IOC Report
main old source new token.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\main old source new token.exe
"C:\Users\user\Desktop\main old source new token.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://discord.com/api/v9/oauth2/applications
unknown
https://discord.com/api/v9//voice/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/upcoming.json
unknown
https://cdn.discordapp.com/icons/
unknown
https://cdn.discordapp.com/banners/
unknown
https://discord.com/api/v9/gateway
162.159.128.233
https://cdn.discordapp.com/guilds/
unknown
https://discord.com/api/v9/oauth2/
unknown
https://discord.com/api/v9/applications
unknown
https://discord.com/api/v9/gateway/bot
unknown
https://discord.com/api/v9/channels/
unknown
https://discord.com/api/v9/guilds/
unknown
https://cdn.discordapp.com/splashes/
unknown
https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall
unknown
https://cdn.discordapp.com/channel-icons/
unknown
https://github.com/bwmarrin/discordgo
unknown
https://cdn.discordapp.com/role-icons/
unknown
https://discord.com/api/v9/
unknown
https://discord.com/api/v9/users/
unknown
https://cdn.discordapp.com/attachments/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/active.json
unknown
https://discord.com/api/v9/09Az~~kernel32.dllREQUEST_METHODiphlpapi.dll
unknown
https://discord.com/api/v9/guilds
unknown
https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/v
unknown
https://discord.com/api/v9/stickers/
unknown
https://discord.com/api/v9/webhooks/
unknown
https://cdn.discordapp.com/avatars/
unknown
https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/use
unknown
https://discord.com/api/v9/stage-instances
unknown
https://discord.com/api/v9//sticker-packs
unknown
https://gateway.discord.gg/?v=9&encoding=json
162.159.133.234
https://discord.com/api/v9//voice/regions
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
discord.com
162.159.128.233
gateway.discord.gg
162.159.133.234

IPs

IP
Domain
Country
Malicious
162.159.128.233
discord.com
United States
162.159.133.234
gateway.discord.gg
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
81C000
unkown
page write copy
7DB000
unkown
page read and write
C000004000
direct allocation
page read and write
7DD000
unkown
page read and write
F2D7FC000
stack
page read and write
C00003F000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
C0001A1000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
C0001E6000
direct allocation
page read and write
C0000CE000
direct allocation
page read and write
C000008000
direct allocation
page read and write
1D0000
unkown
page readonly
C000088000
direct allocation
page read and write
C000026000
direct allocation
page read and write
C0001D0000
direct allocation
page read and write
86C000
unkown
page read and write
C000028000
direct allocation
page read and write
C000122000
direct allocation
page read and write
F2D3FF000
stack
page read and write
C000048000
direct allocation
page read and write
C0001CC000
direct allocation
page read and write
1EBC1930000
heap
page read and write
7E0000
unkown
page read and write
C0000B2000
direct allocation
page read and write
C000140000
direct allocation
page read and write
827000
unkown
page read and write
926000
unkown
page readonly
F2D1FF000
stack
page read and write
1EBE6CC1000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
1EBE6C80000
direct allocation
page read and write
C0001C4000
direct allocation
page read and write
C000158000
direct allocation
page read and write
80A000
unkown
page read and write
7DC000
unkown
page write copy
C000148000
direct allocation
page read and write
C000146000
direct allocation
page read and write
1D1000
unkown
page execute read
C000070000
direct allocation
page read and write
C000192000
direct allocation
page read and write
B07000
unkown
page write copy
C00000A000
direct allocation
page read and write
C0001F6000
direct allocation
page read and write
873000
unkown
page readonly
C0001A8000
direct allocation
page read and write
1EBE6E50000
heap
page read and write
81F000
unkown
page read and write
1D1000
unkown
page execute read
C000180000
direct allocation
page read and write
C00016A000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
C0000B6000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
1D0000
unkown
page readonly
C000064000
direct allocation
page read and write
F2D9FD000
stack
page read and write
7E1000
unkown
page write copy
C0000F6000
direct allocation
page read and write
C0001BE000
direct allocation
page read and write
1EBC1879000
heap
page read and write
C0000B4000
direct allocation
page read and write
C0000EB000
direct allocation
page read and write
C0001C2000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
C0000ED000
direct allocation
page read and write
83E000
unkown
page read and write
B07000
unkown
page write copy
C00014C000
direct allocation
page read and write
873000
unkown
page readonly
C000024000
direct allocation
page read and write
C00012C000
direct allocation
page read and write
C000196000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
C0001E8000
direct allocation
page read and write
C0001BA000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
C000198000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
1D1000
unkown
page execute read
C000190000
direct allocation
page read and write
C000080000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
C000090000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
1EBC1A24000
direct allocation
page read and write
4C0000
unkown
page readonly
C000098000
direct allocation
page read and write
C000188000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
1EBC182C000
heap
page read and write
C000126000
direct allocation
page read and write
C0000E9000
direct allocation
page read and write
C000068000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
C0000EF000
direct allocation
page read and write
7DA000
unkown
page write copy
C000000000
direct allocation
page read and write
C0001F4000
direct allocation
page read and write
C000194000
direct allocation
page read and write
F2DDFF000
stack
page read and write
C000086000
direct allocation
page read and write
F2DBFC000
stack
page read and write
C00008C000
direct allocation
page read and write
C0001EA000
direct allocation
page read and write
1EBC189D000
heap
page read and write
F2D5FF000
stack
page read and write
1EBC187B000
heap
page read and write
C000094000
direct allocation
page read and write
C000104000
direct allocation
page read and write
4C0000
unkown
page readonly
C000096000
direct allocation
page read and write
C0001B6000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
7D8000
unkown
page read and write
C000184000
direct allocation
page read and write
1EBE6E55000
heap
page read and write
C000144000
direct allocation
page read and write
1EBC1A20000
direct allocation
page read and write
C000132000
direct allocation
page read and write
C00015A000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
C00006C000
direct allocation
page read and write
C000164000
direct allocation
page read and write
1EBC1A2A000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
926000
unkown
page readonly
C000054000
direct allocation
page read and write
C0001C6000
direct allocation
page read and write
C000172000
direct allocation
page read and write
1EBE6D40000
direct allocation
page read and write
C000062000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
1EBC1829000
heap
page read and write
C0000BA000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
C0001D2000
direct allocation
page read and write
7DE000
unkown
page write copy
C0001CE000
direct allocation
page read and write
1EBE6D80000
heap
page read and write
7D8000
unkown
page write copy
822000
unkown
page read and write
C00003A000
direct allocation
page read and write
C0001A6000
direct allocation
page read and write
1EBE6CA0000
heap
page read and write
844000
unkown
page read and write
C000092000
direct allocation
page read and write
821000
unkown
page write copy
C0000E4000
direct allocation
page read and write
1EBE6D00000
direct allocation
page read and write
C000186000
direct allocation
page read and write
C0001EC000
direct allocation
page read and write
C000100000
direct allocation
page read and write
B08000
unkown
page readonly
C000038000
direct allocation
page read and write
C000128000
direct allocation
page read and write
C0000A4000
direct allocation
page read and write
C0001E2000
direct allocation
page read and write
1EBC1A28000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C00006A000
direct allocation
page read and write
C0001B8000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
F2CFFC000
stack
page read and write
C000112000
direct allocation
page read and write
C0001CA000
direct allocation
page read and write
C0001F2000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000006000
direct allocation
page read and write
C000002000
direct allocation
page read and write
1EBC1820000
heap
page read and write
C00011D000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
C0001D4000
direct allocation
page read and write
C0001D8000
direct allocation
page read and write
C0001AC000
direct allocation
page read and write
C0001AA000
direct allocation
page read and write
B08000
unkown
page readonly
C00002C000
direct allocation
page read and write
There are 180 hidden memdumps, click here to show them.