IOC Report
https://webmail.cmxserver.com/authsecure/index.php?email=kaylen@virtualintelligencebriefing.com

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:45:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:45:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:45:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:45:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:45:57 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 64
PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 65
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 66
HTML document, ASCII text
downloaded
Chrome Cache Entry: 67
gzip compressed data, last modified: Tue Apr 23 19:46:04 2024, from Unix, original size modulo 2^32 5360
dropped
Chrome Cache Entry: 68
gzip compressed data, last modified: Tue Apr 23 19:46:01 2024, from Unix, original size modulo 2^32 5360
downloaded
Chrome Cache Entry: 69
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
HTML document, ASCII text
downloaded
Chrome Cache Entry: 71
TrueType Font data, 19 tables, 1st "FFTM"
downloaded
Chrome Cache Entry: 72
HTML document, ASCII text
downloaded
Chrome Cache Entry: 73
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
gzip compressed data, last modified: Tue Apr 23 19:46:01 2024, from Unix, original size modulo 2^32 144905
downloaded
Chrome Cache Entry: 75
TrueType Font data, 19 tables, 1st "FFTM"
downloaded
Chrome Cache Entry: 76
HTML document, ASCII text
downloaded
Chrome Cache Entry: 77
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 78
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 79
HTML document, ASCII text
downloaded
Chrome Cache Entry: 80
gzip compressed data, last modified: Tue Apr 23 19:46:00 2024, from Unix, original size modulo 2^32 6358
downloaded
Chrome Cache Entry: 81
HTML document, ASCII text
downloaded
Chrome Cache Entry: 82
HTML document, ASCII text
downloaded
Chrome Cache Entry: 83
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 84
HTML document, ASCII text
downloaded
Chrome Cache Entry: 85
HTML document, ASCII text
downloaded
Chrome Cache Entry: 86
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 87
PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 88
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 89
PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 90
HTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (10631)
downloaded
Chrome Cache Entry: 91
TrueType Font data, 19 tables, 1st "FFTM"
downloaded
Chrome Cache Entry: 92
PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 93
HTML document, ASCII text
downloaded
Chrome Cache Entry: 94
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
downloaded
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 --field-trial-handle=2236,i,4940320550483537317,12252077527601305955,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://webmail.cmxserver.com/authsecure/index.php?email=kaylen@virtualintelligencebriefing.com"

URLs

Name
IP
Malicious
https://webmail.cmxserver.com/authsecure/index.php?email=kaylen@virtualintelligencebriefing.com
malicious
https://webmail.cmxserver.com/authsecure/index.php?email=kaylen@virtualintelligencebriefing.com
malicious
https://webmail.cmxserver.com/?locale=bn
https://technonace.com:2096/cPanel_magic_revision_1468619317/unprotected/cpanel/images/webmail-logo.
unknown
https://webmail.cmxserver.com/?locale=en
https://webmail.cmxserver.com/?locale=el
https://webmail.cmxserver.com/?locale=bg
https://technonace.com:2096/cPanel_magic_revision_1386192030/unprotected/cpanel/fonts/open_sans/open
unknown
https://webmail.cmxserver.com/resetpass?start=1
https://webmail.cmxserver.com/?locale=de
https://webmail.cmxserver.com/?locale=da
https://webmail.cmxserver.com/favicon.ico
185.38.249.30
https://go.cpanel.net/privacy
unknown
https://technonace.com:2096/cPanel_magic_revision_1595982703/unprotected/cpanel/style_v2_optimized.c
unknown
https://webmail.cmxserver.com/?locale=ar
https://webmail.cmxserver.com/?locale=cs
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
webmail.cmxserver.com
185.38.249.30
technonace.com
136.243.80.35
www.google.com
172.253.124.106
fp2e7a.wpc.phicdn.net
192.229.211.108
_2096._https.technonace.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.17
unknown
unknown
136.243.80.35
technonace.com
Germany
172.253.124.106
www.google.com
United States
192.168.2.6
unknown
unknown
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
185.38.249.30
webmail.cmxserver.com
Poland

DOM / HTML

URL
Malicious
https://webmail.cmxserver.com/authsecure/index.php?email=kaylen@virtualintelligencebriefing.com
https://webmail.cmxserver.com/resetpass?start=1
https://webmail.cmxserver.com/?locale=en
https://webmail.cmxserver.com/?locale=ar
https://webmail.cmxserver.com/?locale=bg
https://webmail.cmxserver.com/?locale=bn
https://webmail.cmxserver.com/?locale=cs
https://webmail.cmxserver.com/?locale=da
https://webmail.cmxserver.com/?locale=de
https://webmail.cmxserver.com/?locale=el