Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Downloads\download (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\Downloads\download.crdownload (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\Downloads\eb76f244-1dc7-49cc-8f3d-8698e4139dd6.tmp
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 41
|
ASCII text
|
downloaded
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=2144,i,1816836253766045866,4482234707161197817,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://cybba.solutions"
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://cybba.solutions
|
|||
https://cybba.solutions/
|
104.21.67.105
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cybba.solutions
|
172.67.221.94
|
||
www.google.com
|
142.250.105.106
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.4
|
unknown
|
unknown
|
||
142.250.105.106
|
www.google.com
|
United States
|
||
104.21.67.105
|
unknown
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
17969A50000
|
heap
|
page read and write
|
||
49BF59F000
|
stack
|
page read and write
|
||
17969BA0000
|
heap
|
page read and write
|
||
49BF51C000
|
stack
|
page read and write
|
||
17969BB0000
|
heap
|
page read and write
|
||
49BF87F000
|
stack
|
page read and write
|
||
17969BB8000
|
heap
|
page read and write
|
||
1796B490000
|
heap
|
page read and write
|
||
17969B50000
|
heap
|
page read and write
|
||
17969B30000
|
heap
|
page read and write
|
||
17969BA5000
|
heap
|
page read and write
|
There are 1 hidden memdumps, click here to show them.