IOC Report
https://api-d.dropbox.com/r14/put_mobile_log?app_platform=windowstab&app_version=23.4.27.0&log_level=ANALYTICS&user_ids=%5B%5D&device_id=B383jVBSDsfyDtMa4BQkZCTLzjYL1jpZeysZxkH2M7U6&sys_model=097C&sys_version=10.0.22631.4317&ts=1729769006

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 11:38:53 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 11:38:53 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 09:23:19 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 11:38:53 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 11:38:53 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 11:38:53 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 63
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 64
HTML document, ASCII text, with very long lines (628)
downloaded
Chrome Cache Entry: 65
ASCII text, with very long lines (24618)
downloaded
Chrome Cache Entry: 66
HTML document, ASCII text, with very long lines (410)
downloaded
Chrome Cache Entry: 67
TrueType Font data, 19 tables, 1st "FFTM", 17 names, Microsoft, language 0x409, Digitized data copyright \251 2010-2011, Google Corporation.Open Sans LightRegularAscender - Ope
downloaded
Chrome Cache Entry: 68
TrueType Font data, 19 tables, 1st "FFTM", 15 names, Microsoft, language 0x409, Digitized data copyright \251 2010-2011, Google Corporation.Open SansRegularAscender - Open Sans
downloaded
Chrome Cache Entry: 69
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 70
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 71
SVG Scalable Vector Graphics image
downloaded
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=2020,i,2644156548133602700,17094965150171016535,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://api-d.dropbox.com/r14/put_mobile_log?app_platform=windowstab&app_version=23.4.27.0&log_level=ANALYTICS&user_ids=%5B%5D&device_id=B383jVBSDsfyDtMa4BQkZCTLzjYL1jpZeysZxkH2M7U6&sys_model=097C&sys_version=10.0.22631.4317&ts=1729769006"

URLs

Name
IP
Malicious
https://api-d.dropbox.com/r14/put_mobile_log?app_platform=windowstab&app_version=23.4.27.0&log_level=ANALYTICS&user_ids=%5B%5D&device_id=B383jVBSDsfyDtMa4BQkZCTLzjYL1jpZeysZxkH2M7U6&sys_model=097C&sys_version=10.0.22631.4317&ts=1729769006
http://www.ascendercorp.com/http://www.ascendercorp.com/typedesigners.htmlLicensed
unknown
https://www.dropbox.com/login?_tk=fof
unknown
https://www.dropbox.com/plus?_tk=fof
unknown
https://api-d.dropbox.com/
http://www.apache.org/licenses/LICENSE-2.0Open
unknown
https://assets.dropbox.com/www/en-us/illustrations/spot/look-magnifying-glass.svg
52.222.236.19
https://assets.dropbox.com/www/en-us/illustrations/spot/target-miss.svg
52.222.236.76
https://api-d.dropbox.com/r14/put_mobile_log?app_platform=windowstab&app_version=23.4.27.0&log_level=ANALYTICS&user_ids=%5B%5D&device_id=B383jVBSDsfyDtMa4BQkZCTLzjYL1jpZeysZxkH2M7U6&sys_model=097C&sys_version=10.0.22631.4317&ts=1729769006
https://www.dropbox.com/business?_tk=fof
unknown
https://cfl.dropboxstatic.com/static/images/favicon.ico
unknown
https://www.dropbox.com/home?_tk=fof
unknown
http://www.apache.org/licenses/LICENSE-2.0Webfont
unknown
https://cfl.dropboxstatic.com/static/metaserver/static/css/error.css
unknown
https://forums.dropbox.com
unknown
https://www.dropbox.com/home
unknown
https://www.dropbox.com/register?_tk=fof
unknown
https://status.dropbox.com
unknown
https://www.dropbox.com/help?_tk=fof
unknown
https://www.dropbox.com/help
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
d-edge.v.dropbox.com
162.125.6.20
www.google.com
142.250.185.132
assets.dropbox.com
52.222.236.76
api-d.dropbox.com
unknown
cfl.dropboxstatic.com
unknown

IPs

IP
Domain
Country
Malicious
142.250.185.132
www.google.com
United States
192.168.2.18
unknown
unknown
52.222.236.76
assets.dropbox.com
United States
239.255.255.250
unknown
Reserved
162.125.6.20
d-edge.v.dropbox.com
United States
52.222.236.19
unknown
United States

DOM / HTML

URL
Malicious
https://api-d.dropbox.com/r14/put_mobile_log?app_platform=windowstab&app_version=23.4.27.0&log_level=ANALYTICS&user_ids=%5B%5D&device_id=B383jVBSDsfyDtMa4BQkZCTLzjYL1jpZeysZxkH2M7U6&sys_model=097C&sys_version=10.0.22631.4317&ts=1729769006
https://api-d.dropbox.com/r14/put_mobile_log?app_platform=windowstab&app_version=23.4.27.0&log_level=ANALYTICS&user_ids=%5B%5D&device_id=B383jVBSDsfyDtMa4BQkZCTLzjYL1jpZeysZxkH2M7U6&sys_model=097C&sys_version=10.0.22631.4317&ts=1729769006
https://api-d.dropbox.com/