IOC Report
https://www.google.es/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Foilproductionpower.com%2Fddd%2Ff3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 11:32:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 11:32:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 11:32:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 11:32:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 11:32:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
MS Windows icon resource - 1 icon, 32x32, 8 bits/pixel
dropped
Chrome Cache Entry: 101
HTML document, ASCII text
downloaded
Chrome Cache Entry: 102
ASCII text, with very long lines (65474), with CRLF line terminators
downloaded
Chrome Cache Entry: 103
ASCII text, with very long lines (32065)
downloaded
Chrome Cache Entry: 104
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (19015)
dropped
Chrome Cache Entry: 106
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
dropped
Chrome Cache Entry: 107
ASCII text, with very long lines (19015)
downloaded
Chrome Cache Entry: 108
ASCII text, with very long lines (48664)
dropped
Chrome Cache Entry: 109
ASCII text, with very long lines (32012)
downloaded
Chrome Cache Entry: 82
MS Windows icon resource - 1 icon, 32x32, 8 bits/pixel
downloaded
Chrome Cache Entry: 83
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (32012)
dropped
Chrome Cache Entry: 85
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 86
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 87
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 88
ASCII text, with very long lines (50758)
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (65474), with CRLF line terminators
dropped
Chrome Cache Entry: 90
ASCII text, with very long lines (47459)
dropped
Chrome Cache Entry: 91
PNG image data, 75 x 42, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (32065)
dropped
Chrome Cache Entry: 93
ASCII text, with very long lines (50758)
dropped
Chrome Cache Entry: 94
ASCII text, with very long lines (48664)
downloaded
Chrome Cache Entry: 95
PNG image data, 75 x 42, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 96
ASCII text, with very long lines (47459)
downloaded
Chrome Cache Entry: 97
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
downloaded
Chrome Cache Entry: 98
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 99
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 --field-trial-handle=2408,i,8459770911791454273,18017975804016524361,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.google.es/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Foilproductionpower.com%2Fddd%2Ff3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20="

URLs

Name
IP
Malicious
https://www.google.es/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Foilproductionpower.com%2Fddd%2Ff3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=
malicious
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
malicious
http://oilproductionpower.com/favicon.ico
64.40.12.85
https://code.jquery.com/jquery-3.2.1.slim.min.js
151.101.194.137
http://oilproductionpower.com/ddd/f3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=
https://challenges.cloudflare.com/turnstile/v0/api.js
104.18.94.41
https://a.nel.cloudflare.com/report/v4?s=2QIpECUKLM1D9jJvqxfdEEVMBS00UnPzz3WOziPDTheFZ2SkkOJD6uEiXZMnDWMHcYKnctGILl9W2Y7cYh%2Ffuksjejv8y44qf0W%2BQZRpIfm5zsDGZev4AVvmHBTw5ToTGG%2FakkNexJ6up6LaMA%3D%3D
35.190.80.1
https://aadcdn.msftauth.net/shared/1.0/content/images/backgrounds/2_bc3d32a696895f78c19df6c717586a5d.svg
152.199.21.175
https://challenges.cloudflare.com/turnstile/v0/b/62ec4f065604/api.js
104.18.94.41
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
104.18.10.207
https://getbootstrap.com/)
unknown
https://www.google.es/amp/oilproductionpower.com/ddd/f3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=
142.250.184.227
https://cqxs.federaldocsportal.com/favicon.ico
188.114.96.3
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
104.17.24.14
https://getbootstrap.com)
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/8d06a24b680e435d/1728563557950/da323e2ce2cd3e6aa44a6750f894a3faa9e143ae75af347497a242809dca3a2a/gHyqTpj8eVLbZGq
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8d06a24b680e435d&lang=auto
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/1629673701:1728562364:TSzCo9x5LH4p7ycIPbV8qrhymJWZ3nocFNgwIFC0nu8/8d06a24b680e435d/ffb333fe5f7c252
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8d06a24b680e435d/1728563557952/c5Fsp8wTSkWoPfK
104.18.94.41
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/nmyvc/0x4AAAAAAAwn7pfU7bLklxOj/auto/fbE/normal/auto/
104.18.94.41
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
104.18.10.207
https://5667627934.my.id/next.php
162.241.71.126
http://opensource.org/licenses/MIT).
unknown
https://5667627934-1323985617.cos.sa-saopaulo.myqcloud.com/bootstrap.min.js
43.157.144.192
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stackpath.bootstrapcdn.com
104.18.10.207
a.nel.cloudflare.com
35.190.80.1
s-part-0017.t-0009.t-msedge.net
13.107.246.45
maxcdn.bootstrapcdn.com
104.18.10.207
s-part-0039.t-0009.t-msedge.net
13.107.246.67
fp2e7a.wpc.phicdn.net
192.229.221.95
cos.sa-saopaulo.myqcloud.com
43.157.144.192
cqxs.federaldocsportal.com
188.114.96.3
www.google.es
142.250.184.227
code.jquery.com
151.101.194.137
cdnjs.cloudflare.com
104.17.24.14
challenges.cloudflare.com
104.18.94.41
5667627934.my.id
162.241.71.126
sni1gl.wpc.omegacdn.net
152.199.21.175
www.google.com
142.250.185.196
oilproductionpower.com
64.40.12.85
s-part-0032.t-0009.t-msedge.net
13.107.246.60
5667627934-1323985617.cos.sa-saopaulo.myqcloud.com
unknown
aadcdn.msftauth.net
unknown
There are 9 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.18.10.207
stackpath.bootstrapcdn.com
United States
13.107.246.67
s-part-0039.t-0009.t-msedge.net
United States
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
104.18.94.41
challenges.cloudflare.com
United States
64.40.12.85
oilproductionpower.com
United States
192.168.2.5
unknown
unknown
142.250.184.227
www.google.es
United States
35.190.80.1
a.nel.cloudflare.com
United States
151.101.194.137
code.jquery.com
United States
162.241.71.126
5667627934.my.id
United States
104.17.24.14
cdnjs.cloudflare.com
United States
43.157.144.10
unknown
Japan
239.255.255.250
unknown
Reserved
142.250.185.196
www.google.com
United States
43.157.144.192
cos.sa-saopaulo.myqcloud.com
Japan
188.114.96.3
cqxs.federaldocsportal.com
European Union
152.199.21.175
sni1gl.wpc.omegacdn.net
United States
There are 7 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
malicious
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
malicious
http://oilproductionpower.com/ddd/f3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com
https://cqxs.federaldocsportal.com/wawkH/?e=LLP@novozymes.com