IOC Report
JrE5qsYZD8.exe

loading gif

Files

File Path
Type
Category
Malicious
JrE5qsYZD8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
PNG image data, 24 x 24, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (1116)
downloaded
Chrome Cache Entry: 102
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 103
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 80
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 81
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (952)
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (3383)
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (793)
downloaded
Chrome Cache Entry: 85
ASCII text, with very long lines (2305)
downloaded
Chrome Cache Entry: 86
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 87
PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (2973)
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (987)
downloaded
Chrome Cache Entry: 90
PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 91
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 92
PNG image data, 24 x 24, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 93
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (2353)
downloaded
Chrome Cache Entry: 95
Web Open Font Format (Version 2), TrueType, length 15436, version 1.0
downloaded
Chrome Cache Entry: 96
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 97
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 98
Web Open Font Format (Version 2), TrueType, length 15552, version 1.0
downloaded
Chrome Cache Entry: 99
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JrE5qsYZD8.exe
"C:\Users\user\Desktop\JrE5qsYZD8.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1992,i,15798156456821883579,10995336834318236159,262144 /prefetch:8

URLs

Name
IP
Malicious
http://localhost.corp.google.com/inapp/
unknown
https://feedback.googleusercontent.com/resources/annotator.css
unknown
https://apis.google.com/js/client.js
unknown
https://feedback2-test.corp.googleusercontent.com/tools/feedback/%
unknown
https://support.google.com
unknown
https://play.google.com
unknown
https://consent.youtube.com/_/ConsentUi/browserinfo?f.sid=-9033751170818193612&bl=boq_identityfrontenduiserver_20240505.08_p1&hl=en&gl=GB&_reqid=157061&rt=j
142.251.33.78
http://localhost.proxy.googlers.com/inapp/
unknown
https://consent.youtube.com/m?continue=https%3A%2F%2Fwww.youtube.com%2Faccount%3Fcbrd%3D1&gl=GB&m=0&pc=yt&cm=2&hl=en&src=1
142.251.33.78
https://stagingqual-feedback-pa-googleapis.sandbox.google.com
unknown
https://support.google.com/inapp/%
unknown
https://asx-help-frontend-autopush.corp.youtube.com/inapp/
unknown
https://www.youtube.com/accountd
unknown
https://help.youtube.com/tools/feedback/
unknown
https://asx-frontend-staging.corp.google.com/tools/feedback/
unknown
https://support.google.com/
unknown
https://www.google.com
unknown
https://consent.youtube.com/_/ConsentUi/browserinfo?f.sid=-9033751170818193612&bl=boq_identityfrontenduiserver_20240505.08_p1&hl=en&gl=GB&_reqid=57061&rt=j
142.251.33.78
https://scone-pa.clients6.google.com
unknown
https://support.google.com/inapp/
unknown
https://asx-frontend-autopush.corp.google.co.uk/inapp/
unknown
https://asx-frontend-autopush.corp.google.co.uk/tools/feedback/
unknown
https://asx-frontend-autopush.corp.google.com/tools/feedback/
unknown
https://asx-frontend-autopush.corp.youtube.com/tools/feedback/
unknown
https://feedback2-test.corp.google.com/inapp/%
unknown
https://www.google.com/tools/feedback
unknown
https://sandbox.google.com/inapp/%
unknown
https://apis.google.com/js/api.js
unknown
https://feedback2-test.corp.googleusercontent.com/inapp/%
unknown
https://localhost.proxy.googlers.com/inapp/
unknown
https://www.google.com/tools/feedback/
unknown
https://www.google.cn/tools/feedback/
unknown
https://play.google.com/log?format=json&hasfast=true&authuser=0
142.251.215.238
https://asx-frontend-autopush.corp.google.de/inapp/
unknown
https://www.google.cn/tools/feedback/%
unknown
https://feedback2-test.corp.google.com/tools/feedback/%
unknown
https://www.google.com/tools/feedback/help_panel_binary.js
unknown
https://www.youtube.com/account
unknown
https://www.google.com/favicon.ico
142.251.215.228
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
unknown
https://asx-frontend-autopush.corp.google.de/tools/feedback/
unknown
https://sandbox.google.com/inapp/
unknown
https://test-scone-pa-googleapis.sandbox.google.com
unknown
https://asx-help-frontend-autopush.corp.youtube.com/tools/feedback/
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
https://asx-frontend-autopush.corp.google.com/inapp/
unknown
https://feedback.googleusercontent.com/resources/render_frame2.html
unknown
https://sandbox.google.com/tools/feedback/%
unknown
https://sandbox.google.com/tools/feedback/
unknown
https://localhost.corp.google.com/inapp/
unknown
https://asx-frontend-autopush.corp.youtube.com/inapp/
unknown
https://feedback-pa.clients6.google.com
unknown
https://asx-frontend-staging.corp.google.com/inapp/
unknown
https://www.google.com/tools/feedback/%
unknown
https://fonts.google.com/license/googlerestricted
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
youtube-ui.l.google.com
142.250.69.206
play.google.com
142.251.215.238
consent.youtube.com
142.251.33.78
www.google.com
142.251.215.228
www.youtube.com
unknown

IPs

IP
Domain
Country
Malicious
142.251.33.78
consent.youtube.com
United States
192.168.2.4
unknown
unknown
192.168.2.6
unknown
unknown
142.251.215.228
www.google.com
United States
142.251.215.238
play.google.com
United States
239.255.255.250
unknown
Reserved

Memdumps

Base Address
Regiontype
Protect
Malicious
383C000
heap
page read and write
A5A000
stack
page read and write
36F1000
heap
page read and write
119D000
heap
page read and write
37E1000
heap
page read and write
134F000
heap
page read and write
10A0000
heap
page read and write
11B3000
heap
page read and write
1358000
heap
page read and write
3821000
heap
page read and write
11B4000
heap
page read and write
3861000
heap
page read and write
48EE000
stack
page read and write
368A000
heap
page read and write
13B7000
heap
page read and write
36F1000
heap
page read and write
3730000
heap
page read and write
127B000
heap
page read and write
1161000
heap
page read and write
3798000
heap
page read and write
1404000
heap
page read and write
1461000
heap
page read and write
1404000
heap
page read and write
38C2000
heap
page read and write
3766000
heap
page read and write
10CC000
heap
page read and write
119F000
heap
page read and write
368A000
heap
page read and write
1351000
heap
page read and write
10C5000
heap
page read and write
38DA000
heap
page read and write
12BC000
heap
page read and write
11A2000
heap
page read and write
6A0000
unkown
page write copy
13C3000
heap
page read and write
11AD000
heap
page read and write
3646000
heap
page read and write
496E000
stack
page read and write
13DE000
heap
page read and write
1358000
heap
page read and write
1320000
heap
page read and write
124B000
heap
page read and write
36D0000
heap
page read and write
5830000
heap
page read and write
1471000
heap
page read and write
13C1000
heap
page read and write
12CE000
heap
page read and write
3851000
heap
page read and write
3868000
heap
page read and write
3CC8000
heap
page read and write
11CD000
heap
page read and write
1327000
heap
page read and write
1207000
heap
page read and write
119F000
heap
page read and write
3755000
heap
page read and write
1422000
heap
page read and write
38B8000
heap
page read and write
115E000
heap
page read and write
368C000
heap
page read and write
11CD000
heap
page read and write
38ED000
heap
page read and write
12DA000
heap
page read and write
1422000
heap
page read and write
372B000
heap
page read and write
11AC000
heap
page read and write
3CB5000
heap
page read and write
144D000
heap
page read and write
37E1000
heap
page read and write
149D000
heap
page read and write
127B000
heap
page read and write
144D000
heap
page read and write
11B4000
heap
page read and write
1156000
heap
page read and write
1265000
heap
page read and write
38D5000
heap
page read and write
1164000
heap
page read and write
10C4000
heap
page read and write
3707000
heap
page read and write
11ED000
heap
page read and write
130D000
heap
page read and write
3C70000
heap
page read and write
10DC000
heap
page read and write
1391000
heap
page read and write
371A000
heap
page read and write
12BC000
heap
page read and write
1364000
heap
page read and write
388D000
heap
page read and write
38CF000
heap
page read and write
1183000
heap
page read and write
11A9000
heap
page read and write
44EE000
stack
page read and write
383C000
heap
page read and write
1399000
heap
page read and write
1C9E000
stack
page read and write
1192000
heap
page read and write
1419000
heap
page read and write
131F000
heap
page read and write
3711000
heap
page read and write
11A9000
heap
page read and write
377E000
heap
page read and write
3823000
heap
page read and write
11A9000
heap
page read and write
136E000
heap
page read and write
11FA000
heap
page read and write
38D6000
heap
page read and write
383C000
heap
page read and write
123F000
heap
page read and write
38D0000
heap
page read and write
1268000
heap
page read and write
366F000
heap
page read and write
36DC000
heap
page read and write
1246000
heap
page read and write
1350000
heap
page read and write
3723000
heap
page read and write
384D000
heap
page read and write
11AA000
heap
page read and write
37D1000
heap
page read and write
1462000
heap
page read and write
36D0000
heap
page read and write
120F000
heap
page read and write
3881000
heap
page read and write
3676000
heap
page read and write
3731000
heap
page read and write
10A8000
heap
page read and write
11D6000
heap
page read and write
123C000
heap
page read and write
365A000
heap
page read and write
148D000
heap
page read and write
129A000
heap
page read and write
116B000
heap
page read and write
384C000
heap
page read and write
F0E000
stack
page read and write
3631000
heap
page read and write
37B7000
heap
page read and write
3C88000
heap
page read and write
10C4000
heap
page read and write
1482000
heap
page read and write
3811000
heap
page read and write
11AD000
heap
page read and write
34D0000
heap
page read and write
53FC000
stack
page read and write
3C83000
heap
page read and write
11BF000
heap
page read and write
372B000
heap
page read and write
1358000
heap
page read and write
139B000
heap
page read and write
117A000
heap
page read and write
3884000
heap
page read and write
127F000
heap
page read and write
3922000
heap
page read and write
1327000
heap
page read and write
12EF000
heap
page read and write
F10000
heap
page read and write
1246000
heap
page read and write
38D0000
heap
page read and write
66C000
unkown
page readonly
1218000
heap
page read and write
3645000
heap
page read and write
37C8000
heap
page read and write
1218000
heap
page read and write
37B7000
heap
page read and write
12BC000
heap
page read and write
57FC000
stack
page read and write
1178000
heap
page read and write
10F6000
heap
page read and write
371A000
heap
page read and write
69C000
unkown
page read and write
3664000
heap
page read and write
11BF000
heap
page read and write
3787000
heap
page read and write
36DB000
heap
page read and write
1358000
heap
page read and write
6A4000
unkown
page readonly
10C6000
heap
page read and write
1218000
heap
page read and write
1189000
heap
page read and write
1429000
heap
page read and write
38C2000
heap
page read and write
692000
unkown
page readonly
E3B000
stack
page read and write
149D000
heap
page read and write
1335000
heap
page read and write
115D000
heap
page read and write
10CA000
heap
page read and write
363A000
heap
page read and write
140E000
heap
page read and write
131F000
heap
page read and write
12C7000
heap
page read and write
F20000
heap
page read and write
11DB000
heap
page read and write
130A000
heap
page read and write
4E80000
heap
page read and write
3858000
heap
page read and write
149D000
heap
page read and write
38C1000
heap
page read and write
13BA000
heap
page read and write
1422000
heap
page read and write
6A4000
unkown
page readonly
36F2000
heap
page read and write
13F6000
heap
page read and write
37C1000
heap
page read and write
1086000
heap
page read and write
10C3000
heap
page read and write
1194000
heap
page read and write
11E5000
heap
page read and write
10D2000
heap
page read and write
127B000
heap
page read and write
1183000
heap
page read and write
10FF000
heap
page read and write
1080000
heap
page read and write
1410000
heap
page read and write
5D0000
unkown
page readonly
12DF000
heap
page read and write
12AF000
heap
page read and write
12AF000
heap
page read and write
13CC000
heap
page read and write
53BF000
stack
page read and write
12CE000
heap
page read and write
38F4000
heap
page read and write
3821000
heap
page read and write
3868000
heap
page read and write
372C000
heap
page read and write
3821000
heap
page read and write
37D1000
heap
page read and write
1110000
heap
page read and write
115A000
heap
page read and write
36DA000
heap
page read and write
363C000
heap
page read and write
3858000
heap
page read and write
1218000
heap
page read and write
36A6000
heap
page read and write
117A000
heap
page read and write
37EA000
heap
page read and write
3CC8000
heap
page read and write
37E2000
heap
page read and write
11C0000
heap
page read and write
376E000
heap
page read and write
12CE000
heap
page read and write
3845000
heap
page read and write
3CC4000
heap
page read and write
10DF000
heap
page read and write
1218000
heap
page read and write
129F000
heap
page read and write
372B000
heap
page read and write
12B5000
heap
page read and write
12E6000
heap
page read and write
12F1000
heap
page read and write
12AF000
heap
page read and write
37C3000
heap
page read and write
13FF000
heap
page read and write
F25000
heap
page read and write
12EF000
heap
page read and write
36F1000
heap
page read and write
3896000
heap
page read and write
372E000
heap
page read and write
130A000
heap
page read and write
3874000
heap
page read and write
EC0000
heap
page read and write
132C000
heap
page read and write
123C000
heap
page read and write
386D000
heap
page read and write
3878000
heap
page read and write
119E000
heap
page read and write
11CF000
heap
page read and write
1459000
heap
page read and write
13A7000
heap
page read and write
116D000
heap
page read and write
E1F000
stack
page read and write
1458000
heap
page read and write
13F6000
heap
page read and write
1168000
heap
page read and write
1366000
heap
page read and write
3920000
heap
page read and write
37BA000
heap
page read and write
1207000
heap
page read and write
130A000
heap
page read and write
370E000
heap
page read and write
1222000
heap
page read and write
143B000
heap
page read and write
11ED000
heap
page read and write
11B4000
heap
page read and write
149D000
heap
page read and write
3811000
heap
page read and write
127B000
heap
page read and write
140E000
heap
page read and write
4D6E000
stack
page read and write
1420000
heap
page read and write
1372000
heap
page read and write
131F000
heap
page read and write
388B000
heap
page read and write
12EF000
heap
page read and write
37B7000
heap
page read and write
148B000
heap
page read and write
38A7000
heap
page read and write
38AE000
heap
page read and write
1460000
heap
page read and write
3812000
heap
page read and write
1301000
heap
page read and write
13A5000
heap
page read and write
36E0000
heap
page read and write
1188000
heap
page read and write
1235000
heap
page read and write
3742000
heap
page read and write
137C000
heap
page read and write
149D000
heap
page read and write
38DC000
heap
page read and write
E2F000
stack
page read and write
363A000
heap
page read and write
1207000
heap
page read and write
12CE000
heap
page read and write
12BC000
heap
page read and write
1316000
heap
page read and write
12D1000
heap
page read and write
36DB000
heap
page read and write
5D1000
unkown
page execute read
3916000
heap
page read and write
11A9000
heap
page read and write
11F0000
heap
page read and write
4470000
heap
page read and write
11F9000
heap
page read and write
34E4000
heap
page read and write
12B1000
heap
page read and write
384C000
heap
page read and write
34F1000
heap
page read and write
12BE000
heap
page read and write
10C8000
heap
page read and write
69C000
unkown
page write copy
1335000
heap
page read and write
5D1000
unkown
page execute read
372D000
heap
page read and write
1111000
heap
page read and write
372B000
heap
page read and write
36BF000
heap
page read and write
11BF000
heap
page read and write
384C000
heap
page read and write
1267000
heap
page read and write
1184000
heap
page read and write
120A000
heap
page read and write
103E000
stack
page read and write
137B000
heap
page read and write
1246000
heap
page read and write
4FBE000
stack
page read and write
12EF000
heap
page read and write
E5E000
stack
page read and write
11AE000
heap
page read and write
117B000
heap
page read and write
127B000
heap
page read and write
1280000
heap
page read and write
3868000
heap
page read and write
144F000
heap
page read and write
11B6000
heap
page read and write
129A000
heap
page read and write
1289000
heap
page read and write
135B000
heap
page read and write
1405000
heap
page read and write
144D000
heap
page read and write
144D000
heap
page read and write
11EC000
heap
page read and write
384E000
heap
page read and write
1218000
heap
page read and write
1327000
heap
page read and write
1422000
heap
page read and write
692000
unkown
page readonly
3742000
heap
page read and write
12E6000
heap
page read and write
3681000
heap
page read and write
10CB000
heap
page read and write
1176000
heap
page read and write
5D0000
unkown
page readonly
3796000
heap
page read and write
3745000
heap
page read and write
E4F000
stack
page read and write
3645000
heap
page read and write
3896000
heap
page read and write
10D2000
heap
page read and write
66C000
unkown
page readonly
1346000
heap
page read and write
1219000
heap
page read and write
149D000
heap
page read and write
3868000
heap
page read and write
1420000
heap
page read and write
114E000
heap
page read and write
11B5000
heap
page read and write
1404000
heap
page read and write
3630000
heap
page read and write
372E000
heap
page read and write
12CE000
heap
page read and write
12E8000
heap
page read and write
1110000
heap
page read and write
126A000
heap
page read and write
3680000
heap
page read and write
12AF000
heap
page read and write
189E000
stack
page read and write
376E000
heap
page read and write
1399000
heap
page read and write
1274000
heap
page read and write
383C000
heap
page read and write
3858000
heap
page read and write
38C6000
heap
page read and write
38D7000
heap
page read and write
34E0000
heap
page read and write
116D000
heap
page read and write
387A000
heap
page read and write
11BF000
heap
page read and write
11AA000
heap
page read and write
37E1000
heap
page read and write
There are 396 hidden memdumps, click here to show them.