moussaa121mmnn.z19.web.core.windows.net
Open in
urlscan Pro
20.60.244.173
Malicious Activity!
Public Scan
Effective URL: https://moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-80282-93448
Submission: On September 28 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by Microsoft Azure RSA TLS Issuing CA 04 on March 27th 2024. Valid for: a year.
This is the only time moussaa121mmnn.z19.web.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
28 | 20.60.244.173 20.60.244.173 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
1 | 103.126.138.87 103.126.138.87 | 40676 (AS40676) (AS40676) | |
30 | 4 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
moussaa121mmnn.z19.web.core.windows.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
28 |
windows.net
moussaa121mmnn.z19.web.core.windows.net |
963 KB |
1 |
ipwho.is
ipwho.is — Cisco Umbrella Rank: 58215 |
944 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 851 |
27 KB |
30 | 3 |
Domain | Requested by | |
---|---|---|
28 | moussaa121mmnn.z19.web.core.windows.net |
moussaa121mmnn.z19.web.core.windows.net
|
1 | ipwho.is |
moussaa121mmnn.z19.web.core.windows.net
|
1 | code.jquery.com |
moussaa121mmnn.z19.web.core.windows.net
|
30 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.web.core.windows.net Microsoft Azure RSA TLS Issuing CA 04 |
2024-03-27 - 2025-03-22 |
a year | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
ipwho.is GoGetSSL ECC DV CA |
2024-03-13 - 2025-03-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-80282-93448
Frame ID: AD3339E20403ED5008FA634A58544F3F
Requests: 31 HTTP requests in this frame
Screenshot
Page Title
コンピューターエラPage URL History Show full URLs
- https://moussaa121mmnn.z19.web.core.windows.net/?bcda=%280101%29-80282-93448 Page URL
- https://moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-80282-93448 Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://moussaa121mmnn.z19.web.core.windows.net/?bcda=%280101%29-80282-93448 Page URL
- https://moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-80282-93448 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
30 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
moussaa121mmnn.z19.web.core.windows.net/ |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
17 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tapa.css
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
18 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.4.4.min.js
code.jquery.com/ |
77 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
noir.js
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
82 KB 83 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
537 KB 537 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boxc.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
47 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bx1.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
321 B 321 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mnc.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
187 B 557 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
msmm.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
168 B 538 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bel.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
276 B 646 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
set.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
364 B 734 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vsc.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
722 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pcm.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dm.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
332 B 702 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cs.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
re.gif
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
14 KB 15 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nvidia.js
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
2 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jupiter.js
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
503 B 879 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
340 B 716 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
esc.js
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
99 B 474 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
caps.js
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
509 B 885 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
escs.js
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
63 B 438 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
safes.js
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
662 B 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
ipwho.is/ |
672 B 944 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
349 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aud0jp87.mp3
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
226 KB 226 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ai2.mp3
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
321 B 629 B |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
msmm.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
168 B 0 |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w3.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
321 B 629 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w1.png
moussaa121mmnn.z19.web.core.windows.net/werrx01USAHTML/ |
321 B 629 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| t function| fwefewfewfwvwvwewefewewr string| bcda string| ipadd string| city string| country string| isp string| currtime function| toggleFullScreen function| addEvent function| win_onkeydown_handler number| isNS function| mischandler function| mousehandler0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ipwho.is
moussaa121mmnn.z19.web.core.windows.net
103.126.138.87
20.60.244.173
2a04:4e42:600::649
104a4bf876e7435973f11a8b6e9bc0450bdb9cf58bc9a5e1c19c84094987ed78
1ab5ef4e7e196cb1ff39df44e1a0a39f6880b906ef6fd6da3cfdbb92ffd33115
311213d388418bfcc46cd84d3460323361190c86bb6fc66ab9dcdccd156a0896
318698ae5e67c32550d6b40ac09848d598f6317f51a8f09638ba925f6e7cc479
31c6dbe9d867436244f38566adad57e3870f4c8489c6804280eb564bfac5c1bd
40ea0f5f1767c27586c9c44225f011c3764a15f92d2aaebf6209121ff3cd0726
44f752b0bd2e48052d538bc6aca5379f3630ca64da945f794690ddf47e8eaef7
466835ef2d6f0f0bfddafa405154702e36a5588f69684dd3b6642f9013eb778b
46b5242c5eb6b3b71ef2606f2d0d700142ae58b53c6d018e6bf06bab62437e1b
4b436b0b6a47db85c88f83dc3fe3fd9a96c0a4018b28832165df929dffe0bc86
4c1606563842cce5f1788329d4417ae3618b33c6365c56a7122439b6ab45c977
4f30430b4e65793fb1a618b747521c7129957470fb2ff69cae0fa47eb31f1ed3
4fba99fd67069e57ca9e0c0ebc2d4526c31339deeee80538afc599a423cf0a4b
517364f2d45162fb5037437b5b6cb953d00d9b2b3b79ba87d9fe57ea6ee6070c
601c07d864e6e9054e74748e9a19f37b11fbb5c72b84957c6bc94a8ac44e7d2f
73310aa233204005c5d97ccd8b6c8c06dda83205f1de6571aa798400fb5bedeb
783f038d361f7cd0b0b364e21ee84e2e97254f2f3cdb9c92644311310266bf38
7df9f467d23ee1887edb2123cca10a1a9c4624cdcf7199c64e78a8430031f9f5
8a9ce8981a3fc753b747cf19e37bce2994a445660c018d3f51ec4fd0f0554884
8f84ea48506993476011e50a3c760f772e63310545d5231897cd065b5e484f0a
aed058881b2fe6dd4f59cf5a713c20625fa984053978d5404a1108d6c451b0b4
afe332157f4efe355f3181284e99f4331c4d19703ed1678b5316d2933f95e98e
b13a03e0db893734298cbe203bf264407636ffe5dab0a141f83c492d0034dd6a
b67a7c07a045d7cb0f2e216a557aec0d99405e17c36d1a6b1ff3e2733aa35348
c5a324f181af16879b6c4c52b731b23392f2816def159b157c4de620cff1cd41
db905cb12b30fb4d9b4af6f95842cc97337f14bb926446e554b1a10d4ea4272d
dce46d4e4749ed0340d04a2fc074780d02e87514dc7a415c2d3b6eca5a6e6a34
e3a8cebfbfeeb5d546b3f958b83a0371024436eef276133832ce697be3f81284
f1b8fccc39a3f506027d2db7cbcdd0a43af551b9eb92982c08491fab8d7b9ab5