Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Downloads\P00002.pdf (copy)
|
PDF document, version 1.4, 1 pages
|
dropped
|
||
C:\Users\user\Downloads\P00002.pdf.crdownload (copy)
|
PDF document, version 1.4, 1 pages
|
dropped
|
||
C:\Users\user\Downloads\allegati_comunicazione.zip (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 29 18:16:54 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 29 18:16:54 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 29 18:16:54 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 29 18:16:54 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 29 18:16:54 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\Downloads\2c3fc3a5-37d8-41ea-b29b-c7004ddd1cc2.tmp
|
PDF document, version 1.4, 1 pages
|
dropped
|
||
C:\Users\user\Downloads\7972eb78-9921-464b-8695-b67cbc8d09a2.tmp
|
PDF document, version 1.4, 1 pages
|
dropped
|
||
C:\Users\user\Downloads\ad2fe5bb-7848-49f6-80d8-80ef56ba2691.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Downloads\allegati_comunicazione.zip.crdownload (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
Chrome Cache Entry: 100
|
ASCII text, with very long lines (18186), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 101
|
Unicode text, UTF-8 text, with very long lines (64737)
|
downloaded
|
||
Chrome Cache Entry: 102
|
PNG image data, 200 x 101, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 103
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 104
|
Unicode text, UTF-8 text, with very long lines (65534), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 84
|
ASCII text, with very long lines (2480), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 85
|
ASCII text, with very long lines (2480), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 86
|
Unicode text, UTF-8 text, with very long lines (64737)
|
dropped
|
||
Chrome Cache Entry: 87
|
ASCII text, with very long lines (18186), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 88
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 89
|
Unicode text, UTF-8 (with BOM) text, with very long lines (586), with CRLF line terminators
|
downloaded
|
||
Chrome Cache Entry: 90
|
Web Open Font Format (Version 2), TrueType, length 77160, version 4.459
|
downloaded
|
||
Chrome Cache Entry: 91
|
Unicode text, UTF-8 (with BOM) text, with very long lines (586), with CRLF line terminators
|
dropped
|
||
Chrome Cache Entry: 92
|
PNG image data, 200 x 101, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (37691), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 94
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 95
|
HTML document, ASCII text, with very long lines (664), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 96
|
Unicode text, UTF-8 text, with very long lines (65534), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 98
|
ASCII text, with very long lines (37691), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 99
|
Unicode text, UTF-8 text, with very long lines (64006)
|
downloaded
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=2024,i,7664804515315866365,6801560600046413987,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://clienti.documentipostali.it/#/public/email/a703266c-62aa-4024-8f0c-254725c31c25-DD0015830773-D0002973415"
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://clienti.documentipostali.it/#/public/email/a703266c-62aa-4024-8f0c-254725c31c25-DD0015830773-D0002973415
|
|||
https://github.com/twbs/bootstrap/blob/master/LICENSE)
|
unknown
|
||
http://fontawesome.io
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.wptools.de)
|
unknown
|
||
https://getbootstrap.com/)
|
unknown
|
||
https://clienti.documentipostali.it/#/public/email/a703266c-62aa-4024-8f0c-254725c31c25-DD0015830773-D0002973415
|
|||
http://docs.ckeditor.com/#
|
unknown
|
||
https://cdnjs.cloudflare.com/ajax/libs/pdf.js/2.4.456/pdf.worker.min.js
|
104.17.24.14
|
||
http://www.wptools.de
|
unknown
|
||
http://ckeditor.com/license
|
unknown
|
||
file:///C:/Users/user/Downloads/P00002.pdf
|
|||
http://fontawesome.io/license
|
unknown
|
There are 2 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cdnjs.cloudflare.com
|
104.17.24.14
|
||
www.google.com
|
142.250.181.100
|
||
clienti.documentipostali.it
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.17.24.14
|
cdnjs.cloudflare.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.16
|
unknown
|
unknown
|
||
104.17.25.14
|
unknown
|
United States
|
||
142.250.181.100
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
283A0540000
|
heap
|
page read and write
|
||
BA3BB6E000
|
stack
|
page read and write
|
||
2839EDF5000
|
heap
|
page read and write
|
||
2839E9D0000
|
heap
|
page read and write
|
||
2839EB09000
|
heap
|
page read and write
|
||
BA3BAEC000
|
stack
|
page read and write
|
||
2839EDF0000
|
heap
|
page read and write
|
||
BA3BBEE000
|
stack
|
page read and write
|
||
BA3BE7F000
|
stack
|
page read and write
|
||
2839EAD0000
|
heap
|
page read and write
|
||
2839EAB0000
|
heap
|
page read and write
|
||
2839EB00000
|
heap
|
page read and write
|
There are 2 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://clienti.documentipostali.it/#/public/email/a703266c-62aa-4024-8f0c-254725c31c25-DD0015830773-D0002973415
|
||
https://clienti.documentipostali.it/#/public/email/a703266c-62aa-4024-8f0c-254725c31c25-DD0015830773-D0002973415
|
||
https://clienti.documentipostali.it/#/public/email/a703266c-62aa-4024-8f0c-254725c31c25-DD0015830773-D0002973415
|
||
file:///C:/Users/user/Downloads/P00002.pdf
|
||
file:///C:/Users/user/Downloads/P00002.pdf
|