IOC Report
https://pub-c53ac24b12464864b63e147b424f6afa.r2.dev/ADAwATMwMAItOTU4MC1jMjA2LTAwAi0wMAoAEABW30hqQQA0SoDyAY.html

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun May 26 21:33:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun May 26 21:33:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun May 26 21:33:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun May 26 21:33:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun May 26 21:33:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 142
ASCII text, with very long lines (65326)
downloaded
Chrome Cache Entry: 143
ASCII text
downloaded
Chrome Cache Entry: 144
ASCII text, with very long lines (64001)
downloaded
Chrome Cache Entry: 145
ASCII text, with very long lines (26371)
downloaded
Chrome Cache Entry: 146
ASCII text, with very long lines (50758)
downloaded
Chrome Cache Entry: 147
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 148
C source, ASCII text
downloaded
Chrome Cache Entry: 149
ASCII text, with very long lines (21435), with no line terminators
downloaded
Chrome Cache Entry: 150
HTML document, ASCII text, with very long lines (611)
downloaded
Chrome Cache Entry: 151
HTML document, ASCII text, with very long lines (412), with CRLF line terminators
downloaded
Chrome Cache Entry: 152
ASCII text, with very long lines (655)
downloaded
Chrome Cache Entry: 153
ASCII text
downloaded
Chrome Cache Entry: 154
ASCII text
downloaded
Chrome Cache Entry: 155
Unicode text, UTF-8 text, with very long lines (64399)
downloaded
Chrome Cache Entry: 156
ASCII text, with very long lines (12309)
downloaded
Chrome Cache Entry: 157
ASCII text
downloaded
Chrome Cache Entry: 158
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 159
ASCII text, with very long lines (32065)
downloaded
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2096,i,2661542040895567109,9855717602252006107,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://pub-c53ac24b12464864b63e147b424f6afa.r2.dev/ADAwATMwMAItOTU4MC1jMjA2LTAwAi0wMAoAEABW30hqQQA0SoDyAY.html"

URLs

Name
IP
Malicious
https://pub-c53ac24b12464864b63e147b424f6afa.r2.dev/ADAwATMwMAItOTU4MC1jMjA2LTAwAi0wMAoAEABW30hqQQA0SoDyAY.html
malicious
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/skins/elastic/webmail-logo.svg
malicious
https://pub-c53ac24b12464864b63e147b424f6afa.r2.dev/ADAwATMwMAItOTU4MC1jMjA2LTAwAi0wMAoAEABW30hqQQA0SoDyAY.html
malicious
http://code.iamcal.com/php/rfc822/
unknown
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/program/js/common_s%3D1705745704.js
104.18.3.35
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://cdnjs.cloudflare.com/ajax/libs/jstimezonedetect/1.0.7/jstz.min.js
unknown
https://shocking-northern-globeflower.glitch.me/jquery.js
44.193.185.113
https://github.com/jquery/jquery/tree/3.5.1
unknown
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/brands/181/11074/styles.2_s%3D1689619297.css
104.18.3.35
http://jqueryui.com
unknown
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/program/js/app_s%3D1707943829.js
104.18.3.35
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
104.18.11.207
https://mathiasbynens.be/notes/javascript-encoding
unknown
https://getbootstrap.com/)
unknown
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/skins/elastic/fonts/roboto-v18-greek-ext_cyrillic-ext_cyrillic_greek_latin-ext_latin-regular.woff2
104.18.3.35
http://www.michaelapproved.com/articles/timezone-detect-and-ignore-daylight-saving-time-dst/
unknown
https://github.com/roundcube/elastic/issues/45
unknown
http://creativecommons.org/licenses/by-sa/3.0/
unknown
http://tools.ietf.org/html/rfc3492#section-3.4
unknown
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/program/js/jquery.min_s%3D1707945181.js
104.18.3.35
http://twitter.github.com/bootstrap/)
unknown
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/skins/elastic/fonts/roboto-v18-greek-ext_cyrillic-ext_cyrillic_greek_latin-ext_latin-regular.woff
104.18.3.35
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/program/js/jstz.min_s%3D1705745709.js
104.18.3.35
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/skins/elastic/ui_s%3D1677694320.js
104.18.3.35
http://rumkin.com
unknown
https://github.com/twbs/bootstrap/issues/20219)
unknown
https://pub-c53ac24b12464864b63e147b424f6afa.r2.dev/favicon.ico
104.18.2.35
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/plugins/jqueryui/themes/elastic/jquery-ui.min_s%3D1705745704.css
104.18.3.35
https://github.com/twbs/bootstrap/issues/25428
unknown
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/plugins/skins/punycode_s%3D1677694319.js
104.18.3.35
http://dev.rubyonrails.org/changeset/7271
unknown
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/skins/elastic/deps/bootstrap.min_s%3D1707945294.css
104.18.3.35
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://mths.be/punycode
unknown
https://bugs.jqueryui.com/ticket/8593
unknown
https://www.cloudflare.com/favicon.ico
unknown
https://developers.cloudflare.com/r2/data-access/public-buckets/
unknown
https://fullcalendar.io/
unknown
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/plugins/jqueryui/js/jquery-ui.min_s%3D1705745704.js
104.18.3.35
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/plugins/skins/login_s%3D1677694319.css
104.18.3.35
http://idn.icann.org/E-mail_test)
unknown
http://www.gnu.org/licenses/
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stackpath.bootstrapcdn.com
104.18.11.207
bg.microsoft.map.fastly.net
199.232.210.172
pub-3588bd29371644b4ba49e89c840c7b96.r2.dev
104.18.3.35
www.google.com
172.217.16.196
shocking-northern-globeflower.glitch.me
44.193.185.113
pub-c53ac24b12464864b63e147b424f6afa.r2.dev
104.18.2.35
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
104.18.3.35
pub-3588bd29371644b4ba49e89c840c7b96.r2.dev
United States
104.18.2.35
pub-c53ac24b12464864b63e147b424f6afa.r2.dev
United States
44.193.185.113
shocking-northern-globeflower.glitch.me
United States
192.168.2.6
unknown
unknown
104.18.11.207
stackpath.bootstrapcdn.com
United States
239.255.255.250
unknown
Reserved
172.217.16.196
www.google.com
United States

DOM / HTML

URL
Malicious
https://pub-3588bd29371644b4ba49e89c840c7b96.r2.dev/eu/skins/elastic/webmail-logo.svg
malicious
https://pub-c53ac24b12464864b63e147b424f6afa.r2.dev/ADAwATMwMAItOTU4MC1jMjA2LTAwAi0wMAoAEABW30hqQQA0SoDyAY.html
malicious