Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 19:48:24 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 19:48:24 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 19:48:24 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 19:48:24 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 19:48:24 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 70
|
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 7390
|
downloaded
|
||
Chrome Cache Entry: 71
|
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 72
|
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2905
|
downloaded
|
||
Chrome Cache Entry: 73
|
ASCII text, with very long lines (32030)
|
downloaded
|
||
Chrome Cache Entry: 74
|
HTML document, ASCII text, with very long lines (611)
|
downloaded
|
||
Chrome Cache Entry: 75
|
ASCII text, with very long lines (42414)
|
downloaded
|
||
Chrome Cache Entry: 76
|
ASCII text, with CRLF line terminators
|
downloaded
|
||
Chrome Cache Entry: 77
|
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 78
|
HTML document, ASCII text, with very long lines (1878), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 79
|
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 250
|
dropped
|
||
Chrome Cache Entry: 80
|
troff or preprocessor input, ASCII text, with very long lines (372)
|
downloaded
|
||
Chrome Cache Entry: 81
|
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2905
|
dropped
|
||
Chrome Cache Entry: 82
|
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 7390
|
dropped
|
||
Chrome Cache Entry: 83
|
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 250
|
downloaded
|
||
Chrome Cache Entry: 84
|
ASCII text, with very long lines (47992), with no line terminators
|
downloaded
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=2032,i,2131495140126217569,7822506574545057631,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://wzxqi.theknittingdoula.com/ghoopuh/lopwiuiye"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://wzxqi.theknittingdoula.com/ghoopuh/lopwiuiye
|
|||
https://pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev/ytwiowuytp.html?sessionToken=gxHItZv6XlUfxhcpc8gBqsqmjSna6pkpH37IHocpJ9TOjqTKUUJugAvpaqfaPgltZNazNs8lQUyzTQj3&e=
|
|||
https://pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev/ytwiowuytp.html?sessionToken=gxHItZv6XlUfxhcpc8gBqsqmjSna6pkpH37IHocpJ9TOjqTKUUJugAvpaqfaPgltZNazNs8lQUyzTQj3&e=#
|
|||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=8767841db9f51399
|
104.17.2.184
|
||
https://www.saleforces.net/hosuyyuiuyt/72dae30.php
|
85.31.237.222
|
||
http://fontawesome.io
|
unknown
|
||
https://www.saleforces.net/hosuyyuiuyt/admin/js/sc.php?r=ZW0sZW1haWwsYWRk
|
85.31.237.222
|
||
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.css
|
104.17.24.14
|
||
https://code.jquery.com/jquery-3.1.1.min.js
|
151.101.66.137
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/0y69g/1x00000000000000000000AA/auto/normal
|
|||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
|
104.17.2.184
|
||
https://challenges.cloudflare.com/turnstile/v0/g/54ea73d52131/api.js?onload=onloadTurnstileCallback
|
104.17.3.184
|
||
https://www.cloudflare.com/favicon.ico
|
unknown
|
||
https://developers.cloudflare.com/r2/data-access/public-buckets/
|
unknown
|
||
https://challenges.cloudflare.com/turnstile/v0/api.js?onload=onloadTurnstileCallback
|
104.17.3.184
|
||
https://pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev/favicon.ico
|
104.18.2.35
|
||
https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.0.0/crypto-js.min.js
|
104.17.24.14
|
||
https://wzxqi.theknittingdoula.com/ghoopuh/lopwiuiye
|
104.21.71.20
|
||
https://wzxqi.theknittingdoula.com/ghoopuh/lopwiuiye/
|
104.21.71.20
|
||
http://fontawesome.io/license
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
www.saleforces.net
|
85.31.237.222
|
||
part-0013.t-0009.t-msedge.net
|
13.107.246.41
|
||
wzxqi.theknittingdoula.com
|
104.21.71.20
|
||
code.jquery.com
|
151.101.66.137
|
||
cdnjs.cloudflare.com
|
104.17.24.14
|
||
pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev
|
104.18.2.35
|
||
challenges.cloudflare.com
|
104.17.3.184
|
||
www.google.com
|
64.233.185.147
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.17.24.14
|
cdnjs.cloudflare.com
|
United States
|
||
13.107.246.41
|
part-0013.t-0009.t-msedge.net
|
United States
|
||
104.18.2.35
|
pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev
|
United States
|
||
85.31.237.222
|
www.saleforces.net
|
Poland
|
||
192.168.2.5
|
unknown
|
unknown
|
||
104.17.3.184
|
challenges.cloudflare.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
151.101.66.137
|
code.jquery.com
|
United States
|
||
104.17.2.184
|
unknown
|
United States
|
||
104.21.71.20
|
wzxqi.theknittingdoula.com
|
United States
|
||
64.233.185.147
|
www.google.com
|
United States
|
There are 1 hidden IPs, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev/ytwiowuytp.html?sessionToken=gxHItZv6XlUfxhcpc8gBqsqmjSna6pkpH37IHocpJ9TOjqTKUUJugAvpaqfaPgltZNazNs8lQUyzTQj3&e=
|
||
https://pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev/ytwiowuytp.html?sessionToken=gxHItZv6XlUfxhcpc8gBqsqmjSna6pkpH37IHocpJ9TOjqTKUUJugAvpaqfaPgltZNazNs8lQUyzTQj3&e=#
|
||
https://pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev/ytwiowuytp.html?sessionToken=gxHItZv6XlUfxhcpc8gBqsqmjSna6pkpH37IHocpJ9TOjqTKUUJugAvpaqfaPgltZNazNs8lQUyzTQj3&e=#
|
||
https://pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev/ytwiowuytp.html?sessionToken=gxHItZv6XlUfxhcpc8gBqsqmjSna6pkpH37IHocpJ9TOjqTKUUJugAvpaqfaPgltZNazNs8lQUyzTQj3&e=
|
||
https://pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev/ytwiowuytp.html?sessionToken=gxHItZv6XlUfxhcpc8gBqsqmjSna6pkpH37IHocpJ9TOjqTKUUJugAvpaqfaPgltZNazNs8lQUyzTQj3&e=
|
||
https://pub-67287b4c03bd4108a3a76bfe6a5b8687.r2.dev/ytwiowuytp.html?sessionToken=gxHItZv6XlUfxhcpc8gBqsqmjSna6pkpH37IHocpJ9TOjqTKUUJugAvpaqfaPgltZNazNs8lQUyzTQj3&e=
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/0y69g/1x00000000000000000000AA/auto/normal
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/0y69g/1x00000000000000000000AA/auto/normal
|