IOC Report
From S03E06.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\From S03E06.exe
"C:\Users\user\Desktop\From S03E06.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager

URLs

Name
IP
Malicious
https://gcc.gnu.org/bugs/):
unknown
https://xmrig.com/benchmark/%s
unknown
https://xmrig.com/wizard
unknown
https://xmrig.com/wizard%s
unknown
https://xmrig.com/docs/algorithms
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF69ECF1000
unkown
page readonly
malicious
201F90B0000
unkown
page read and write
201F92AA000
unkown
page read and write
205630F3000
heap
page read and write
2D3A962B000
heap
page read and write
2056CE65000
heap
page read and write
2056312C000
heap
page read and write
2D3A9600000
heap
page read and write
2056313B000
heap
page read and write
2056311E000
heap
page read and write
2056314B000
heap
page read and write
205631F5000
heap
page read and write
DDC09FE000
unkown
page readonly
2056C680000
heap
page read and write
2057176E000
heap
page read and write
2056C8A9000
heap
page read and write
201F7290000
unkown
page read and write
20563135000
heap
page read and write
2056311E000
heap
page read and write
20562E70000
heap
page read and write
2D3A95C0000
heap
page read and write
2056311E000
heap
page read and write
E6E87FE000
unkown
page readonly
205630E6000
heap
page read and write
20563103000
heap
page read and write
20563103000
heap
page read and write
2056311E000
heap
page read and write
205630F3000
heap
page read and write
DDC04FD000
stack
page read and write
2056311B000
heap
page read and write
2056310B000
heap
page read and write
2056311E000
heap
page read and write
2056311B000
heap
page read and write
20563113000
heap
page read and write
E6E897C000
unkown
page read and write
20563153000
heap
page read and write
205630E1000
heap
page read and write
2056C4D1000
direct allocation
page execute and read and write
2056311E000
heap
page read and write
205630C4000
heap
page read and write
2056310B000
heap
page read and write
2056311C000
heap
page read and write
7FF69F1E8000
unkown
page readonly
201F72B5000
heap
page read and write
20564C4F000
heap
page read and write
2056311E000
heap
page read and write
205630FB000
heap
page read and write
2056311C000
heap
page read and write
2056310B000
heap
page read and write
20562E98000
heap
page read and write
2056311C000
heap
page read and write
20563113000
heap
page read and write
2056C4A0000
direct allocation
page execute and read and write
20563149000
heap
page read and write
201F928A000
unkown
page read and write
E6E877E000
unkown
page read and write
E6E887B000
unkown
page read and write
20563060000
heap
page read and write
20563103000
heap
page read and write
205630FB000
heap
page read and write
2914FFF000
stack
page read and write
29159FD000
stack
page read and write
2056D065000
heap
page read and write
2056311B000
heap
page read and write
2056E56E000
heap
page read and write
20563163000
heap
page read and write
20562E90000
heap
page read and write
20563113000
heap
page read and write
201FBA00000
unkown
page read and write
7FF69F1E1000
unkown
page write copy
205630F3000
heap
page read and write
205630FB000
heap
page read and write
7FF69ECE1000
unkown
page write copy
20563113000
heap
page read and write
205630A6000
heap
page read and write
DDC012B000
stack
page read and write
DDC06FD000
stack
page read and write
2056311C000
heap
page read and write
201F8CA0000
unkown
page readonly
2056314B000
heap
page read and write
201F8C90000
unkown
page read and write
20563103000
heap
page read and write
201F939B000
unkown
page read and write
2056310B000
heap
page read and write
2056D265000
heap
page read and write
2056C488000
direct allocation
page execute and read and write
2056310B000
heap
page read and write
7FF69E6B1000
unkown
page execute read
20563113000
heap
page read and write
20563113000
heap
page read and write
2056310B000
heap
page read and write
20563103000
heap
page read and write
2056310B000
heap
page read and write
20563113000
heap
page read and write
20563132000
heap
page read and write
205630FB000
heap
page read and write
201F7190000
heap
page read and write
2056310B000
heap
page read and write
2056310B000
heap
page read and write
7FF69E6B0000
unkown
page readonly
2056310B000
heap
page read and write
20563103000
heap
page read and write
205630F3000
heap
page read and write
205631E0000
direct allocation
page execute and read and write
20563103000
heap
page read and write
205630E4000
heap
page read and write
205630E1000
heap
page read and write
20563133000
heap
page read and write
20563113000
heap
page read and write
20563113000
heap
page read and write
2056311E000
heap
page read and write
2056C464000
heap
page read and write
29153FE000
stack
page read and write
20564C30000
heap
page read and write
20563139000
heap
page read and write
20563190000
direct allocation
page execute read
2056310B000
heap
page read and write
2056C4C1000
direct allocation
page execute and read and write
2056310B000
heap
page read and write
2914DED000
stack
page read and write
2D3A963A000
heap
page read and write
2056311B000
heap
page read and write
20563149000
heap
page read and write
205630F3000
heap
page read and write
20563139000
heap
page read and write
2056310B000
heap
page read and write
20563103000
heap
page read and write
2056311E000
heap
page read and write
20564B50000
direct allocation
page execute and read and write
E6E830E000
stack
page read and write
20563113000
heap
page read and write
2056D47C000
heap
page read and write
201F8D63000
heap
page read and write
20563103000
heap
page read and write
201F8C87000
unkown
page read and write
E6E841B000
unkown
page read and write
20563135000
heap
page read and write
201F96B0000
unkown
page readonly
29151FF000
stack
page read and write
205631F0000
heap
page read and write
2056311B000
heap
page read and write
205630E1000
heap
page read and write
20563113000
heap
page read and write
2056311E000
heap
page read and write
2056313B000
heap
page read and write
205630B1000
heap
page read and write
2056EF6E000
heap
page read and write
201F8D60000
heap
page read and write
2056C4B0000
direct allocation
page execute and read and write
201FB200000
unkown
page read and write
201F9312000
unkown
page read and write
201F9174000
unkown
page read and write
20563135000
heap
page read and write
2056310B000
heap
page read and write
201F72F9000
heap
page read and write
DDC07FE000
unkown
page readonly
2056314B000
heap
page read and write
2057216E000
heap
page read and write
20563113000
heap
page read and write
2056C48F000
direct allocation
page execute and read and write
29157FE000
stack
page read and write
201F8C7E000
unkown
page read and write
20563113000
heap
page read and write
20563104000
heap
page read and write
205630FB000
heap
page read and write
2056311C000
heap
page read and write
20563113000
heap
page read and write
2056C8A5000
heap
page read and write
201F7180000
unkown
page readonly
20563113000
heap
page read and write
201F91D6000
unkown
page read and write
2057356E000
heap
page read and write
201F72B0000
heap
page read and write
20564B60000
direct allocation
page execute and read and write
201F72BB000
heap
page read and write
20563113000
heap
page read and write
2056311E000
heap
page read and write
20563103000
heap
page read and write
20563113000
heap
page read and write
2D3A9E02000
trusted library allocation
page read and write
205630FB000
heap
page read and write
29155FE000
stack
page read and write
205630B6000
heap
page read and write
2D3A95B0000
heap
page read and write
20563139000
heap
page read and write
2914DFB000
stack
page read and write
201F97BE000
unkown
page read and write
2056311C000
heap
page read and write
205630F3000
heap
page read and write
E6E8413000
unkown
page read and write
20572B6E000
heap
page read and write
2056C465000
heap
page read and write
201F92A4000
unkown
page read and write
2057036E000
heap
page read and write
201F72C1000
unkown
page readonly
20563113000
heap
page read and write
205630FB000
heap
page read and write
205630F3000
heap
page read and write
205630D6000
heap
page read and write
2D3A9613000
heap
page read and write
2056311E000
heap
page read and write
205630FB000
heap
page read and write
205630EA000
heap
page read and write
20563113000
heap
page read and write
2056C462000
heap
page read and write
201F72F0000
heap
page read and write
20563103000
heap
page read and write
20563103000
heap
page read and write
2056C480000
direct allocation
page execute and read and write
7FF69ECEE000
unkown
page write copy
2056311B000
heap
page read and write
201F7270000
unkown
page read and write
20562ECB000
heap
page read and write
2056315B000
heap
page read and write
2056311B000
heap
page read and write
E6E89FE000
unkown
page readonly
205630E4000
heap
page read and write
201F8CD0000
unkown
page read and write
20563113000
heap
page read and write
205630F3000
heap
page read and write
2056CAB8000
heap
page read and write
201F9396000
unkown
page read and write
2D3A95F0000
trusted library allocation
page read and write
201FB100000
unkown
page read and write
2056311E000
heap
page read and write
201F9354000
unkown
page read and write
2056310B000
heap
page read and write
205630F3000
heap
page read and write
201F92B0000
unkown
page read and write
2056313B000
heap
page read and write
201F8B90000
unkown
page read and write
2056CCB7000
heap
page read and write
205630FB000
heap
page read and write
20563103000
heap
page read and write
2056310C000
heap
page read and write
2056F96E000
heap
page read and write
2056310B000
heap
page read and write
DDC05FE000
unkown
page readonly
2056311C000
heap
page read and write
20570D6E000
heap
page read and write
2056C68D000
heap
page read and write
2D3A9590000
heap
page read and write
2056311E000
heap
page read and write
2056311E000
heap
page read and write
2056310B000
heap
page read and write
205630F3000
heap
page read and write
201F93DC000
unkown
page read and write
20563135000
heap
page read and write
E6E88FE000
unkown
page readonly
20563103000
heap
page read and write
205630FB000
heap
page read and write
201F72FF000
heap
page read and write
2056313B000
heap
page read and write
201F8D20000
unkown
page readonly
205630FB000
heap
page read and write
2056311B000
heap
page read and write
201F93D8000
unkown
page read and write
20564AE0000
direct allocation
page execute and read and write
205630F3000
heap
page read and write
20562E60000
heap
page read and write
20563113000
heap
page read and write
201F9220000
unkown
page read and write
20563113000
heap
page read and write
E6E8419000
unkown
page read and write
20563103000
heap
page read and write
20563113000
heap
page read and write
201F9374000
unkown
page read and write
20563132000
heap
page read and write
205630E1000
heap
page read and write
2056310B000
heap
page read and write
2056311C000
heap
page read and write
205630E3000
heap
page read and write
20563149000
heap
page read and write
205630E4000
heap
page read and write
20563149000
heap
page read and write
20563103000
heap
page read and write
2D3A9702000
heap
page read and write
DDC08FE000
stack
page read and write
201F8D00000
unkown
page readonly
2056310B000
heap
page read and write
2D3A9602000
heap
page read and write
20563129000
heap
page read and write
205630F3000
heap
page read and write
2056311B000
heap
page read and write
20563113000
heap
page read and write
20563132000
heap
page read and write
20563139000
heap
page read and write
2D3A9645000
heap
page read and write
201F9112000
unkown
page read and write
201F93D6000
unkown
page read and write
201F7780000
unkown
page readonly
20563113000
heap
page read and write
There are 282 hidden memdumps, click here to show them.