IOC Report
https://pusha1qsn.z13.web.core.windows.net/

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 53
PNG image data, 128 x 128, 1-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 54
HTML document, ASCII text, with very long lines (321), with no line terminators
downloaded
Chrome Cache Entry: 55
ASCII text, with very long lines (820)
downloaded
Chrome Cache Entry: 56
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 57
PNG image data, 31 x 30, 4-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 58
PNG image data, 1056 x 908, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 59
GIF image data, version 89a, 193 x 71
dropped
Chrome Cache Entry: 60
PNG image data, 13 x 13, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 61
PNG image data, 140 x 30, 1-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 62
PNG image data, 13 x 13, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 63
HTML document, ASCII text, with very long lines (321), with no line terminators
downloaded
Chrome Cache Entry: 64
PNG image data, 12 x 12, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 65
PNG image data, 166 x 92, 4-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 66
PNG image data, 140 x 30, 1-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 67
PNG image data, 12 x 12, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 68
PNG image data, 1920 x 4340, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 69
PNG image data, 1920 x 4340, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 70
PNG image data, 31 x 30, 4-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 71
ASCII text, with very long lines (5955)
downloaded
Chrome Cache Entry: 72
assembler source, ASCII text, with very long lines (324), with CRLF line terminators
downloaded
Chrome Cache Entry: 73
PNG image data, 128 x 128, 1-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 74
PNG image data, 520 x 520, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 75
PNG image data, 100 x 100, 1-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 76
HTML document, ASCII text, with very long lines (522)
downloaded
Chrome Cache Entry: 77
PNG image data, 100 x 100, 1-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 78
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 22050 Hz
downloaded
Chrome Cache Entry: 79
PNG image data, 166 x 92, 4-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 80
PNG image data, 520 x 520, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 81
PNG image data, 1056 x 908, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 82
GIF image data, version 89a, 193 x 71
downloaded
Chrome Cache Entry: 83
JSON data
downloaded
Chrome Cache Entry: 84
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 85
JSON data
dropped
Chrome Cache Entry: 86
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 87
HTML document, ASCII text, with very long lines (321), with no line terminators
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (2083), with no line terminators
downloaded
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=2004,i,13070710393856215573,8462554755440443289,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://pusha1qsn.z13.web.core.windows.net/"

URLs

Name
IP
Malicious
https://pusha1qsn.z13.web.core.windows.net/
malicious
https://www.google.com
unknown
https://www.youtube.com/iframe_api
unknown
https://ipwho.is/?lang=en
15.204.213.5
https://stats.g.doubleclick.net/g/collect
unknown
http://jquery.org/license
unknown
https://td.doubleclick.net
unknown
http://sizzlejs.com/
unknown
https://www.merchant-center-analytics.goog
unknown
https://stats.g.doubleclick.net/g/collect?v=2&
unknown
https://adservice.google.com/pagead/regclk
unknown
https://cct.google/taggy/agent.js
unknown
https://ezgif.com/optimize
unknown
http://jquery.com/
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
ipwho.is
15.204.213.5
userstatics.com
104.21.53.38
www.google.com
74.125.138.103
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
74.125.138.103
www.google.com
United States
15.204.213.5
ipwho.is
United States
192.168.2.4
unknown
unknown
239.255.255.250
unknown
Reserved
104.21.53.38
userstatics.com
United States
108.181.98.179
unknown
Canada

DOM / HTML

URL
Malicious
https://pusha1qsn.z13.web.core.windows.net/
malicious
https://pusha1qsn.z13.web.core.windows.net/
malicious
https://pusha1qsn.z13.web.core.windows.net/
malicious
https://pusha1qsn.z13.web.core.windows.net/
malicious