IOC Report
https://d22xf2qtjwaix4.cloudfront.net/fcs/configureHtml/share/facebook.php?title=Check+out+this+custom+Vans+shoe&image=http://goo.gl/Felnhz&descriΡtion=I+made+this+custom+Vans+Slip-On+shoe.&url=https://minbv.shop

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\DucuSign_23.24_503671.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\dkzallen.vew\DucuSign_23.24_503671.PDF.url
Generic INItialization configuration [InternetShortcut]
dropped
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Downloads\DucuSign_23.24_503671.zip.crdownload (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Downloads\f4f70771-2909-47d4-925b-9547cffaff10.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
Chrome Cache Entry: 47
HTML document, ASCII text, with very long lines (781), with no line terminators
downloaded
Chrome Cache Entry: 48
Zip archive data, at least v2.0 to extract, compression method=deflate
downloaded

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 --field-trial-handle=2312,i,1355773766837614093,12017507885534609916,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://d22xf2qtjwaix4.cloudfront.net/fcs/configureHtml/share/facebook.php?title=Check+out+this+custom+Vans+shoe&image=http://goo.gl/Felnhz&description=I+made+this+custom+Vans+Slip-On+shoe.&url=https://minbv.shop"
malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\DucuSign_23.24_503671.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\dkzallen.vew" "C:\Users\user\Downloads\DucuSign_23.24_503671.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://d22xf2qtjwaix4.cloudfront.net/fcs/configureHtml/share/facebook.php?title=Check+out+this+custom+Vans+shoe&image=http://goo.gl/Felnhz&description=I+made+this+custom+Vans+Slip-On+shoe.&url=https://minbv.shop
https://d22xf2qtjwaix4.cloudfront.net/fcs/configureHtml/share/facebook.php?title=Check+out+this+custom+Vans+shoe&image=http://goo.gl/Felnhz&description=I+made+this+custom+Vans+Slip-On+shoe.&url=https://minbv.shop
52.222.236.19
http://goo.gl/Felnhz
unknown
http://goo.gl/Felnhz&description=I
unknown
https://minbv.shop/
3.128.24.43
https://cdn-prod.fluidconfigure.com/api/legacy/fcs/configureHtml/share/facebook.php?title=Check
unknown
https://minbv.shop
unknown

Domains

Name
IP
Malicious
d22xf2qtjwaix4.cloudfront.net
52.222.236.19
www.google.com
142.250.186.36
minbv.shop
3.128.24.43
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
84.201.210.37
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
3.128.24.43
minbv.shop
United States
142.250.186.36
www.google.com
United States
239.255.255.250
unknown
Reserved
52.222.236.19
d22xf2qtjwaix4.cloudfront.net
United States
192.168.2.6
unknown
unknown
192.168.2.5
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
17F0000
trusted library allocation
page execute and read and write
1360000
heap
page read and write
15EB000
heap
page read and write
F50000
heap
page read and write
156A000
trusted library allocation
page execute and read and write
565E000
stack
page read and write
12F9000
stack
page read and write
148E000
stack
page read and write
D8D000
stack
page read and write
14EE000
stack
page read and write
DF0000
heap
page read and write
1038000
heap
page read and write
161D000
heap
page read and write
35E8000
trusted library allocation
page read and write
14F0000
heap
page read and write
FFC000
stack
page read and write
4581000
trusted library allocation
page read and write
5B8E000
stack
page read and write
35BA000
trusted library allocation
page read and write
2ACF000
stack
page read and write
E90000
heap
page read and write
1520000
trusted library allocation
page read and write
19C0000
heap
page execute and read and write
EFE000
stack
page read and write
35E3000
trusted library allocation
page read and write
1810000
heap
page read and write
157B000
trusted library allocation
page execute and read and write
15EE000
heap
page read and write
154A000
trusted library allocation
page execute and read and write
5A4D000
stack
page read and write
17DF000
stack
page read and write
122F000
stack
page read and write
154C000
trusted library allocation
page execute and read and write
E3E000
stack
page read and write
EB0000
heap
page read and write
35E6000
trusted library allocation
page read and write
35EF000
trusted library allocation
page read and write
1590000
heap
page read and write
35CA000
trusted library allocation
page read and write
590E000
stack
page read and write
2AD0000
heap
page read and write
1562000
trusted library allocation
page execute and read and write
15B0000
heap
page read and write
153A000
trusted library allocation
page execute and read and write
15E0000
heap
page read and write
12F6000
stack
page read and write
1540000
trusted library allocation
page read and write
17E0000
trusted library allocation
page read and write
14F5000
heap
page read and write
1570000
trusted library allocation
page read and write
19E0000
heap
page read and write
F30000
trusted library allocation
page read and write
3581000
trusted library allocation
page read and write
30FF000
stack
page read and write
1542000
trusted library allocation
page execute and read and write
35D0000
trusted library allocation
page read and write
5A8E000
stack
page read and write
35D5000
trusted library allocation
page read and write
35EC000
trusted library allocation
page read and write
7F240000
trusted library allocation
page execute and read and write
5BCE000
stack
page read and write
35E0000
trusted library allocation
page read and write
35B0000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
F00000
heap
page read and write
323F000
stack
page read and write
5CCE000
stack
page read and write
1577000
trusted library allocation
page execute and read and write
1440000
heap
page read and write
575E000
stack
page read and write
1532000
trusted library allocation
page execute and read and write
F05000
heap
page read and write
1030000
heap
page read and write
35BC000
trusted library allocation
page read and write
594E000
stack
page read and write
F10000
trusted library allocation
page read and write
580E000
stack
page read and write
1607000
heap
page read and write
C8C000
stack
page read and write
35DB000
trusted library allocation
page read and write
313E000
stack
page read and write
There are 71 hidden memdumps, click here to show them.