IOC Report
Launcher.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Launcher.exe
"C:\Users\user\Desktop\Launcher.exe"
malicious
C:\Users\user\Desktop\Launcher.exe
"C:\Users\user\Desktop\Launcher.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://farewellnzu.icu/api
172.67.198.61
malicious
farewellnzu.icu
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://farewellnzu.icu/d
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://farewellnzu.icu/pi
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://farewellnzu.icu/icjJY%
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://farewellnzu.icu:443/api
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://farewellnzu.icu/R
unknown
https://farewellnzu.icu/apibTr
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://farewellnzu.icu/apiu
unknown
https://farewellnzu.icu:443/apical
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://farewellnzu.icu/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://farewellnzu.icu/api(
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
farewellnzu.icu
172.67.198.61

IPs

IP
Domain
Country
Malicious
172.67.198.61
farewellnzu.icu
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2AF2000
heap
page read and write
malicious
34F3000
heap
page read and write
5B32000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
3503000
heap
page read and write
5B36000
trusted library allocation
page read and write
266000
unkown
page write copy
3478000
heap
page read and write
34AB000
heap
page read and write
3503000
heap
page read and write
5AB7000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
5D61000
heap
page read and write
3503000
heap
page read and write
5A78000
trusted library allocation
page read and write
5A6B000
trusted library allocation
page read and write
5E3C000
trusted library allocation
page read and write
5B32000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
457000
remote allocation
page execute and read and write
5AF9000
trusted library allocation
page read and write
5EAE000
stack
page read and write
5A65000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
2DAD000
stack
page read and write
231000
unkown
page execute read
5B12000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
5AC8000
trusted library allocation
page read and write
3500000
heap
page read and write
5A6B000
trusted library allocation
page read and write
3513000
heap
page read and write
5A8C000
trusted library allocation
page read and write
5AF9000
trusted library allocation
page read and write
5B1E000
trusted library allocation
page read and write
26DC000
stack
page read and write
5B4A000
trusted library allocation
page read and write
5B32000
trusted library allocation
page read and write
5B14000
trusted library allocation
page read and write
5F0E000
trusted library allocation
page read and write
32AE000
stack
page read and write
5B17000
trusted library allocation
page read and write
5A6B000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
2A40000
heap
page read and write
5B14000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
5A6A000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
336D000
stack
page read and write
264000
unkown
page readonly
5A69000
trusted library allocation
page read and write
5E71000
trusted library allocation
page read and write
5B32000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
260000
unkown
page execute and read and write
5A70000
trusted library allocation
page read and write
3513000
heap
page read and write
32C7000
heap
page read and write
5E73000
trusted library allocation
page read and write
5B33000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
350F000
heap
page read and write
34BB000
heap
page read and write
258000
unkown
page readonly
5A81000
trusted library allocation
page read and write
258000
unkown
page readonly
340E000
stack
page read and write
532C000
stack
page read and write
5A8C000
trusted library allocation
page read and write
34EF000
heap
page read and write
258000
unkown
page readonly
350D000
heap
page read and write
5B19000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
230000
unkown
page readonly
350E000
heap
page read and write
5A7E000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
27DC000
stack
page read and write
5A7B000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
266000
unkown
page write copy
5B32000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
595E000
stack
page read and write
5B14000
trusted library allocation
page read and write
5A69000
trusted library allocation
page read and write
5A9D000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
5AAC000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
3473000
heap
page read and write
264000
unkown
page readonly
5A70000
trusted library allocation
page read and write
231000
unkown
page execute read
3516000
heap
page read and write
33C6000
heap
page read and write
5AFA000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
3420000
remote allocation
page read and write
5B68000
trusted library allocation
page read and write
32C0000
heap
page read and write
34FE000
heap
page read and write
552E000
stack
page read and write
351C000
heap
page read and write
5A61000
trusted library allocation
page read and write
3515000
heap
page read and write
3515000
heap
page read and write
5A61000
trusted library allocation
page read and write
2E10000
heap
page read and write
5B19000
trusted library allocation
page read and write
5B32000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
264000
unkown
page readonly
5A8C000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
350F000
heap
page read and write
5A96000
trusted library allocation
page read and write
260000
unkown
page write copy
5B12000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
3521000
heap
page read and write
5A6B000
trusted library allocation
page read and write
3450000
heap
page read and write
3420000
remote allocation
page read and write
5B99000
trusted library allocation
page read and write
5A5E000
stack
page read and write
3503000
heap
page read and write
5B79000
trusted library allocation
page read and write
542D000
stack
page read and write
5B99000
trusted library allocation
page read and write
5B32000
trusted library allocation
page read and write
5AF9000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
5B14000
trusted library allocation
page read and write
5B68000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
5A8C000
trusted library allocation
page read and write
57E0000
heap
page read and write
5B24000
trusted library allocation
page read and write
5B27000
trusted library allocation
page read and write
350B000
heap
page read and write
5A62000
trusted library allocation
page read and write
3511000
heap
page read and write
5AB2000
trusted library allocation
page read and write
332E000
stack
page read and write
5AAC000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
576F000
stack
page read and write
5AF8000
trusted library allocation
page read and write
5B91000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5D65000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
349F000
heap
page read and write
5A76000
trusted library allocation
page read and write
30FB000
stack
page read and write
5B07000
trusted library allocation
page read and write
5A6C000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
5A72000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
4EEE000
stack
page read and write
5B11000
trusted library allocation
page read and write
5A69000
trusted library allocation
page read and write
5A6B000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
348A000
heap
page read and write
5A68000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
3503000
heap
page read and write
5B00000
trusted library allocation
page read and write
5AF9000
trusted library allocation
page read and write
32C5000
heap
page read and write
2A50000
heap
page read and write
5A7D000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
562F000
stack
page read and write
260000
unkown
page write copy
350D000
heap
page read and write
5B05000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
33AE000
stack
page read and write
5B03000
trusted library allocation
page read and write
34AB000
heap
page read and write
3120000
heap
page read and write
5B1A000
trusted library allocation
page read and write
231000
unkown
page execute read
5AF9000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
688D000
trusted library allocation
page read and write
351C000
heap
page read and write
3513000
heap
page read and write
5A92000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
4DEE000
stack
page read and write
5A72000
trusted library allocation
page read and write
3500000
heap
page read and write
5B32000
trusted library allocation
page read and write
3500000
heap
page read and write
5B1A000
trusted library allocation
page read and write
5D61000
heap
page read and write
5A7B000
trusted library allocation
page read and write
5E0C000
trusted library allocation
page read and write
5A6A000
trusted library allocation
page read and write
345A000
heap
page read and write
5B0D000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
3505000
heap
page read and write
5B17000
trusted library allocation
page read and write
566E000
stack
page read and write
3473000
heap
page read and write
5B22000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
5AAC000
trusted library allocation
page read and write
5B79000
trusted library allocation
page read and write
264000
unkown
page readonly
5A92000
trusted library allocation
page read and write
261000
unkown
page read and write
33C0000
heap
page read and write
5B22000
trusted library allocation
page read and write
258000
unkown
page readonly
5AFF000
trusted library allocation
page read and write
230000
unkown
page readonly
2DEE000
stack
page read and write
5B05000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
5B2C000
trusted library allocation
page read and write
34F3000
heap
page read and write
5A9C000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
34F3000
heap
page read and write
5A7A000
trusted library allocation
page read and write
350F000
heap
page read and write
5AAC000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
46BF000
stack
page read and write
5D60000
heap
page read and write
5B2A000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
2AEB000
heap
page read and write
34F3000
heap
page read and write
5A76000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
5B14000
trusted library allocation
page read and write
34BC000
heap
page read and write
3515000
heap
page read and write
5B12000
trusted library allocation
page read and write
58EF000
stack
page read and write
5B16000
trusted library allocation
page read and write
231000
unkown
page execute read
3512000
heap
page read and write
5B14000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
3521000
heap
page read and write
5B14000
trusted library allocation
page read and write
266000
unkown
page write copy
5AAA000
trusted library allocation
page read and write
5B68000
trusted library allocation
page read and write
3513000
heap
page read and write
2ABD000
stack
page read and write
5AA4000
trusted library allocation
page read and write
2DCB000
stack
page read and write
5A71000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
348A000
heap
page read and write
5A62000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
266000
unkown
page write copy
3420000
remote allocation
page read and write
5AB8000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
5A6B000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
34AA000
heap
page read and write
5ACA000
trusted library allocation
page read and write
5B79000
trusted library allocation
page read and write
5A8C000
trusted library allocation
page read and write
5B1E000
trusted library allocation
page read and write
610F000
stack
page read and write
2A30000
heap
page read and write
3513000
heap
page read and write
5AFD000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
3500000
heap
page read and write
5AA2000
trusted library allocation
page read and write
3513000
heap
page read and write
34F3000
heap
page read and write
5A70000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
3508000
heap
page read and write
5D9C000
trusted library allocation
page read and write
57DE000
stack
page read and write
350F000
heap
page read and write
3521000
heap
page read and write
5B11000
trusted library allocation
page read and write
5B14000
trusted library allocation
page read and write
3200000
heap
page read and write
5AF9000
trusted library allocation
page read and write
3500000
heap
page read and write
5AB7000
trusted library allocation
page read and write
32D0000
heap
page read and write
230000
unkown
page readonly
5B60000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
326E000
stack
page read and write
5A6A000
trusted library allocation
page read and write
3503000
heap
page read and write
5B7E000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
3503000
heap
page read and write
5AA9000
trusted library allocation
page read and write
5AAA000
trusted library allocation
page read and write
5B29000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
3514000
heap
page read and write
5A73000
trusted library allocation
page read and write
230000
unkown
page readonly
5E34000
trusted library allocation
page read and write
5B32000
trusted library allocation
page read and write
351C000
heap
page read and write
3515000
heap
page read and write
5A73000
trusted library allocation
page read and write
349F000
heap
page read and write
6376000
trusted library allocation
page read and write
260000
unkown
page write copy
5D6B000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
5A81000
trusted library allocation
page read and write
2AE0000
heap
page read and write
34AA000
heap
page read and write
5A9A000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
34BB000
heap
page read and write
5B30000
trusted library allocation
page read and write
5AAC000
trusted library allocation
page read and write
There are 368 hidden memdumps, click here to show them.