IOC Report
http://url5892.equipgreen.com/ls/click?upn=u001.QnVyUTRnA6m7Ys04OcfRK-2BmYDxK-2BPvo2SH4SnTHtM2ahAlVLCP5CpZxqdikPch52bwE-2B6FGVTHUfa6r6g-2FUXtg-3D-3DRRNj_h5tndX3XP82u2CVP7HmVo4t-2FDkgNbuc-2FvPQxBNjqhqQfNFsb7fTdfgoFOkzI-2Bxa5KYPUiZS4W-2FgvgYDkntJEAhmsWMOHAu7qmcDzwEsnQtseb3y8TmhK-2BeBLagbYZa-2Fl5PaNGlz

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 11:40:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 11:40:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 11:40:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 11:40:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 11:40:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (18082)
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 102
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 103
ASCII text, with very long lines (65451)
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (724)
downloaded
Chrome Cache Entry: 105
HTML document, ASCII text, with very long lines (2533), with no line terminators
downloaded
Chrome Cache Entry: 106
Unicode text, UTF-8 text, with very long lines (2587)
downloaded
Chrome Cache Entry: 107
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 108
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
dropped
Chrome Cache Entry: 109
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 450x450, components 3
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (724)
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (23565)
downloaded
Chrome Cache Entry: 80
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 81
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (65451)
dropped
Chrome Cache Entry: 83
Web Open Font Format (Version 2), TrueType, length 15340, version 1.0
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (1434), with no line terminators
downloaded
Chrome Cache Entry: 85
ASCII text, with very long lines (724)
dropped
Chrome Cache Entry: 86
Web Open Font Format (Version 2), TrueType, length 15552, version 1.0
downloaded
Chrome Cache Entry: 87
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 88
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 89
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 90
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
dropped
Chrome Cache Entry: 91
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 450x450, components 3
dropped
Chrome Cache Entry: 92
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
dropped
Chrome Cache Entry: 93
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 94
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (18082)
dropped
Chrome Cache Entry: 96
ASCII text, with very long lines (1434), with no line terminators
dropped
Chrome Cache Entry: 97
ASCII text, with very long lines (23565)
dropped
Chrome Cache Entry: 98
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 99
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 --field-trial-handle=2212,i,16920598822452305431,8408077165695907693,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://url5892.equipgreen.com/ls/click?upn=u001.QnVyUTRnA6m7Ys04OcfRK-2BmYDxK-2BPvo2SH4SnTHtM2ahAlVLCP5CpZxqdikPch52bwE-2B6FGVTHUfa6r6g-2FUXtg-3D-3DRRNj_h5tndX3XP82u2CVP7HmVo4t-2FDkgNbuc-2FvPQxBNjqhqQfNFsb7fTdfgoFOkzI-2Bxa5KYPUiZS4W-2FgvgYDkntJEAhmsWMOHAu7qmcDzwEsnQtseb3y8TmhK-2BeBLagbYZa-2Fl5PaNGlzycBP9wt-2Bx-2BIF8M6H7XNSfHFanKHmI0XclVmtDLdFtwBZAykMNol-2B1EVQFYL6mFcaqBDNwcneuaiLfRiDR-2FpEOaIMkXlnRLaWty4mFpZlGkJkD2RATf5aYVpVmITUImq0A03rBAVtkq8oTcm0pf7AnRvvjfggEzQM-2FBDJTgvat7iExDFu-2FC1T1blavXJCuw6WT3ULqe7EEFzwLpISA11fryJZChsjBogHU4mmljbR7myqEHYvHOs-2BwDsboMOlR8BgyLszRlTVGoHnspaKXf-2BkOLcDw7PJIrD7-2FlwFq18AGU-2BMCwieNwipGZ43aaplrmL164T9c9GFx1PNH2NTQ8QQdXqSUL2c6Z6-2B1ninN2347XsTbH1kOcG-2Baj-2BmKRd-2BNrQ8HjKbgibY3if2Dc-2FillftKg-2BOAfAsCUg0buauclIIXkY9pJgbAiU0QED9OnFbExZCCtlYAvJNOed7N4zn56A55lVm-2FpSqvOehGwGBaKqQa4ttNoFB-2BYOeC0wYp71SC66lbF9C6FtGbF3Qpgus3-2BPuAKrmA6O2Su9CLsGxY9NfltTk4RJkxZjzDErPRMi6bSkxScSDRk90tJqNxYpDyXtYZlskKpQ4HdVrTPlGs8-2B-2FHPDDSgN-2BZxT1dhGovf81VbcvTPC13GKhBBaLTvYpomEVB24raM-2Fz7Xk5U-2B8zKTebMlP-2B767ISJjSJ4FsIMohGUw1oYLuomExXvt4SjzjZbOP9qyB9S-2BEqd7x6PZREvV2dm-2BJKbb6DwZmKWxW1lJB4QpPTNqpO9GdNhkZb7A-3D-3D"

URLs

Name
IP
Malicious
http://url5892.equipgreen.com/ls/click?upn=u001.QnVyUTRnA6m7Ys04OcfRK-2BmYDxK-2BPvo2SH4SnTHtM2ahAlVLCP5CpZxqdikPch52bwE-2B6FGVTHUfa6r6g-2FUXtg-3D-3DRRNj_h5tndX3XP82u2CVP7HmVo4t-2FDkgNbuc-2FvPQxBNjqhqQfNFsb7fTdfgoFOkzI-2Bxa5KYPUiZS4W-2FgvgYDkntJEAhmsWMOHAu7qmcDzwEsnQtseb3y8TmhK-2BeBLagbYZa-2Fl5PaNGlzycBP9wt-2Bx-2BIF8M6H7XNSfHFanKHmI0XclVmtDLdFtwBZAykMNol-2B1EVQFYL6mFcaqBDNwcneuaiLfRiDR-2FpEOaIMkXlnRLaWty4mFpZlGkJkD2RATf5aYVpVmITUImq0A03rBAVtkq8oTcm0pf7AnRvvjfggEzQM-2FBDJTgvat7iExDFu-2FC1T1blavXJCuw6WT3ULqe7EEFzwLpISA11fryJZChsjBogHU4mmljbR7myqEHYvHOs-2BwDsboMOlR8BgyLszRlTVGoHnspaKXf-2BkOLcDw7PJIrD7-2FlwFq18AGU-2BMCwieNwipGZ43aaplrmL164T9c9GFx1PNH2NTQ8QQdXqSUL2c6Z6-2B1ninN2347XsTbH1kOcG-2Baj-2BmKRd-2BNrQ8HjKbgibY3if2Dc-2FillftKg-2BOAfAsCUg0buauclIIXkY9pJgbAiU0QED9OnFbExZCCtlYAvJNOed7N4zn56A55lVm-2FpSqvOehGwGBaKqQa4ttNoFB-2BYOeC0wYp71SC66lbF9C6FtGbF3Qpgus3-2BPuAKrmA6O2Su9CLsGxY9NfltTk4RJkxZjzDErPRMi6bSkxScSDRk90tJqNxYpDyXtYZlskKpQ4HdVrTPlGs8-2B-2FHPDDSgN-2BZxT1dhGovf81VbcvTPC13GKhBBaLTvYpomEVB24raM-2Fz7Xk5U-2B8zKTebMlP-2B767ISJjSJ4FsIMohGUw1oYLuomExXvt4SjzjZbOP9qyB9S-2BEqd7x6PZREvV2dm-2BJKbb6DwZmKWxW1lJB4QpPTNqpO9GdNhkZb7A-3D-3D
malicious
https://microsoft-sharepoint-online-1349a5.webflow.io/
malicious
https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=66faf117d6087a05cf9bdb6
unknown
https://developers.google.com/recaptcha/docs/faq#localhost_support
unknown
http://underscorejs.org
unknown
https://support.google.com/recaptcha#6262736
unknown
https://cloud.google.com/recaptcha-enterprise/billing-information
unknown
https://recaptcha.net
unknown
https://cdn.prod.website-files.com/66faf117d6087a05cf9bdb64/js/webflow.4b3c28ff1.js
104.18.161.117
https://www.google.com/recaptcha/api2/payload?p=06AFcWeA5qtF4f_QqWm2AlmHQSf4m7HzUQMql2nENmd5QFYhBE73zuT0eq0iJkcMa8hajg7sfKttXueO_4Vfe3CljB16JmDTkoalG7uPaW0oMN9bd4E1lSh3Im5MSlTfHk4LO86O55SJK2xyZnHPmDc_4Ni9RkX5n4hMdsDfCSowsTILdDMSzJAVO1lHCs5J-65k3OCtiDCWCO&k=6LcGdVQqAAAAAOpEbbGIiUKvi42CYgbQtFARrTAc
216.58.212.164
https://cdn.prod.website-files.com/img/webclip.png
unknown
https://www.google.com/recaptcha/api2/webworker.js?hl=en&v=xds0rzGrktR88uEZ2JUvdgOY
216.58.212.164
https://support.google.com/recaptcha/?hl=en#6223828
unknown
https://cloud.google.com/contact
unknown
https://developers.google.com/recaptcha/docs/faq#my-computer-or-network-may-be-sending-automated-que
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
https://www.google.com/recaptcha/api2/bframe?hl=en&v=xds0rzGrktR88uEZ2JUvdgOY&k=6LcGdVQqAAAAAOpEbbGIiUKvi42CYgbQtFARrTAc
216.58.212.164
https://developers.google.com/recaptcha/docs/faq#are-there-any-qps-or-daily-limits-on-my-use-of-reca
unknown
https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=66faf117d6087a05cf9bdb64
52.222.232.39
https://cdn.prod.website-files.com/66faf117d6087a05cf9bdb64/css/microsoft-sharepoint-online-1349a5.w
unknown
https://www.google.com/recaptcha/api.js
142.250.185.132
https://support.google.com/recaptcha/#6175971
unknown
https://cdn.prod.website-files.com/66faf117d6087a05cf9bdb64/css/microsoft-sharepoint-online-1349a5.webflow.f0ef5b7ea.css
104.18.161.117
https://www.google.com/js/bg/zEg4NaMiOUeKKZ2pqXY4HMvMf5VCq4avNU_6WgNs2Cw.js
216.58.212.164
https://sharepointonlineportal.softr.app/
unknown
https://cdn.prod.website-files.com/66faf117d6087a05cf9bdb64/66fbbadd16ae048b2ce04fb4_office.png
104.18.161.117
https://www.google.com/recaptcha/api2/
unknown
https://www.google.com/recaptcha/api2/reload?k=6LcGdVQqAAAAAOpEbbGIiUKvi42CYgbQtFARrTAc
216.58.212.164
https://github.com/bkwld/tram
unknown
https://support.google.com/recaptcha
unknown
https://www.gstatic.c..?/recaptcha/releases/xds0rzGrktR88uEZ2JUvdgOY/recaptcha__.
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
microsoft-sharepoint-online-1349a5.webflow.io
unknown
malicious
d3e54v103j8qbb.cloudfront.net
52.222.232.39
bg.microsoft.map.fastly.net
199.232.214.172
webflow-io.map.fastly.net
151.101.2.188
cdn.prod.website-files.com
104.18.161.117
sendgrid.net
167.89.118.52
www.google.com
142.250.185.132
s-part-0039.t-0009.t-msedge.net
13.107.246.67
fp2e7a.wpc.phicdn.net
192.229.221.95
url5892.equipgreen.com
unknown

IPs

IP
Domain
Country
Malicious
167.89.118.52
sendgrid.net
United States
52.222.232.39
d3e54v103j8qbb.cloudfront.net
United States
216.58.212.164
unknown
United States
104.18.161.117
cdn.prod.website-files.com
United States
142.250.185.132
www.google.com
United States
192.168.2.4
unknown
unknown
216.58.206.36
unknown
United States
216.58.206.68
unknown
United States
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
151.101.2.188
webflow-io.map.fastly.net
United States
There are 1 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://microsoft-sharepoint-online-1349a5.webflow.io/
malicious
https://microsoft-sharepoint-online-1349a5.webflow.io/
malicious
https://microsoft-sharepoint-online-1349a5.webflow.io/
https://microsoft-sharepoint-online-1349a5.webflow.io/
https://microsoft-sharepoint-online-1349a5.webflow.io/
https://microsoft-sharepoint-online-1349a5.webflow.io/
https://microsoft-sharepoint-online-1349a5.webflow.io/
https://microsoft-sharepoint-online-1349a5.webflow.io/