IOC Report
https://email.mg.pmctraining.com/c/eJwUzDGOhSAQANDTSCfBAQQL2n-PgRmUDaAh_E329hvbVzwKpJF3Ehw2B84ro50WV0j68CYB2SNnQrVvLloHPjtLjAq9KAFAJ7thXDVQWlEdcfVg82oOBTo6s9ucFqPaKZ-W5sDSSz9lupuogbhPrBkT10n4ooxjgU8jXuDzfeqNJJ_rESP8fLGXiXJw6ddd6S3_GnaczPIep_gN8B8AAP__bcA-Lw

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 19:07:56 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 19:07:56 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 19:07:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 19:07:56 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 19:07:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (48664)
dropped
Chrome Cache Entry: 101
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 102
ASCII text, with very long lines (19015)
downloaded
Chrome Cache Entry: 103
ASCII text, with very long lines (47261)
downloaded
Chrome Cache Entry: 104
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
downloaded
Chrome Cache Entry: 79
HTML document, ASCII text
downloaded
Chrome Cache Entry: 80
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 81
ASCII text, with very long lines (32012)
dropped
Chrome Cache Entry: 82
ASCII text, with very long lines (32065)
downloaded
Chrome Cache Entry: 83
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 84
PNG image data, 82 x 13, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 85
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 86
ASCII text, with very long lines (47261)
dropped
Chrome Cache Entry: 87
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (32065)
dropped
Chrome Cache Entry: 89
ASCII text, with very long lines (50758)
dropped
Chrome Cache Entry: 90
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (50758)
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (48664)
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (32012)
downloaded
Chrome Cache Entry: 94
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 95
Unicode text, UTF-8 text, with very long lines (65471), with CRLF line terminators
downloaded
Chrome Cache Entry: 96
Unicode text, UTF-8 text, with very long lines (65471), with CRLF line terminators
dropped
Chrome Cache Entry: 97
ASCII text, with very long lines (19015)
dropped
Chrome Cache Entry: 98
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
dropped
Chrome Cache Entry: 99
PNG image data, 82 x 13, 8-bit/color RGB, non-interlaced
downloaded
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 --field-trial-handle=2224,i,8100066697835545616,9870521771565033121,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://email.mg.pmctraining.com/c/eJwUzDGOhSAQANDTSCfBAQQL2n-PgRmUDaAh_E329hvbVzwKpJF3Ehw2B84ro50WV0j68CYB2SNnQrVvLloHPjtLjAq9KAFAJ7thXDVQWlEdcfVg82oOBTo6s9ucFqPaKZ-W5sDSSz9lupuogbhPrBkT10n4ooxjgU8jXuDzfeqNJJ_rESP8fLGXiXJw6ddd6S3_GnaczPIep_gN8B8AAP__bcA-Lw"

URLs

Name
IP
Malicious
https://email.mg.pmctraining.com/c/eJwUzDGOhSAQANDTSCfBAQQL2n-PgRmUDaAh_E329hvbVzwKpJF3Ehw2B84ro50WV0j68CYB2SNnQrVvLloHPjtLjAq9KAFAJ7thXDVQWlEdcfVg82oOBTo6s9ucFqPaKZ-W5sDSSz9lupuogbhPrBkT10n4ooxjgU8jXuDzfeqNJJ_rESP8fLGXiXJw6ddd6S3_GnaczPIep_gN8B8AAP__bcA-Lw
malicious
https://yjgm.techfederaldocument.com/FS96A/?e=
malicious
https://yjgm.techfederaldocument.com/FS96A/?e=#
malicious
https://email.mg.pmctraining.com/c/eJwUzDGOhSAQANDTSCfBAQQL2n-PgRmUDaAh_E329hvbVzwKpJF3Ehw2B84ro50WV0j68CYB2SNnQrVvLloHPjtLjAq9KAFAJ7thXDVQWlEdcfVg82oOBTo6s9ucFqPaKZ-W5sDSSz9lupuogbhPrBkT10n4ooxjgU8jXuDzfeqNJJ_rESP8fLGXiXJw6ddd6S3_GnaczPIep_gN8B8AAP__bcA-Lw
34.110.180.34
https://challenges.cloudflare.com/turnstile/v0/g/ec4b873d446c/api.js
104.18.94.41
https://7362992165.my.id/next.php
69.49.230.198
https://code.jquery.com/jquery-3.2.1.slim.min.js
151.101.130.137
https://challenges.cloudflare.com/turnstile/v0/api.js
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/pat/8cbf15240965432e/1727813286254/4e0c3eae9b39f5701e2d0b623d6cc827728a42b2f4d2cd6397a64e2860772330/3tWpLpWrAiS7_xr
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/flow/ov1/1622865630:1727811040:r57DtUOoC-96uWX4vBD_9kC49umlz_gS7BCzKLGH3w0/8cbf15240965432e/d955c4bcb90b6a0
104.18.94.41
https://7362992165-1323985617.cos.na-ashburn.myqcloud.com/bootstrap.min.js
49.51.78.226
https://aadcdn.msftauth.net/shared/1.0/content/images/backgrounds/2_bc3d32a696895f78c19df6c717586a5d.svg
152.199.21.175
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
104.18.11.207
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/i/8cbf15240965432e/1727813286245/ZfJnupoPMg4f3Ba
104.18.94.41
https://getbootstrap.com/)
unknown
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/ok1j2/0x4AAAAAAAkQBDSsd3VzbhdR/auto/fbE/normal/auto/
104.18.94.41
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
104.17.25.14
https://getbootstrap.com)
unknown
https://a.nel.cloudflare.com/report/v4?s=%2Ba31Oy%2FHnMmEgmwaffjzVzmlHoLd3v3R98219Q%2B5BqqzXZ98EvKtyOyBDfCPOrlIMgNbAm0apfOJWYFEOkpuUiTJkneCEPfq87W94QL3p6HkvG5KJM6wId1zPHY%2BVa0jIBcX%2FlMX4d9CjOY%2F4jQo
35.190.80.1
http://yjgm.techfederaldocument.com/FS96A/?e=
104.21.59.67
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://yjgm.techfederaldocument.com/favicon.ico
172.67.217.152
https://yjgm.techfederaldocument.com/FS96A?e=
172.67.217.152
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/orchestrate/chl_api/v1?ray=8cbf15240965432e&lang=auto
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
104.18.94.41
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
104.18.10.207
http://opensource.org/licenses/MIT).
unknown
http://dentalfaceltda.com.br/mde/upload.php
216.172.173.3
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
yjgm.techfederaldocument.com
172.67.217.152
malicious
stackpath.bootstrapcdn.com
104.18.11.207
dentalfaceltda.com.br
216.172.173.3
a.nel.cloudflare.com
35.190.80.1
cos.na-ashburn.myqcloud.com
49.51.78.226
maxcdn.bootstrapcdn.com
104.18.10.207
s-part-0017.t-0009.t-msedge.net
13.107.246.45
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.23
mailgun.org
34.110.180.34
fp2e7a.wpc.phicdn.net
192.229.221.95
7362992165.my.id
69.49.230.198
code.jquery.com
151.101.130.137
cdnjs.cloudflare.com
104.17.25.14
challenges.cloudflare.com
104.18.94.41
sni1gl.wpc.omegacdn.net
152.199.21.175
www.google.com
142.250.186.68
s-part-0032.t-0009.t-msedge.net
13.107.246.60
aadcdn.msftauth.net
unknown
7362992165-1323985617.cos.na-ashburn.myqcloud.com
unknown
email.mg.pmctraining.com
unknown
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.67.217.152
yjgm.techfederaldocument.com
United States
malicious
142.250.186.68
www.google.com
United States
34.110.180.34
mailgun.org
United States
104.18.10.207
maxcdn.bootstrapcdn.com
United States
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
104.18.94.41
challenges.cloudflare.com
United States
69.49.230.198
7362992165.my.id
United States
13.107.246.60
s-part-0032.t-0009.t-msedge.net
United States
49.51.78.226
cos.na-ashburn.myqcloud.com
China
192.168.2.5
unknown
unknown
151.101.130.137
code.jquery.com
United States
35.190.80.1
a.nel.cloudflare.com
United States
104.21.59.67
unknown
United States
216.172.173.3
dentalfaceltda.com.br
United States
104.18.11.207
stackpath.bootstrapcdn.com
United States
151.101.2.137
unknown
United States
239.255.255.250
unknown
Reserved
152.199.21.175
sni1gl.wpc.omegacdn.net
United States
49.51.77.119
unknown
China
104.17.25.14
cdnjs.cloudflare.com
United States
There are 10 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://yjgm.techfederaldocument.com/FS96A/?e=
malicious
https://yjgm.techfederaldocument.com/FS96A/?e=#
malicious
https://yjgm.techfederaldocument.com/FS96A/?e=
https://yjgm.techfederaldocument.com/FS96A/?e=
https://yjgm.techfederaldocument.com/FS96A/?e=