Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unarchiver.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip.crdownload
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
Chrome Cache Entry: 49
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
downloaded
|
||
Chrome Cache Entry: 50
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2420 --field-trial-handle=1984,i,9041773597454674287,8571613679135902817,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://docs.google.com/uc?export=download&id=1gucHUhrnC0jRDGAhRfRkCK8rYqf0o3cv"
|
||
C:\Windows\SysWOW64\unarchiver.exe
|
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip"
|
||
C:\Windows\SysWOW64\7za.exe
|
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\cbr0q0l4.clz" "C:\Users\user\Downloads\FALLO
SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
docs.google.com
|
142.250.184.238
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
drive.usercontent.google.com
|
142.250.185.193
|
||
www.google.com
|
172.217.18.4
|
||
s-part-0032.t-0009.t-msedge.net
|
13.107.246.60
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.185.193
|
drive.usercontent.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.217.18.4
|
www.google.com
|
United States
|
||
192.168.2.7
|
unknown
|
unknown
|
||
142.250.184.238
|
docs.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
960000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
2A08000
|
trusted library allocation
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
3961000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
2A0D000
|
trusted library allocation
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
2A1B000
|
trusted library allocation
|
page read and write
|
||
7FAB0000
|
trusted library allocation
|
page execute and read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
4F9000
|
stack
|
page read and write
|
||
29E3000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
B5F000
|
stack
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
A62000
|
trusted library allocation
|
page execute and read and write
|
||
85A000
|
trusted library allocation
|
page execute and read and write
|
||
1DC000
|
stack
|
page read and write
|
||
C50000
|
trusted library allocation
|
page execute and read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
84A000
|
trusted library allocation
|
page execute and read and write
|
||
8C0000
|
heap
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
A7B000
|
trusted library allocation
|
page execute and read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
2A21000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
29A7000
|
trusted library allocation
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
2A19000
|
trusted library allocation
|
page read and write
|
||
832000
|
trusted library allocation
|
page execute and read and write
|
||
29D6000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
2A02000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
29AF000
|
trusted library allocation
|
page read and write
|
||
4AED000
|
stack
|
page read and write
|
||
A77000
|
trusted library allocation
|
page execute and read and write
|
||
910000
|
heap
|
page read and write
|
||
C5F000
|
stack
|
page read and write
|
||
29FC000
|
trusted library allocation
|
page read and write
|
||
83A000
|
trusted library allocation
|
page execute and read and write
|
||
E10000
|
heap
|
page execute and read and write
|
||
2A1E000
|
trusted library allocation
|
page read and write
|
||
29F9000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
39C000
|
stack
|
page read and write
|
||
A6A000
|
trusted library allocation
|
page execute and read and write
|
||
ABE000
|
stack
|
page read and write
|
||
2A0A000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
842000
|
trusted library allocation
|
page execute and read and write
|
||
84C000
|
trusted library allocation
|
page execute and read and write
|
||
4FB000
|
stack
|
page read and write
|
||
29B4000
|
trusted library allocation
|
page read and write
|
||
7AF000
|
stack
|
page read and write
|
||
89E000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
29C2000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
2A24000
|
trusted library allocation
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
29FF000
|
trusted library allocation
|
page read and write
|
||
4C2A000
|
stack
|
page read and write
|
||
2A13000
|
trusted library allocation
|
page read and write
|
||
29B7000
|
trusted library allocation
|
page read and write
|
||
4B2D000
|
stack
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
6A6000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
29F7000
|
trusted library allocation
|
page read and write
|
||
29CA000
|
trusted library allocation
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
29C5000
|
trusted library allocation
|
page read and write
|
||
2400000
|
heap
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
There are 88 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://drive.usercontent.google.com/download?id=1gucHUhrnC0jRDGAhRfRkCK8rYqf0o3cv&export=download
|