IOC Report
2k632W2O.exe

loading gif

Files

File Path
Type
Category
Malicious
2k632W2O.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\PerfMon\PerfWatson2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\PerfMon\1201824912038.xml
XML 1.0 document, ASCII text, with CRLF, CR line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\PerfMon\PerfWatson2.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 50
ASCII text, with very long lines (3774)
downloaded

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2k632W2O.exe
"C:\Users\user\Desktop\2k632W2O.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 5 /tn "PerformanceMonitor_{Y6F7A6L1Q3V2W4S7}" /tr "C:\Users\user\AppData\Roaming\Microsoft\PerfMon\PerfWatson2.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /Query /XML /TN "PerformanceMonitor_{Y6F7A6L1Q3V2W4S7}"
malicious
C:\Users\user\AppData\Roaming\Microsoft\PerfMon\PerfWatson2.exe
C:\Users\user\AppData\Roaming\Microsoft\PerfMon\PerfWatson2.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /tn "PerformanceMonitor_{Y6F7A6L1Q3V2W4S7}" /XML "C:\Users\user\AppData\Roaming\Microsoft\PerfMon\1201824912038.xml"
malicious
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 5 /tn "PerformanceMonitor_{Y6F7A6L1Q3V2W4S7}" /tr "C:\Users\user\AppData\Roaming\Microsoft\PerfMon\PerfWatson2.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 --field-trial-handle=2320,i,9069043476438568243,10755491246426050170,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.google.com/async/ddljson?async=ntp:2
142.250.189.132
https://www.google.com/async/newtab_promos
142.250.189.132
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.189.132
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.189.132
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGOe2sLEGIjBr0MdO0BYOJHvE4c3r_MeYQPdjstJTWuR7MYyn8Z4PVcXCDLAhkZk0gANbn-kD57oyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.189.132
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGOe2sLEGIjCRQXKD8hfxz0ViO1eijFkmmx_OTjfe4iTZ5wTUpUMhz8i_7ZLVRoSzurhTqh7cwPUyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.189.132

Domains

Name
IP
Malicious
www.google.com
142.250.189.132

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
142.250.189.132
www.google.com
United States
192.168.2.7
unknown
unknown
192.168.2.5
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1580000
trusted library allocation
page read and write
67B000
unkown
page read and write
1544000
heap
page read and write
5C6000
unkown
page execute read
14A4000
heap
page read and write
14A4000
heap
page read and write
14A4000
heap
page read and write
650000
unkown
page readonly
1544000
heap
page read and write
30F1000
heap
page read and write
965000
unkown
page execute read
107F000
unkown
page readonly
166C000
heap
page read and write
1544000
heap
page read and write
166C000
heap
page read and write
14A4000
heap
page read and write
1540000
heap
page read and write
171B000
heap
page read and write
5C0000
unkown
page readonly
5C1000
unkown
page execute read
2FA0000
heap
page read and write
1544000
heap
page read and write
1544000
heap
page read and write
170E000
heap
page read and write
1544000
heap
page read and write
2FA1000
heap
page read and write
14A4000
heap
page read and write
1544000
heap
page read and write
138C000
stack
page read and write
651000
unkown
page execute read
1544000
heap
page read and write
14A4000
heap
page read and write
1544000
heap
page read and write
1544000
heap
page read and write
107F000
unkown
page readonly
1544000
heap
page read and write
5F1000
unkown
page execute read
5C0000
unkown
page readonly
1544000
heap
page read and write
1544000
heap
page read and write
5F0000
heap
page read and write
14A4000
heap
page read and write
1544000
heap
page read and write
14A4000
heap
page read and write
14A4000
heap
page read and write
118C000
stack
page read and write
16C0000
heap
page read and write
14A4000
heap
page read and write
1650000
heap
page read and write
14A0000
heap
page read and write
681000
unkown
page execute read
148E000
stack
page read and write
14A4000
heap
page read and write
14A4000
heap
page read and write
5C5000
unkown
page read and write
1544000
heap
page read and write
5EB000
unkown
page read and write
171B000
heap
page read and write
14A4000
heap
page read and write
1544000
heap
page read and write
14A4000
heap
page read and write
14D0000
trusted library allocation
page read and write
2FA1000
heap
page read and write
1544000
heap
page read and write
1544000
heap
page read and write
3340000
heap
page read and write
1544000
heap
page read and write
14A4000
heap
page read and write
9F5000
unkown
page execute read
33B0000
heap
page read and write
1544000
heap
page read and write
1674000
heap
page read and write
14A4000
heap
page read and write
13F0000
heap
page read and write
1544000
heap
page read and write
14A4000
heap
page read and write
1544000
heap
page read and write
32D0000
heap
page read and write
194F000
stack
page read and write
1400000
heap
page read and write
1700000
heap
page read and write
128C000
stack
page read and write
5C3000
unkown
page readonly
1544000
heap
page read and write
1544000
heap
page read and write
FEF000
unkown
page readonly
15BA000
heap
page read and write
14A4000
heap
page read and write
1544000
heap
page read and write
1544000
heap
page read and write
165A000
heap
page read and write
14A4000
heap
page read and write
14A4000
heap
page read and write
1544000
heap
page read and write
30F0000
heap
page read and write
656000
unkown
page execute read
14A4000
heap
page read and write
655000
unkown
page read and write
14A4000
heap
page read and write
170A000
heap
page read and write
14A4000
heap
page read and write
30F1000
heap
page read and write
14A4000
heap
page read and write
965000
unkown
page execute read
653000
unkown
page readonly
14A4000
heap
page read and write
14A4000
heap
page read and write
9F5000
unkown
page execute read
1544000
heap
page read and write
1544000
heap
page read and write
144E000
stack
page read and write
14A4000
heap
page read and write
14A4000
heap
page read and write
1675000
heap
page read and write
184F000
stack
page read and write
14A4000
heap
page read and write
FEF000
unkown
page readonly
14A4000
heap
page read and write
650000
unkown
page readonly
165E000
heap
page read and write
14A4000
heap
page read and write
5E0000
heap
page read and write
57C000
stack
page read and write
14A4000
heap
page read and write
14A4000
heap
page read and write
There are 115 hidden memdumps, click here to show them.