IOC Report
171429109375b3b920cee552fad739e9c4a7f13922ed9d66bf32a3993fab5b757bcc601074656.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
171429109375b3b920cee552fad739e9c4a7f13922ed9d66bf32a3993fab5b757bcc601074656.dat-decoded.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
Chrome Cache Entry: 51
ASCII text, with very long lines (1746)
downloaded
Chrome Cache Entry: 52
ASCII text
downloaded
Chrome Cache Entry: 53
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 54
ASCII text, with very long lines (3572), with no line terminators
downloaded
Chrome Cache Entry: 55
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 56
ASCII text, with very long lines (2124)
downloaded
Chrome Cache Entry: 57
ASCII text
downloaded

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\171429109375b3b920cee552fad739e9c4a7f13922ed9d66bf32a3993fab5b757bcc601074656.dat-decoded.exe
"C:\Users\user\Desktop\171429109375b3b920cee552fad739e9c4a7f13922ed9d66bf32a3993fab5b757bcc601074656.dat-decoded.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 --field-trial-handle=2496,i,13517212685356134340,2370661816050994569,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1124 --field-trial-handle=2028,i,13329251012211762179,12573226295212013179,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
nmds.duckdns.org
malicious
https://www.google.com/async/ddljson?async=ntp:2
172.253.115.147
https://play.google.com/log?format=json&hasfast=true
unknown
http://www.broofa.com
unknown
https://csp.withgoogle.com/csp/lcreport/
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0
172.253.122.102
https://www.google.com/async/newtab_promos
172.253.115.147
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
172.253.115.147
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
https://domains.google.com/suggest/flow
unknown
https://clients6.google.com
unknown
https://plus.google.com
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
nmds.duckdns.org
87.121.105.4
malicious
google.com
172.253.63.100
plus.l.google.com
172.253.122.102
www.google.com
172.253.115.147
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
87.121.105.4
nmds.duckdns.org
Bulgaria
malicious
172.253.122.102
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
172.253.115.147
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\082C2C722F273426B981
4DA7B92DD81FF96931AA9012EABAA0878D13C78DC3CD840B102CE7E15FEC4B7B
HKEY_CURRENT_USER\SOFTWARE\082C2C722F273426B981
91E582DD0FE0224A74B326FAA35161958AAE425DF4B6151646B9C330E7BD5487

Memdumps

Base Address
Regiontype
Protect
Malicious
322000
unkown
page readonly
malicious
24E1000
trusted library allocation
page read and write
malicious
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
1C160000
trusted library allocation
page read and write
254B000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
1BE8B000
stack
page read and write
1B163000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1B0BC000
heap
page read and write
7F2000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
8A7000
heap
page read and write
CE0000
heap
page execute and read and write
7FFD9B816000
trusted library allocation
page read and write
1B540000
heap
page read and write
26B2000
trusted library allocation
page read and write
1CCBC000
stack
page read and write
1AFAA000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
2558000
trusted library allocation
page read and write
2556000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
2538000
trusted library allocation
page read and write
3E0000
heap
page read and write
2548000
trusted library allocation
page read and write
2535000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1B125000
heap
page read and write
1B110000
heap
page read and write
D35000
heap
page read and write
801000
heap
page read and write
BBB000
stack
page read and write
1B165000
heap
page read and write
1CA8D000
heap
page read and write
1BD7C000
stack
page read and write
7A0000
trusted library allocation
page read and write
1B97E000
stack
page read and write
2563000
trusted library allocation
page read and write
253E000
trusted library allocation
page read and write
AA0000
heap
page execute and read and write
1CBB0000
heap
page read and write
1C0B0000
heap
page read and write
6F1000
stack
page read and write
1C29B000
stack
page read and write
3B0000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
839000
heap
page read and write
AB5000
heap
page read and write
1C39C000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
84F000
heap
page read and write
2541000
trusted library allocation
page read and write
AB0000
heap
page read and write
256D000
trusted library allocation
page read and write
255D000
trusted library allocation
page read and write
269A000
trusted library allocation
page read and write
257B000
trusted library allocation
page read and write
700000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
1CA80000
heap
page read and write
750000
trusted library allocation
page read and write
7CC000
heap
page read and write
82D000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1A510000
trusted library allocation
page read and write
1BA79000
stack
page read and write
1B0F7000
heap
page read and write
7FFD9B99F000
trusted library allocation
page read and write
1AA6D000
stack
page read and write
2553000
trusted library allocation
page read and write
255F000
trusted library allocation
page read and write
1B0B0000
heap
page read and write
2698000
trusted library allocation
page read and write
320000
unkown
page readonly
793000
heap
page read and write
1B53F000
stack
page read and write
1BD80000
trusted library section
page read and write
1C49D000
stack
page read and write
7D5000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
256B000
trusted library allocation
page read and write
1C090000
trusted library section
page read and write
7FFD9B762000
trusted library allocation
page read and write
7FFD9B9E2000
trusted library allocation
page read and write
1B15C000
heap
page read and write
1D5C0000
heap
page read and write
8A3000
heap
page read and write
3C0000
heap
page read and write
2543000
trusted library allocation
page read and write
D30000
heap
page read and write
CBE000
stack
page read and write
7EA000
heap
page read and write
7A3000
trusted library allocation
page read and write
124F1000
trusted library allocation
page read and write
851000
heap
page read and write
1BB76000
stack
page read and write
7C0000
heap
page read and write
320000
unkown
page readonly
1B15F000
heap
page read and write
124E1000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
1CBB4000
heap
page read and write
1B3AE000
stack
page read and write
7FFD9B9D5000
trusted library allocation
page read and write
259C000
trusted library allocation
page read and write
7DF000
heap
page read and write
25EA000
trusted library allocation
page read and write
833000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1B116000
heap
page read and write
770000
trusted library allocation
page read and write
1B4AE000
stack
page read and write
258A000
trusted library allocation
page read and write
1CA83000
heap
page read and write
CF0000
heap
page read and write
1B14F000
heap
page read and write
12502000
trusted library allocation
page read and write
790000
heap
page read and write
1BF8B000
stack
page read and write
7FFD9B772000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
A8B000
stack
page read and write
7FF4C7F30000
trusted library allocation
page execute and read and write
804000
heap
page read and write
780000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B763000
trusted library allocation
page execute and read and write
254D000
trusted library allocation
page read and write
254F000
trusted library allocation
page read and write
1B2AE000
stack
page read and write
7E3000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
1D5D0000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
25BE000
trusted library allocation
page read and write
1AEA5000
stack
page read and write
7FFD9B9A8000
trusted library allocation
page read and write
7FFD9B91C000
trusted library allocation
page read and write
1B0A4000
stack
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B94B000
trusted library allocation
page read and write
1BC7E000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1C088000
stack
page read and write
257D000
trusted library allocation
page read and write
There are 140 hidden memdumps, click here to show them.