IOC Report
https://aulixalrrydrea.pages.dev/

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 48
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 49
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 109863
downloaded
Chrome Cache Entry: 50
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 402757
downloaded
Chrome Cache Entry: 51
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 52
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1864
dropped
Chrome Cache Entry: 53
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 3651
downloaded
Chrome Cache Entry: 54
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 110586
downloaded
Chrome Cache Entry: 55
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 3651
dropped
Chrome Cache Entry: 56
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1864
downloaded
Chrome Cache Entry: 57
HTML document, Unicode text, UTF-8 text, with very long lines (526), with CRLF line terminators
downloaded
Chrome Cache Entry: 58
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
dropped
Chrome Cache Entry: 59
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
downloaded
Chrome Cache Entry: 60
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 61
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 47722
downloaded
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2012,i,12969093549859991253,14937565198231521022,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://aulixalrrydrea.pages.dev/"

URLs

Name
IP
Malicious
https://aulixalrrydrea.pages.dev/
malicious
https://aulixalrrydrea.pages.dev/#
malicious
https://aulixalrrydrea.pages.dev/
malicious
https://aulixalrrydrea.pages.dev/favicon.ico
172.66.47.90

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
part-0013.t-0009.t-msedge.net
13.107.246.41
www.google.com
142.250.217.196
aulixalrrydrea.pages.dev
172.66.47.90
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
13.107.246.41
part-0013.t-0009.t-msedge.net
United States
172.217.2.196
unknown
United States
192.168.2.4
unknown
unknown
142.250.217.196
www.google.com
United States
239.255.255.250
unknown
Reserved
172.66.44.166
unknown
United States
172.66.47.90
aulixalrrydrea.pages.dev
United States

DOM / HTML

URL
Malicious
https://aulixalrrydrea.pages.dev/
malicious
https://aulixalrrydrea.pages.dev/#
malicious