Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\main old source new token.exe
|
"C:\Users\user\Desktop\main old source new token.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://discord.com/api/v9/oauth2/applications
|
unknown
|
||
https://discord.com/api/v9//voice/
|
unknown
|
||
https://status.discord.com/api/v2/scheduled-maintenances/upcoming.json
|
unknown
|
||
https://cdn.discordapp.com/icons/
|
unknown
|
||
https://cdn.discordapp.com/banners/
|
unknown
|
||
https://discord.com/api/v9/gateway
|
162.159.128.233
|
||
https://cdn.discordapp.com/guilds/
|
unknown
|
||
https://discord.com/api/v9/oauth2/
|
unknown
|
||
https://discord.com/api/v9/applications
|
unknown
|
||
https://discord.com/api/v9/gateway/bot
|
unknown
|
||
https://discord.com/api/v9/channels/
|
unknown
|
||
https://discord.com/api/v9/guilds/
|
unknown
|
||
https://cdn.discordapp.com/splashes/
|
unknown
|
||
https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall
|
unknown
|
||
https://cdn.discordapp.com/channel-icons/
|
unknown
|
||
https://github.com/bwmarrin/discordgo
|
unknown
|
||
https://cdn.discordapp.com/role-icons/
|
unknown
|
||
https://discord.com/api/v9/
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
https://cdn.discordapp.com/attachments/
|
unknown
|
||
https://status.discord.com/api/v2/scheduled-maintenances/active.json
|
unknown
|
||
https://discord.com/api/v9/09Az~~kernel32.dllREQUEST_METHODiphlpapi.dll
|
unknown
|
||
https://discord.com/api/v9/guilds
|
unknown
|
||
https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/v
|
unknown
|
||
https://discord.com/api/v9/stickers/
|
unknown
|
||
https://discord.com/api/v9/webhooks/
|
unknown
|
||
https://cdn.discordapp.com/avatars/
|
unknown
|
||
https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/use
|
unknown
|
||
https://discord.com/api/v9/stage-instances
|
unknown
|
||
https://discord.com/api/v9//sticker-packs
|
unknown
|
||
https://gateway.discord.gg/?v=9&encoding=json
|
162.159.133.234
|
||
https://discord.com/api/v9//voice/regions
|
unknown
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
discord.com
|
162.159.128.233
|
||
gateway.discord.gg
|
162.159.133.234
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.159.128.233
|
discord.com
|
United States
|
||
162.159.133.234
|
gateway.discord.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
81C000
|
unkown
|
page write copy
|
||
7DB000
|
unkown
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
7DD000
|
unkown
|
page read and write
|
||
F2D7FC000
|
stack
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
C0001A1000
|
direct allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
C0001E6000
|
direct allocation
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
C000088000
|
direct allocation
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
C0001D0000
|
direct allocation
|
page read and write
|
||
86C000
|
unkown
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
F2D3FF000
|
stack
|
page read and write
|
||
C000048000
|
direct allocation
|
page read and write
|
||
C0001CC000
|
direct allocation
|
page read and write
|
||
1EBC1930000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
827000
|
unkown
|
page read and write
|
||
926000
|
unkown
|
page readonly
|
||
F2D1FF000
|
stack
|
page read and write
|
||
1EBE6CC1000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
1EBE6C80000
|
direct allocation
|
page read and write
|
||
C0001C4000
|
direct allocation
|
page read and write
|
||
C000158000
|
direct allocation
|
page read and write
|
||
80A000
|
unkown
|
page read and write
|
||
7DC000
|
unkown
|
page write copy
|
||
C000148000
|
direct allocation
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
1D1000
|
unkown
|
page execute read
|
||
C000070000
|
direct allocation
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
B07000
|
unkown
|
page write copy
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C0001F6000
|
direct allocation
|
page read and write
|
||
873000
|
unkown
|
page readonly
|
||
C0001A8000
|
direct allocation
|
page read and write
|
||
1EBE6E50000
|
heap
|
page read and write
|
||
81F000
|
unkown
|
page read and write
|
||
1D1000
|
unkown
|
page execute read
|
||
C000180000
|
direct allocation
|
page read and write
|
||
C00016A000
|
direct allocation
|
page read and write
|
||
C00005F000
|
direct allocation
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
C0000D4000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
C000064000
|
direct allocation
|
page read and write
|
||
F2D9FD000
|
stack
|
page read and write
|
||
7E1000
|
unkown
|
page write copy
|
||
C0000F6000
|
direct allocation
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
1EBC1879000
|
heap
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
C0000EB000
|
direct allocation
|
page read and write
|
||
C0001C2000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
C0000ED000
|
direct allocation
|
page read and write
|
||
83E000
|
unkown
|
page read and write
|
||
B07000
|
unkown
|
page write copy
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
873000
|
unkown
|
page readonly
|
||
C000024000
|
direct allocation
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
C000196000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
C0001E8000
|
direct allocation
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
C000198000
|
direct allocation
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
1D1000
|
unkown
|
page execute read
|
||
C000190000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
1EBC1A24000
|
direct allocation
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
C000098000
|
direct allocation
|
page read and write
|
||
C000188000
|
direct allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
1EBC182C000
|
heap
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
C0000E9000
|
direct allocation
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C0000EF000
|
direct allocation
|
page read and write
|
||
7DA000
|
unkown
|
page write copy
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C0001F4000
|
direct allocation
|
page read and write
|
||
C000194000
|
direct allocation
|
page read and write
|
||
F2DDFF000
|
stack
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
F2DBFC000
|
stack
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
C0001EA000
|
direct allocation
|
page read and write
|
||
1EBC189D000
|
heap
|
page read and write
|
||
F2D5FF000
|
stack
|
page read and write
|
||
1EBC187B000
|
heap
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
C000096000
|
direct allocation
|
page read and write
|
||
C0001B6000
|
direct allocation
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
7D8000
|
unkown
|
page read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
1EBE6E55000
|
heap
|
page read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
1EBC1A20000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
C00015A000
|
direct allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
C00006C000
|
direct allocation
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
1EBC1A2A000
|
direct allocation
|
page read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
926000
|
unkown
|
page readonly
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C0001C6000
|
direct allocation
|
page read and write
|
||
C000172000
|
direct allocation
|
page read and write
|
||
1EBE6D40000
|
direct allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
1EBC1829000
|
heap
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
C0001D2000
|
direct allocation
|
page read and write
|
||
7DE000
|
unkown
|
page write copy
|
||
C0001CE000
|
direct allocation
|
page read and write
|
||
1EBE6D80000
|
heap
|
page read and write
|
||
7D8000
|
unkown
|
page write copy
|
||
822000
|
unkown
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C0001A6000
|
direct allocation
|
page read and write
|
||
1EBE6CA0000
|
heap
|
page read and write
|
||
844000
|
unkown
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
821000
|
unkown
|
page write copy
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
1EBE6D00000
|
direct allocation
|
page read and write
|
||
C000186000
|
direct allocation
|
page read and write
|
||
C0001EC000
|
direct allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
B08000
|
unkown
|
page readonly
|
||
C000038000
|
direct allocation
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C0001E2000
|
direct allocation
|
page read and write
|
||
1EBC1A28000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
C00006A000
|
direct allocation
|
page read and write
|
||
C0001B8000
|
direct allocation
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
F2CFFC000
|
stack
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
C0001CA000
|
direct allocation
|
page read and write
|
||
C0001F2000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
1EBC1820000
|
heap
|
page read and write
|
||
C00011D000
|
direct allocation
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
C0001D4000
|
direct allocation
|
page read and write
|
||
C0001D8000
|
direct allocation
|
page read and write
|
||
C0001AC000
|
direct allocation
|
page read and write
|
||
C0001AA000
|
direct allocation
|
page read and write
|
||
B08000
|
unkown
|
page readonly
|
||
C00002C000
|
direct allocation
|
page read and write
|
There are 180 hidden memdumps, click here to show them.