Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\xLauncher.exe
|
"C:\Users\user\Desktop\xLauncher.exe"
|
||
C:\Users\user\Desktop\xLauncher.exe
|
"C:\Users\user\Desktop\xLauncher.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fumblingactor.cyou
|
|||
https://frogs-severz.sbs/api
|
172.67.155.47
|
||
https://frogs-severz.sbs/apil
|
unknown
|
||
https://frogs-severz.sbs:443/apibcryptPrimitives.dll
|
unknown
|
||
https://frogs-severz.sbs/
|
unknown
|
||
https://frogs-severz.sbs/api6C
|
unknown
|
||
http://crl.microx
|
unknown
|
||
https://fumblingactor.cyou:443/apiS
|
unknown
|
||
https://frogs-severz.sbs:443/api
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fumblingactor.cyou
|
unknown
|
||
frogs-severz.sbs
|
172.67.155.47
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.155.47
|
frogs-severz.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
2A82000
|
heap
|
page read and write
|
||
2A7B000
|
heap
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
5FB000
|
unkown
|
page execute and read and write
|
||
29DB000
|
stack
|
page read and write
|
||
2D53000
|
heap
|
page read and write
|
||
5FF000
|
unkown
|
page readonly
|
||
520F000
|
stack
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
601000
|
unkown
|
page write copy
|
||
2D80000
|
heap
|
page read and write
|
||
456000
|
remote allocation
|
page execute and read and write
|
||
2CFB000
|
stack
|
page read and write
|
||
5FF000
|
unkown
|
page readonly
|
||
2DD6000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
5FB000
|
unkown
|
page write copy
|
||
2E30000
|
heap
|
page read and write
|
||
5FB000
|
unkown
|
page write copy
|
||
2D3A000
|
heap
|
page read and write
|
||
2DE9000
|
heap
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
5F3000
|
unkown
|
page readonly
|
||
5D1000
|
unkown
|
page execute read
|
||
2FE0000
|
heap
|
page read and write
|
||
601000
|
unkown
|
page write copy
|
||
2D8E000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
5F3000
|
unkown
|
page readonly
|
||
510E000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
2DD9000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
2D8E000
|
heap
|
page read and write
|
||
5FF000
|
unkown
|
page readonly
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
2DDF000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
444D000
|
stack
|
page read and write
|
||
5FB000
|
unkown
|
page write copy
|
||
26B0000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
5D1000
|
unkown
|
page execute read
|
||
5210000
|
remote allocation
|
page read and write
|
||
2D77000
|
heap
|
page read and write
|
||
4E4D000
|
stack
|
page read and write
|
||
5FF000
|
unkown
|
page readonly
|
||
2DE4000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
5CC000
|
stack
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
54CF000
|
stack
|
page read and write
|
||
525D000
|
stack
|
page read and write
|
||
5F3000
|
unkown
|
page readonly
|
||
2D76000
|
heap
|
page read and write
|
||
5210000
|
remote allocation
|
page read and write
|
||
5FC000
|
unkown
|
page read and write
|
||
601000
|
unkown
|
page write copy
|
||
2DE2000
|
heap
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
2D53000
|
heap
|
page read and write
|
||
2DDF000
|
heap
|
page read and write
|
||
2DE2000
|
heap
|
page read and write
|
||
2DDF000
|
heap
|
page read and write
|
||
3066000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
5F3000
|
unkown
|
page readonly
|
||
303D000
|
stack
|
page read and write
|
||
5D1000
|
unkown
|
page execute read
|
||
2D64000
|
heap
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
2D8E000
|
heap
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
4E8D000
|
stack
|
page read and write
|
||
2EC5000
|
heap
|
page read and write
|
||
2A3D000
|
stack
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
56CF000
|
stack
|
page read and write
|
||
4CC000
|
stack
|
page read and write
|
||
4F8D000
|
stack
|
page read and write
|
||
2D8E000
|
heap
|
page read and write
|
||
2DE2000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
601000
|
unkown
|
page write copy
|
||
3060000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
5210000
|
remote allocation
|
page read and write
|
||
5D1000
|
unkown
|
page execute read
|
||
5D0000
|
unkown
|
page readonly
|
There are 92 hidden memdumps, click here to show them.