IOC Report
main.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\main.exe
"C:\Users\user\Desktop\main.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://discord.com/api/v9/oauth2/applications
unknown
https://discord.com/api/v9//voice/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/upcoming.json
unknown
https://cdn.discordapp.com/icons/
unknown
https://discord.com/api/v9/09Az~~kernel32.dllREQUEST_METHODiphlpapi.dllB
unknown
https://cdn.discordapp.com/banners/
unknown
https://discord.com/api/v9/gateway
162.159.137.232
https://cdn.discordapp.com/guilds/
unknown
https://discord.com/api/v9/oauth2/
unknown
https://discord.com/api/v9/applications
unknown
https://discord.com/api/v9/gateway/bot
unknown
https://status.discord.com/api/v2/scheduled-maintenances/7
unknown
https://discord.com/api/v9/channels/
unknown
https://discord.com/api/v9/guilds/
unknown
https://cdn.discordapp.com/splashes/
unknown
https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall
unknown
https://cdn.discordapp.com/channel-icons/
unknown
https://github.com/bwmarrin/discordgo
unknown
https://cdn.discordapp.com/role-icons/
unknown
https://discord.com/api/v9/
unknown
https://discord.com/api/v9/users/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/
unknown
https://cdn.discordapp.com/attachments/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/active.json
unknown
https://discord.com/api/v9/guilds
unknown
https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/v
unknown
https://discord.com/api/v9/stickers/
unknown
https://discord.com/api/v9/webhooks/
unknown
https://cdn.discordapp.com/avatars/
unknown
https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/use
unknown
https://discord.com/api/v9/stage-instances
unknown
https://discord.com/api/v9//sticker-packs
unknown
https://gateway.discord.gg/?v=9&encoding=json
162.159.136.234
https://discord.com/api/v9//voice/regions
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
discord.com
162.159.137.232
gateway.discord.gg
162.159.136.234

IPs

IP
Domain
Country
Malicious
162.159.136.234
gateway.discord.gg
United States
162.159.137.232
discord.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C0001EC000
direct allocation
page read and write
10F0000
unkown
page readonly
C000284000
direct allocation
page read and write
C00011D000
direct allocation
page read and write
1F02C2A0000
heap
page read and write
14A3000
unkown
page readonly
C000024000
direct allocation
page read and write
E00000
unkown
page readonly
140A000
unkown
page write copy
C0001D2000
direct allocation
page read and write
C000064000
direct allocation
page read and write
1737000
unkown
page write copy
C0001EE000
direct allocation
page read and write
C00014C000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
E01000
unkown
page execute read
C000028000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C000136000
direct allocation
page read and write
144C000
unkown
page write copy
C00017C000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
C000122000
direct allocation
page read and write
1556000
unkown
page readonly
C0000B0000
direct allocation
page read and write
CF987FE000
stack
page read and write
C000174000
direct allocation
page read and write
144F000
unkown
page read and write
C0001A2000
direct allocation
page read and write
1F02C349000
heap
page read and write
C0000A2000
direct allocation
page read and write
C0001D6000
direct allocation
page read and write
C0001D0000
direct allocation
page read and write
1738000
unkown
page readonly
C00018E000
direct allocation
page read and write
E01000
unkown
page execute read
C0001B2000
direct allocation
page read and write
140D000
unkown
page read and write
C00016E000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
C0001C2000
direct allocation
page read and write
C00028C000
direct allocation
page read and write
1F02C2D0000
heap
page read and write
C0000A4000
direct allocation
page read and write
CF97BFE000
stack
page read and write
C00008E000
direct allocation
page read and write
C000194000
direct allocation
page read and write
C000190000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C000054000
direct allocation
page read and write
C000020000
direct allocation
page read and write
1F02C2DC000
heap
page read and write
1408000
unkown
page read and write
C00017A000
direct allocation
page read and write
C000100000
direct allocation
page read and write
1F02C327000
heap
page read and write
1F02C325000
heap
page read and write
1737000
unkown
page write copy
C00020C000
direct allocation
page read and write
140B000
unkown
page read and write
C000196000
direct allocation
page read and write
C0001BE000
direct allocation
page read and write
1F071650000
direct allocation
page read and write
C0001AA000
direct allocation
page read and write
C000202000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
C000096000
direct allocation
page read and write
1F0715D9000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
146E000
unkown
page read and write
C0000A0000
direct allocation
page read and write
140C000
unkown
page write copy
C0000A8000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C0001A6000
direct allocation
page read and write
C0001BC000
direct allocation
page read and write
C000030000
direct allocation
page read and write
1F02C224000
direct allocation
page read and write
C000176000
direct allocation
page read and write
C000004000
direct allocation
page read and write
C0001EA000
direct allocation
page read and write
C000155000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
1452000
unkown
page read and write
CF979FC000
stack
page read and write
C00002C000
direct allocation
page read and write
C000038000
direct allocation
page read and write
C0001DC000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
C0001CE000
direct allocation
page read and write
1556000
unkown
page readonly
CF983FE000
stack
page read and write
C0001FA000
direct allocation
page read and write
CF985FC000
stack
page read and write
C00008C000
direct allocation
page read and write
C000052000
direct allocation
page read and write
C0001B0000
direct allocation
page read and write
C0001FE000
direct allocation
page read and write
1457000
unkown
page read and write
C0001D8000
direct allocation
page read and write
1411000
unkown
page write copy
C00020E000
direct allocation
page read and write
1F02C280000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C0001A4000
direct allocation
page read and write
1F071655000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
C000192000
direct allocation
page read and write
1408000
unkown
page write copy
C000002000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C000198000
direct allocation
page read and write
C00016C000
direct allocation
page read and write
143D000
unkown
page write copy
C00013A000
direct allocation
page read and write
C0000A6000
direct allocation
page read and write
10F0000
unkown
page readonly
1F02C130000
heap
page read and write
C000108000
direct allocation
page read and write
C000006000
direct allocation
page read and write
C000092000
direct allocation
page read and write
C000200000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
C000172000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
140E000
unkown
page write copy
CF97DFF000
stack
page read and write
C00005B000
direct allocation
page read and write
C000157000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
1F02C22A000
direct allocation
page read and write
1474000
unkown
page read and write
C000094000
direct allocation
page read and write
C0001AC000
direct allocation
page read and write
C000214000
direct allocation
page read and write
149C000
unkown
page read and write
C0000B2000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
C000180000
direct allocation
page read and write
1F071610000
direct allocation
page read and write
1F02C228000
direct allocation
page read and write
C000068000
direct allocation
page read and write
C00018C000
direct allocation
page read and write
C0001C8000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C0001E6000
direct allocation
page read and write
C000026000
direct allocation
page read and write
14A3000
unkown
page readonly
CF97FFE000
stack
page read and write
C00001C000
direct allocation
page read and write
C000080000
direct allocation
page read and write
CF981FC000
stack
page read and write
1410000
unkown
page read and write
C00012E000
direct allocation
page read and write
C000048000
direct allocation
page read and write
1F071870000
heap
page read and write
C000104000
direct allocation
page read and write
C000132000
direct allocation
page read and write
C0001CA000
direct allocation
page read and write
1F071690000
heap
page read and write
C000212000
direct allocation
page read and write
C000142000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C0001F8000
direct allocation
page read and write
C000070000
direct allocation
page read and write
E00000
unkown
page readonly
C000062000
direct allocation
page read and write
143E000
unkown
page read and write
C0001C0000
direct allocation
page read and write
1F0715D1000
direct allocation
page read and write
C000188000
direct allocation
page read and write
1738000
unkown
page readonly
C0000B4000
direct allocation
page read and write
1451000
unkown
page write copy
C000130000
direct allocation
page read and write
C00015D000
direct allocation
page read and write
C00016A000
direct allocation
page read and write
C000000000
direct allocation
page read and write
1F071875000
heap
page read and write
C0000AC000
direct allocation
page read and write
1F02C220000
direct allocation
page read and write
C0001D4000
direct allocation
page read and write
C000128000
direct allocation
page read and write
C00006C000
direct allocation
page read and write
143A000
unkown
page read and write
C00020A000
direct allocation
page read and write
C0000B6000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
There are 182 hidden memdumps, click here to show them.