Skip To Main Content

Main Navigation

Mobile Translate ( don't delete )

Mobile Utility

Header Holder

Header Right

Header Utility

Translate

Mobile Toggle ( don't delete )

Breadcrumb

The filename is strongly associated with malicious activities, particularly Discord-based credential theft and token logging . Files formatted this way (a name followed by a Discord tag) are commonly used by threat actors to distribute malware through direct messages or community servers.

: The malware may add itself to the Windows Startup folder or create a Registry key to run on boot.

: List internal files (e.g., Dugor.exe , install.bat , or obfuscated .js files). Dynamic Analysis :

: Identify the file as a likely Token Logger or InfoStealer targeting Discord users.

: Terminate any suspicious processes in Task Manager and delete the extracted files.