IOC Report
IDProtect Manager.exe

loading gif

Files

File Path
Type
Category
Malicious
IDProtect Manager.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 20:59:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 20:59:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 20:59:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 20:59:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 20:59:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 56
ASCII text, with very long lines (3753)
downloaded

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\IDProtect Manager.exe
"C:\Users\user\Desktop\IDProtect Manager.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1960,i,4465652620104932970,15968156762818287997,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Users\user\Desktop\IDProtect Manager.exe
"C:\Users\user\Desktop\IDProtect Manager.exe"
C:\Users\user\Desktop\IDProtect Manager.exe
"C:\Users\user\Desktop\IDProtect Manager.exe"

URLs

Name
IP
Malicious
https://www.google.com/async/ddljson?async=ntp:2
142.250.217.196
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGN3HsLEGIjBXNY7YcegvyOHYSwdfu5I_M0N2dcx3FvhLYsqeDJ9GBKii4_kEKNqzeEuer1mYsD0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.217.196
https://www.google.com/async/newtab_promos
142.250.217.196
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.217.196
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.217.196
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGN3HsLEGIjBX3BfcQ98qwWOS90Bukqjp-iVTJvobixLhl4MnGPX3CMTHq4gdZ2y95_O1i-7EVc0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.217.196

Domains

Name
IP
Malicious
www.google.com
142.250.217.196

IPs

IP
Domain
Country
Malicious
142.250.217.196
www.google.com
United States
239.255.255.250
unknown
Reserved
192.168.2.16
unknown
unknown
192.168.2.4
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
5DF000
heap
page read and write
B07000
heap
page read and write
5B0000
heap
page read and write
58B000
heap
page read and write
88F000
stack
page read and write
2457000
heap
page read and write
5FB000
heap
page read and write
2454000
heap
page read and write
9AE000
stack
page read and write
54C0000
trusted library allocation
page read and write
2324000
heap
page read and write
597000
heap
page read and write
AFE000
stack
page read and write
47B000
unkown
page readonly
590000
heap
page read and write
252BDA50000
heap
page read and write
5DC000
heap
page read and write
756000
heap
page read and write
4E0000
heap
page read and write
75B000
heap
page read and write
49F000
unkown
page readonly
591000
heap
page read and write
5AC000
heap
page read and write
5D0000
heap
page read and write
86E000
stack
page read and write
590000
heap
page read and write
5E7000
heap
page read and write
58C000
heap
page read and write
588000
heap
page read and write
754000
heap
page read and write
730000
heap
page read and write
199000
stack
page read and write
5DF000
heap
page read and write
401000
unkown
page execute read
CB6000
heap
page read and write
47B000
unkown
page readonly
4F0000
heap
page read and write
19B000
stack
page read and write
5A7000
heap
page read and write
498000
unkown
page read and write
5D9000
heap
page read and write
B00000
heap
page read and write
5A3000
heap
page read and write
98000
stack
page read and write
2410000
heap
page read and write
4F0000
heap
page read and write
28EE000
stack
page read and write
730000
heap
page read and write
496000
unkown
page read and write
498000
unkown
page read and write
BB0000
heap
page read and write
743000
heap
page read and write
58F000
heap
page read and write
749000
heap
page read and write
252BDA30000
heap
page read and write
5E0000
heap
page read and write
2320000
heap
page read and write
CB0000
heap
page read and write
736000
heap
page read and write
5A8000
heap
page read and write
567000
heap
page read and write
5FC000
heap
page read and write
75A000
heap
page read and write
5470000
trusted library allocation
page read and write
5DB000
heap
page read and write
584000
heap
page read and write
2A4F000
stack
page read and write
5B3000
heap
page read and write
59B000
heap
page read and write
ACF000
stack
page read and write
580000
heap
page read and write
199000
stack
page read and write
58B000
heap
page read and write
5D0000
heap
page read and write
2460000
heap
page read and write
5E8000
heap
page read and write
6B0000
heap
page read and write
AD0000
heap
page read and write
CBA000
heap
page read and write
404F000
stack
page read and write
9CE000
stack
page read and write
5DB000
heap
page read and write
252BDA80000
heap
page read and write
5D6000
heap
page read and write
400000
unkown
page readonly
5B0000
heap
page read and write
1D0000
heap
page read and write
735000
heap
page read and write
58F000
heap
page read and write
57E000
stack
page read and write
AD6000
heap
page read and write
2417000
heap
page read and write
751000
heap
page read and write
598000
heap
page read and write
5B7000
heap
page read and write
74E000
heap
page read and write
4E0000
heap
page read and write
53E000
stack
page read and write
580000
heap
page read and write
5A9000
heap
page read and write
740000
heap
page read and write
96E000
stack
page read and write
5E7000
heap
page read and write
75F000
heap
page read and write
252BDC05000
heap
page read and write
2560000
heap
page read and write
25EE000
stack
page read and write
53E000
stack
page read and write
58D000
heap
page read and write
52E000
stack
page read and write
AB0000
heap
page read and write
4D1000
unkown
page readonly
74C000
heap
page read and write
496000
unkown
page write copy
3F4E000
stack
page read and write
5DC000
heap
page read and write
5E2000
heap
page read and write
5A1000
heap
page read and write
5F8000
heap
page read and write
8FF000
stack
page read and write
590000
heap
page read and write
82B9FAE000
stack
page read and write
98000
stack
page read and write
26EF000
stack
page read and write
5E8000
heap
page read and write
23FE000
stack
page read and write
9FE000
stack
page read and write
24AE000
stack
page read and write
252BDC00000
heap
page read and write
6BE000
stack
page read and write
57E000
stack
page read and write
5D8000
heap
page read and write
C00000
heap
page read and write
560000
heap
page read and write
73C000
heap
page read and write
239C000
stack
page read and write
82B9F2E000
stack
page read and write
5DF000
heap
page read and write
540000
heap
page read and write
47B000
unkown
page readonly
ADA000
heap
page read and write
5EB000
heap
page read and write
24C4000
heap
page read and write
2350000
heap
page read and write
2450000
heap
page read and write
5D8000
heap
page read and write
58C000
heap
page read and write
98E000
stack
page read and write
2564000
heap
page read and write
732000
heap
page read and write
254E000
stack
page read and write
82BA27F000
stack
page read and write
2B8F000
stack
page read and write
5DF000
heap
page read and write
496000
unkown
page read and write
82B9EAC000
stack
page read and write
72C000
heap
page read and write
599000
heap
page read and write
58F000
heap
page read and write
70E000
heap
page read and write
5AB000
heap
page read and write
5D4000
heap
page read and write
410F000
stack
page read and write
530000
heap
page read and write
700000
heap
page read and write
25AF000
stack
page read and write
742000
heap
page read and write
597000
heap
page read and write
82E000
stack
page read and write
2D8F000
stack
page read and write
732000
heap
page read and write
75E000
heap
page read and write
97000
stack
page read and write
23B0000
heap
page read and write
709000
heap
page read and write
72C000
heap
page read and write
2414000
heap
page read and write
496000
unkown
page read and write
752000
heap
page read and write
252BDA88000
heap
page read and write
5A0000
heap
page read and write
2A8E000
stack
page read and write
2C8F000
stack
page read and write
5410000
heap
page read and write
58F000
heap
page read and write
B04000
heap
page read and write
252BF4A0000
heap
page read and write
5DD000
heap
page read and write
252BD950000
heap
page read and write
24C0000
heap
page read and write
AAE000
stack
page read and write
5AB000
heap
page read and write
There are 182 hidden memdumps, click here to show them.