IOC Report
xLauncher.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xLauncher.exe
"C:\Users\user\Desktop\xLauncher.exe"
malicious
C:\Users\user\Desktop\xLauncher.exe
"C:\Users\user\Desktop\xLauncher.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
fumblingactor.cyou
malicious
https://frogs-severz.sbs/api
172.67.155.47
malicious
https://frogs-severz.sbs/apil
unknown
https://frogs-severz.sbs:443/apibcryptPrimitives.dll
unknown
https://frogs-severz.sbs/
unknown
https://frogs-severz.sbs/api6C
unknown
http://crl.microx
unknown
https://fumblingactor.cyou:443/apiS
unknown
https://frogs-severz.sbs:443/api
unknown

Domains

Name
IP
Malicious
fumblingactor.cyou
unknown
malicious
frogs-severz.sbs
172.67.155.47

IPs

IP
Domain
Country
Malicious
172.67.155.47
frogs-severz.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2A82000
heap
page read and write
malicious
2A7B000
heap
page read and write
4A0E000
stack
page read and write
2EC0000
heap
page read and write
5FB000
unkown
page execute and read and write
29DB000
stack
page read and write
2D53000
heap
page read and write
5FF000
unkown
page readonly
520F000
stack
page read and write
458F000
stack
page read and write
2D4E000
heap
page read and write
601000
unkown
page write copy
2D80000
heap
page read and write
456000
remote allocation
page execute and read and write
2CFB000
stack
page read and write
5FF000
unkown
page readonly
2DD6000
heap
page read and write
5D0000
unkown
page readonly
5FB000
unkown
page write copy
2E30000
heap
page read and write
5FB000
unkown
page write copy
2D3A000
heap
page read and write
2DE9000
heap
page read and write
535E000
stack
page read and write
26F0000
heap
page read and write
2FDE000
stack
page read and write
5F3000
unkown
page readonly
5D1000
unkown
page execute read
2FE0000
heap
page read and write
601000
unkown
page write copy
2D8E000
heap
page read and write
2EAE000
stack
page read and write
5F3000
unkown
page readonly
510E000
stack
page read and write
2D30000
heap
page read and write
2DE4000
heap
page read and write
2DD9000
heap
page read and write
2D80000
heap
page read and write
55C0000
heap
page read and write
2D8E000
heap
page read and write
5FF000
unkown
page readonly
5530000
trusted library allocation
page read and write
4FCE000
stack
page read and write
50CE000
stack
page read and write
2DDF000
heap
page read and write
5D0000
unkown
page readonly
444D000
stack
page read and write
5FB000
unkown
page write copy
26B0000
heap
page read and write
2D80000
heap
page read and write
2DE4000
heap
page read and write
5D1000
unkown
page execute read
5210000
remote allocation
page read and write
2D77000
heap
page read and write
4E4D000
stack
page read and write
5FF000
unkown
page readonly
2DE4000
heap
page read and write
2A70000
heap
page read and write
2DF0000
heap
page read and write
5CC000
stack
page read and write
2D80000
heap
page read and write
54CF000
stack
page read and write
525D000
stack
page read and write
5F3000
unkown
page readonly
2D76000
heap
page read and write
5210000
remote allocation
page read and write
5FC000
unkown
page read and write
601000
unkown
page write copy
2DE2000
heap
page read and write
552E000
stack
page read and write
2D53000
heap
page read and write
2DDF000
heap
page read and write
2DE2000
heap
page read and write
2DDF000
heap
page read and write
3066000
heap
page read and write
5D0000
unkown
page readonly
5F3000
unkown
page readonly
303D000
stack
page read and write
5D1000
unkown
page execute read
2D64000
heap
page read and write
490E000
stack
page read and write
2D65000
heap
page read and write
2D8E000
heap
page read and write
448E000
stack
page read and write
4E8D000
stack
page read and write
2EC5000
heap
page read and write
2A3D000
stack
page read and write
53CE000
stack
page read and write
56CF000
stack
page read and write
4CC000
stack
page read and write
4F8D000
stack
page read and write
2D8E000
heap
page read and write
2DE2000
heap
page read and write
2E40000
heap
page read and write
26A0000
heap
page read and write
601000
unkown
page write copy
3060000
heap
page read and write
2D30000
heap
page read and write
5210000
remote allocation
page read and write
5D1000
unkown
page execute read
5D0000
unkown
page readonly
There are 92 hidden memdumps, click here to show them.