Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RobloxPlayer DevBuildV2.653.952.exe
|
"C:\Users\user\Desktop\RobloxPlayer DevBuildV2.653.952.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://discord.com/api/v9/oauth2/applications
|
unknown
|
||
https://discord.com/api/v9//voice/
|
unknown
|
||
https://status.discord.com/api/v2/scheduled-maintenances/upcoming.json
|
unknown
|
||
https://cdn.discordapp.com/icons/
|
unknown
|
||
https://cdn.discordapp.com/banners/
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://discord.com/api/v9/gateway
|
162.159.136.232
|
||
https://cdn.discordapp.com/guilds/
|
unknown
|
||
https://discord.com/api/v9/oauth2/
|
unknown
|
||
https://discord.com/api/v9/applications
|
unknown
|
||
https://discord.com/api/v9/gateway/bot
|
unknown
|
||
https://discord.com/api/v9/channels/
|
unknown
|
||
https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/cert
|
unknown
|
||
https://discord.com/api/v9/guilds/
|
unknown
|
||
https://cdn.discordapp.com/splashes/
|
unknown
|
||
https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall
|
unknown
|
||
https://cdn.discordapp.com/channel-icons/
|
unknown
|
||
https://github.com/bwmarrin/discordgo
|
unknown
|
||
https://cdn.discordapp.com/role-icons/
|
unknown
|
||
https://discord.com/api/v9/
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
https://status.discord.com/api/v2/scheduled-maintenances/
|
unknown
|
||
https://cdn.discordapp.com/attachments/
|
unknown
|
||
https://status.discord.com/api/v2/scheduled-maintenances/active.json
|
unknown
|
||
https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/c
|
unknown
|
||
https://discord.com/api/v9/09Az~~kernel32.dllREQUEST_METHODiphlpapi.dll
|
unknown
|
||
https://discord.com/api/v9/guilds
|
unknown
|
||
https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/v
|
unknown
|
||
https://discord.com/api/v9/stickers/
|
unknown
|
||
https://discord.com/api/v9/webhooks/
|
unknown
|
||
https://cdn.discordapp.com/avatars/
|
unknown
|
||
https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/use
|
unknown
|
||
https://discord.com/api/v9/stage-instances
|
unknown
|
||
https://curl.se/docs/caextract.html
|
unknown
|
||
https://discord.com/api/v9//sticker-packs
|
unknown
|
||
https://gateway.discord.gg/?v=9&encoding=json
|
162.159.136.234
|
||
https://discord.com/api/v9//voice/regions
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
discord.com
|
162.159.136.232
|
||
gateway.discord.gg
|
162.159.136.234
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.159.136.234
|
gateway.discord.gg
|
United States
|
||
162.159.136.232
|
discord.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000000000
|
direct allocation
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
2B668D2B000
|
heap
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
C000230000
|
direct allocation
|
page read and write
|
||
C00021C000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
2B66E161000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C000212000
|
direct allocation
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
E6D000
|
unkown
|
page write copy
|
||
C000126000
|
direct allocation
|
page read and write
|
||
C000220000
|
direct allocation
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
C0000E2000
|
direct allocation
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C000224000
|
direct allocation
|
page read and write
|
||
C0000F6000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
2B668D6E000
|
heap
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
DEFA7FC000
|
stack
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
C000232000
|
direct allocation
|
page read and write
|
||
2B66E375000
|
heap
|
page read and write
|
||
2B668EF8000
|
direct allocation
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
C00020E000
|
direct allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
C000082000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
E3E000
|
unkown
|
page write copy
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
2B66E1E0000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
ECC000
|
unkown
|
page read and write
|
||
2B668EF4000
|
direct allocation
|
page read and write
|
||
C000216000
|
direct allocation
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C00022C000
|
direct allocation
|
page read and write
|
||
E3C000
|
unkown
|
page write copy
|
||
B20000
|
unkown
|
page readonly
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
ED3000
|
unkown
|
page readonly
|
||
2B66E220000
|
heap
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
2B668D70000
|
heap
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
E40000
|
unkown
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C000200000
|
direct allocation
|
page read and write
|
||
C000222000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
E41000
|
unkown
|
page write copy
|
||
1168000
|
unkown
|
page readonly
|
||
2B66E140000
|
heap
|
page read and write
|
||
E7F000
|
unkown
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
2B668D10000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C00014A000
|
direct allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
F86000
|
unkown
|
page readonly
|
||
C000054000
|
direct allocation
|
page read and write
|
||
DEF9DFC000
|
stack
|
page read and write
|
||
C0000F4000
|
direct allocation
|
page read and write
|
||
2B668CD0000
|
heap
|
page read and write
|
||
C00022E000
|
direct allocation
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
2B668D90000
|
heap
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
E3B000
|
unkown
|
page read and write
|
||
C00020A000
|
direct allocation
|
page read and write
|
||
C0000EF000
|
direct allocation
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
2B66E370000
|
heap
|
page read and write
|
||
1167000
|
unkown
|
page write copy
|
||
C000214000
|
direct allocation
|
page read and write
|
||
ED3000
|
unkown
|
page readonly
|
||
C000138000
|
direct allocation
|
page read and write
|
||
1167000
|
unkown
|
page write copy
|
||
E81000
|
unkown
|
page write copy
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
DEFA5FF000
|
stack
|
page read and write
|
||
E9E000
|
unkown
|
page read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
C0000ED000
|
direct allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
DEFA1FF000
|
stack
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
2B668EF0000
|
direct allocation
|
page read and write
|
||
831000
|
unkown
|
page execute read
|
||
830000
|
unkown
|
page readonly
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
DEFA9FE000
|
stack
|
page read and write
|
||
C00006A000
|
direct allocation
|
page read and write
|
||
C00005F000
|
direct allocation
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
C000090000
|
direct allocation
|
page read and write
|
||
2B668D20000
|
heap
|
page read and write
|
||
EA4000
|
unkown
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
E7C000
|
unkown
|
page write copy
|
||
E6E000
|
unkown
|
page read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
DEFABFE000
|
stack
|
page read and write
|
||
831000
|
unkown
|
page execute read
|
||
E6A000
|
unkown
|
page read and write
|
||
C000070000
|
direct allocation
|
page read and write
|
||
2B668EFA000
|
direct allocation
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
2B66E1A4000
|
direct allocation
|
page read and write
|
||
C000048000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C000158000
|
direct allocation
|
page read and write
|
||
E38000
|
unkown
|
page write copy
|
||
E3D000
|
unkown
|
page read and write
|
||
C00015A000
|
direct allocation
|
page read and write
|
||
C0000FD000
|
direct allocation
|
page read and write
|
||
E3A000
|
unkown
|
page write copy
|
||
1168000
|
unkown
|
page readonly
|
||
E38000
|
unkown
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
2B66E1E2000
|
direct allocation
|
page read and write
|
||
E87000
|
unkown
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
DEFA3FE000
|
stack
|
page read and write
|
||
2B668D92000
|
heap
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
C0000D4000
|
direct allocation
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
E82000
|
unkown
|
page read and write
|
||
C000170000
|
direct allocation
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
C00011D000
|
direct allocation
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
C00006C000
|
direct allocation
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
F86000
|
unkown
|
page readonly
|
||
C000146000
|
direct allocation
|
page read and write
|
||
2B66E1A0000
|
direct allocation
|
page read and write
|
||
C00020C000
|
direct allocation
|
page read and write
|
||
C00021A000
|
direct allocation
|
page read and write
|
||
C000156000
|
direct allocation
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
DEF9FFF000
|
stack
|
page read and write
|
There are 164 hidden memdumps, click here to show them.