IOC Report
https://file-exchange.doc-extension.com/HXxGM/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 18:43:32 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 18:43:32 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 18:43:32 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 18:43:32 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 18:43:32 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (50758)
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (32012)
downloaded
Chrome Cache Entry: 76
PNG image data, 17 x 60, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (32012)
dropped
Chrome Cache Entry: 78
ASCII text, with very long lines (47520)
downloaded
Chrome Cache Entry: 79
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 80
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (32065)
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (19015)
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (32065)
dropped
Chrome Cache Entry: 84
ASCII text, with very long lines (50758)
dropped
Chrome Cache Entry: 85
ASCII text, with very long lines (65454), with CRLF line terminators
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (47520)
dropped
Chrome Cache Entry: 87
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 88
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 89
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 90
PNG image data, 17 x 60, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 91
HTML document, ASCII text
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (65454), with CRLF line terminators
dropped
Chrome Cache Entry: 93
ASCII text, with very long lines (48664)
downloaded
Chrome Cache Entry: 94
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (19015)
dropped
Chrome Cache Entry: 96
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 97
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
dropped
Chrome Cache Entry: 98
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (48664)
dropped
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1012,i,9324064750672957519,12307270752545532674,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://file-exchange.doc-extension.com/HXxGM/"

URLs

Name
IP
Malicious
https://file-exchange.doc-extension.com/HXxGM/
malicious
https://file-exchange.doc-extension.com/HXxGM/
malicious
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1
104.18.94.41
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
104.17.25.14
https://getbootstrap.com)
unknown
https://code.jquery.com/jquery-3.2.1.slim.min.js
151.101.194.137
https://5727013834-1323985617.cos.ap-singapore.myqcloud.com/bootstrap.min.js
43.152.64.193
https://challenges.cloudflare.com/turnstile/v0/api.js
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/90285b0a4b6a7c84/1736970217802/CFGOXriQZmBWblL
104.18.94.41
https://challenges.cloudflare.com/turnstile/v0/b/e0c90b6a3ed1/api.js
104.18.95.41
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv/svt99/0x4AAAAAAA5A_xmCEG2AeiSZ/auto/fbE/normal/auto/
104.18.94.41
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
104.18.10.207
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
104.18.11.207
http://opensource.org/licenses/MIT).
unknown
https://getbootstrap.com/)
unknown
https://file-exchange.doc-extension.com/favicon.ico
172.67.161.132
https://5727013834.uscourtlegalhelp.com/next.php
162.241.125.28
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/1391832915:1736969269:qWD9G0l2K1YgzKF38fnem2tq_7e-QiACYWV3I9Gfrss/90285b0a4b6a7c84/tQ4Go3o9hufjBqhSGqfGrH2tl.RajUxU8q08KAMYqtY-1736970216-1.1.1.1-7ymcamOo8H8aTtcMRXjm4cjlJOR2b4EM4OaG0r1zOEHNd2FNS1r5wMcqt0yTfGE0
104.18.94.41
https://a.nel.cloudflare.com/report/v4?s=bqohKTZH25a%2BE24Urlmq4oDoo19G7YrbKGkv8Sw6rVraY6V%2Fhzb9Ri4T7Udg8cUrVi6nGr10c1qmi7%2FJNOgjVMASa5EbhyY2qrCxk%2FjMc%2F5ZYcHf9z7bqwgk2CyvI6w4Q9GOhBdDCVUOehmUBFlHxRpo
35.190.80.1
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=90285b0a4b6a7c84&lang=auto
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/90285b0a4b6a7c84/1736970217804/72b6334e5c13323ff3fd7ad2701ed57510030fc25a5a2a4fffa97f5d1904bf9f/peCRmhHp9XgQZPf
104.18.94.41
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
file-exchange.doc-extension.com
172.67.161.132
malicious
stackpath.bootstrapcdn.com
104.18.10.207
sgp.file.myqcloud.com
43.152.64.193
a.nel.cloudflare.com
35.190.80.1
code.jquery.com
151.101.194.137
cdnjs.cloudflare.com
104.17.25.14
challenges.cloudflare.com
104.18.95.41
maxcdn.bootstrapcdn.com
104.18.11.207
5727013834.uscourtlegalhelp.com
162.241.125.28
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
142.250.186.68
5727013834-1323985617.cos.ap-singapore.myqcloud.com
unknown
aadcdn.msftauth.net
unknown
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.67.161.132
file-exchange.doc-extension.com
United States
malicious
142.250.186.68
www.google.com
United States
104.18.10.207
stackpath.bootstrapcdn.com
United States
104.18.94.41
unknown
United States
192.168.2.16
unknown
unknown
192.168.2.7
unknown
unknown
43.152.64.193
sgp.file.myqcloud.com
Japan
162.241.125.28
5727013834.uscourtlegalhelp.com
United States
35.190.80.1
a.nel.cloudflare.com
United States
151.101.194.137
code.jquery.com
United States
104.17.24.14
unknown
United States
104.18.95.41
challenges.cloudflare.com
United States
104.18.11.207
maxcdn.bootstrapcdn.com
United States
151.101.2.137
unknown
United States
239.255.255.250
unknown
Reserved
43.152.64.207
unknown
Japan
104.17.25.14
cdnjs.cloudflare.com
United States
There are 7 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://file-exchange.doc-extension.com/HXxGM/
malicious
https://file-exchange.doc-extension.com/HXxGM/
https://file-exchange.doc-extension.com/HXxGM/
https://file-exchange.doc-extension.com/HXxGM/