IOC Report
http://autoiothiatowers.web.app/0.05389702077273273

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 64
ASCII text, with very long lines (65357)
downloaded
Chrome Cache Entry: 65
HTML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 66
ASCII text, with very long lines (32012)
dropped
Chrome Cache Entry: 67
ASCII text, with very long lines (4143)
dropped
Chrome Cache Entry: 68
ASCII text, with very long lines (14271)
dropped
Chrome Cache Entry: 69
ASCII text, with very long lines (65447)
dropped
Chrome Cache Entry: 70
ASCII text, with very long lines (65447)
downloaded
Chrome Cache Entry: 71
ASCII text, with very long lines (19015)
downloaded
Chrome Cache Entry: 72
ASCII text, with very long lines (65449)
downloaded
Chrome Cache Entry: 73
HTML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 74
ASCII text, with very long lines (48664)
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (4143)
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (14271)
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (65449)
dropped
Chrome Cache Entry: 78
ASCII text, with very long lines (19015)
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (32012)
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (48664)
dropped
Chrome Cache Entry: 81
ASCII text, with very long lines (65357)
dropped
Chrome Cache Entry: 82
ASCII text, with no line terminators
downloaded
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1892,i,17908469950601066209,13384380030667321609,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://autoiothiatowers.web.app/0.05389702077273273"

URLs

Name
IP
Malicious
http://autoiothiatowers.web.app/0.05389702077273273
malicious
https://autoiothiatowers.web.app/0.05389702077273273?err=1lUMb75dIbWbL6drpoSkzztdHdsl1dpbgq0z0jcL6UMSvouZF7rgpkye9bxMyc7molfu3os7f5gNs4l8l06yDXlOfJo1lheeHTJpygdr2Juj8DwuPGjzQ028uuqFcWnq63igd6i4qmei8rywok5uFDq9lC0stIdovfnpIj7dFpOrNlWwMKts6dJQy8fypVphnReiX9qdQf5Z7kem31xZFEC38DLrssJmy6DoEuul&dispatch=76f4hchcj3hfe61j6cb5837kfhf000&id=gbgkaj2b31i48h97i73j1iejigkbc24b6f438hh3791jk
malicious
https://autoiothiatowers.web.app/0.05389702077273273
malicious
http://underscorejs.org/LICENSE
unknown
https://npms.io/search?q=ponyfill.
unknown
http://materializecss.com)
unknown
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://code.jquery.com/jquery-3.6.0.min.js
151.101.66.137
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
104.17.24.14
https://getbootstrap.com)
unknown
https://cdnjs.cloudflare.com/ajax/libs/axios/0.21.1/axios.min.js
104.17.24.14
https://code.jquery.com/jquery-3.2.1.slim.min.js
151.101.66.137
https://cdnjs.cloudflare.com/ajax/libs/materialize/1.0.0/js/materialize.min.js
104.17.24.14
https://lodash.com/
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://lodash.com/license
unknown
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
104.18.11.207
http://autoiothiatowers.web.app/0.05389702077273273
199.36.158.100
http://opensource.org/licenses/MIT).
unknown
https://raw.githubusercontent.com/Dogfalo/materialize/master/LICENSE)
unknown
https://openjsf.org/
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
code.jquery.com
151.101.66.137
edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.26
autoiothiatowers.web.app
199.36.158.100
cdnjs.cloudflare.com
104.17.24.14
maxcdn.bootstrapcdn.com
104.18.11.207
www.google.com
142.250.186.36
fp2e7a.wpc.phicdn.net
192.229.221.95
cdn.jsdelivr.net
unknown

IPs

IP
Domain
Country
Malicious
104.17.24.14
cdnjs.cloudflare.com
United States
142.250.186.36
www.google.com
United States
104.18.10.207
unknown
United States
192.168.2.4
unknown
unknown
151.101.130.137
unknown
United States
192.168.2.5
unknown
unknown
199.36.158.100
autoiothiatowers.web.app
United States
104.18.11.207
maxcdn.bootstrapcdn.com
United States
239.255.255.250
unknown
Reserved
151.101.66.137
code.jquery.com
United States
104.17.25.14
unknown
United States
There are 1 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://autoiothiatowers.web.app/0.05389702077273273
https://autoiothiatowers.web.app/0.05389702077273273
https://autoiothiatowers.web.app/0.05389702077273273?err=1lUMb75dIbWbL6drpoSkzztdHdsl1dpbgq0z0jcL6UMSvouZF7rgpkye9bxMyc7molfu3os7f5gNs4l8l06yDXlOfJo1lheeHTJpygdr2Juj8DwuPGjzQ028uuqFcWnq63igd6i4qmei8rywok5uFDq9lC0stIdovfnpIj7dFpOrNlWwMKts6dJQy8fypVphnReiX9qdQf5Z7kem31xZFEC38DLrssJmy6DoEuul&dispatch=76f4hchcj3hfe61j6cb5837kfhf000&id=gbgkaj2b31i48h97i73j1iejigkbc24b6f438hh3791jk