IOC Report
https://mail.sandiegofenceinstallers.com/login_up.php?success_redirect_url=%2Findex.php%2Ffalse%2Fpy1n.html%2Fdiscovercard.com%2Fdfs%2Faccounthome%2Fsummary%2F-www.schwab.com%2Fsecure.accurint.com%2Funfcu2.org%2Flogin1

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01 2023, length=1158936, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01 2023, length=1158936, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01 2023, length=1158936, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01 2023, length=1158936, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01 2023, length=1158936, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01 2023, length=1158936, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2812 --field-trial-handle=2588,i,4458651840048700992,7296907126945281215,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mail.sandiegofenceinstallers.com/login_up.php?success_redirect_url=%2Findex.php%2Ffalse%2Fpy1n.html%2Fdiscovercard.com%2Fdfs%2Faccounthome%2Fsummary%2F-www.schwab.com%2Fsecure.accurint.com%2Funfcu2.org%2Flogin1

URLs

Name
IP
Malicious
https://mail.sandiegofenceinstallers.com/login_up.php?success_redirect_url=%2Findex.php%2Ffalse%2Fpy1n.html%2Fdiscovercard.com%2Fdfs%2Faccounthome%2Fsummary%2F-www.schwab.com%2Fsecure.accurint.com%2Funfcu2.org%2Flogin1
malicious
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=115.0.5790.171&lang=en-GB&acceptformat=crx3,puff&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
142.250.203.110
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
172.217.168.77

Domains

Name
IP
Malicious
google.com
142.250.203.110
accounts.google.com
172.217.168.77
www.google.com
172.217.168.68
clients.l.google.com
142.250.203.110
clients2.google.com
unknown
mail.sandiegofenceinstallers.com
unknown

IPs

IP
Domain
Country
Malicious
172.217.168.68
www.google.com
United States
192.168.2.1
unknown
unknown
239.255.255.250
unknown
Reserved
172.217.168.77
accounts.google.com
United States
142.250.203.110
google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
26BBC643000
heap
page read and write
1C165B4E000
heap
page read and write
2F118070000
heap
page read and write
1C1650CF000
heap
page read and write
186E99B0000
trusted library allocation
page read and write
F8E24FC000
stack
page read and write
25690602000
trusted library allocation
page read and write
26BBC5D0000
trusted library allocation
page read and write
1C1650F2000
heap
page read and write
2F118108000
heap
page read and write
186E9A52000
heap
page read and write
2A331900000
heap
page read and write
186E9A13000
heap
page read and write
2A331910000
heap
page read and write
AC9F7EE000
stack
page read and write
A8BF27F000
stack
page read and write
1AA36C13000
heap
page read and write
14AE925A000
heap
page read and write
F8E28FF000
stack
page read and write
26BBC643000
heap
page read and write
26BBC530000
heap
page read and write
23957849000
heap
page read and write
1C165013000
heap
page read and write
14AE9300000
heap
page read and write
DC686FF000
stack
page read and write
227B0A24000
heap
page read and write
A8BEBFB000
stack
page read and write
2A3319A0000
trusted library allocation
page read and write
1AA36C49000
heap
page read and write
DC6847B000
stack
page read and write
2A331B02000
heap
page read and write
2568FE42000
heap
page read and write
B74A07F000
stack
page read and write
1AA36C64000
heap
page read and write
719E9FD000
stack
page read and write
2568FE41000
heap
page read and write
80701FF000
stack
page read and write
227B0ABD000
heap
page read and write
227B0A29000
heap
page read and write
23957913000
heap
page read and write
1C165070000
heap
page read and write
23957780000
trusted library allocation
page read and write
186E9A00000
heap
page read and write
719F07F000
stack
page read and write
806FC7A000
stack
page read and write
A8BF47F000
stack
page read and write
F8E216F000
stack
page read and write
1C165B13000
heap
page read and write
23957877000
heap
page read and write
1AA36C02000
heap
page read and write
B74A0FF000
stack
page read and write
2568FE31000
heap
page read and write
2155843C000
heap
page read and write
719ED7E000
stack
page read and write
2568FE64000
heap
page read and write
807077C000
stack
page read and write
26BBC627000
heap
page read and write
23957900000
heap
page read and write
2F11804B000
heap
page read and write
26BBC7E1000
heap
page read and write
1C165A02000
heap
page read and write
1C164FD0000
remote allocation
page read and write
2A331A57000
heap
page read and write
6E4A97F000
stack
page read and write
245797D000
stack
page read and write
26BBC713000
heap
page read and write
14AE923C000
heap
page read and write
2A331B00000
heap
page read and write
26BBC540000
heap
page read and write
26BBC657000
heap
page read and write
806FB7E000
stack
page read and write
227B0A70000
heap
page read and write
B74A5FE000
stack
page read and write
A8BE79B000
stack
page read and write
1C165113000
heap
page read and write
2568FE46000
heap
page read and write
2F118102000
heap
page read and write
2A331970000
heap
page read and write
186E9B08000
heap
page read and write
2568FE3D000
heap
page read and write
2568FE30000
heap
page read and write
215583C0000
trusted library allocation
page read and write
1C16509C000
heap
page read and write
14AE9266000
heap
page read and write
AC9FD7E000
stack
page read and write
23957842000
heap
page read and write
1AA36D02000
heap
page read and write
A8BF17C000
stack
page read and write
227B0A68000
heap
page read and write
227B1532000
heap
page read and write
1C165102000
heap
page read and write
2568FE4D000
heap
page read and write
6E4A2FE000
stack
page read and write
1C165089000
heap
page read and write
806FDFB000
stack
page read and write
227B0A43000
heap
page read and write
2F11807A000
heap
page read and write
26BBD202000
heap
page read and write
807087C000
stack
page read and write
B74A37C000
stack
page read and write
B74A8FB000
stack
page read and write
807067F000
stack
page read and write
A8BF07B000
stack
page read and write
719E5AC000
stack
page read and write
227B0950000
heap
page read and write
80700FD000
stack
page read and write
14AE9224000
heap
page read and write
AC9F76B000
stack
page read and write
1C165B0A000
heap
page read and write
1C165115000
heap
page read and write
14AE9A02000
trusted library allocation
page read and write
14AE9313000
heap
page read and write
2457CF7000
stack
page read and write
DC68C7E000
stack
page read and write
B74A4FA000
stack
page read and write
2568FE69000
heap
page read and write
14AE8FE0000
heap
page read and write
2A331A79000
heap
page read and write
1C16508C000
heap
page read and write
26BBC68E000
heap
page read and write
227B1500000
heap
page read and write
2568FE54000
heap
page read and write
2F118050000
heap
page read and write
186E9A4C000
heap
page read and write
186E9A29000
heap
page read and write
26BBD17A000
heap
page read and write
21558502000
heap
page read and write
6645B3E000
stack
page read and write
2F117EB0000
heap
page read and write
719EF7C000
stack
page read and write
239576F0000
heap
page read and write
2A331A02000
heap
page read and write
1C165B00000
heap
page read and write
2568FE36000
heap
page read and write
1C1650D3000
heap
page read and write
80702FE000
stack
page read and write
215582C0000
heap
page read and write
1C1650A9000
heap
page read and write
23957802000
heap
page read and write
14AE9268000
heap
page read and write
1AA36C00000
heap
page read and write
2F11803C000
heap
page read and write
2568FE00000
heap
page read and write
1AA36C2A000
heap
page read and write
2568FE4E000
heap
page read and write
1AA36D00000
heap
page read and write
26BBD252000
heap
page read and write
26BBC68B000
heap
page read and write
24578FE000
stack
page read and write
215583F0000
remote allocation
page read and write
2F11804D000
heap
page read and write
227B0A13000
heap
page read and write
AC9FC7B000
stack
page read and write
2457B7B000
stack
page read and write
227B0B02000
heap
page read and write
719EC7F000
stack
page read and write
664607E000
stack
page read and write
186E9A55000
heap
page read and write
806FCFE000
stack
page read and write
2568FC60000
heap
page read and write
186E9A4F000
heap
page read and write
A8BF37B000
stack
page read and write
26BBD100000
heap
page read and write
AC9FE7E000
stack
page read and write
DC68AFD000
stack
page read and write
719EE7C000
stack
page read and write
26BBC687000
heap
page read and write
6645BBE000
stack
page read and write
6E4A87F000
stack
page read and write
1C165B62000
heap
page read and write
14AE9251000
heap
page read and write
26BBC691000
heap
page read and write
1AA36B80000
trusted library allocation
page read and write
239592B0000
trusted library allocation
page read and write
2568FE74000
heap
page read and write
2568FE29000
heap
page read and write
1C165B24000
heap
page read and write
23957902000
heap
page read and write
719EA7D000
stack
page read and write
1C16505B000
heap
page read and write
21558402000
heap
page read and write
80703FE000
stack
page read and write
719E8FE000
stack
page read and write
14AE9150000
trusted library allocation
page read and write
1AA36D08000
heap
page read and write
1C165084000
heap
page read and write
2568FF02000
heap
page read and write
2F117E40000
heap
page read and write
14AE9200000
heap
page read and write
26BBC5A0000
heap
page read and write
1C165091000
heap
page read and write
F8E27F7000
stack
page read and write
1D05EFE000
stack
page read and write
2457A7B000
stack
page read and write
1C165B06000
heap
page read and write
AC9FA7E000
stack
page read and write
2457EFF000
stack
page read and write
2568FE61000
heap
page read and write
1C165041000
heap
page read and write
1C164ED0000
heap
page read and write
B74A6FF000
stack
page read and write
2568FE4B000
heap
page read and write
239577D0000
remote allocation
page read and write
DC6877E000
stack
page read and write
6E4A777000
stack
page read and write
1AA36C3C000
heap
page read and write
A8BEEFC000
stack
page read and write
2F117E50000
heap
page read and write
2F11804F000
heap
page read and write
26BBC7B9000
heap
page read and write
26BBD213000
heap
page read and write
14AE9285000
heap
page read and write
26BBC666000
heap
page read and write
2568FE63000
heap
page read and write
14AE925C000
heap
page read and write
215583F0000
remote allocation
page read and write
2568FE13000
heap
page read and write
6645F7E000
stack
page read and write
26BBD235000
heap
page read and write
1C165093000
heap
page read and write
23957918000
heap
page read and write
80704FE000
stack
page read and write
14AE925E000
heap
page read and write
2F118013000
heap
page read and write
2A331A68000
heap
page read and write
227B0AC5000
heap
page read and write
26BBD002000
heap
page read and write
23957849000
heap
page read and write
23957750000
heap
page read and write
2568FC00000
heap
page read and write
14AE9302000
heap
page read and write
80705FF000
stack
page read and write
B74A27E000
stack
page read and write
186E9B02000
heap
page read and write
26BBD197000
heap
page read and write
2568FE60000
heap
page read and write
806FFFF000
stack
page read and write
14AE9267000
heap
page read and write
6645ABB000
stack
page read and write
1C164FD0000
remote allocation
page read and write
AC9FF7F000
stack
page read and write
2A331B13000
heap
page read and write
21558429000
heap
page read and write
F8E20EB000
stack
page read and write
26BBC671000
heap
page read and write
227B0A8A000
heap
page read and write
2568FE47000
heap
page read and write
21558413000
heap
page read and write
186E9A71000
heap
page read and write
1AA36D13000
heap
page read and write
26BBD1EA000
heap
page read and write
23957866000
heap
page read and write
1C1650B3000
heap
page read and write
215583F0000
remote allocation
page read and write
719EB7F000
stack
page read and write
14AE925F000
heap
page read and write
26BBC65A000
heap
page read and write
2568FE44000
heap
page read and write
2A331A28000
heap
page read and write
2568FE50000
heap
page read and write
2568FE77000
heap
page read and write
DC6887F000
stack
page read and write
1D0647F000
stack
page read and write
186E9840000
heap
page read and write
664627F000
stack
page read and write
6E4A57B000
stack
page read and write
239577A0000
trusted library allocation
page read and write
23957813000
heap
page read and write
1C164F40000
heap
page read and write
2A331A00000
heap
page read and write
245787B000
stack
page read and write
2568FE66000
heap
page read and write
186E98B0000
heap
page read and write
21558C02000
trusted library allocation
page read and write
2A331A3C000
heap
page read and write
2568FE84000
heap
page read and write
1C1650B6000
heap
page read and write
2568FE7E000
heap
page read and write
2A331A63000
heap
page read and write
23957848000
heap
page read and write
23959402000
trusted library allocation
page read and write
2568FE40000
heap
page read and write
1D0637F000
stack
page read and write
DC6897D000
stack
page read and write
2F118029000
heap
page read and write
186E9B13000
heap
page read and write
26BBD102000
heap
page read and write
2155845C000
heap
page read and write
227B0980000
trusted library allocation
page read and write
2568FE45000
heap
page read and write
14AE925B000
heap
page read and write
186E9B00000
heap
page read and write
23957858000
heap
page read and write
1D06277000
stack
page read and write
1C1650F0000
heap
page read and write
1AA36C8F000
heap
page read and write
2568FE49000
heap
page read and write
2568FE39000
heap
page read and write
2568FE62000
heap
page read and write
2F118086000
heap
page read and write
227B1402000
heap
page read and write
DC689FE000
stack
page read and write
719F17E000
stack
page read and write
26BBD1F0000
heap
page read and write
B74A17E000
stack
page read and write
227B0AE2000
heap
page read and write
239577D0000
remote allocation
page read and write
227B08E0000
heap
page read and write
2F118000000
heap
page read and write
2F118802000
trusted library allocation
page read and write
1AA36C59000
heap
page read and write
2568FBF0000
heap
page read and write
14AE9278000
heap
page read and write
1C165B41000
heap
page read and write
26BBC63C000
heap
page read and write
26BBD1BB000
heap
page read and write
719E87E000
stack
page read and write
6E4A27B000
stack
page read and write
23957800000
heap
page read and write
1C165066000
heap
page read and write
1C164FD0000
remote allocation
page read and write
1C165B11000
heap
page read and write
26BBCE70000
trusted library allocation
page read and write
DC68BFF000
stack
page read and write
227B0ACE000
heap
page read and write
1AA36C5F000
heap
page read and write
186E9A02000
heap
page read and write
227B0B13000
heap
page read and write
26BBC629000
heap
page read and write
2568FE6B000
heap
page read and write
F8E29FF000
stack
page read and write
26BBD163000
heap
page read and write
186E9A7E000
heap
page read and write
21558250000
heap
page read and write
1C1650F0000
heap
page read and write
2457DFF000
stack
page read and write
23957859000
heap
page read and write
23957859000
heap
page read and write
2A332402000
trusted library allocation
page read and write
F8E25FB000
stack
page read and write
1C165096000
heap
page read and write
1C165102000
heap
page read and write
1C165000000
heap
page read and write
A8BEA7E000
stack
page read and write
806FA7C000
stack
page read and write
26BBD128000
heap
page read and write
186E9A54000
heap
page read and write
26BBD24A000
heap
page read and write
2568FE7B000
heap
page read and write
1C164F70000
trusted library allocation
page read and write
1C1650CE000
heap
page read and write
26BBC66F000
heap
page read and write
6E4A47C000
stack
page read and write
1C164EE0000
heap
page read and write
2395782A000
heap
page read and write
A8BEAFD000
stack
page read and write
F8E21EF000
stack
page read and write
186E9A88000
heap
page read and write
B749D1E000
stack
page read and write
2F117FB0000
trusted library allocation
page read and write
21558400000
heap
page read and write
26BBC78C000
heap
page read and write
14AE9308000
heap
page read and write
26BBD14E000
heap
page read and write
186E9A4A000
heap
page read and write
2A331A13000
heap
page read and write
2568FE6D000
heap
page read and write
2568FE7A000
heap
page read and write
1C165065000
heap
page read and write
1AA36AF0000
heap
page read and write
B74A7FE000
stack
page read and write
14AE9264000
heap
page read and write
A8BEE7E000
stack
page read and write
14AE9213000
heap
page read and write
B74A3F9000
stack
page read and write
2F118100000
heap
page read and write
A8BED7F000
stack
page read and write
23959270000
trusted library allocation
page read and write
26BBC600000
heap
page read and write
2F118052000
heap
page read and write
2568FE5F000
heap
page read and write
DC684FE000
stack
page read and write
186E9A3C000
heap
page read and write
26BBD1DE000
heap
page read and write
186EA202000
trusted library allocation
page read and write
1AA36AE0000
heap
page read and write
1AA37602000
trusted library allocation
page read and write
1C1650D1000
heap
page read and write
2A331A5F000
heap
page read and write
1AA36C5C000
heap
page read and write
26BBD128000
heap
page read and write
1C165B80000
heap
page read and write
2568FE48000
heap
page read and write
186E9850000
heap
page read and write
14AE9050000
heap
page read and write
2568FE67000
heap
page read and write
2F118113000
heap
page read and write
26BBC613000
heap
page read and write
1D0617B000
stack
page read and write
806FAFD000
stack
page read and write
239576E0000
heap
page read and write
227B0A00000
heap
page read and write
1AA36B50000
heap
page read and write
A8BEFFD000
stack
page read and write
1D05F7E000
stack
page read and write
2A331A25000
heap
page read and write
1AA36C7B000
heap
page read and write
2568FD60000
trusted library allocation
page read and write
26BBD200000
heap
page read and write
1D05E7C000
stack
page read and write
B749C9C000
stack
page read and write
2457BFF000
stack
page read and write
806FEFC000
stack
page read and write
1C16502A000
heap
page read and write
664617E000
stack
page read and write
14AE9261000
heap
page read and write
6E4A67F000
stack
page read and write
26BBD254000
heap
page read and write
6E4A37F000
stack
page read and write
239577D0000
remote allocation
page read and write
F8E26FD000
stack
page read and write
2568FE75000
heap
page read and write
DC6857E000
stack
page read and write
1AA36C55000
heap
page read and write
B749D9E000
stack
page read and write
14AE8FF0000
heap
page read and write
21558260000
heap
page read and write
1AA36C86000
heap
page read and write
1D0607B000
stack
page read and write
227B08F0000
heap
page read and write
There are 420 hidden memdumps, click here to show them.