IOC Report
xrPfnwOyJZqd.exe

loading gif

Files

File Path
Type
Category
Malicious
xrPfnwOyJZqd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
Chrome Cache Entry: 49
ASCII text, with very long lines (1746)
downloaded
Chrome Cache Entry: 50
ASCII text, with very long lines (771)
downloaded
Chrome Cache Entry: 51
ASCII text
downloaded
Chrome Cache Entry: 52
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 53
ASCII text, with very long lines (3572), with no line terminators
downloaded
Chrome Cache Entry: 54
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 55
ASCII text, with very long lines (2124)
downloaded

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xrPfnwOyJZqd.exe
"C:\Users\user\Desktop\xrPfnwOyJZqd.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=2064,i,9320462037478548023,11330767766689099081,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
warzones12.duckdns.org
malicious
https://www.google.com/async/ddljson?async=ntp:2
142.250.190.132
https://play.google.com/log?format=json&hasfast=true
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.190.132
http://www.broofa.com
unknown
https://csp.withgoogle.com/csp/lcreport/
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0
142.250.191.206
https://www.google.com/async/newtab_promos
142.250.190.132
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.190.132
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
https://domains.google.com/suggest/flow
unknown
https://clients6.google.com
unknown
https://plus.google.com
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
warzones12.duckdns.org
179.13.0.175
malicious
plus.l.google.com
142.250.191.206
www.google.com
142.250.190.132
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
179.13.0.175
warzones12.duckdns.org
Colombia
malicious
192.168.2.7
unknown
unknown
malicious
142.250.190.132
www.google.com
United States
239.255.255.250
unknown
Reserved
142.250.191.206
plus.l.google.com
United States
192.168.2.4
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2331000
trusted library allocation
page read and write
malicious
42000
unkown
page readonly
malicious
7FFB22680000
unkown
page read and write
7FFAAC8F0000
trusted library allocation
page read and write
7FFAAC774000
trusted library allocation
page read and write
40000
unkown
page readonly
1ADB3000
heap
page read and write
1BB8C000
stack
page read and write
7FFAAC750000
trusted library allocation
page read and write
1B2C0000
heap
page read and write
7FFAAC76D000
trusted library allocation
page execute and read and write
184000
stack
page read and write
1B2BF000
stack
page read and write
2437000
trusted library allocation
page read and write
7FFAAC806000
trusted library allocation
page read and write
12331000
trusted library allocation
page read and write
1B580000
heap
page read and write
7FFB22685000
unkown
page readonly
400000
heap
page read and write
1AC7E000
stack
page read and write
7FFB22682000
unkown
page readonly
770000
trusted library allocation
page read and write
491000
heap
page read and write
7FFAAC7AC000
trusted library allocation
page execute and read and write
2320000
heap
page read and write
460000
heap
page read and write
420000
heap
page read and write
7FFAAC800000
trusted library allocation
page read and write
1A360000
trusted library allocation
page read and write
7FFB22660000
unkown
page readonly
4A1000
heap
page read and write
1B30E000
heap
page read and write
1AEBA000
stack
page read and write
7FFAAC836000
trusted library allocation
page execute and read and write
2378000
trusted library allocation
page read and write
1E0000
heap
page read and write
40000
unkown
page readonly
805000
heap
page read and write
4E4000
heap
page read and write
1B98C000
stack
page read and write
7FFAAC760000
trusted library allocation
page read and write
4CD000
heap
page read and write
1ADB0000
heap
page read and write
7FFB22661000
unkown
page execute read
1B88A000
stack
page read and write
7FFAAC770000
trusted library allocation
page read and write
7FF42BF90000
trusted library allocation
page execute and read and write
49F000
heap
page read and write
1B2D2000
heap
page read and write
1233E000
trusted library allocation
page read and write
800000
heap
page read and write
7FFAAC754000
trusted library allocation
page read and write
48A000
heap
page read and write
A40000
heap
page read and write
1A8BC000
stack
page read and write
4D1000
heap
page read and write
A0C000
stack
page read and write
1B312000
heap
page read and write
1ACB0000
heap
page execute and read and write
12338000
trusted library allocation
page read and write
1B30C000
heap
page read and write
66F000
stack
page read and write
522000
heap
page read and write
46C000
heap
page read and write
22EF000
stack
page read and write
7FFAAC870000
trusted library allocation
page execute and read and write
A10000
heap
page read and write
760000
trusted library allocation
page read and write
1B68F000
stack
page read and write
780000
heap
page execute and read and write
1B0BF000
stack
page read and write
740000
trusted library allocation
page read and write
493000
heap
page read and write
7FFAAC80C000
trusted library allocation
page execute and read and write
1D0000
heap
page read and write
4CB000
heap
page read and write
7FFAAC75D000
trusted library allocation
page execute and read and write
520000
heap
page read and write
90E000
stack
page read and write
7FFAAC77D000
trusted library allocation
page execute and read and write
1B1BC000
stack
page read and write
7FFAAC901000
trusted library allocation
page read and write
51D000
heap
page read and write
7FFAAC810000
trusted library allocation
page execute and read and write
7FFB22676000
unkown
page readonly
27E9000
trusted library allocation
page read and write
1A6B0000
heap
page read and write
7FFAAC753000
trusted library allocation
page execute and read and write
7FFAAC762000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
1AFB4000
stack
page read and write
A45000
heap
page read and write
773000
trusted library allocation
page read and write
There are 83 hidden memdumps, click here to show them.