IOC Report
https://allmylinkswebgt.z13.web.core.windows.net/index.html

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 57
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 22.3 (Windows)], baseline, precision 8, 1892x1366, components 3
dropped
Chrome Cache Entry: 58
Web Open Font Format (Version 2), TrueType, length 7748, version 1.0
downloaded
Chrome Cache Entry: 59
Web Open Font Format (Version 2), TrueType, length 66624, version 4.262
downloaded
Chrome Cache Entry: 60
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 21.0 (Windows)], baseline, precision 8, 47x46, components 3
downloaded
Chrome Cache Entry: 61
PNG image data, 676 x 806, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 62
ASCII text, with very long lines (65326)
downloaded
Chrome Cache Entry: 63
ASCII text, with very long lines (32180)
downloaded
Chrome Cache Entry: 64
ASCII text, with very long lines (27303)
downloaded
Chrome Cache Entry: 65
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 21.0 (Windows)], baseline, precision 8, 47x46, components 3
dropped
Chrome Cache Entry: 66
Web Open Font Format (Version 2), TrueType, length 7824, version 1.0
downloaded
Chrome Cache Entry: 67
HTML document, Unicode text, UTF-8 text, with very long lines (310), with CRLF line terminators
downloaded
Chrome Cache Entry: 68
ASCII text, with very long lines (4666), with no line terminators
downloaded
Chrome Cache Entry: 69
Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 128 kbps, 44.1 kHz, Stereo
downloaded
Chrome Cache Entry: 70
Web Open Font Format (Version 2), TrueType, length 8000, version 1.0
downloaded
Chrome Cache Entry: 71
ASCII text, with very long lines (59765)
downloaded
Chrome Cache Entry: 72
PNG image data, 676 x 806, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 73
PNG image data, 1846 x 710, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 74
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 75
ASCII text
downloaded
Chrome Cache Entry: 76
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 22.3 (Windows)], baseline, precision 8, 1892x1366, components 3
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (5152), with no line terminators
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (3829), with no line terminators
downloaded
Chrome Cache Entry: 79
HTML document, ASCII text, with very long lines (321), with no line terminators
downloaded
Chrome Cache Entry: 80
Web Open Font Format (Version 2), TrueType, length 7884, version 1.0
downloaded
Chrome Cache Entry: 81
PNG image data, 1846 x 710, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 82
ASCII text, with CRLF line terminators
downloaded
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=2012,i,7825138692145901741,18011894296286758546,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://allmylinkswebgt.z13.web.core.windows.net/index.html"

URLs

Name
IP
Malicious
https://allmylinkswebgt.z13.web.core.windows.net/index.html
malicious
https://d2fuc4clr7gvcn.cloudfront.net/track.js
108.138.82.231
http://fontawesome.io
unknown
https://maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/font-awesome.min.css
104.18.10.207
https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js
104.17.25.14
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://getbootstrap.com/)
unknown
https://maxcdn.bootstrapcdn.com/font-awesome/4.5.0/fonts/fontawesome-webfont.woff2?v=4.5.0
104.18.10.207
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/js/bootstrap.min.js
104.18.10.207
https://track.gaug.es/track.gif
unknown
https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/bootstrap.min.css
104.18.10.207
http://fontawesome.io/license
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stackpath.bootstrapcdn.com
104.18.10.207
cdnjs.cloudflare.com
104.17.25.14
d2fuc4clr7gvcn.cloudfront.net
108.138.82.231
maxcdn.bootstrapcdn.com
104.18.10.207
www.google.com
173.194.219.103
track.gaug.es
52.72.129.147
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
104.18.10.207
stackpath.bootstrapcdn.com
United States
108.138.82.231
d2fuc4clr7gvcn.cloudfront.net
United States
173.194.219.103
www.google.com
United States
192.168.2.4
unknown
unknown
239.255.255.250
unknown
Reserved
54.161.134.69
unknown
United States
104.17.25.14
cdnjs.cloudflare.com
United States
52.72.129.147
track.gaug.es
United States

DOM / HTML

URL
Malicious
https://allmylinkswebgt.z13.web.core.windows.net/index.html