IOC Report
main.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\main.exe
"C:\Users\user\Desktop\main.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://discord.com/api/v9/oauth2/applications
unknown
https://discord.com/api/v9//voice/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/upcoming.json
unknown
https://cdn.discordapp.com/icons/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/D
unknown
https://cdn.discordapp.com/banners/
unknown
https://discord.com/api/v9/gateway
162.159.135.232
https://cdn.discordapp.com/guilds/
unknown
https://discord.com/api/v9/oauth2/
unknown
https://discord.com/api/v9/applications
unknown
https://discord.com/api/v9/gateway/bot
unknown
https://discord.com/api/v9/channels/
unknown
https://discord.com/api/v9/guilds/
unknown
https://cdn.discordapp.com/splashes/
unknown
https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall
unknown
https://cdn.discordapp.com/channel-icons/
unknown
https://github.com/bwmarrin/discordgo
unknown
https://cdn.discordapp.com/role-icons/
unknown
https://discord.com/api/v9/
unknown
https://discord.com/api/v9/users/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/
unknown
https://cdn.discordapp.com/attachments/
unknown
https://status.discord.com/api/v2/scheduled-maintenances/active.json
unknown
https://discord.com/api/v9/09Az~~kernel32.dllREQUEST_METHODiphlpapi.dll
unknown
https://discord.com/api/v9/guilds
unknown
https://status.discord.com/api/v2/scheduled-maintenances/active.jsonhttps://status.discord.com/api/v
unknown
https://discord.com/api/v9/stickers/
unknown
https://discord.com/api/v9/webhooks/
unknown
https://cdn.discordapp.com/avatars/
unknown
https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/use
unknown
https://discord.com/api/v9/stage-instances
unknown
https://discord.com/api/v9//sticker-packs
unknown
https://gateway.discord.gg/?v=9&encoding=json
162.159.133.234
https://discord.com/api/v9//voice/regions
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
discord.com
162.159.135.232
gateway.discord.gg
162.159.133.234

IPs

IP
Domain
Country
Malicious
162.159.133.234
gateway.discord.gg
United States
162.159.135.232
discord.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C0001C8000
direct allocation
page read and write
C000200000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
C00022A000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
A1C000
unkown
page read and write
C000100000
direct allocation
page read and write
C00019C000
direct allocation
page read and write
C0000A4000
direct allocation
page read and write
C000080000
direct allocation
page read and write
15D7AF50000
direct allocation
page read and write
9D1000
unkown
page write copy
15D75C48000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
988000
unkown
page write copy
C0000EE000
direct allocation
page read and write
C000022000
direct allocation
page read and write
A23000
unkown
page readonly
C0000DA000
direct allocation
page read and write
AD6000
unkown
page readonly
C0000F0000
direct allocation
page read and write
C0000FC000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
15D7AF90000
heap
page read and write
C0000AC000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
988000
unkown
page read and write
C0000B6000
direct allocation
page read and write
C000008000
direct allocation
page read and write
CB7000
unkown
page write copy
C0001FE000
direct allocation
page read and write
9BE000
unkown
page read and write
C0000F4000
direct allocation
page read and write
C000090000
direct allocation
page read and write
380000
unkown
page readonly
C00020A000
direct allocation
page read and write
15D7AF10000
direct allocation
page read and write
C0000FE000
direct allocation
page read and write
C0001EB000
direct allocation
page read and write
C000194000
direct allocation
page read and write
15D7AF52000
direct allocation
page read and write
1D1F9FC000
stack
page read and write
C0001B4000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
C000070000
direct allocation
page read and write
15D75A7C000
heap
page read and write
C000002000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
C000190000
direct allocation
page read and write
C0001B0000
direct allocation
page read and write
15D75C40000
direct allocation
page read and write
C000212000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
9BD000
unkown
page write copy
C000104000
direct allocation
page read and write
990000
unkown
page read and write
C0000B4000
direct allocation
page read and write
C000096000
direct allocation
page read and write
C00018C000
direct allocation
page read and write
15D7AF54000
direct allocation
page read and write
C00011D000
direct allocation
page read and write
9EE000
unkown
page read and write
98E000
unkown
page write copy
C00022C000
direct allocation
page read and write
C0001C2000
direct allocation
page read and write
1D1F3FF000
stack
page read and write
C0000DC000
direct allocation
page read and write
C000094000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
C0001F0000
direct allocation
page read and write
C000182000
direct allocation
page read and write
381000
unkown
page execute read
C0000E2000
direct allocation
page read and write
C000030000
direct allocation
page read and write
CB8000
unkown
page readonly
1D1F7FE000
stack
page read and write
C000228000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
C000028000
direct allocation
page read and write
C0001D0000
direct allocation
page read and write
C0001AC000
direct allocation
page read and write
C0001B8000
direct allocation
page read and write
C00021E000
direct allocation
page read and write
C0001BA000
direct allocation
page read and write
C0001E9000
direct allocation
page read and write
15D75C44000
direct allocation
page read and write
CB8000
unkown
page readonly
C000188000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
AD6000
unkown
page readonly
C0000BA000
direct allocation
page read and write
C000180000
direct allocation
page read and write
15D7B0F0000
heap
page read and write
C0000B2000
direct allocation
page read and write
9F4000
unkown
page read and write
C0001AE000
direct allocation
page read and write
C000184000
direct allocation
page read and write
9D2000
unkown
page read and write
C0000A6000
direct allocation
page read and write
15D75AEC000
heap
page read and write
380000
unkown
page readonly
C00001C000
direct allocation
page read and write
15D75AEA000
heap
page read and write
15D7AEB0000
heap
page read and write
98C000
unkown
page write copy
C000026000
direct allocation
page read and write
C0001D8000
direct allocation
page read and write
C000220000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
CB7000
unkown
page write copy
C0001F2000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
C0001C6000
direct allocation
page read and write
15D75A60000
direct allocation
page read and write
98A000
unkown
page write copy
C00003C000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
15D7AED1000
direct allocation
page read and write
98B000
unkown
page read and write
C000048000
direct allocation
page read and write
C0000E4000
direct allocation
page read and write
C000082000
direct allocation
page read and write
9BA000
unkown
page read and write
C00003A000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
C00006A000
direct allocation
page read and write
C00020E000
direct allocation
page read and write
C000086000
direct allocation
page read and write
C0001A4000
direct allocation
page read and write
C0001A2000
direct allocation
page read and write
C00021C000
direct allocation
page read and write
A23000
unkown
page readonly
1D1FBFE000
stack
page read and write
C000004000
direct allocation
page read and write
1D1F1FC000
stack
page read and write
C000196000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C000006000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
9CF000
unkown
page read and write
C000068000
direct allocation
page read and write
C000210000
direct allocation
page read and write
9D7000
unkown
page read and write
C000216000
direct allocation
page read and write
9CC000
unkown
page write copy
670000
unkown
page readonly
C000112000
direct allocation
page read and write
C0001E0000
direct allocation
page read and write
C0001BE000
direct allocation
page read and write
C000054000
direct allocation
page read and write
1D1FFFF000
stack
page read and write
15D75C4A000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
C000020000
direct allocation
page read and write
1D1F5FE000
stack
page read and write
C0000AA000
direct allocation
page read and write
C00022E000
direct allocation
page read and write
C0001DE000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
C0001CE000
direct allocation
page read and write
15D75A70000
heap
page read and write
C000218000
direct allocation
page read and write
C000024000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
991000
unkown
page write copy
C000092000
direct allocation
page read and write
C0001C0000
direct allocation
page read and write
15D7B0F5000
heap
page read and write
C00028E000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C0000F2000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
1D1FDFD000
stack
page read and write
C0001F9000
direct allocation
page read and write
15D75A40000
heap
page read and write
C0001A6000
direct allocation
page read and write
C000286000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
C0001AA000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
670000
unkown
page readonly
C000038000
direct allocation
page read and write
15D75C4C000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
C0001DC000
direct allocation
page read and write
98D000
unkown
page read and write
C0000AE000
direct allocation
page read and write
381000
unkown
page execute read
C0001D2000
direct allocation
page read and write
C000088000
direct allocation
page read and write
There are 185 hidden memdumps, click here to show them.