Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
windxcmd.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\windxcmd.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\wind.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\windxcmd.exe
|
"C:\Users\user\Desktop\windxcmd.exe"
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Users\user\AppData\Roaming\wind.exe
|
"C:\Users\user\AppData\Roaming\wind.exe"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
45.141.26.134
|
|||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
https://discord.gg/arzenshop%click
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
https://github.com/stark11231/spoof/raw/main/WindXTen.exeAC:
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 20 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.141.26.134
|
unknown
|
Netherlands
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
302000
|
unkown
|
page readonly
|
||
3541000
|
trusted library allocation
|
page read and write
|
||
27A1000
|
trusted library allocation
|
page read and write
|
||
1D90C000
|
stack
|
page read and write
|
||
1C1AE000
|
stack
|
page read and write
|
||
1CDA79C3000
|
heap
|
page read and write
|
||
1CD8D330000
|
heap
|
page read and write
|
||
1CDA7FA0000
|
trusted library allocation
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
7FFD9B504000
|
trusted library allocation
|
page read and write
|
||
29C6E880000
|
heap
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
13541000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5CC000
|
trusted library allocation
|
page execute and read and write
|
||
1C1B0000
|
heap
|
page read and write
|
||
1CD8CFB8000
|
heap
|
page read and write
|
||
198C3FE000
|
stack
|
page read and write
|
||
7FFD9B53B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B52D000
|
trusted library allocation
|
page execute and read and write
|
||
80B000
|
heap
|
page read and write
|
||
AC8C95E000
|
unkown
|
page read and write
|
||
AC8C8D9000
|
stack
|
page read and write
|
||
1CD8CFC3000
|
heap
|
page read and write
|
||
1CD8D0A0000
|
heap
|
page read and write
|
||
1C891000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
1C5AE000
|
stack
|
page read and write
|
||
198D3FC000
|
stack
|
page read and write
|
||
13A4000
|
stack
|
page read and write
|
||
1CD8D230000
|
trusted library allocation
|
page read and write
|
||
7FFD9B56C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B600000
|
trusted library allocation
|
page execute and read and write
|
||
1C0AD000
|
stack
|
page read and write
|
||
1CDA86F5000
|
trusted library allocation
|
page read and write
|
||
1CDA7509000
|
heap
|
page read and write
|
||
1CD8D07D000
|
heap
|
page read and write
|
||
1C902000
|
heap
|
page read and write
|
||
AC8C9DF000
|
stack
|
page read and write
|
||
1D0D5000
|
stack
|
page read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5C6000
|
trusted library allocation
|
page execute and read and write
|
||
1CDA76C0000
|
heap
|
page read and write
|
||
1970000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
1CDA7460000
|
heap
|
page execute and read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
1C3AF000
|
stack
|
page read and write
|
||
1CDA74B1000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
1CD8CE90000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
1CD8D1A5000
|
heap
|
page read and write
|
||
1CDA74A0000
|
heap
|
page read and write
|
||
1CDA76E1000
|
heap
|
page read and write
|
||
6F1000
|
stack
|
page read and write
|
||
C02000
|
heap
|
page read and write
|
||
1CD8D0C0000
|
heap
|
page read and write
|
||
1CDA8701000
|
trusted library allocation
|
page read and write
|
||
1D80F000
|
stack
|
page read and write
|
||
1CD8CF86000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
1CD8D2D0000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
7FFD9B502000
|
trusted library allocation
|
page read and write
|
||
1CD8ECA0000
|
heap
|
page read and write
|
||
127AE000
|
trusted library allocation
|
page read and write
|
||
82D000
|
heap
|
page read and write
|
||
1995000
|
heap
|
page read and write
|
||
1CDA9770000
|
trusted library allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
1CD8CFF2000
|
heap
|
page read and write
|
||
1CDA8744000
|
trusted library allocation
|
page read and write
|
||
1AC1D000
|
stack
|
page read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page read and write
|
||
1CDA8706000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E3000
|
trusted library allocation
|
page execute and read and write
|
||
893000
|
heap
|
page read and write
|
||
7FFD9B5D6000
|
trusted library allocation
|
page execute and read and write
|
||
1CDA871F000
|
trusted library allocation
|
page read and write
|
||
1CD8D06F000
|
heap
|
page read and write
|
||
7FFD9B4F3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
1CDA8715000
|
trusted library allocation
|
page read and write
|
||
1990000
|
heap
|
page read and write
|
||
1CD8D240000
|
trusted library section
|
page read and write
|
||
1AFF0000
|
heap
|
page read and write
|
||
1C804000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
1CD8D270000
|
trusted library allocation
|
page read and write
|
||
1C102000
|
heap
|
page execute and read and write
|
||
1CDA77EF000
|
heap
|
page read and write
|
||
1C88E000
|
heap
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
1CD8ECB1000
|
trusted library allocation
|
page read and write
|
||
1CD9ECB1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B514000
|
trusted library allocation
|
page read and write
|
||
7FF4542D0000
|
trusted library allocation
|
page execute and read and write
|
||
1DC0C000
|
stack
|
page read and write
|
||
171B000
|
heap
|
page read and write
|
||
7FFD9B5AC000
|
trusted library allocation
|
page execute and read and write
|
||
1264000
|
unkown
|
page readonly
|
||
1CD8CFAE000
|
heap
|
page read and write
|
||
13543000
|
trusted library allocation
|
page read and write
|
||
7FFD9B59C000
|
trusted library allocation
|
page execute and read and write
|
||
1CDA77D0000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
1D70C000
|
stack
|
page read and write
|
||
7FFD9B4FD000
|
trusted library allocation
|
page execute and read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
1C84D000
|
heap
|
page read and write
|
||
7FFD9B51D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B590000
|
trusted library allocation
|
page read and write
|
||
1BF00000
|
heap
|
page execute and read and write
|
||
7FFD9B596000
|
trusted library allocation
|
page read and write
|
||
1CD8CF80000
|
heap
|
page read and write
|
||
1CD8D075000
|
heap
|
page read and write
|
||
29C6E7C0000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
1CDA86FF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
127A1000
|
trusted library allocation
|
page read and write
|
||
1A9E000
|
stack
|
page read and write
|
||
7FFD9B690000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
16FC000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
1C8BF000
|
heap
|
page read and write
|
||
1C7AE000
|
stack
|
page read and write
|
||
1CD8D080000
|
heap
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
127B1000
|
trusted library allocation
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
7FFD9B50D000
|
trusted library allocation
|
page execute and read and write
|
||
175E000
|
heap
|
page read and write
|
||
7FFD9B54C000
|
trusted library allocation
|
page execute and read and write
|
||
1C6AB000
|
stack
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
1CD8ED68000
|
trusted library allocation
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
1CD8D100000
|
trusted library allocation
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page read and write
|
||
1CDA8717000
|
trusted library allocation
|
page read and write
|
||
7FFD9B50D000
|
trusted library allocation
|
page execute and read and write
|
||
1920000
|
heap
|
page read and write
|
||
1D2D6000
|
stack
|
page read and write
|
||
279D000
|
stack
|
page read and write
|
||
7FFD9B5F6000
|
trusted library allocation
|
page execute and read and write
|
||
1A7D0000
|
trusted library allocation
|
page read and write
|
||
198CFFD000
|
stack
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
7FFD9B534000
|
trusted library allocation
|
page read and write
|
||
1C4AE000
|
stack
|
page read and write
|
||
851000
|
heap
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
7FFD9B50B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6A0000
|
trusted library allocation
|
page execute and read and write
|
||
1D60F000
|
stack
|
page read and write
|
||
1C4FE000
|
stack
|
page read and write
|
||
7FFD9B4FD000
|
trusted library allocation
|
page execute and read and write
|
||
1C897000
|
heap
|
page read and write
|
||
1CDA76D0000
|
heap
|
page read and write
|
||
1C002000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
1725000
|
heap
|
page read and write
|
||
29C6E810000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
1CD8D1A0000
|
heap
|
page read and write
|
||
1BACC000
|
stack
|
page read and write
|
||
1DA0A000
|
stack
|
page read and write
|
||
1CD8D033000
|
heap
|
page read and write
|
||
29C6E889000
|
heap
|
page read and write
|
||
1C5FF000
|
stack
|
page read and write
|
||
7FFD9B513000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
29C6E6E0000
|
heap
|
page read and write
|
||
1CD8CFC1000
|
heap
|
page read and write
|
||
7FFD9B53C000
|
trusted library allocation
|
page execute and read and write
|
||
1C8B7000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
7FFD9B5C6000
|
trusted library allocation
|
page read and write
|
||
1CD8D2C0000
|
trusted library section
|
page readonly
|
||
1CD8D180000
|
heap
|
page read and write
|
||
1732000
|
heap
|
page read and write
|
||
F02000
|
unkown
|
page readonly
|
||
7FFD9B53D000
|
trusted library allocation
|
page execute and read and write
|
||
198CBFE000
|
stack
|
page read and write
|
||
3410000
|
heap
|
page execute and read and write
|
||
7FFD9B4F2000
|
trusted library allocation
|
page read and write
|
||
1CD8D2A0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
1CD8D130000
|
trusted library allocation
|
page read and write
|
||
1CD8CF8C000
|
heap
|
page read and write
|
||
7FFD9B690000
|
trusted library allocation
|
page read and write
|
||
29C6E7E0000
|
heap
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
29C6E815000
|
heap
|
page read and write
|
||
1B9E000
|
stack
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
1CD8CFED000
|
heap
|
page read and write
|
||
1C1C5000
|
heap
|
page read and write
|
||
1CD8CFEF000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
127A8000
|
trusted library allocation
|
page read and write
|
||
1CDA871D000
|
trusted library allocation
|
page read and write
|
||
1C8CB000
|
heap
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page read and write
|
||
7FFD9B522000
|
trusted library allocation
|
page read and write
|
||
1CD9ECB7000
|
trusted library allocation
|
page read and write
|
||
1C7FE000
|
stack
|
page read and write
|
||
7FFD9B4E4000
|
trusted library allocation
|
page read and write
|
||
B33000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page execute and read and write
|
||
1CDA8722000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
1CDA9792000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page execute and read and write
|
||
1CDA76DC000
|
heap
|
page read and write
|
||
1C880000
|
heap
|
page read and write
|
||
1CDA75A0000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page execute and read and write
|
||
1815000
|
heap
|
page read and write
|
||
1D1DA000
|
stack
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
1C820000
|
heap
|
page read and write
|
||
1C800000
|
heap
|
page read and write
|
||
191F000
|
stack
|
page read and write
|
||
7FFD9B5D0000
|
trusted library allocation
|
page execute and read and write
|
||
29C6E88E000
|
heap
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page execute and read and write
|
||
1C88A000
|
heap
|
page read and write
|
||
7FFD9B4F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B504000
|
trusted library allocation
|
page read and write
|
||
1CDA7490000
|
heap
|
page read and write
|
||
1CD8CAB2000
|
unkown
|
page readonly
|
||
1CD8D290000
|
heap
|
page execute and read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
1CDA8729000
|
trusted library allocation
|
page read and write
|
||
1CD8D120000
|
trusted library allocation
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
1C3FE000
|
stack
|
page read and write
|
||
1734000
|
heap
|
page read and write
|
||
1CD8D335000
|
heap
|
page read and write
|
||
1B010000
|
heap
|
page read and write
|
||
1CDA8724000
|
trusted library allocation
|
page read and write
|
||
1CDA7493000
|
heap
|
page read and write
|
||
7FFD9B4ED000
|
trusted library allocation
|
page execute and read and write
|
||
1CD8CAB0000
|
unkown
|
page readonly
|
||
1C2FA000
|
stack
|
page read and write
|
||
1CDA76C8000
|
heap
|
page read and write
|
||
8FF000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
1CD9ECC1000
|
trusted library allocation
|
page read and write
|
||
16F6000
|
heap
|
page read and write
|
||
17B6000
|
heap
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
1CDA76EB000
|
heap
|
page read and write
|
||
7FFD9B630000
|
trusted library allocation
|
page execute and read and write
|
||
1C844000
|
heap
|
page read and write
|
||
7FFD9B610000
|
trusted library allocation
|
page execute and read and write
|
||
16D0000
|
heap
|
page read and write
|
||
13548000
|
trusted library allocation
|
page read and write
|
||
198BFF4000
|
stack
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page read and write
|
||
1CD8D133000
|
trusted library allocation
|
page read and write
|
||
1CDA8713000
|
trusted library allocation
|
page read and write
|
||
1CDA74E9000
|
heap
|
page read and write
|
||
1C8B5000
|
heap
|
page read and write
|
There are 268 hidden memdumps, click here to show them.