IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:53:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:53:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:53:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:53:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 03:53:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6048_2110720458\LICENSE
ASCII text
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6048_2110720458\_metadata\verified_contents.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6048_2110720458\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6048_2110720458\manifest.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6048_2110720458\sets.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6048_393236696\Google.Widevine.CDM.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6048_393236696\_metadata\verified_contents.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6048_393236696\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6048_393236696\manifest.json
JSON data
dropped
Chrome Cache Entry: 172
ASCII text, with very long lines (468)
downloaded
Chrome Cache Entry: 173
ASCII text, with very long lines (683)
downloaded
Chrome Cache Entry: 174
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 175
ASCII text, with very long lines (5693)
downloaded
Chrome Cache Entry: 176
ASCII text, with very long lines (2907)
downloaded
Chrome Cache Entry: 177
HTML document, ASCII text, with very long lines (681)
downloaded
Chrome Cache Entry: 178
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 179
ASCII text, with very long lines (533)
downloaded
Chrome Cache Entry: 180
ASCII text, with very long lines (755)
downloaded
Chrome Cache Entry: 181
ASCII text, with very long lines (553)
downloaded
Chrome Cache Entry: 182
ASCII text, with very long lines (570)
downloaded
Chrome Cache Entry: 183
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 184
ASCII text, with very long lines (395)
downloaded
Chrome Cache Entry: 185
ASCII text, with very long lines (522)
downloaded
Chrome Cache Entry: 186
ASCII text, with very long lines (1694)
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 --field-trial-handle=2172,i,2599626556490026948,17595553873914899486,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5500 --field-trial-handle=2172,i,2599626556490026948,17595553873914899486,262144 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 --field-trial-handle=2172,i,2599626556490026948,17595553873914899486,262144 /prefetch:8

URLs

Name
IP
Malicious
https://wieistmeineip.de
unknown
https://mercadoshops.com.co
unknown
https://gliadomain.com
unknown
https://poalim.xyz
unknown
https://mercadolivre.com
unknown
https://play.google.com/work/enroll?identifier=
unknown
https://policies.google.com/terms/service-specific
unknown
https://reshim.org
unknown
https://nourishingpursuits.com
unknown
https://medonet.pl
unknown
https://unotv.com
unknown
https://mercadoshops.com.br
unknown
https://joyreactor.cc
unknown
https://policies.google.com/technologies/cookies
unknown
https://zdrowietvn.pl
unknown
https://johndeere.com
unknown
https://songstats.com
unknown
https://baomoi.com
unknown
https://supereva.it
unknown
https://elfinancierocr.com
unknown
https://bolasport.com
unknown
https://rws1nvtvt.com
unknown
https://www.youtube.com/t/terms?chromeless=1&hl=
unknown
https://desimartini.com
unknown
https://hearty.app
unknown
https://hearty.gift
unknown
https://mercadoshops.com
unknown
https://heartymail.com
unknown
https://nlc.hu
unknown
https://p106.net
unknown
https://radio2.be
unknown
https://finn.no
unknown
https://hc1.com
unknown
https://kompas.tv
unknown
https://mystudentdashboard.com
unknown
https://songshare.com
unknown
https://smaker.pl
unknown
https://mercadopago.com.mx
unknown
https://p24.hu
unknown
https://talkdeskqaid.com
unknown
https://24.hu
unknown
https://mercadopago.com.pe
unknown
https://cardsayings.net
unknown
https://text.com
unknown
https://apis.google.com/js/api.js
unknown
https://mightytext.net
unknown
https://pudelek.pl
unknown
https://hazipatika.com
unknown
https://joyreactor.com
unknown
https://cookreactor.com
unknown
https://wildixin.com
unknown
https://eworkbookcloud.com
unknown
https://cognitiveai.ru
unknown
https://nacion.com
unknown
https://chennien.com
unknown
https://drimer.travel
unknown
https://deccoria.pl
unknown
https://www.google.com/favicon.ico
142.250.185.132
https://mercadopago.cl
unknown
https://talkdeskstgid.com
unknown
https://naukri.com
unknown
https://interia.pl
unknown
https://bonvivir.com
unknown
https://carcostadvisor.be
unknown
https://salemovetravel.com
unknown
https://sapo.io
unknown
https://wpext.pl
unknown
https://welt.de
unknown
https://poalim.site
unknown
https://drimer.io
unknown
https://infoedgeindia.com
unknown
https://blackrockadvisorelite.it
unknown
https://policies.google.com/privacy
unknown
https://cognitive-ai.ru
unknown
https://cafemedia.com
unknown
https://graziadaily.co.uk
unknown
https://thirdspace.org.au
unknown
https://mercadoshops.com.ar
unknown
https://smpn106jkt.sch.id
unknown
https://elpais.uy
unknown
https://landyrev.com
unknown
https://the42.ie
unknown
https://commentcamarche.com
unknown
https://tucarro.com.ve
unknown
https://rws3nvtvt.com
unknown
https://eleconomista.net
unknown
https://helpdesk.com
unknown
https://mercadolivre.com.br
unknown
https://clmbtech.com
unknown
https://standardsandpraiserepurpose.com
unknown
https://07c225f3.online
unknown
https://salemovefinancial.com
unknown
https://mercadopago.com.br
unknown
https://commentcamarche.net
unknown
https://etfacademy.it
unknown
https://mighty-app.appspot.com
unknown
https://hj.rs
unknown
https://hearty.me
unknown
https://mercadolibre.com.gt
unknown
https://timesinternet.in
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
youtube-ui.l.google.com
142.250.186.46
www3.l.google.com
142.250.185.110
play.google.com
216.58.206.46
www.google.com
142.250.185.132
youtube.com
142.250.185.174
241.42.69.40.in-addr.arpa
unknown
accounts.youtube.com
unknown
www.youtube.com
unknown

IPs

IP
Domain
Country
Malicious
142.250.186.174
unknown
United States
192.168.2.16
unknown
unknown
142.250.185.132
www.google.com
United States
142.250.185.110
www3.l.google.com
United States
192.168.2.5
unknown
unknown
216.58.206.46
play.google.com
United States
239.255.255.250
unknown
Reserved
142.250.185.174
youtube.com
United States
142.250.186.164
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
3EB1000
heap
page read and write
512000
unkown
page readonly
1585000
heap
page read and write
1583000
heap
page read and write
DF0000
heap
page read and write
1583000
heap
page read and write
1585000
heap
page read and write
4EC000
unkown
page readonly
13EF000
stack
page read and write
1583000
heap
page read and write
1514000
heap
page read and write
1584000
heap
page read and write
1583000
heap
page read and write
156F000
heap
page read and write
451000
unkown
page execute read
214E000
stack
page read and write
1583000
heap
page read and write
2200000
heap
page read and write
1585000
heap
page read and write
1D4E000
stack
page read and write
22D0000
heap
page read and write
2290000
heap
page read and write
520000
unkown
page write copy
1575000
heap
page read and write
450000
unkown
page readonly
DA0000
heap
page read and write
1510000
heap
page read and write
51C000
unkown
page write copy
1514000
heap
page read and write
1585000
heap
page read and write
512000
unkown
page readonly
13FE000
stack
page read and write
2220000
trusted library allocation
page read and write
1514000
heap
page read and write
D3A000
stack
page read and write
1582000
heap
page read and write
1575000
heap
page read and write
DED000
stack
page read and write
1514000
heap
page read and write
3EB1000
heap
page read and write
13CF000
stack
page read and write
2220000
trusted library allocation
page read and write
3EB0000
heap
page read and write
150E000
stack
page read and write
1550000
heap
page read and write
51C000
unkown
page read and write
1585000
heap
page read and write
1572000
heap
page read and write
4EC000
unkown
page readonly
3EB1000
heap
page read and write
450000
unkown
page readonly
1557000
heap
page read and write
1514000
heap
page read and write
524000
unkown
page readonly
524000
unkown
page readonly
13BF000
stack
page read and write
2294000
heap
page read and write
1576000
heap
page read and write
13DB000
stack
page read and write
451000
unkown
page execute read
1572000
heap
page read and write
There are 51 hidden memdumps, click here to show them.