IOC Report
http://vis.finance.unionforce.com/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 21:33:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 21:33:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 21:33:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 21:33:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 21:33:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 67
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 68
ASCII text, with very long lines (1932)
downloaded
Chrome Cache Entry: 69
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 70
ASCII text, with very long lines (382), with no line terminators
downloaded
Chrome Cache Entry: 71
PNG image data, 150 x 699, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 72
ASCII text, with very long lines (382), with no line terminators
dropped
Chrome Cache Entry: 73
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 74
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 75
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 76
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 77
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (1932)
downloaded
Chrome Cache Entry: 79
HTML document, ASCII text, with very long lines (1559)
downloaded
Chrome Cache Entry: 80
PNG image data, 150 x 699, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 81
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 82
HTML document, ASCII text, with very long lines (13855)
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (1932)
dropped
Chrome Cache Entry: 84
ASCII text, with very long lines (1932)
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=2180,i,9732635979550710463,8915562067235882549,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://vis.finance.unionforce.com/"

URLs

Name
IP
Malicious
http://vis.finance.unionforce.com/
http://img.sedoparking.com/templates/bg/multi-arrows.png
205.234.175.175
https://syndicatedsearch.goog/afs/gen_204?client=dp-sedo80_3ph&output=uds_ads_only&zx=2feob11xkb9b&aqid=M8saZ5b5HJDJxdwP6OiYkQM&pbt=bs&adbx=481.5&adby=1287.625&adbh=16&adbw=300&adbn=slave-1-1&eawp=partner-dp-sedo80_3ph&errv=688160506&csala=4%7C0%7C1396%7C2270%7C206&lle=0&ifv=0&hpt=0
142.250.181.238
https://www.google.com/adsense/domains/caf.js?abp=1&YEr3CiF6AuQqLspNobyal3ji0SyqxBLn=true
142.250.184.196
https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/search.svg?c=%23000000
142.250.74.193
https://syndicatedsearch.goog/afs/gen_204?client=dp-sedo80_3ph&output=uds_ads_only&zx=khr4kxu4k7ot&aqid=M8saZ5b5HJDJxdwP6OiYkQM&psid=6033258639&pbt=bv&adbx=225.203125&adby=125.5&adbh=529&adbw=813&adbah=161%2C161%2C161&adbn=master-1&eawp=partner-dp-sedo80_3ph&errv=688160506&csala=16%7C0%7C1384%7C2270%7C206&lle=0&ifv=1&hpt=0
142.250.181.238
https://syndicatedsearch.goog
unknown
https://syndicatedsearch.goog/adsense/domains/caf.js?pac=2
142.250.181.238
https://syndicatedsearch.goog/afs/gen_204?client=dp-sedo80_3ph&output=uds_ads_only&zx=pyvgl9cgzsck&aqid=M8saZ5b5HJDJxdwP6OiYkQM&psid=6033258639&pbt=bs&adbx=225.203125&adby=125.5&adbh=529&adbw=813&adbah=161%2C161%2C161&adbn=master-1&eawp=partner-dp-sedo80_3ph&errv=688160506&csala=16%7C0%7C1384%7C2270%7C206&lle=0&ifv=1&hpt=0
142.250.181.238
https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/chevron.svg?c=%23000000
142.250.74.193
http://img.sedoparking.com/templates/logos/sedo_logo.png
205.234.175.175
https://syndicatedsearch.goog/afs/ads/i/iframe.html
142.250.181.238
http://vis.finance.unionforce.com/
https://www.google.com/pagead/1p-conversion/16521530460/?gad_source=1&adview_type=5
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
vis.finance.unionforce.com
64.190.63.222
bg.microsoft.map.fastly.net
199.232.214.172
vip1.g5.cachefly.net
205.234.175.175
syndicatedsearch.goog
142.250.181.238
www.google.com
142.250.184.196
googlehosted.l.googleusercontent.com
142.250.74.193
fp2e7a.wpc.phicdn.net
192.229.221.95
img.sedoparking.com
unknown
afs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
142.250.184.196
www.google.com
United States
192.168.2.16
unknown
unknown
64.190.63.222
vis.finance.unionforce.com
United States
142.250.185.100
unknown
United States
205.234.175.175
vip1.g5.cachefly.net
United States
192.168.2.5
unknown
unknown
142.250.181.238
syndicatedsearch.goog
United States
204.93.142.142
unknown
United States
192.168.2.11
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.74.193
googlehosted.l.googleusercontent.com
United States
142.250.186.65
unknown
United States
There are 2 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
http://vis.finance.unionforce.com/
http://vis.finance.unionforce.com/
http://vis.finance.unionforce.com/
http://vis.finance.unionforce.com/
http://vis.finance.unionforce.com/
http://vis.finance.unionforce.com/