IOC Report
09j4wHYrHs.exe

loading gif

Files

File Path
Type
Category
Malicious
09j4wHYrHs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\~DFAC1AC9EB40B6FD0C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\Desktop\config.xml
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\09j4wHYrHs.exe
"C:\Users\user\Desktop\09j4wHYrHs.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/?q=
unknown
https://drive-daily-2.corp.google.com/
unknown
https://drive-autopush.corp.google.com/
unknown
https://drive-daily-4.corp.google.com/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://payments.google.com/
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://docs.google.com/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://drive-staging.corp.google.com/
unknown
https://drive-daily-6.corp.google.com/
unknown
https://drive.google.com/
unknown
https://drive-daily-0.corp.google.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://drive-preprod.corp.google.com/
unknown
https://sandbox.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.google.com/
unknown
https://drive-daily-3.corp.google.com/
unknown
There are 15 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4B3000
heap
page read and write
463000
heap
page read and write
326E000
stack
page read and write
2A80000
heap
page read and write
2AB0000
heap
page read and write
510000
heap
page read and write
474000
heap
page read and write
42C000
heap
page read and write
312F000
stack
page read and write
2050000
trusted library allocation
page execute read
4B6000
heap
page read and write
463000
heap
page read and write
4A8000
heap
page read and write
454000
heap
page read and write
42C000
heap
page read and write
441000
heap
page read and write
2120000
heap
page read and write
448000
heap
page read and write
484000
heap
page read and write
418000
heap
page read and write
430000
heap
page read and write
4B5000
heap
page read and write
46E000
heap
page read and write
5A0000
heap
page read and write
442000
heap
page read and write
4B3000
heap
page read and write
43D000
heap
page read and write
463000
heap
page read and write
42D000
heap
page read and write
20A0000
heap
page read and write
2130000
trusted library allocation
page read and write
409000
unkown
page read and write
463000
heap
page read and write
448000
heap
page read and write
9A000
stack
page read and write
4A8000
heap
page read and write
430000
heap
page read and write
59E000
stack
page read and write
2939000
heap
page read and write
4B5000
heap
page read and write
20B0000
heap
page read and write
2A7E000
stack
page read and write
484000
heap
page read and write
482000
heap
page read and write
2940000
heap
page read and write
463000
heap
page read and write
401000
unkown
page execute read
410000
heap
page read and write
40A000
unkown
page readonly
454000
heap
page read and write
472000
heap
page read and write
49A000
heap
page read and write
880000
heap
page read and write
40A000
unkown
page readonly
48F000
heap
page read and write
454000
heap
page read and write
448000
heap
page read and write
292E000
stack
page read and write
46F000
heap
page read and write
77F000
stack
page read and write
454000
heap
page read and write
466000
heap
page read and write
47F000
heap
page read and write
45A000
heap
page read and write
2080000
heap
page read and write
2930000
heap
page read and write
5A5000
heap
page read and write
454000
heap
page read and write
44E000
heap
page read and write
400000
unkown
page readonly
438000
heap
page read and write
4B6000
heap
page read and write
463000
heap
page read and write
49A000
heap
page read and write
425000
heap
page read and write
4A8000
heap
page read and write
87F000
stack
page read and write
336F000
stack
page read and write
482000
heap
page read and write
44E000
heap
page read and write
19C000
stack
page read and write
48F000
heap
page read and write
48F000
heap
page read and write
4B5000
heap
page read and write
484000
heap
page read and write
454000
heap
page read and write
322F000
stack
page read and write
4B3000
heap
page read and write
44A000
heap
page read and write
55E000
stack
page read and write
49A000
heap
page read and write
46F000
heap
page read and write
451000
heap
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
There are 85 hidden memdumps, click here to show them.