IOC Report
https://mailc.dps.texas.gov/module/semail.fe?fewReq=:B:JVw4MTIyOHBnc0NhdmttbD8wMiRwZ3NNYGhnYXY/Tm1hY25nJGd6cmtwZ112a29nPzM1MzYzNjQzMzIkYW1mZz81Z2BkZmAzZDQwO2NgZjswMTU1ZGBkYzM3YWZjYTQ2YGYwOzZjYTs2JHJjZWc/Y2F2a3RjdmttbCRrZj9xcC9hcHIsZ29hcUJsbWNjLGVtdCRuY2xlP2dsJHFnYXdwZ11hbWZnP3FwL2Fwcixnb2FxJzYybG1jY

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 21:14:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 21:14:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 21:14:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 21:14:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 25 21:14:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 68
ASCII text, with very long lines (36862), with no line terminators
downloaded
Chrome Cache Entry: 69
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 70
HTML document, ASCII text
downloaded
Chrome Cache Entry: 71
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 73
ASCII text, with very long lines (2353), with no line terminators
downloaded
Chrome Cache Entry: 74
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 75
MS Windows icon resource - 1 icon, 16x16, 16 colors
downloaded
Chrome Cache Entry: 76
ASCII text
downloaded
Chrome Cache Entry: 77
Web Open Font Format (Version 2), TrueType, length 27892, version 1.6816
downloaded
Chrome Cache Entry: 79
HTML document, ASCII text
downloaded
Chrome Cache Entry: 80
XML 1.0 document, ASCII text
dropped
Chrome Cache Entry: 81
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 82
HTML document, ASCII text
downloaded
Chrome Cache Entry: 83
JSON data
dropped
There are 11 hidden files, click here to show them.

URLs

Name
IP
Malicious
https://mailc.dps.texas.gov/module/semail.fe?fewReq=:B:JVw4MTIyOHBnc0NhdmttbD8wMiRwZ3NNYGhnYXY/Tm1hY25nJGd6cmtwZ112a29nPzM1MzYzNjQzMzIkYW1mZz81Z2BkZmAzZDQwO2NgZjswMTU1ZGBkYzM3YWZjYTQ2YGYwOzZjYTs2JHJjZWc/Y2F2a3RjdmttbCRrZj9xcC9hcHIsZ29hcUJsbWNjLGVtdCRuY2xlP2dsJHFnYXdwZ11hbWZnP3FwL2Fwcixnb2FxJzYybG1jYyxlbXQnMWM1Z2BkZmAzZDQwO2NgZjswMTU1ZGBkYzM3YWZjYTQ2YGYwOzZjYTs2JzFjMzUzNjM2NDMzMicxY3RncCcxYzAnMWMyMycxYzIzJzFjNTQzZDU1MzM7M2QzZmc6ZzdnMWM0YTU0MDA3Ojc6YGdhOmY6NjU6Mg==&c=E,1,rq5qGkAZhLyex9aXGJRXiwwAVCBBGb9rYT0lMs5k_20Sqz45p0qJgiUApbOJ8yAtxqJ1ztZoyOzLsVT27C4xAyI39WhYljd1P1E5Oi904DAR&typo=1
https://mailc.dps.texas.gov/user/
https://mailc.dps.texas.gov/module/semail.fe?fewReq=:B:JVw4MTIyOHBnc0NhdmttbD8wMiRwZ3NNYGhnYXY/Tm1hY25nJGd6cmtwZ112a29nPzM1MzYzNjQzMzIkYW1mZz81Z2BkZmAzZDQwO2NgZjswMTU1ZGBkYzM3YWZjYTQ2YGYwOzZjYTs2JHJjZWc/Y2F2a3RjdmttbCRrZj9xcC9hcHIsZ29hcUJsbWNjLGVtdCRuY2xlP2dsJHFnYXdwZ11hbWZnP3FwL2Fwcixnb2FxJzYybG1jYyxlbXQnMWM1Z2BkZmAzZDQwO2NgZjswMTU1ZGBkYzM3YWZjYTQ2YGYwOzZjYTs2JzFjMzUzNjM2NDMzMicxY3RncCcxYzAnMWMyMycxYzIzJzFjNTQzZDU1MzM7M2QzZmc6ZzdnMWM0YTU0MDA3Ojc6YGdhOmY6NjU6Mg==&c=E,1,rq5qGkAZhLyex9aXGJRXiwwAVCBBGb9rYT0lMs5k_20Sqz45p0qJgiUApbOJ8yAtxqJ1ztZoyOzLsVT27C4xAyI39WhYljd1P1E5Oi904DAR&typo=1
https://mailc.dps.texas.gov/user/login

Domains

Name
IP
Malicious
mailc.dps.texas.gov
204.65.230.124
www.google.com
172.217.2.196

IPs

IP
Domain
Country
Malicious
192.178.50.67
unknown
United States
1.1.1.1
unknown
Australia
142.250.217.174
unknown
United States
239.255.255.250
unknown
Reserved
172.217.165.195
unknown
United States
204.65.230.124
mailc.dps.texas.gov
United States
172.217.2.196
www.google.com
United States
192.168.2.16
unknown
unknown
74.125.141.84
unknown
United States
142.250.64.202
unknown
United States
142.250.64.238
unknown
United States
There are 1 hidden IPs, click here to show them.