IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 80
HTML document, ASCII text, with very long lines (687)
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (1192)
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (44533)
downloaded
Chrome Cache Entry: 83
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 84
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 85
ASCII text, with very long lines (467)
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (4478)
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (777)
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (1694)
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (2362)
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (574)
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (693)
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (777)
downloaded
Chrome Cache Entry: 93
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (405)
downloaded
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4476 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8

URLs

Name
IP
Malicious
https://play.google/intl/
unknown
https://families.google.com/intl/
unknown
https://youtube.com/t/terms?gl=
unknown
https://policies.google.com/technologies/location-data
unknown
https://www.google.com/intl/
unknown
https://apis.google.com/js/api.js
unknown
https://policies.google.com/privacy/google-partners
unknown
https://play.google.com/work/enroll?identifier=
unknown
https://policies.google.com/terms/service-specific
unknown
https://g.co/recover
unknown
https://policies.google.com/privacy/additional
unknown
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
unknown
https://play.google.com/log?format=json&hasfast=true&authuser=0
142.250.185.238
https://www.youtube.com/account
142.250.185.206
https://policies.google.com/technologies/cookies
unknown
https://www.google.com/favicon.ico
142.250.186.68
https://policies.google.com/terms
unknown
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
unknown
https://www.google.com
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
https://policies.google.com/privacy/additional/embedded?gl=kr
unknown
https://policies.google.com/terms/location/embedded
unknown
https://www.youtube.com/t/terms?chromeless=1&hl=
unknown
https://support.google.com/accounts?hl=
unknown
https://www.youtube.com/account6
unknown
https://policies.google.com/privacy
unknown
https://support.google.com/accounts?p=new-si-ui
unknown
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
youtube-ui.l.google.com
142.250.185.206
www3.l.google.com
142.250.185.206
play.google.com
142.250.185.238
www.google.com
142.250.186.68
accounts.youtube.com
unknown
www.youtube.com
unknown

IPs

IP
Domain
Country
Malicious
142.250.186.68
www.google.com
United States
142.250.185.206
youtube-ui.l.google.com
United States
142.250.185.238
play.google.com
United States
192.168.2.6
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.185.174
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
10EF000
heap
page read and write
36E7000
heap
page read and write
3750000
heap
page read and write
1091000
heap
page read and write
101D000
heap
page read and write
3750000
heap
page read and write
36F8000
heap
page read and write
100C000
heap
page read and write
36A6000
heap
page read and write
100C000
heap
page read and write
869000
stack
page read and write
1215000
heap
page read and write
118E000
heap
page read and write
100C000
heap
page read and write
D45000
heap
page read and write
12ED000
heap
page read and write
EF8000
heap
page read and write
F45000
heap
page read and write
1164000
heap
page read and write
10F4000
heap
page read and write
36E7000
heap
page read and write
119F000
heap
page read and write
36F8000
heap
page read and write
1120000
heap
page read and write
1248000
heap
page read and write
12ED000
heap
page read and write
D20000
heap
page read and write
1002000
heap
page read and write
1090000
heap
page read and write
F14000
heap
page read and write
100D000
heap
page read and write
10A6000
heap
page read and write
341B000
heap
page read and write
37C0000
heap
page read and write
3825000
heap
page read and write
1159000
heap
page read and write
10E8000
heap
page read and write
3671000
heap
page read and write
3C32000
heap
page read and write
3869000
heap
page read and write
1090000
heap
page read and write
1063000
heap
page read and write
3882000
heap
page read and write
3841000
heap
page read and write
1271000
heap
page read and write
FD8000
heap
page read and write
F54000
heap
page read and write
C1000
unkown
page execute read
36AA000
heap
page read and write
1043000
heap
page read and write
1019000
heap
page read and write
FA4000
heap
page read and write
F18000
heap
page read and write
1159000
heap
page read and write
1137000
heap
page read and write
37D2000
heap
page read and write
36DE000
heap
page read and write
10B2000
heap
page read and write
10FE000
heap
page read and write
FA9000
heap
page read and write
3702000
heap
page read and write
371B000
heap
page read and write
3757000
heap
page read and write
4C8E000
stack
page read and write
F9E000
heap
page read and write
1215000
heap
page read and write
3795000
heap
page read and write
37D2000
heap
page read and write
3652000
heap
page read and write
10C9000
heap
page read and write
118E000
heap
page read and write
36AB000
heap
page read and write
37C0000
heap
page read and write
1120000
heap
page read and write
FB0000
heap
page read and write
11EA000
heap
page read and write
11A0000
heap
page read and write
3668000
heap
page read and write
12ED000
heap
page read and write
FC3000
heap
page read and write
16EE000
stack
page read and write
100C000
heap
page read and write
37FE000
heap
page read and write
120A000
heap
page read and write
10C0000
heap
page read and write
116E000
heap
page read and write
1270000
heap
page read and write
3785000
heap
page read and write
1137000
heap
page read and write
FB7000
heap
page read and write
ED0000
heap
page read and write
11A0000
heap
page read and write
100C000
heap
page read and write
F47000
heap
page read and write
12AD000
heap
page read and write
FE4000
heap
page read and write
FF5000
heap
page read and write
550D000
stack
page read and write
F95000
heap
page read and write
11F2000
heap
page read and write
100C000
heap
page read and write
37C0000
heap
page read and write
3894000
heap
page read and write
11F2000
heap
page read and write
1117000
heap
page read and write
3BF0000
heap
page read and write
11F2000
heap
page read and write
37EB000
heap
page read and write
35F2000
heap
page read and write
1056000
heap
page read and write
F5F000
heap
page read and write
10CE000
heap
page read and write
118E000
heap
page read and write
E5E000
stack
page read and write
D40000
heap
page read and write
11E8000
heap
page read and write
123F000
heap
page read and write
10B2000
heap
page read and write
37C1000
heap
page read and write
37E6000
heap
page read and write
FCA000
heap
page read and write
3747000
heap
page read and write
11CB000
heap
page read and write
1001000
heap
page read and write
369C000
heap
page read and write
12ED000
heap
page read and write
389B000
heap
page read and write
115A000
heap
page read and write
359E000
stack
page read and write
12AC000
heap
page read and write
F9E000
heap
page read and write
1074000
heap
page read and write
18C000
unkown
page write copy
125B000
heap
page read and write
103A000
heap
page read and write
1002000
heap
page read and write
C0000
unkown
page readonly
118E000
heap
page read and write
377C000
heap
page read and write
10C8000
heap
page read and write
105D000
heap
page read and write
12D2000
heap
page read and write
4CCE000
stack
page read and write
1264000
heap
page read and write
FFB000
heap
page read and write
123F000
heap
page read and write
1176000
heap
page read and write
125B000
heap
page read and write
125C000
heap
page read and write
115D000
heap
page read and write
FB9000
heap
page read and write
1137000
heap
page read and write
35C3000
heap
page read and write
3719000
heap
page read and write
36AE000
heap
page read and write
1002000
heap
page read and write
106B000
heap
page read and write
1052000
heap
page read and write
FF5000
heap
page read and write
182000
unkown
page readonly
FEE000
heap
page read and write
1267000
heap
page read and write
10B5000
heap
page read and write
12A3000
heap
page read and write
10C8000
heap
page read and write
EF0000
heap
page read and write
120A000
heap
page read and write
36BA000
heap
page read and write
FB7000
heap
page read and write
F62000
heap
page read and write
1AEF000
stack
page read and write
FE1000
heap
page read and write
3C41000
heap
page read and write
3617000
heap
page read and write
1091000
heap
page read and write
C4B000
stack
page read and write
11D8000
heap
page read and write
3874000
heap
page read and write
36A7000
heap
page read and write
50CF000
stack
page read and write
37D2000
heap
page read and write
35FC000
heap
page read and write
105D000
heap
page read and write
FC9000
heap
page read and write
1052000
heap
page read and write
FEB000
heap
page read and write
3701000
heap
page read and write
36E7000
heap
page read and write
11AE000
heap
page read and write
37D3000
heap
page read and write
1062000
heap
page read and write
3719000
heap
page read and write
376D000
heap
page read and write
1002000
heap
page read and write
F9E000
heap
page read and write
10A6000
heap
page read and write
F42000
heap
page read and write
C3F000
stack
page read and write
11A1000
heap
page read and write
1299000
heap
page read and write
35C4000
heap
page read and write
35B1000
heap
page read and write
1270000
heap
page read and write
1024000
heap
page read and write
1175000
heap
page read and write
35A0000
heap
page read and write
F18000
heap
page read and write
3794000
heap
page read and write
389B000
heap
page read and write
11AA000
heap
page read and write
FEC000
heap
page read and write
10B2000
heap
page read and write
FD3000
heap
page read and write
3693000
heap
page read and write
386C000
heap
page read and write
36A6000
heap
page read and write
FA9000
heap
page read and write
12C1000
heap
page read and write
10BE000
heap
page read and write
110D000
heap
page read and write
15C000
unkown
page readonly
12ED000
heap
page read and write
3C06000
heap
page read and write
1270000
heap
page read and write
1120000
heap
page read and write
1271000
heap
page read and write
FA4000
heap
page read and write
3801000
heap
page read and write
35D5000
heap
page read and write
11C3000
heap
page read and write
11FF000
heap
page read and write
1029000
heap
page read and write
F9F000
heap
page read and write
1201000
heap
page read and write
FBE000
heap
page read and write
37D7000
heap
page read and write
F44000
heap
page read and write
106B000
heap
page read and write
112B000
heap
page read and write
1100000
heap
page read and write
11F6000
heap
page read and write
11AA000
heap
page read and write
3C02000
heap
page read and write
124F000
heap
page read and write
109E000
heap
page read and write
10FE000
heap
page read and write
EB0000
heap
page read and write
35A4000
heap
page read and write
3794000
heap
page read and write
1120000
heap
page read and write
1215000
heap
page read and write
3671000
heap
page read and write
36A6000
heap
page read and write
37FE000
heap
page read and write
194000
unkown
page readonly
3742000
heap
page read and write
37F2000
heap
page read and write
F9F000
heap
page read and write
10DE000
heap
page read and write
1139000
heap
page read and write
FE3000
heap
page read and write
1277000
heap
page read and write
15C000
unkown
page readonly
3C44000
heap
page read and write
36DC000
heap
page read and write
35B0000
heap
page read and write
11FF000
heap
page read and write
10FE000
heap
page read and write
F98000
heap
page read and write
3762000
heap
page read and write
3845000
heap
page read and write
103A000
heap
page read and write
FFB000
heap
page read and write
3671000
heap
page read and write
190000
unkown
page write copy
100E000
heap
page read and write
100C000
heap
page read and write
FC9000
heap
page read and write
34AE000
stack
page read and write
11C0000
heap
page read and write
10B2000
heap
page read and write
37D3000
heap
page read and write
FF9000
heap
page read and write
365F000
heap
page read and write
F57000
heap
page read and write
3671000
heap
page read and write
F23000
heap
page read and write
386B000
heap
page read and write
11EB000
heap
page read and write
3672000
heap
page read and write
12AC000
heap
page read and write
D1E000
stack
page read and write
36DD000
heap
page read and write
F57000
heap
page read and write
F5C000
heap
page read and write
FF8000
heap
page read and write
125B000
heap
page read and write
103C000
heap
page read and write
12ED000
heap
page read and write
1218000
heap
page read and write
387D000
heap
page read and write
1270000
heap
page read and write
194000
unkown
page readonly
FBB000
heap
page read and write
C6E000
stack
page read and write
3742000
heap
page read and write
36E7000
heap
page read and write
C5F000
stack
page read and write
387E000
heap
page read and write
376C000
heap
page read and write
F46000
heap
page read and write
FAD000
heap
page read and write
182000
unkown
page readonly
10A7000
heap
page read and write
3897000
heap
page read and write
37DF000
heap
page read and write
37F7000
heap
page read and write
1298000
heap
page read and write
3846000
heap
page read and write
12A2000
heap
page read and write
12B7000
heap
page read and write
118E000
heap
page read and write
1116000
heap
page read and write
FA1000
heap
page read and write
18C000
unkown
page read and write
C1000
unkown
page execute read
12E3000
heap
page read and write
3808000
heap
page read and write
37B8000
heap
page read and write
FEB000
heap
page read and write
F23000
heap
page read and write
11F5000
heap
page read and write
12C1000
heap
page read and write
37E6000
heap
page read and write
FF5000
heap
page read and write
FFE000
heap
page read and write
F52000
heap
page read and write
10EF000
heap
page read and write
3757000
heap
page read and write
11AA000
heap
page read and write
35FD000
heap
page read and write
1C66000
heap
page read and write
10A6000
heap
page read and write
1047000
heap
page read and write
1175000
heap
page read and write
11AA000
heap
page read and write
11F8000
heap
page read and write
47EE000
stack
page read and write
389A000
heap
page read and write
FB0000
heap
page read and write
3C41000
heap
page read and write
36B0000
heap
page read and write
11E1000
heap
page read and write
C2F000
stack
page read and write
3857000
heap
page read and write
1052000
heap
page read and write
FFB000
heap
page read and write
1159000
heap
page read and write
370A000
heap
page read and write
36B1000
heap
page read and write
36E7000
heap
page read and write
3719000
heap
page read and write
36AB000
heap
page read and write
F1A000
heap
page read and write
11E8000
heap
page read and write
CD0000
heap
page read and write
C0000
unkown
page readonly
FD7000
heap
page read and write
3656000
heap
page read and write
10B2000
heap
page read and write
386C000
heap
page read and write
3C44000
heap
page read and write
12DB000
heap
page read and write
11FF000
heap
page read and write
1097000
heap
page read and write
117B000
heap
page read and write
1C60000
heap
page read and write
F45000
heap
page read and write
1254000
heap
page read and write
3651000
heap
page read and write
103A000
heap
page read and write
FB4000
heap
page read and write
1043000
heap
page read and write
1264000
heap
page read and write
1052000
heap
page read and write
3858000
heap
page read and write
360E000
heap
page read and write
365F000
heap
page read and write
11D4000
heap
page read and write
104B000
heap
page read and write
5540000
heap
page read and write
1046000
heap
page read and write
510B000
stack
page read and write
1120000
heap
page read and write
120A000
heap
page read and write
1270000
heap
page read and write
3651000
heap
page read and write
36CD000
heap
page read and write
12AE000
heap
page read and write
381B000
heap
page read and write
1220000
heap
page read and write
1183000
heap
page read and write
37C9000
heap
page read and write
120B000
heap
page read and write
112B000
heap
page read and write
36CA000
heap
page read and write
10FE000
heap
page read and write
3C44000
heap
page read and write
1114000
heap
page read and write
10D7000
heap
page read and write
124F000
heap
page read and write
11AA000
heap
page read and write
1298000
heap
page read and write
109E000
heap
page read and write
3899000
heap
page read and write
1130000
heap
page read and write
3604000
heap
page read and write
1165000
heap
page read and write
120A000
heap
page read and write
1123000
heap
page read and write
3763000
heap
page read and write
F9E000
heap
page read and write
F56000
heap
page read and write
1003000
heap
page read and write
36AD000
heap
page read and write
37AE000
heap
page read and write
383E000
heap
page read and write
There are 417 hidden memdumps, click here to show them.