Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterMediumOpen
|
unknown
|
||
https://curl.se/docs/http-cookies.html
|
unknown
|
||
https://github.com/Prax-Client/Releases/raw/main/killsound.wavCreated
|
unknown
|
||
https://www.jetbrains.comhttps://www.jetbrains.comThis
|
unknown
|
||
https://api.playhive.com/v0/game/all/GetHiveStats:
|
unknown
|
||
https://github.com/Prax-Client/Releases/raw/main/banner
|
unknown
|
||
https://rsms.me/This
|
unknown
|
||
http://fontello.com
|
unknown
|
||
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterLightOpen
|
unknown
|
||
https://cdn.discordapp.com/attachments/1157861980611297410/1163279643168747570/F6_T6MXXoAAH6os.jpg?e
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
https://api.github.com/repos/Prax-Client/Releases/releases/latest
|
unknown
|
||
https://github.com/Prax-Client/Releases/raw/main/killsound.wav
|
unknown
|
||
https://github.com/rsms/inter)InterBold3.019;RSMS;Inter-BoldInter
|
unknown
|
||
https://api.playhive.com/v0/game/all/
|
unknown
|
||
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen
|
unknown
|
||
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterExtraLightOpen
|
unknown
|
||
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterThinOpen
|
unknown
|
||
https://curl.se/docs/hsts.html
|
unknown
|
||
https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter
|
unknown
|
||
https://Mozilla/5.0Failed
|
unknown
|
||
https://yiffing.zone/sounds/click.wav
|
unknown
|
||
https://github.com/JetBrains/JetBrainsMono)JetBrains
|
unknown
|
||
http://fontello.comCopyright
|
unknown
|
||
https://yiffing.zone/sounds/click.wavhttps://yiffing.zone/sounds/notify_off.wavhttps://yiffing.zone/
|
unknown
|
||
https://github.com/Prax-Client/Releases/raw/main/fardreverb.wav
|
unknown
|
||
https://github.com/rsms/inter)Inter
|
unknown
|
||
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterSemiBoldOpen
|
unknown
|
||
https://peoplehub-public.xboxlive.com/people/gt(
|
unknown
|
||
https://github.com/Prax-Client/Releases/raw/main/bannerstart_screenhud_screentextures/ui/titletextur
|
unknown
|
||
https://peoplehub-public.xboxlive.com/people/gt(Rtn:
|
unknown
|
||
https://yiffing.zone/sounds/notify_off.wav
|
unknown
|
||
https://scripts.sil.org/OFLhttps://scripts.sil.org/OFL
|
unknown
|
||
https://yiffing.zone/sounds/notify_on.wav
|
unknown
|
There are 24 hidden URLs, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFBA982B000
|
unkown
|
page read and write
|
||
7FFBA9823000
|
unkown
|
page readonly
|
||
1C442900000
|
heap
|
page read and write
|
||
7FFBA9BA8000
|
unkown
|
page execute and read and write
|
||
1B6B6680000
|
heap
|
page read and write
|
||
1B6B6570000
|
heap
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
7FFBA9464000
|
unkown
|
page read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
1C440D90000
|
direct allocation
|
page read and write
|
||
694E35B000
|
stack
|
page read and write
|
||
1C440B40000
|
heap
|
page read and write
|
||
7FFBA982B000
|
unkown
|
page read and write
|
||
1C440BD9000
|
heap
|
page read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1C440BC0000
|
heap
|
page read and write
|
||
7FFBA9B09000
|
unkown
|
page execute and read and write
|
||
1B6B4938000
|
heap
|
page read and write
|
||
1B6B48B0000
|
heap
|
page read and write
|
||
1B6B4910000
|
heap
|
page readonly
|
||
49DD5FF000
|
stack
|
page read and write
|
||
1C440BF7000
|
heap
|
page read and write
|
||
7FFBA982D000
|
unkown
|
page readonly
|
||
1B6B657F000
|
heap
|
page read and write
|
||
7FFBA982E000
|
unkown
|
page execute and read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1C440C00000
|
heap
|
page read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
7FFBA9BA8000
|
unkown
|
page execute and read and write
|
||
7FFBA9808000
|
unkown
|
page readonly
|
||
49DD2FB000
|
stack
|
page read and write
|
||
1C440E10000
|
heap
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
1C440BFC000
|
heap
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
1B6B4953000
|
heap
|
page read and write
|
||
694E6FE000
|
stack
|
page read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1B6B6570000
|
direct allocation
|
page read and write
|
||
1C440DF0000
|
heap
|
page read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
7FFBA9B79000
|
unkown
|
page execute and read and write
|
||
7FFBA9808000
|
unkown
|
page readonly
|
||
7FFBA982E000
|
unkown
|
page execute and read and write
|
||
1C442900000
|
direct allocation
|
page read and write
|
||
1B6B4930000
|
heap
|
page read and write
|
||
1C440DF5000
|
heap
|
page read and write
|
||
1C440B80000
|
heap
|
page read and write
|
||
1B6B4963000
|
heap
|
page read and write
|
||
1B6B495E000
|
heap
|
page read and write
|
||
1C440E15000
|
heap
|
page read and write
|
||
1B6B4C10000
|
heap
|
page read and write
|
||
1C44290F000
|
heap
|
page read and write
|
||
7FFBA93E4000
|
unkown
|
page readonly
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
7FFBA982D000
|
unkown
|
page readonly
|
||
1C440BCD000
|
heap
|
page read and write
|
||
7FFBA93E4000
|
unkown
|
page readonly
|
||
7FFBA9120000
|
unkown
|
page readonly
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
1C440C67000
|
heap
|
page read and write
|
||
1B6B49BD000
|
heap
|
page read and write
|
||
7FFBA9121000
|
unkown
|
page execute read
|
||
1B6B47B0000
|
heap
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
7FFBA9121000
|
unkown
|
page execute read
|
||
1C440BFE000
|
heap
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
1B6B6570000
|
direct allocation
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
49DD6FE000
|
stack
|
page read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1B6B49CA000
|
heap
|
page read and write
|
||
1C440D90000
|
direct allocation
|
page read and write
|
||
7FFBA9E3C000
|
unkown
|
page execute read
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
7FFBA9464000
|
unkown
|
page read and write
|
||
7FFBA9B09000
|
unkown
|
page execute and read and write
|
||
7FFBA9120000
|
unkown
|
page readonly
|
||
7FFBA9B79000
|
unkown
|
page execute and read and write
|
||
1C442900000
|
direct allocation
|
page read and write
|
||
7FFBA9E3C000
|
unkown
|
page execute read
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1B6B4BC0000
|
direct allocation
|
page read and write
|
||
1B6B4C15000
|
heap
|
page read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
1C440BB0000
|
direct allocation
|
page read and write
|
||
1B6B4890000
|
heap
|
page read and write
|
||
7FFBA9823000
|
unkown
|
page readonly
|
||
1C440B50000
|
heap
|
page read and write
|
||
1B6B6570000
|
direct allocation
|
page read and write
|
||
1B6B4920000
|
direct allocation
|
page read and write
|
||
1B6B6685000
|
heap
|
page read and write
|
||
1C440BC9000
|
heap
|
page read and write
|
There are 92 hidden memdumps, click here to show them.