IOC Report
https://p.usertrackjvg.top/us

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Dec 20 19:10:29 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Dec 20 19:10:29 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Dec 20 19:10:29 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Dec 20 19:10:29 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Dec 20 19:10:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (65324)
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (52436)
downloaded
Chrome Cache Entry: 102
Unicode text, UTF-8 text, with very long lines (65528), with no line terminators
dropped
Chrome Cache Entry: 103
ASCII text, with very long lines (1898), with no line terminators
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (1898), with no line terminators
dropped
Chrome Cache Entry: 78
ASCII text, with very long lines (2613), with no line terminators
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (35025), with no line terminators
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (2039), with no line terminators
dropped
Chrome Cache Entry: 81
Unicode text, UTF-8 text, with very long lines (65528), with no line terminators
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (2613), with no line terminators
downloaded
Chrome Cache Entry: 83
PNG image data, 54 x 54, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 84
ASCII text, with very long lines (322)
downloaded
Chrome Cache Entry: 85
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 86
ASCII text, with very long lines (24050)
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 88
ASCII text, with very long lines (35025), with no line terminators
dropped
Chrome Cache Entry: 89
Unicode text, UTF-8 text, with very long lines (4486), with no line terminators
dropped
Chrome Cache Entry: 90
HTML document, ASCII text, with very long lines (435)
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (951)
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (52436)
dropped
Chrome Cache Entry: 93
ASCII text, with very long lines (6351), with no line terminators
downloaded
Chrome Cache Entry: 94
PNG image data, 54 x 54, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (2039), with no line terminators
downloaded
Chrome Cache Entry: 96
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 97
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (6351), with no line terminators
dropped
Chrome Cache Entry: 99
Unicode text, UTF-8 text, with very long lines (4486), with no line terminators
downloaded
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1956,i,9785136012189791851,10955493160986737822,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://p.usertrackjvg.top/us"

URLs

Name
IP
Malicious
https://p.usertrackjvg.top/us
malicious
https://p.usertrackjvg.top/us/
malicious
https://p.usertrackjvg.top/us/assets/f0ee2557KXMp5.js
104.21.39.136
malicious
https://p.usertrackjvg.top/us
malicious
https://p.usertrackjvg.top/us/assets/f6170fbbTeKnX.css
104.21.39.136
https://p.usertrackjvg.top/us/assets/index-4b020bd6.js
104.21.39.136
https://p.usertrackjvg.top/us/assets/62ff200fKXMp5.js
104.21.39.136
https://p.usertrackjvg.top/us/assets/667bf194TeKnX.css
104.21.39.136
https://p.usertrackjvg.top/api/MC40MTU1MTE3NzI5NTA1NDkz
104.21.39.136
https://p.usertrackjvg.top/cdn-cgi/phish-bypass?atok=W06vmeNexmcxgZS5R_Z0TSLEGI3pzh68J6zBifyqY5E-1734725462-0.0.1.1-%2Fus%2F
104.21.39.136
https://p.usertrackjvg.top/cdn-cgi/phish-bypass?atok=JSmPbu.aAjRDVP3Y.d11sG1lZTQeCCz4vbhpmzP2sCI-1734725436-0.0.1.1-%2Fus
104.21.39.136
https://getbootstrap.com/)
unknown
https://p.usertrackjvg.top/us/assets/4cd1ec68TeKnX.css
104.21.39.136
https://p.usertrackjvg.top/us/assets/143268e9KXMp5.js
104.21.39.136
https://a.nel.cloudflare.com/report/v4?s=4qF4j%2BVdGFFU79sImzG0Ls5SnejaAOGKtMJUTX2pN3DK9itm0CBvnVYEJbAJ%2FSiAS7bBjAlnJ4pnnZ7HmppDhmA3kQxYCNnDruR2LoxhMJQa1qAwA3uTR%2BJkIhpJjwhvrs%2FZgTo%3D
35.190.80.1
https://a.nel.cloudflare.com/report/v4?s=IWzdp1q0gB%2BRYo45k45SE1hXUfD5kfgvTJMsavaY1kKoWFd4WC7L5eHb%2B3oX35vAfnyCVOpvtGbgHaZn%2BHh9y2DSiXt1INiyD6IlCWlEmv0S9%2BgUyPhAJAdj%2FvHfKnWnUhe3WwM%3D
35.190.80.1
https://p.usertrackjvg.top/favicon.ico
104.21.39.136
https://p.usertrackjvg.top/us/assets/7357514cKXMp5.js
104.21.39.136
https://p.usertrackjvg.top/us/assets/09bf01f8KXMp5.js
104.21.39.136
https://p.usertrackjvg.top/us/assets/c27b6911KXMp5.js
104.21.39.136
https://p.usertrackjvg.top/us/assets/3213f1cfKXMp5.js
104.21.39.136
https://p.usertrackjvg.top/cdn-cgi/styles/cf.errors.css
104.21.39.136
https://a.nel.cloudflare.com/report/v4?s=5oJCzw3%2Blw0NMzv9DykIWi%2FCFJcHF7GS1KxnL3mn2LIM45DfUzx1XFJrl8xWio62NafHqqlVitvIgCuHJ9oIwRjE67yI6vc3s9hsY%2BdoMqeBXu1ih5aWC%2Fawk5bdA9G0O9P9vHU%3D
35.190.80.1
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://p.usertrackjvg.top/us/assets/dc6d90ceKXMp5.js
104.21.39.136
https://p.usertrackjvg.top/cdn-cgi/images/icon-exclamation.png?1376755637
104.21.39.136
https://p.usertrackjvg.top/us/assets/78d59236KXMp5.js
104.21.39.136
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
p.usertrackjvg.top
104.21.39.136
malicious
a.nel.cloudflare.com
35.190.80.1
www.google.com
142.250.181.132

IPs

IP
Domain
Country
Malicious
104.21.39.136
p.usertrackjvg.top
United States
malicious
239.255.255.250
unknown
Reserved
192.168.2.23
unknown
unknown
35.190.80.1
a.nel.cloudflare.com
United States
142.250.181.132
www.google.com
United States
192.168.2.5
unknown
unknown

DOM / HTML

URL
Malicious
https://p.usertrackjvg.top/us
malicious
https://p.usertrackjvg.top/us
malicious
https://p.usertrackjvg.top/us/
malicious
https://p.usertrackjvg.top/us/
https://p.usertrackjvg.top/us/
https://p.usertrackjvg.top/us/