IOC Report
RobloxPlayer DevBuildV2.653.952.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RobloxPlayer DevBuildV2.653.952.exe
"C:\Users\user\Desktop\RobloxPlayer DevBuildV2.653.952.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://discord.com/api/v9/oauth2/applications
unknown
https://discord.com/api/v9//voice/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/upcoming.json
unknown
https://cdn.discordapp.com/icons/
unknown
https://cdn.discordapp.com/banners/
unknown
https://go.micro
unknown
https://discord.com/api/v9/gateway
162.159.136.232
https://cdn.discordapp.com/guilds/
unknown
https://discord.com/api/v9/oauth2/
unknown
https://discord.com/api/v9/applications
unknown
https://discord.com/api/v9/gateway/bot
unknown
https://discord.com/api/v9/channels/
unknown
https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/cert
unknown
https://discord.com/api/v9/guilds/
unknown
https://cdn.discordapp.com/splashes/
unknown
https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall
unknown
https://cdn.discordapp.com/channel-icons/
unknown
https://github.com/bwmarrin/discordgo
unknown
https://cdn.discordapp.com/role-icons/
unknown
https://discord.com/api/v9/
unknown
https://discord.com/api/v9/users/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/
unknown
https://cdn.discordapp.com/attachments/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/active.json
unknown
https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/c
unknown
https://discord.com/api/v9/09Az~~kernel32.dllREQUEST_METHODiphlpapi.dll
unknown
https://discord.com/api/v9/guilds
unknown
https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/v
unknown
https://discord.com/api/v9/stickers/
unknown
https://discord.com/api/v9/webhooks/
unknown
https://cdn.discordapp.com/avatars/
unknown
https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/use
unknown
https://discord.com/api/v9/stage-instances
unknown
https://curl.se/docs/caextract.html
unknown
https://discord.com/api/v9//sticker-packs
unknown
https://gateway.discord.gg/?v=9&encoding=json
162.159.136.234
https://discord.com/api/v9//voice/regions
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
discord.com
162.159.136.232
gateway.discord.gg
162.159.136.234

IPs

IP
Domain
Country
Malicious
162.159.136.234
gateway.discord.gg
United States
162.159.136.232
discord.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C000000000
direct allocation
page read and write
C0000D6000
direct allocation
page read and write
2B668D2B000
heap
page read and write
C0000A8000
direct allocation
page read and write
C000230000
direct allocation
page read and write
C00021C000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
2B66E161000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C000212000
direct allocation
page read and write
C000024000
direct allocation
page read and write
E6D000
unkown
page write copy
C000126000
direct allocation
page read and write
C000220000
direct allocation
page read and write
C000038000
direct allocation
page read and write
C0000E2000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
C000224000
direct allocation
page read and write
C0000F6000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
2B668D6E000
heap
page read and write
C000028000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
DEFA7FC000
stack
page read and write
C0000CC000
direct allocation
page read and write
C000232000
direct allocation
page read and write
2B66E375000
heap
page read and write
2B668EF8000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
C00020E000
direct allocation
page read and write
C000162000
direct allocation
page read and write
C000082000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
C000152000
direct allocation
page read and write
E3E000
unkown
page write copy
C00000A000
direct allocation
page read and write
2B66E1E0000
direct allocation
page read and write
C000140000
direct allocation
page read and write
C000168000
direct allocation
page read and write
ECC000
unkown
page read and write
2B668EF4000
direct allocation
page read and write
C000216000
direct allocation
page read and write
C000096000
direct allocation
page read and write
C000134000
direct allocation
page read and write
C000094000
direct allocation
page read and write
C00022C000
direct allocation
page read and write
E3C000
unkown
page write copy
B20000
unkown
page readonly
C000030000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
C000124000
direct allocation
page read and write
ED3000
unkown
page readonly
2B66E220000
heap
page read and write
C000098000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C0000BA000
direct allocation
page read and write
2B668D70000
heap
page read and write
C0000B2000
direct allocation
page read and write
E40000
unkown
page read and write
C000080000
direct allocation
page read and write
C000200000
direct allocation
page read and write
C000222000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
E41000
unkown
page write copy
1168000
unkown
page readonly
2B66E140000
heap
page read and write
E7F000
unkown
page read and write
C00005B000
direct allocation
page read and write
2B668D10000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
C000006000
direct allocation
page read and write
C00014A000
direct allocation
page read and write
C000086000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
F86000
unkown
page readonly
C000054000
direct allocation
page read and write
DEF9DFC000
stack
page read and write
C0000F4000
direct allocation
page read and write
2B668CD0000
heap
page read and write
C00022E000
direct allocation
page read and write
C0000C4000
direct allocation
page read and write
2B668D90000
heap
page read and write
C000064000
direct allocation
page read and write
E3B000
unkown
page read and write
C00020A000
direct allocation
page read and write
C0000EF000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
2B66E370000
heap
page read and write
1167000
unkown
page write copy
C000214000
direct allocation
page read and write
ED3000
unkown
page readonly
C000138000
direct allocation
page read and write
1167000
unkown
page write copy
E81000
unkown
page write copy
C0000DE000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
DEFA5FF000
stack
page read and write
E9E000
unkown
page read and write
C000144000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C0000ED000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
DEFA1FF000
stack
page read and write
C000004000
direct allocation
page read and write
2B668EF0000
direct allocation
page read and write
831000
unkown
page execute read
830000
unkown
page readonly
C00012A000
direct allocation
page read and write
C000122000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
DEFA9FE000
stack
page read and write
C00006A000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
830000
unkown
page readonly
C000090000
direct allocation
page read and write
2B668D20000
heap
page read and write
EA4000
unkown
page read and write
C00003F000
direct allocation
page read and write
C000002000
direct allocation
page read and write
E7C000
unkown
page write copy
E6E000
unkown
page read and write
C0000E4000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C0000B6000
direct allocation
page read and write
C0000CE000
direct allocation
page read and write
DEFABFE000
stack
page read and write
831000
unkown
page execute read
E6A000
unkown
page read and write
C000070000
direct allocation
page read and write
2B668EFA000
direct allocation
page read and write
C000026000
direct allocation
page read and write
C000088000
direct allocation
page read and write
2B66E1A4000
direct allocation
page read and write
C000048000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C000158000
direct allocation
page read and write
E38000
unkown
page write copy
E3D000
unkown
page read and write
C00015A000
direct allocation
page read and write
C0000FD000
direct allocation
page read and write
E3A000
unkown
page write copy
1168000
unkown
page readonly
E38000
unkown
page read and write
C00011A000
direct allocation
page read and write
2B66E1E2000
direct allocation
page read and write
E87000
unkown
page read and write
C000068000
direct allocation
page read and write
DEFA3FE000
stack
page read and write
2B668D92000
heap
page read and write
C00004D000
direct allocation
page read and write
C000062000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
B20000
unkown
page readonly
E82000
unkown
page read and write
C000170000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
C00011D000
direct allocation
page read and write
C0000B4000
direct allocation
page read and write
C00006C000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
F86000
unkown
page readonly
C000146000
direct allocation
page read and write
2B66E1A0000
direct allocation
page read and write
C00020C000
direct allocation
page read and write
C00021A000
direct allocation
page read and write
C000156000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
DEF9FFF000
stack
page read and write
There are 164 hidden memdumps, click here to show them.