IOC Report
https://tron2qk6vdl.z13.web.core.windows.net/Wind0s01Ersys44/index.html

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 55
PNG image data, 100 x 100, 1-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 56
GIF image data, version 89a, 193 x 71
dropped
Chrome Cache Entry: 57
PNG image data, 12 x 12, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 58
HTML document, ASCII text, with very long lines (321), with no line terminators
downloaded
Chrome Cache Entry: 59
PNG image data, 128 x 128, 1-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 60
PNG image data, 128 x 128, 1-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 61
PNG image data, 1920 x 4340, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 62
PNG image data, 166 x 92, 4-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 63
HTML document, ASCII text, with very long lines (321), with no line terminators
downloaded
Chrome Cache Entry: 64
PNG image data, 140 x 30, 1-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 65
PNG image data, 166 x 92, 4-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 66
PNG image data, 520 x 520, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 67
PNG image data, 1920 x 4340, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 68
ASCII text, with very long lines (820)
downloaded
Chrome Cache Entry: 69
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 70
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 22050 Hz
downloaded
Chrome Cache Entry: 71
PNG image data, 520 x 520, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 72
HTML document, ASCII text, with very long lines (321), with no line terminators
downloaded
Chrome Cache Entry: 73
HTML document, ASCII text, with very long lines (321), with no line terminators
downloaded
Chrome Cache Entry: 74
assembler source, ASCII text, with very long lines (324), with CRLF line terminators
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (5945)
downloaded
Chrome Cache Entry: 76
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 77
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 78
PNG image data, 31 x 30, 4-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 79
PNG image data, 12 x 12, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 80
PNG image data, 31 x 30, 4-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 81
PNG image data, 1056 x 908, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 82
ASCII text, with very long lines (2083), with no line terminators
downloaded
Chrome Cache Entry: 83
OpenPGP Secret Key
downloaded
Chrome Cache Entry: 84
PNG image data, 13 x 13, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 85
PNG image data, 140 x 30, 1-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 86
PNG image data, 100 x 100, 1-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 87
JSON data
downloaded
Chrome Cache Entry: 88
GIF image data, version 89a, 193 x 71
downloaded
Chrome Cache Entry: 89
PNG image data, 13 x 13, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 90
JSON data
dropped
Chrome Cache Entry: 91
PNG image data, 1056 x 908, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 92
HTML document, ASCII text, with very long lines (522)
downloaded
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=2016,i,13252386866944281913,3936590754656706084,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://tron2qk6vdl.z13.web.core.windows.net/Wind0s01Ersys44/index.html"

URLs

Name
IP
Malicious
https://tron2qk6vdl.z13.web.core.windows.net/Wind0s01Ersys44/index.html
malicious
https://www.google.com
unknown
https://www.youtube.com/iframe_api
unknown
https://ipwho.is/?lang=en
15.204.213.5
https://stats.g.doubleclick.net/g/collect
unknown
http://jquery.org/license
unknown
https://td.doubleclick.net
unknown
http://sizzlejs.com/
unknown
https://www.merchant-center-analytics.goog
unknown
https://stats.g.doubleclick.net/g/collect?v=2&
unknown
https://adservice.google.com/pagead/regclk
unknown
https://cct.google/taggy/agent.js
unknown
https://ezgif.com/optimize
unknown
http://jquery.com/
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipwho.is
15.204.213.5
userstatics.com
104.21.53.38
www.google.com
192.178.50.68
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
192.178.50.68
www.google.com
United States
15.204.213.5
ipwho.is
United States
192.168.2.4
unknown
unknown
239.255.255.250
unknown
Reserved
104.21.53.38
userstatics.com
United States

DOM / HTML

URL
Malicious
https://tron2qk6vdl.z13.web.core.windows.net/Wind0s01Ersys44/index.html
malicious
https://tron2qk6vdl.z13.web.core.windows.net/Wind0s01Ersys44/index.html
malicious
https://tron2qk6vdl.z13.web.core.windows.net/Wind0s01Ersys44/index.html
malicious
https://tron2qk6vdl.z13.web.core.windows.net/Wind0s01Ersys44/index.html
malicious