IOC Report
http://pub-431046b43b84431ea1b4a212cd34e302.r2.dev/gsecondcheck.html?usr=ouwxfmmtalwl

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 49
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 50
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 51
PNG image data, 2160 x 599, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 52
ASCII text, with very long lines (65393)
downloaded
Chrome Cache Entry: 53
JSON data
dropped
Chrome Cache Entry: 54
ASCII text, with very long lines (32058)
downloaded
Chrome Cache Entry: 55
HTML document, ASCII text, with very long lines (611)
downloaded
Chrome Cache Entry: 56
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 57
ASCII text, with very long lines (2058), with no line terminators
downloaded
Chrome Cache Entry: 58
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 59
PNG image data, 2160 x 599, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 60
JSON data
downloaded
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=2016,i,760030498250869216,11143219381644743243,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://pub-431046b43b84431ea1b4a212cd34e302.r2.dev/gsecondcheck.html?usr=ouwxfmmtalwl"

URLs

Name
IP
Malicious
http://pub-431046b43b84431ea1b4a212cd34e302.r2.dev/gsecondcheck.html?usr=ouwxfmmtalwl
malicious
https://pub-431046b43b84431ea1b4a212cd34e302.r2.dev/gsecondcheck.html?usr=ouwxfmmtalwl
malicious
https://pub-431046b43b84431ea1b4a212cd34e302.r2.dev/gstyles.css
104.18.2.35
malicious
http://pub-431046b43b84431ea1b4a212cd34e302.r2.dev/gsecondcheck.html?usr=ouwxfmmtalwl
104.18.2.35
malicious
https://pub-431046b43b84431ea1b4a212cd34e302.r2.dev/images/download_afD_icon.ico
104.18.2.35
malicious
https://pub-431046b43b84431ea1b4a212cd34e302.r2.dev/gform.css
104.18.2.35
malicious
https://fontawesome.com
unknown
https://cdn.jsdelivr.net/npm/
unknown
https://dashboard.emailjs.com/admin/account
unknown
https://api.emailjs.com
unknown
https://pro.fontawesome.com/releases/v5.10.0/css/all.css
unknown
https://dashboard.emailjs.com/templates
unknown
https://fontawesome.com/license
unknown
https://mail.yahoo.com
unknown
https://dashboard.emailjs.com/admin
unknown
https://logodownload.org/wp-content/uploads/2019/09/yahoo-logo-1.png
104.26.7.17
https://www.cloudflare.com/favicon.ico
unknown
https://dashboard.emailjs.com/admin/templates
unknown
https://developers.cloudflare.com/r2/data-access/public-buckets/
unknown
https://ipinfo.io
unknown
https://ipinfo.io/json?token=5eaf0700b2c0d2
34.117.186.192
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pub-431046b43b84431ea1b4a212cd34e302.r2.dev
104.18.2.35
malicious
ipinfo.io
34.117.186.192
www.google.com
142.250.185.68
logodownload.org
104.26.7.17
fp2e7a.wpc.phicdn.net
192.229.221.95
cdn.jsdelivr.net
unknown
pro.fontawesome.com
unknown

IPs

IP
Domain
Country
Malicious
104.18.2.35
pub-431046b43b84431ea1b4a212cd34e302.r2.dev
United States
malicious
34.117.186.192
ipinfo.io
United States
142.250.185.68
www.google.com
United States
104.26.7.17
logodownload.org
United States
104.26.6.17
unknown
United States
192.168.2.4
unknown
unknown
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved

DOM / HTML

URL
Malicious
https://pub-431046b43b84431ea1b4a212cd34e302.r2.dev/gsecondcheck.html?usr=ouwxfmmtalwl
malicious