System32\reg.exe
        C:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord /ve /d "URL:Discord Protocol" /f
        3⤵
        • Modifies registry class
        • Modifies registry key
        PID:1152
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2264 --field-trial-handle=2268,i,18357214729206022673,9008856916135919049,262144 --enable-features=kWebSQLAccess --disable-features=CalculateNativeWinOcclusion,HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:2
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1420
      • C:\Windows\System32\reg.exe
        C:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord /v "URL Protocol" /f
        3⤵
        • Modifies registry class
        • Modifies registry key
        PID:4184
      • C:\Windows\System32\reg.exe
        C:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord\DefaultIcon /ve /d "\"C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe\",-1" /f
        3⤵
        • Modifies registry class
        • Modifies registry key
        PID:624
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --secure-schemes=disclip --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=disclip --mojo-platform-channel-handle=3060 --field-trial-handle=2268,i,18357214729206022673,9008856916135919049,262144 --enable-features=kWebSQLAccess --disable-features=CalculateNativeWinOcclusion,HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4180
      • C:\Windows\System32\reg.exe
        C:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord\shell\open\command /ve /d "\"C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe\" --url -- \"%1\"" /f
        3⤵
        • Modifies registry class
        • Modifies registry key
        PID:4644
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=0 --gpu-device-id=0 --gpu-sub-system-id=0 --gpu-revision=0 --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3264 --field-trial-handle=2268,i,18357214729206022673,9008856916135919049,262144 --enable-features=kWebSQLAccess --disable-features=CalculateNativeWinOcclusion,HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:1896
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --secure-schemes=disclip --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=disclip --app-user-model-id=com.squirrel.Discord.Discord --app-path="C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --autoplay-policy=no-user-gesture-required --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=2268,i,18357214729206022673,9008856916135919049,262144 --enable-features=kWebSQLAccess --disable-features=CalculateNativeWinOcclusion,HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:1
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4540
  • C:\Users\Admin\AppData\Local\Discord\Update.exe
    "C:\Users\Admin\AppData\Local\Discord\Update.exe" --processStart Discord.exe
    1⤵
    • Executes dropped EXE
    PID:2052
    • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
      "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3184
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\discord /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\discord\Crashpad --url=https://f.a.k/e --annotation=_productName=discord --annotation=_version=1.0.9147 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=28.2.10 --initial-client-data=0x4a8,0x4ac,0x4b0,0x4a4,0x4b4,0x7ff6725e3108,0x7ff6725e3114,0x7ff6725e3120
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4564
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2336 --field-trial-handle=2340,i,11395909558780129846,9051587007031111356,262144 --enable-features=kWebSQLAccess --disable-features=CalculateNativeWinOcclusion,HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:2
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3568
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --secure-schemes=disclip --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=disclip --mojo-platform-channel-handle=2856 --field-trial-handle=2340,i,11395909558780129846,9051587007031111356,262144 --enable-features=kWebSQLAccess --disable-features=CalculateNativeWinOcclusion,HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1620
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=0 --gpu-device-id=0 --gpu-sub-system-id=0 --gpu-revision=0 --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3032 --field-trial-handle=2340,i,11395909558780129846,9051587007031111356,262144 --enable-features=kWebSQLAccess --disable-features=CalculateNativeWinOcclusion,HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:3332
      • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe
        "C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\Discord.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --secure-schemes=disclip --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=disclip --app-user-model-id=com.squirrel.Discord.Discord --app-path="C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --autoplay-policy=no-user-gesture-required --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=2340,i,11395909558780129846,9051587007031111356,262144 --enable-features=kWebSQLAccess --disable-features=CalculateNativeWinOcclusion,HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:1
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Discord\SquirrelSetup.log

    Filesize

    2KB

    MD5

    93b6bb956e365f84123151731226cae3

    SHA1

    57168d33f911b97078a901307ad0b98c62d363ce

    SHA256

    447477cf8431d5a4eb8728ef027089d04d88ef8f98e0e52e3480203ee5236b2c

    SHA512

    cf8aa22fc281b7b2ad2770d47338ed8a2090f8433f043b3756009a9e862e1f0a97c66d7560275bd68149679ce942bb27b6afcccf98c4e76b055b95f29d7a5d16

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\app.ico

    Filesize

    278KB

    MD5

    084f9bc0136f779f82bea88b5c38a358

    SHA1

    64f210b7888e5474c3aabcb602d895d58929b451

    SHA256

    dfcea1bea8a924252d507d0316d8cf38efc61cf1314e47dca3eb723f47d5fe43

    SHA512

    65bccb3e1d4849b61c68716831578300b20dcaf1cbc155512edbc6d73dccbaf6e5495d4f95d089ee496f8e080057b7097a628cc104fa8eaad8da866891d9e3eb

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\chrome_100_percent.pak

    Filesize

    163KB

    MD5

    4fc6564b727baa5fecf6bf3f6116cc64

    SHA1

    6ced7b16dc1abe862820dfe25f4fe7ead1d3f518

    SHA256

    b7805392bfce11118165e3a4e747ac0ca515e4e0ceadab356d685575f6aa45fb

    SHA512

    fa7eab7c9b67208bd076b2cbda575b5cc16a81f59cc9bba9512a0e85af97e2f3adebc543d0d847d348d513b9c7e8bef375ab2fef662387d87c82b296d76dffa2

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\chrome_200_percent.pak

    Filesize

    222KB

    MD5

    47668ac5038e68a565e0a9243df3c9e5

    SHA1

    38408f73501162d96757a72c63e41e78541c8e8e

    SHA256

    fac820a98b746a04ce14ec40c7268d6a58819133972b538f9720a5363c862e32

    SHA512

    5412041c923057ff320aba09674b309b7fd71ede7e467f47df54f92b7c124e3040914d6b8083272ef9f985eef1626eaf4606b17a3cae97cfe507fb74bc6f0f89

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\ffmpeg.dll

    Filesize

    4.0MB

    MD5

    34a86c7a13ab91972883df3e3e2eb9ab

    SHA1

    88cb2d58ebf507dc96f9c72051e90a5aeb6de03b

    SHA256

    88e4dc54a49083defc4ebbe97520f8fa701aa23eadb49620006367640d2ea24d

    SHA512

    68ec3062268936a6bd8bdb0e97488a082d10ad9f169c27b5422ac17b2b7e3f28dd44b9e49d8af18f29074f9830213478d95050d910a0c801a12bbe2fcb6c57d2

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\icudtl.dat

    Filesize

    10.2MB

    MD5

    e0f1ad85c0933ecce2e003a2c59ae726

    SHA1

    a8539fc5a233558edfa264a34f7af6187c3f0d4f

    SHA256

    f5170aa2b388d23bebf98784dd488a9bcb741470384a6a9a8d7a2638d768defb

    SHA512

    714ed5ae44dfa4812081b8de42401197c235a4fa05206597f4c7b4170dd37e8360cc75d176399b735c9aec200f5b7d5c81c07b9ab58cbca8dc08861c6814fb28

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\libglesv2.dll

    Filesize

    7.5MB

    MD5

    a18a279444b09e7097d49564d10ccaa2

    SHA1

    a3e566c85cadba9ae48ff128ddec097a413e6a87

    SHA256

    bf7d30ed4761b0cd19ec18934447ee254f23413c8d831f6d64521bd087fbbfce

    SHA512

    6a6c5234b051b5d4b321921430fd77e760d9ea59b3edf260f17edeeb98ba899dfa292dc4e4c9ea7d5e094201157395c8c3abae5b14c6007f891d49d933c7e86a

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\locales\en-US.pak

    Filesize

    428KB

    MD5

    809b600d2ee9e32b0b9b586a74683e39

    SHA1

    99d670c66d1f4d17a636f6d4edc54ad82f551e53

    SHA256

    0db4f65e527553b9e7bee395f774cc9447971bf0b86d1728856b6c15b88207bb

    SHA512

    9dfbe9fe0cfa3fcb5ce215ad8ab98e042760f4c1ff6247a6a32b18dd12617fc033a3bbf0a4667321a46a372fc26090e4d67581eaab615bf73cc96cb90e194431

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\resources.pak

    Filesize

    5.1MB

    MD5

    e9056386a2b4edac9f0ffa829bc0cfa0

    SHA1

    f8d4b8289ebb088c9997a1fde1c2f12aedd6c82e

    SHA256

    546456d9a1328836a99876824f3beb7279f38403cd001515f5d9eb204939e57c

    SHA512

    c49e832e5c16a1846ea882395e83f9cbe9f4f6b44be9f0c7276d0a4495b88091bd95593c5e167dba853834058d7ca823db60d2fac73434ed952b7064b2daf6da

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\resources\app.asar

    Filesize

    6.3MB

    MD5

    12722f1f6a97cef65dc24bb4c8049e9a

    SHA1

    20098990d4a272ff87bfba34a6a3fe6195e22fd8

    SHA256

    21eee017072356ac5430688af44a8499f2230f847c391fa96c5816bf38aed0ab

    SHA512

    b9209c66e716d30195d9bb423a6e9ac6e7118778aea9ef0da7a269b1762e1b5b1e0e406c0cdc5a50759081e9041acc9210a91dbcd7dfe67c82d973f3cba2edaa

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\resources\build_info.json

    Filesize

    83B

    MD5

    29758c7a31b168e9cf70a533e5aa64f0

    SHA1

    68886573a1586259e409786181412c253ece150d

    SHA256

    136281506525bfcc8862d2d9ea9597af93281cd4da4b3595083e3c3613eebafc

    SHA512

    4a8b3b14d0fe9a2cc66470986e8971ae325f3ab06ebbce90ba488015a7e29a7fdb578078e5309eace8077b4221368c549cda3f6e4fcdfcf0962081001c01c6ab

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\v8_context_snapshot.bin

    Filesize

    627KB

    MD5

    1e4da0bc6404552f9a80ccde89fdef2b

    SHA1

    838481b9e4f1d694c948c0082e9697a5ed443ee2

    SHA256

    2db4a98abe705ef9bc18e69d17f91bc3f4c0f5703f9f57b41acb877100718918

    SHA512

    054917652829af01977e278cd0201c715b3a1280d7e43035507e4fa61c1c00c4cd7ed521c762aebd2ea2388d33c3d4d4b16cee5072d41e960021b6f38745a417

  • C:\Users\Admin\AppData\Local\Discord\app-1.0.9147\vk_swiftshader.dll

    Filesize

    5.0MB

    MD5

    418931d6324a4b9aee665db02ffa4608

    SHA1

    bb9e9b30d3a84bf68a0cc4f56e125b8709ca9d6c

    SHA256

    282726daea498983b4480a161cbdc885c76fc01fd53ab96c469a39e0e18722e5

    SHA512

    89cd3c3b7028c65826dd2aee6caa6752483095391861d42de554e31f946b1d49d5c40f3c94f034dcd902d2e2896a56fb563c39548cb7951c271f93387b14328c

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Update.exe.log

    Filesize

    1KB

    MD5

    2244dc0b3273589a6f523d1132743c50

    SHA1

    aa3b1e074e6db473c5b29c613f96bdb1e055224f

    SHA256

    95360f53262f25f870960255268efe6213d026715336c1366db1a58b2b5e0f3f

    SHA512

    951c1be44dad2f68c35bbdc2a971316bc348298d91a1be97cc90eeb1e1082263473affc1117fd35ebff3744a70e19eb6c20cb587a059281ba1e24ee5636ea5d0

  • C:\Users\Admin\AppData\Local\SquirrelTemp\RELEASES

    Filesize

    81B

    MD5

    79d221283c0d1389b849165306d9015e

    SHA1

    fcaad52b3b0d49e98d71a56aac199ed95c1301f1

    SHA256

    fd6682599238b669f85bd201e7803c6dd304b6b3a36ca0557b0cc92e21bfa86e

    SHA512

    d70e9a2d137172b45cf6a912e93a6313728003c303fd4235811fd1ec588c9a4c4f924eb9a2588825883c3a8369e5918aa11f485442ec2eacd28deb7410ff308e

  • C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe

    Filesize

    1.5MB

    MD5

    78b7a9a33ab3c3a17336ad38f5ba9f65

    SHA1

    0089d32e98292c2cf7d16d98616635eac0d90508

    SHA256

    65c2cb5539c0957ab57281f4294cc01876285461f47847eb83304732e0cf4b1c

    SHA512

    53fdef293137c431729181426a47cac1ffc9855c1a7622a7f36dc750a8bafc3607ae81fdb3102f6eb1d4684ef66e2e62116b741243b39a4d8a33d2425f7f122b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Discord Inc\Discord.lnk

    Filesize

    2KB

    MD5

    bdac9e228653947c873334f5a5eb005c

    SHA1

    a5ddc9676c290d7f1ea9a93612676959e461bcbf

    SHA256

    092aeda85fdb7408149e346ee9e14ab21cb8a9881b0465df5dbee14d7c2b6e84

    SHA512

    9f4192b7eac42c7254b572a642daf12c072f6cc6ea570151f87a91914d9cd833b52473585c92b0df35b15ab32b76d748574660fcf82e885585e145a2a1cd1ec1

  • C:\Users\Admin\AppData\Roaming\discord\Code Cache\js\index-dir\the-real-index

    Filesize

    48B

    MD5

    4142ef0a0f13bcdbcdce53709b7a9fbe

    SHA1

    c98d134c348d89f100c4916ac2b52dbe4ffc2f33

    SHA256

    4822802eb897e0608b1e9fe8638a20b47214e2ca8e6c1761f387a0af759f0e44

    SHA512

    6aae2d798f568ecb1303d2e9d25df4e5d0ba5f9220fd1b0efdbda408d39923a71a00d59330f43ef090b41f6f7df22743f34e44f884b2470142cca24515ad5bdb

  • C:\Users\Admin\AppData\Roaming\discord\Code Cache\wasm\index

    Filesize

    24B

    MD5

    54cb446f628b2ea4a5bce5769910512e

    SHA1

    c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

    SHA256

    fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

    SHA512

    8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

  • C:\Users\Admin\AppData\Roaming\discord\Code Cache\wasm\index-dir\the-real-index

    Filesize

    48B

    MD5

    4fd98c4266d4cf01e63c04769b5c9abf

    SHA1

    ff30fa3c31d08da76f62c8cbc59ab0aac0c2d666

    SHA256

    0d596b113dac737a6aebdcceed10017c9e9d8baa8d34be0d26e52ec78f146419

    SHA512

    405c35f9855100f1743821e1c20ec16280662ddabbfd01e542261c43cefbe1710e05dcaa955d39b0d7638d821f34ff2a711364e699f832b231b1bd25fb921dcf

  • C:\Users\Admin\AppData\Roaming\discord\Crashpad\settings.dat

    Filesize

    40B

    MD5

    0b586422160e7a848a911ad087970df7

    SHA1

    a0b4aed2012c86caae2075e9830a384b45916b99

    SHA256

    e430eb4218be39e6af59e725badb665f489c5857b2104c3bc4288ba38d5c25e3

    SHA512

    1257639a1ed222dddaccfd49cd12ad4f8aaf71836eb17112c74da97c05dbf77685883016381b53e95ccaf93fcfb23aaeec4e7be5592e0d1d7e8f7df9968dfd45

  • C:\Users\Admin\AppData\Roaming\discord\DawnCache\data_1

    Filesize

    264KB

    MD5

    f50f89a0a91564d0b8a211f8921aa7de

    SHA1

    112403a17dd69d5b9018b8cede023cb3b54eab7d

    SHA256

    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

    SHA512

    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

  • C:\Users\Admin\AppData\Roaming\discord\DawnCache\data_3

    Filesize

    8KB

    MD5

    41876349cb12d6db992f1309f22df3f0

    SHA1

    5cf26b3420fc0302cd0a71e8d029739b8765be27

    SHA256

    e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

    SHA512

    e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

  • C:\Users\Admin\AppData\Roaming\discord\Local State

    Filesize

    643B

    MD5

    a209014a21d33997d8139be4ad481958

    SHA1

    b34b1365fd4b17c0e3cdbf48287c3f3243591925

    SHA256

    e00a86c721e636b29b45cecdb939947f5a62e0564efb679a986ca5696e8ccbcf

    SHA512

    9b7b495480015bb963a4194d833a1329857b70ea043ccce2456c3ce637758e1085785e143eb8dc609eca0e31c19bf3e00489c89503de639bf0f8fc20b27bd5a6

  • C:\Users\Admin\AppData\Roaming\discord\Local State

    Filesize

    434B

    MD5

    cfeb30d7e942d89346262cdae47d473c

    SHA1

    57f0b31b2f5013aa7c2d2ae622c58943ee4787e6

    SHA256

    526c3782e3c9d9af72929c9cafab60ad4379cde45344da760b02ef1f22a34a97

    SHA512

    05a1e290b8a79f2ccf30a7a60e966f60135099a641aed76d2b9fdfc1ab8e1603691d25c66c70cd438b3945f6a5da00de1dc97bd5150c5023cc600ee457dd8f4a

  • C:\Users\Admin\AppData\Roaming\discord\Local State

    Filesize

    643B

    MD5

    d694377a081d2b6e7012fb7a873bad59

    SHA1

    038ddfe2184bb4b6e8f310da3b0a1a561841be4f

    SHA256

    4093c2ac2aa61429119c8b040debabc84ec3b74d010e764c40f2bdcc8fe21038

    SHA512

    35c6c1885053566a2ab2924410e999d82df2e6c0191d62e598f0bd73b12debb83e2bdac890b24c9e03c343164769703a60d3e3c12af6215410f7b96a46b6ce44

  • C:\Users\Admin\AppData\Roaming\discord\Local Storage\leveldb\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Roaming\discord\Local Storage\leveldb\LOG

    Filesize

    245B

    MD5

    ce81398e83e179e74c381c94188bf4ca

    SHA1

    ce8885a5447b0fda0cc7dbba2133ee20ac106cfe

    SHA256

    c2747ebe91befe654a6493a9dce6e13825c05120eb63b73d7e82ff6430db0228

    SHA512

    e47484f9f236fc6e14ee81e67a99c902c78501297740045dd0e7ec91c5d496d029c46a73cf23a1ce04ac38336db5371489a2fb502b0afefc4ff426cdab491f00

  • C:\Users\Admin\AppData\Roaming\discord\Local Storage\leveldb\MANIFEST-000001

    Filesize

    41B

    MD5

    5af87dfd673ba2115e2fcf5cfdb727ab

    SHA1

    d5b5bbf396dc291274584ef71f444f420b6056f1

    SHA256

    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

    SHA512

    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

  • C:\Users\Admin\AppData\Roaming\discord\Preferences

    Filesize

    57B

    MD5

    58127c59cb9e1da127904c341d15372b

    SHA1

    62445484661d8036ce9788baeaba31d204e9a5fc

    SHA256

    be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

    SHA512

    8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

  • C:\Users\Admin\AppData\Roaming\discord\module_data\crashlogs\2024_05_22T23_32_03_104Z-0-events.log

    Filesize

    294B

    MD5

    d653ab5dbb49bd700618ef57a9fd5d0f

    SHA1

    9f532d6b8ab71280a4b97673fb7eb8e018c86cb1

    SHA256

    17bf3b52f17bf7b878d77da9d8cf34686c51457df8d412c846d1d349e4cde16e

    SHA512

    078990b3872e11f356b6ca8209e565283058abb5b6532a2bebdde91f7991bc90c37ec58ada09167592737af4052f52384c65b1e17980fe6af72c25c0da538eba

  • C:\Users\Admin\AppData\Roaming\discord\sentry\queue\queue.json

    Filesize

    2B

    MD5

    d751713988987e9331980363e24189ce

    SHA1

    97d170e1550eee4afc0af065b78cda302a97674c

    SHA256

    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

    SHA512

    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

  • C:\Users\Admin\AppData\Roaming\discord\sentry\scope_v3.json

    Filesize

    1KB

    MD5

    f3d6918307a4a770ff6a1a179eb79846

    SHA1

    8c983d0cbe69a320dcf38cdcad62a48206941fb8

    SHA256

    6f3f3bc120647eaabf6a740515ee3c3a515ca483e650b818a97ff2f2712a1f5d

    SHA512

    86eb537745f9c180a38c63fe523ac41034718afe437e71df13f69f4fd2f453f68086b77170cb758c391bcfc8510a416279e7af1be33351403aa379183a6de3b9

  • C:\Users\Admin\Desktop\Discord.lnk

    Filesize

    2KB

    MD5

    0ecf3853e2addae810a1c48f28e82d0f

    SHA1

    3adc015d5689d9e2da1da14fe44fa406e4f13863

    SHA256

    b7f2a86831e24dd90fc45ad5d8e2a1e05dafb74b068e75cb1ab8d744be2098be

    SHA512

    1f71384d5a62f810cb0af097e6d41293a70352fa151275f16e1a40b86ebb85261ec80cdcb83bcaa0f34ce2a605bf1d29b8937ffe6065e0230c5d400526e01993

  • \??\pipe\crashpad_4680_YAHZGMWUAWPWBGFH

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \Users\Admin\AppData\Local\Discord\app-1.0.9147\d3dcompiler_47.dll

    Filesize

    4.7MB

    MD5

    a7b7470c347f84365ffe1b2072b4f95c

    SHA1

    57a96f6fb326ba65b7f7016242132b3f9464c7a3

    SHA256

    af7b99be1b8770c0e4d18e43b04e81d11bdeb667fa6b07ade7a88f4c5676bf9a

    SHA512

    83391a219631f750499fd9642d59ec80fb377c378997b302d10762e83325551bb97c1086b181fff0521b1ca933e518eab71a44a3578a23691f215ebb1dce463d

  • \Users\Admin\AppData\Local\Discord\app-1.0.9147\libEGL.dll

    Filesize

    487KB

    MD5

    c502f0b22b24eaab84561aa1c5e4da53

    SHA1

    29594a4d5de1cc3bb24c9364169ba5e3d3e71bbd

    SHA256

    45f9e83f6c5a282adff76689b6996dda9883d9d9a85992fc9909f723c470f0ca

    SHA512

    7a014d6943bc70b1b1852b23144408b7c6fbfef3b1bb104c954e4ee8de1a41db80b207b912ef7fde956e0b170db4075f82925419a48ef48ad35d3397b4092504

  • \Users\Admin\AppData\Local\Discord\app-1.0.9147\updater.node

    Filesize

    3.9MB

    MD5

    ed4bd65e59be05e67d989c48198976f3

    SHA1

    b3b8e30111468e27b5384d541b2db825c0a06e46

    SHA256

    82c082ab82aa4108e23d0d460c6232755de5434b27375bf6d678eb503f40e4e0

    SHA512

    1d78a72c245214ce9e526419a45792c54e0525f2a6166ac986cc6e15b551c331f3d0fdf26a5393e6380741e156bce0d797e8ace6ef878244df5c8ab680eb2611

  • memory/2440-233-0x0000000003020000-0x0000000003040000-memory.dmp

    Filesize

    128KB

  • memory/5060-192-0x0000000012830000-0x0000000012868000-memory.dmp

    Filesize

    224KB

  • memory/5060-191-0x0000000011EB0000-0x0000000011EB8000-memory.dmp

    Filesize

    32KB

  • memory/5060-9-0x0000000000630000-0x00000000007A6000-memory.dmp

    Filesize

    1.5MB