IOC Report
6xQ8CMUaES.exe

loading gif

Files

File Path
Type
Category
Malicious
6xQ8CMUaES.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\lqlvnipszdia.sys
Unknown
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6xQ8CMUaES.exe
"C:\Users\user\Desktop\6xQ8CMUaES.exe"
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://crl.cloudflare.com/origin_ca.crl0
unknown
http://ocsp.cloudflare.com/origin_ca
unknown
http://crl.cloudflare.com/origin_ca.crlCd
unknown
http://ocsp.cloudflare.com/origin_ca0
unknown
http://crl.cloudflare.com/origin_ca.crl
unknown
https://xmrig.com/docs/algorithms
unknown

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
xmr-eu1.nanopool.org
51.89.23.91

IPs

IP
Domain
Country
Malicious
51.89.23.91
xmr-eu1.nanopool.org
France

Memdumps

Base Address
Regiontype
Protect
Malicious
235E8A2F000
heap
page read and write
malicious
235E8A6A000
heap
page read and write
malicious
235E8A69000
heap
page read and write
malicious
140001000
unkown
page execute and read and write
malicious
235E8A7E000
heap
page read and write
malicious
235E8AD1000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8940000
heap
page read and write
225C3900000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
225C3720000
heap
page read and write
140834000
unkown
page read and write
23CDEB58000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
23CDEB05000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8A92000
heap
page read and write
235EA902000
heap
page read and write
57FE32F000
stack
page read and write
235E8AE3000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
F7EF8ED000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA7F8000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
21EDDD10000
unkown
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8AEC000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8B02000
heap
page read and write
7FF713140000
unkown
page readonly
86DA3AF000
stack
page read and write
235E8AEC000
heap
page read and write
235E8AE6000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8AEC000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA7F8000
heap
page read and write
235E8A9A000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
21EDDB35000
heap
page read and write
235EA7B4000
heap
page read and write
88D2EFE000
stack
page read and write
235E8AE3000
heap
page read and write
235E8AD1000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
256664D0000
heap
page read and write
88D34FE000
stack
page read and write
235EAA00000
heap
page read and write
225C3820000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
86DA32D000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
140777000
unkown
page execute and read and write
7FF7133B7000
unkown
page readonly
235EA4D0000
trusted library allocation
page read and write
235E8AEC000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
23F24340000
heap
page read and write
235EA94F000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
1404EC000
unkown
page execute and read and write
235EA4D0000
trusted library allocation
page read and write
7FF713146000
unkown
page readonly
235EA4D0000
trusted library allocation
page read and write
235E8AD1000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8AFD000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8910000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA802000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8ACD000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
235E8AE7000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
7FF713148000
unkown
page write copy
88D32FF000
stack
page read and write
235E8AB5000
heap
page read and write
235E89A0000
trusted library allocation
page read and write
235EA7C5000
heap
page read and write
235E8930000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8AEC000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4C0000
direct allocation
page execute and read and write
235EA4D0000
trusted library allocation
page read and write
235F0400000
heap
page read and write
7FF7133B7000
unkown
page readonly
235E8960000
direct allocation
page execute read
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
7DEA2FF000
stack
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA700000
heap
page read and write
235EA7EA000
heap
page read and write
235E8B02000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EBE00000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
23CDEB00000
heap
page read and write
23F24290000
heap
page read and write
23F24348000
heap
page read and write
235EA7EB000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
225C3A00000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA902000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
14082C000
unkown
page execute and read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA94B000
heap
page read and write
235E8A97000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235ED200000
heap
page read and write
235EA470000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8A92000
heap
page read and write
235E8A5C000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E89A0000
heap
page readonly
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA7EB000
heap
page read and write
235EFA00000
heap
page read and write
235EB400000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
25666675000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8980000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA943000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
57FE2AD000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
23CDEB50000
heap
page read and write
235EA7EC000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
140000000
unkown
page read and write
235EA784000
heap
page read and write
235EA902000
heap
page read and write
7FF713141000
unkown
page execute read
235EA4D0000
trusted library allocation
page read and write
235EA743000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8AC6000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8AE3000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA902000
heap
page read and write
235E8AE3000
heap
page read and write
235EA7BC000
heap
page read and write
235EA928000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA79C000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA7AC000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
7FF713148000
unkown
page read and write
7FF713140000
unkown
page readonly
235EA4B0000
trusted library allocation
page read and write
235E89A0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
225C3728000
heap
page read and write
235EA470000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
88D33FE000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
1404C8000
unkown
page execute and read and write
235EA4B0000
trusted library allocation
page read and write
235E8A8E000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
57FE3AF000
stack
page read and write
235EA902000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8A92000
heap
page read and write
7DEA27F000
stack
page read and write
25666670000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
256666A0000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EDC00000
heap
page read and write
235EA902000
heap
page read and write
235EA4B0000
direct allocation
page execute and read and write
235EA4D0000
trusted library allocation
page read and write
235EE600000
heap
page read and write
21EDDB49000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA902000
heap
page read and write
235EA94B000
heap
page read and write
235E8AE3000
heap
page read and write
235E8AD1000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8A97000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
7DE9FBD000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
23F24530000
heap
page read and write
235E8A8E000
heap
page read and write
88D2BDB000
stack
page read and write
235EA4B0000
trusted library allocation
page read and write
235E8AAB000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
88D36FE000
stack
page read and write
21EDDB30000
heap
page read and write
235EA470000
direct allocation
page execute and read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8B13000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
256666A8000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
23CDEA90000
heap
page read and write
23CDEAB0000
heap
page read and write
23F24270000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
88D31FB000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8A00000
heap
page read and write
235EA7EA000
heap
page read and write
235EA94B000
heap
page read and write
225C3920000
heap
page read and write
235EA902000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
225C3A05000
heap
page read and write
235EA950000
heap
page read and write
88D30FD000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA602000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EF000000
heap
page read and write
235EA902000
heap
page read and write
7FF713146000
unkown
page readonly
235EA4B0000
trusted library allocation
page read and write
235EC800000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
23F24190000
heap
page read and write
235EA7A4000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8AEC000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA900000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
21EDDB40000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
F7EF9FF000
stack
page read and write
88D38FF000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
6ED3B9F000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
88D2FFE000
stack
page read and write
88D35FF000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
1407F8000
unkown
page execute and read and write
6ED3E7F000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
21EDDAE0000
heap
page read and write
21EDDB00000
unkown
page read and write
235EA4D0000
trusted library allocation
page read and write
23CDEA80000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
256665D0000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235E8A96000
heap
page read and write
21EDDAD0000
heap
page read and write
235EA4B0000
trusted library allocation
page read and write
23F24535000
heap
page read and write
7FF713141000
unkown
page execute read
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4D0000
trusted library allocation
page read and write
88D37FE000
stack
page read and write
6ED3B1D000
stack
page read and write
F7EF8FD000
stack
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA4B0000
trusted library allocation
page read and write
235E8AFF000
heap
page read and write
256665B0000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
235EA7F8000
heap
page read and write
235E8A13000
heap
page read and write
235E89C0000
heap
page read and write
235EA7EA000
heap
page read and write
235EA4D0000
trusted library allocation
page read and write
There are 369 hidden memdumps, click here to show them.