File name:

discordfix.exe

Full analysis: https://app.any.run/tasks/74631539-57b0-412d-b882-995e24101a53
Verdict: Malicious activity
Threats:

Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth.

Analysis date: May 15, 2025, 17:15:29
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
github
telegram
evasion
miner
purecrypter
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
MD5:

E1B24A093EAEEA28382BCD2B86CE8118

SHA1:

C5CEBCB5BAF7C1B5C10DB1B0869F3F78E334C65B

SHA256:

35418E7F3F9C2A41F711E839BC7611CC25FCC1B7CCA788AE5D4EDCED0EAA0325

SSDEEP:

98304:/xPdiuTATg9aDAHPagXxT56sCZJsarVZglrEd0HZdtwqCZ/gnLbyUe5S1ZI+fUzU:/f

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • discordfix.exe (PID: 1676)
    • PURECRYPTER has been detected (YARA)

      • discordfix.exe (PID: 1676)
    • Uses Task Scheduler to run other applications

      • aspnet_compiler.exe (PID: 660)
    • MINER has been detected (SURICATA)

      • svchost.exe (PID: 2196)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • aspnet_compiler.exe (PID: 660)
    • Executable content was dropped or overwritten

      • aspnet_compiler.exe (PID: 660)
    • Reads the date of Windows installation

      • aspnet_compiler.exe (PID: 660)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • aspnet_compiler.exe (PID: 660)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • aspnet_compiler.exe (PID: 660)
    • Crypto Currency Mining Activity Detected

      • svchost.exe (PID: 2196)
    • Executes application which crashes

      • aspnet_compiler.exe (PID: 660)
    • The process checks if it is being run in the virtual environment

      • aspnet_compiler.exe (PID: 660)
  • INFO

    • Reads the machine GUID from the registry

      • discordfix.exe (PID: 1676)
      • aspnet_compiler.exe (PID: 660)
    • Reads the computer name

      • discordfix.exe (PID: 1676)
      • aspnet_compiler.exe (PID: 660)
      • AddInUtil.exe (PID: 4756)
    • Checks supported languages

      • discordfix.exe (PID: 1676)
      • aspnet_compiler.exe (PID: 660)
      • AddInUtil.exe (PID: 4756)
    • Manual execution by a user

      • aspnet_compiler.exe (PID: 660)
    • Reads Environment values

      • discordfix.exe (PID: 1676)
      • aspnet_compiler.exe (PID: 660)
    • Checks proxy server information

      • aspnet_compiler.exe (PID: 660)
    • Disables trace logs

      • aspnet_compiler.exe (PID: 660)
    • Creates files in the program directory

      • aspnet_compiler.exe (PID: 660)
    • Reads the software policy settings

      • aspnet_compiler.exe (PID: 660)
    • Process checks computer location settings

      • aspnet_compiler.exe (PID: 660)
    • Creates files or folders in the user directory

      • aspnet_compiler.exe (PID: 660)
      • WerFault.exe (PID: 2980)
    • Attempting to use instant messaging service

      • svchost.exe (PID: 2196)
      • aspnet_compiler.exe (PID: 660)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:14 01:31:25+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 8
CodeSize: 3188224
InitializedDataSize: 25600
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.9191.0
ProductVersionNumber: 1.0.9191.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Discord - https://discord.com/
CompanyName: Discord Inc.
FileDescription: Discord - https://discord.com/
FileVersion: 1.0.9191.0
InternalName: discordfix.exe
LegalCopyright: Copyright (c) 2025 Discord Inc. All rights reserved.
LegalTrademarks: -
OriginalFileName: discordfix.exe
ProductName: Discord - https://discord.com/
ProductVersion: 1.0.9191.0
AssemblyVersion: 1.0.9191.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
10
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #PURECRYPTER discordfix.exe no specs sppextcomobj.exe no specs slui.exe aspnet_compiler.exe schtasks.exe no specs conhost.exe no specs addinutil.exe conhost.exe no specs #MINER svchost.exe werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
660"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_compiler.exe
Exit code:
3221225477
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_compiler.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1676"C:\Users\admin\Desktop\discordfix.exe" C:\Users\admin\Desktop\discordfix.exe
explorer.exe
User:
admin
Company:
Discord Inc.
Integrity Level:
MEDIUM
Description:
Discord - https://discord.com/
Exit code:
4294967295
Version:
1.0.9191.0
Modules
Images
c:\users\admin\desktop\discordfix.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2392C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2980C:\WINDOWS\system32\WerFault.exe -u -p 660 -s 3068C:\Windows\System32\WerFault.exeaspnet_compiler.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
4756C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe -opool.hashvault.pro:443 -u 4385GdKcYysbDy9ka41iHpGscHtJvcZNZ7tWyqfetbJCPwGXxBLJD7RE1oVjCZ8CZU52whodv8btgTz7SZL43ePe7ZuPNVb.mousetir -k --tlsC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
aspnet_compiler.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AddInUtil.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\addinutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
5024"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5400\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeAddInUtil.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6040\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6876"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 3 /tn "MicrosoftEdgeUpdate" /tr "C:\ProgramData\WindowsNotification\driverquery.exe" /fC:\Windows\System32\schtasks.exeaspnet_compiler.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
6 297
Read events
6 283
Write events
14
Delete events
0

Modification events

(PID) Process:(660) aspnet_compiler.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(660) aspnet_compiler.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(660) aspnet_compiler.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(660) aspnet_compiler.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(660) aspnet_compiler.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(660) aspnet_compiler.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(660) aspnet_compiler.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(660) aspnet_compiler.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(660) aspnet_compiler.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(660) aspnet_compiler.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2980WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aspnet_compiler._82a4be112fbbb22829841f92a5a884c20997ad5_873cb6f7_a3c4f889-b9e4-4013-884f-66c5ba5d7313\Report.wer
MD5:
SHA256:
2980WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\aspnet_compiler.exe.660.dmp
MD5:
SHA256:
660aspnet_compiler.exeC:\ProgramData\WindowsNotification\driverquery.exeexecutable
MD5:D1BB2938C1FE863E49EADA61FDF239D4
SHA256:4A27D421D67E3DDF430397E64B2B200DC98C08FA974AD0E8D102D45DD6AC1FED
660aspnet_compiler.exeC:\Users\admin\AppData\Local\WindowsUpdate\screen.jpgbinary
MD5:A651A13BB814170EEE279A58F4822418
SHA256:08773E94F6FA86BC811364A3F8A7C667147A74BF730E190C87B1EDD24F829036
2980WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER4D05.tmp.WERInternalMetadata.xmlbinary
MD5:EA98D24E75C49AE2FB47D39E4E12A740
SHA256:94614891EFCA5ACDD3ED82116E67375E7E4BEB2D6BD006A630AB4A102D2EC60D
2980WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER4A64.tmp.dmpbinary
MD5:53183B0AC2A17B0F6E94ADE306752BC9
SHA256:A37D19AEF0345874C8ECC08C97D2824AC38B32B27C161D5FC4D7CA40271A1511
2980WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER4D35.tmp.xmlxml
MD5:DACA443D898ECD1FB779E02449D6F8AD
SHA256:13E8EFA65A67A818427205BD9AFF6B9682B7F44694839138B3E2EF2DF5978DD1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
24
DNS requests
17
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3768
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3768
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.177:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
69.192.161.161:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.160.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
660
aspnet_compiler.exe
140.82.121.3:443
github.com
GITHUB
US
whitelisted
660
aspnet_compiler.exe
185.199.109.133:443
raw.githubusercontent.com
FASTLY
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.177
  • 23.48.23.173
  • 23.48.23.174
  • 23.48.23.185
  • 23.48.23.175
  • 23.48.23.181
  • 23.48.23.176
  • 23.48.23.184
  • 23.48.23.180
whitelisted
www.microsoft.com
  • 69.192.161.161
  • 2.23.246.101
whitelisted
google.com
  • 142.250.185.78
whitelisted
login.live.com
  • 20.190.160.130
  • 20.190.160.20
  • 20.190.160.132
  • 20.190.160.128
  • 40.126.32.72
  • 20.190.160.67
  • 20.190.160.131
  • 20.190.160.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
github.com
  • 140.82.121.3
whitelisted
raw.githubusercontent.com
  • 185.199.109.133
  • 185.199.108.133
  • 185.199.111.133
  • 185.199.110.133
whitelisted
api.ipify.org
  • 104.26.13.205
  • 104.26.12.205
  • 172.67.74.152
shared
api.telegram.org
  • 149.154.167.220
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
2196
svchost.exe
Misc activity
ET HUNTING Telegram API Domain in DNS Lookup
2196
svchost.exe
Misc activity
SUSPICIOUS [ANY.RUN] Possible sending an external IP address to Telegram
660
aspnet_compiler.exe
Misc activity
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
2196
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
660
aspnet_compiler.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
660
aspnet_compiler.exe
Misc activity
ET HUNTING Telegram API Certificate Observed
660
aspnet_compiler.exe
Misc activity
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
660
aspnet_compiler.exe
Misc activity
ET HUNTING Telegram API Certificate Observed
2196
svchost.exe
Crypto Currency Mining Activity Detected
ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)
No debug info