IOC Report
https://cninaspwebprb.icu

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 31 17:35:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 31 17:35:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 31 17:35:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 31 17:35:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 31 17:35:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 65
PNG image data, 1100 x 61, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 66
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
Chrome Cache Entry: 67
troff or preprocessor input, Unicode text, UTF-8 text, with CRLF line terminators
downloaded
Chrome Cache Entry: 68
PNG image data, 1100 x 61, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 69
ASCII text
downloaded
Chrome Cache Entry: 70
Unicode text, UTF-8 text, with CRLF line terminators
downloaded
Chrome Cache Entry: 71
ASCII text, with very long lines (32018)
downloaded
Chrome Cache Entry: 72
ASCII text, with very long lines (336), with CRLF line terminators
downloaded
Chrome Cache Entry: 73
assembler source, ASCII text, with very long lines (352)
downloaded
Chrome Cache Entry: 74
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
downloaded
Chrome Cache Entry: 75
PNG image data, 56 x 68, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 76
ASCII text, with very long lines (65319), with CRLF line terminators
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (3297)
downloaded
Chrome Cache Entry: 78
PNG image data, 547 x 85, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 79
PNG image data, 261 x 143, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 80
Unicode text, UTF-8 text, with CRLF line terminators
dropped
Chrome Cache Entry: 81
PNG image data, 18 x 20, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 82
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 83
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x400, components 3
downloaded
Chrome Cache Entry: 84
PNG image data, 18 x 20, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 85
troff or preprocessor input, ASCII text, with very long lines (357), with CRLF line terminators
downloaded
Chrome Cache Entry: 86
Unicode text, UTF-8 text, with very long lines (11013)
downloaded
Chrome Cache Entry: 87
Unicode text, UTF-8 text, with very long lines (11013)
dropped
Chrome Cache Entry: 88
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 89
PNG image data, 261 x 143, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 90
ASCII text, with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 91
PNG image data, 547 x 85, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (336), with CRLF line terminators
dropped
Chrome Cache Entry: 93
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (32018)
dropped
Chrome Cache Entry: 95
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x400, components 3
dropped
Chrome Cache Entry: 96
GIF image data, version 89a, 128 x 43
dropped
Chrome Cache Entry: 97
GIF image data, version 89a, 128 x 43
downloaded
Chrome Cache Entry: 98
PNG image data, 640 x 400, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 99
PNG image data, 56 x 68, 8-bit/color RGBA, non-interlaced
downloaded
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://cninaspwebprb.icu/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1968,i,16311935120300516305,16399617042518779315,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://cninaspwebprb.icu
https://cninaspwebprn.icu/c-assets/css/font-awesome.css
45.135.232.98
malicious
https://cninaspwebprn.icu/
malicious
https://cninaspwebprn.icu/index_files/7570212.css
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/7570217.js
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/8229979.jpg
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/7601024.css
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/8221087.js
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/7569191.png
45.135.232.98
malicious
https://cninaspwebprn.icu/favicon.ico
45.135.232.98
malicious
https://cninaspwebprn.icu/c-assets/css/bootstrap.min.css
45.135.232.98
malicious
https://cninaspwebprn.icu/c-assets/dialog-new/logo.png
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/7569190.png
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/7570255.png
45.135.232.98
malicious
https://cninaspwebprn.icu/c-assets/js/land.js
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/7570214.css
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/8574863.png
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/7570216.js
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/7570238.png
45.135.232.98
malicious
https://cninaspwebprn.icu/index_files/7570215.css
45.135.232.98
malicious
https://cninaspwebprn.icu/c-assets/css/style.css?1714115086
45.135.232.98
malicious
https://cninaspwebprn.icu/c-assets/img/22.gif
45.135.232.98
malicious
http://fontawesome.io
unknown
http://www.idangero.us/sliders/swiper/
unknown
http://www.sucaihuo.com/
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=https%3A%2F%2Fcninaspwebprn.icu&oit=3&cp=21&pgcl=4&gs_rn=42&psi=A-BHRQIvUdko_ht_&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.100
https://getbootstrap.com/)
unknown
https://www.yunmd.net/toolbar/allToolvarV5/help.html
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.100
http://fontawesome.io/license
unknown
https://www.mangren.com/mps.gov.cnV5/
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
http://www.idangero.us/
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
google.com
142.251.37.14
cninaspwebprn.icu
45.135.232.98
www.google.com
142.250.185.100
cninaspwebprb.icu
unknown

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
45.135.232.98
cninaspwebprn.icu
Russian Federation
192.168.2.16
unknown
unknown
142.250.185.100
www.google.com
United States

DOM / HTML

URL
Malicious
https://cninaspwebprn.icu/