Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 11:32:28 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 11:32:28 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 11:32:28 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 11:32:28 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 11:32:28 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
MS Windows icon resource - 1 icon, 32x32, 8 bits/pixel
|
dropped
|
||
Chrome Cache Entry: 101
|
HTML document, ASCII text
|
downloaded
|
||
Chrome Cache Entry: 102
|
ASCII text, with very long lines (65474), with CRLF line terminators
|
downloaded
|
||
Chrome Cache Entry: 103
|
ASCII text, with very long lines (32065)
|
downloaded
|
||
Chrome Cache Entry: 104
|
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 105
|
ASCII text, with very long lines (19015)
|
dropped
|
||
Chrome Cache Entry: 106
|
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
|
dropped
|
||
Chrome Cache Entry: 107
|
ASCII text, with very long lines (19015)
|
downloaded
|
||
Chrome Cache Entry: 108
|
ASCII text, with very long lines (48664)
|
dropped
|
||
Chrome Cache Entry: 109
|
ASCII text, with very long lines (32012)
|
downloaded
|
||
Chrome Cache Entry: 82
|
MS Windows icon resource - 1 icon, 32x32, 8 bits/pixel
|
downloaded
|
||
Chrome Cache Entry: 83
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 84
|
ASCII text, with very long lines (32012)
|
dropped
|
||
Chrome Cache Entry: 85
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 86
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 87
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 88
|
ASCII text, with very long lines (50758)
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with very long lines (65474), with CRLF line terminators
|
dropped
|
||
Chrome Cache Entry: 90
|
ASCII text, with very long lines (47459)
|
dropped
|
||
Chrome Cache Entry: 91
|
PNG image data, 75 x 42, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 92
|
ASCII text, with very long lines (32065)
|
dropped
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (50758)
|
dropped
|
||
Chrome Cache Entry: 94
|
ASCII text, with very long lines (48664)
|
downloaded
|
||
Chrome Cache Entry: 95
|
PNG image data, 75 x 42, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 96
|
ASCII text, with very long lines (47459)
|
downloaded
|
||
Chrome Cache Entry: 97
|
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
|
downloaded
|
||
Chrome Cache Entry: 98
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 99
|
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2472 --field-trial-handle=2408,i,8459770911791454273,18017975804016524361,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.google.es/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Foilproductionpower.com%2Fddd%2Ff3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20="
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.google.es/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Foilproductionpower.com%2Fddd%2Ff3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=
|
|||
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
|
|||
http://oilproductionpower.com/favicon.ico
|
64.40.12.85
|
||
https://code.jquery.com/jquery-3.2.1.slim.min.js
|
151.101.194.137
|
||
http://oilproductionpower.com/ddd/f3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=
|
|||
https://challenges.cloudflare.com/turnstile/v0/api.js
|
104.18.94.41
|
||
https://a.nel.cloudflare.com/report/v4?s=2QIpECUKLM1D9jJvqxfdEEVMBS00UnPzz3WOziPDTheFZ2SkkOJD6uEiXZMnDWMHcYKnctGILl9W2Y7cYh%2Ffuksjejv8y44qf0W%2BQZRpIfm5zsDGZev4AVvmHBTw5ToTGG%2FakkNexJ6up6LaMA%3D%3D
|
35.190.80.1
|
||
https://aadcdn.msftauth.net/shared/1.0/content/images/backgrounds/2_bc3d32a696895f78c19df6c717586a5d.svg
|
152.199.21.175
|
||
https://challenges.cloudflare.com/turnstile/v0/b/62ec4f065604/api.js
|
104.18.94.41
|
||
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
|
104.18.10.207
|
||
https://getbootstrap.com/)
|
unknown
|
||
https://www.google.es/amp/oilproductionpower.com/ddd/f3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=
|
142.250.184.227
|
||
https://cqxs.federaldocsportal.com/favicon.ico
|
188.114.96.3
|
||
https://github.com/twbs/bootstrap/graphs/contributors)
|
unknown
|
||
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
|
104.17.24.14
|
||
https://getbootstrap.com)
|
unknown
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/8d06a24b680e435d/1728563557950/da323e2ce2cd3e6aa44a6750f894a3faa9e143ae75af347497a242809dca3a2a/gHyqTpj8eVLbZGq
|
104.18.94.41
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8d06a24b680e435d&lang=auto
|
104.18.94.41
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
|
104.18.94.41
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/1629673701:1728562364:TSzCo9x5LH4p7ycIPbV8qrhymJWZ3nocFNgwIFC0nu8/8d06a24b680e435d/ffb333fe5f7c252
|
104.18.94.41
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8d06a24b680e435d/1728563557952/c5Fsp8wTSkWoPfK
|
104.18.94.41
|
||
https://github.com/twbs/bootstrap/blob/master/LICENSE)
|
unknown
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/nmyvc/0x4AAAAAAAwn7pfU7bLklxOj/auto/fbE/normal/auto/
|
104.18.94.41
|
||
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
|
104.18.10.207
|
||
https://5667627934.my.id/next.php
|
162.241.71.126
|
||
http://opensource.org/licenses/MIT).
|
unknown
|
||
https://5667627934-1323985617.cos.sa-saopaulo.myqcloud.com/bootstrap.min.js
|
43.157.144.192
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
stackpath.bootstrapcdn.com
|
104.18.10.207
|
||
a.nel.cloudflare.com
|
35.190.80.1
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
maxcdn.bootstrapcdn.com
|
104.18.10.207
|
||
s-part-0039.t-0009.t-msedge.net
|
13.107.246.67
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
cos.sa-saopaulo.myqcloud.com
|
43.157.144.192
|
||
cqxs.federaldocsportal.com
|
188.114.96.3
|
||
www.google.es
|
142.250.184.227
|
||
code.jquery.com
|
151.101.194.137
|
||
cdnjs.cloudflare.com
|
104.17.24.14
|
||
challenges.cloudflare.com
|
104.18.94.41
|
||
5667627934.my.id
|
162.241.71.126
|
||
sni1gl.wpc.omegacdn.net
|
152.199.21.175
|
||
www.google.com
|
142.250.185.196
|
||
oilproductionpower.com
|
64.40.12.85
|
||
s-part-0032.t-0009.t-msedge.net
|
13.107.246.60
|
||
5667627934-1323985617.cos.sa-saopaulo.myqcloud.com
|
unknown
|
||
aadcdn.msftauth.net
|
unknown
|
There are 9 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.18.10.207
|
stackpath.bootstrapcdn.com
|
United States
|
||
13.107.246.67
|
s-part-0039.t-0009.t-msedge.net
|
United States
|
||
13.107.246.45
|
s-part-0017.t-0009.t-msedge.net
|
United States
|
||
104.18.94.41
|
challenges.cloudflare.com
|
United States
|
||
64.40.12.85
|
oilproductionpower.com
|
United States
|
||
192.168.2.5
|
unknown
|
unknown
|
||
142.250.184.227
|
www.google.es
|
United States
|
||
35.190.80.1
|
a.nel.cloudflare.com
|
United States
|
||
151.101.194.137
|
code.jquery.com
|
United States
|
||
162.241.71.126
|
5667627934.my.id
|
United States
|
||
104.17.24.14
|
cdnjs.cloudflare.com
|
United States
|
||
43.157.144.10
|
unknown
|
Japan
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.185.196
|
www.google.com
|
United States
|
||
43.157.144.192
|
cos.sa-saopaulo.myqcloud.com
|
Japan
|
||
188.114.96.3
|
cqxs.federaldocsportal.com
|
European Union
|
||
152.199.21.175
|
sni1gl.wpc.omegacdn.net
|
United States
|
There are 7 hidden IPs, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
|
||
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
|
||
http://oilproductionpower.com/ddd/f3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=
|
||
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
|
||
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
|
||
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
|