IOC Report
https://account.mypaymentvault.com/contactus

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:24:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:24:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:24:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:24:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:24:40 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 108
ASCII text, with very long lines (5607), with CRLF line terminators
dropped
Chrome Cache Entry: 109
JPEG image data, baseline, precision 8, 348x39, components 3
dropped
Chrome Cache Entry: 110
Unicode text, UTF-8 text, with very long lines (33928), with no line terminators
downloaded
Chrome Cache Entry: 111
ASCII text, with very long lines (32014)
dropped
Chrome Cache Entry: 112
ASCII text, with very long lines (887), with no line terminators
downloaded
Chrome Cache Entry: 113
ASCII text, with very long lines (20164)
downloaded
Chrome Cache Entry: 114
ASCII text, with very long lines (14681)
downloaded
Chrome Cache Entry: 115
ASCII text, with very long lines (14681)
dropped
Chrome Cache Entry: 116
Unicode text, UTF-8 text, with very long lines (33928), with no line terminators
dropped
Chrome Cache Entry: 117
GIF image data, version 89a, 200 x 200
dropped
Chrome Cache Entry: 118
JPEG image data, baseline, precision 8, 348x39, components 3
downloaded
Chrome Cache Entry: 119
ASCII text, with very long lines (5945)
dropped
Chrome Cache Entry: 120
ASCII text, with very long lines (2343)
downloaded
Chrome Cache Entry: 121
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 122
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 123
ASCII text, with very long lines (32012)
dropped
Chrome Cache Entry: 124
ASCII text, with very long lines (57791)
downloaded
Chrome Cache Entry: 125
ASCII text, with very long lines (2531), with no line terminators
dropped
Chrome Cache Entry: 126
ASCII text, with very long lines (5607), with CRLF line terminators
downloaded
Chrome Cache Entry: 127
ASCII text, with very long lines (4138)
downloaded
Chrome Cache Entry: 128
ASCII text, with very long lines (5945)
downloaded
Chrome Cache Entry: 129
ASCII text, with very long lines (65324)
downloaded
Chrome Cache Entry: 130
ASCII text, with very long lines (1903), with no line terminators
downloaded
Chrome Cache Entry: 131
ASCII text, with very long lines (20362), with no line terminators
downloaded
Chrome Cache Entry: 132
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 133
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 134
ASCII text, with very long lines (57791)
dropped
Chrome Cache Entry: 135
ASCII text, with very long lines (65447)
dropped
Chrome Cache Entry: 136
ASCII text, with very long lines (607)
dropped
Chrome Cache Entry: 137
ASCII text, with very long lines (526)
downloaded
Chrome Cache Entry: 138
ASCII text, with very long lines (19235), with no line terminators
dropped
Chrome Cache Entry: 139
ASCII text, with very long lines (4138)
dropped
Chrome Cache Entry: 140
ASCII text, with very long lines (30837)
downloaded
Chrome Cache Entry: 141
ASCII text, with very long lines (32012)
downloaded
Chrome Cache Entry: 142
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 143
ASCII text, with very long lines (39524)
downloaded
Chrome Cache Entry: 144
ASCII text, with very long lines (2343)
dropped
Chrome Cache Entry: 145
ASCII text, with very long lines (1335)
downloaded
Chrome Cache Entry: 146
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 147
ASCII text, with very long lines (2531), with no line terminators
downloaded
Chrome Cache Entry: 148
ASCII text, with very long lines (6496), with no line terminators
dropped
Chrome Cache Entry: 149
Unicode text, UTF-8 text, with very long lines (20952)
downloaded
Chrome Cache Entry: 150
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x1080, components 3
dropped
Chrome Cache Entry: 151
Unicode text, UTF-8 text, with very long lines (20952)
dropped
Chrome Cache Entry: 152
PNG image data, 34 x 34, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 153
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x1080, components 3
downloaded
Chrome Cache Entry: 154
ASCII text, with very long lines (21571)
downloaded
Chrome Cache Entry: 155
ASCII text, with very long lines (19235), with no line terminators
downloaded
Chrome Cache Entry: 156
OpenType font data
downloaded
Chrome Cache Entry: 157
ASCII text, with very long lines (20164)
dropped
Chrome Cache Entry: 158
ASCII text, with very long lines (20362), with no line terminators
dropped
Chrome Cache Entry: 159
OpenType font data
downloaded
Chrome Cache Entry: 160
ASCII text, with very long lines (607)
downloaded
Chrome Cache Entry: 161
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 162
ASCII text, with very long lines (893), with no line terminators
downloaded
Chrome Cache Entry: 163
OpenType font data
downloaded
Chrome Cache Entry: 164
GIF image data, version 89a, 200 x 200
downloaded
Chrome Cache Entry: 165
ASCII text, with very long lines (6496), with no line terminators
downloaded
Chrome Cache Entry: 166
PNG image data, 34 x 34, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 167
ASCII text, with very long lines (32014)
downloaded
Chrome Cache Entry: 168
OpenType font data
downloaded
Chrome Cache Entry: 169
OpenType font data
downloaded
Chrome Cache Entry: 170
ASCII text, with very long lines (1335)
dropped
Chrome Cache Entry: 171
ASCII text, with very long lines (526)
dropped
Chrome Cache Entry: 172
ASCII text, with very long lines (65447)
downloaded
There are 62 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=2012,i,16375959323855330496,7446416814349655483,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://account.mypaymentvault.com/contactus"

URLs

Name
IP
Malicious
https://account.mypaymentvault.com/contactus
https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/js/bootstrap.min.js
104.18.10.207
https://cdnjs.cloudflare.com/ajax/libs/jquery.mask/1.14.10/jquery.mask.min.js
104.17.24.14
http://fontawesome.io
unknown
https://stats.g.doubleclick.net/g/collect
unknown
https://cdnjs.cloudflare.com/ajax/libs/jScrollPane/2.0.23/script/jquery.jscrollpane.min.js
104.17.24.14
https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css
104.18.10.207
https://cdn.highimpactpayments.com/prepaiddigitalsolutions/Files/account.mypaymentvault.com/Files/BrandPackage/DWBackground/mdw-background.jpg
13.107.246.63
https://ampcid.google.com/v1/publisher:getClientId
unknown
http://github.com/kenwheeler/slick
unknown
https://cdnjs.cloudflare.com/ajax/libs/jquery-validation-unobtrusive/3.2.11/jquery.validate.unobtrusive.min.js
104.17.24.14
https://www.google.com
unknown
https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
104.18.11.207
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.3/umd/popper.min.js
104.17.24.14
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.apache.org/licenses/LICENSE-2.0)
unknown
http://github.com/kenwheeler/slick/issues
unknown
https://cdnjs.cloudflare.com/ajax/libs/jScrollPane/2.0.23/style/jquery.jscrollpane.min.css
104.17.24.14
http://www.marksimonson.comProxima
unknown
https://stats.g.doubleclick.net/j/collect
unknown
http://opensource.org/licenses/MIT).
unknown
https://cdnjs.cloudflare.com/ajax/libs/bootstrap3-dialog/1.34.7/js/bootstrap-dialog.min.js
104.17.24.14
https://cdnjs.cloudflare.com/ajax/libs/slick-carousel/1.5.9/slick.min.js
104.17.24.14
https://cdn.highimpactpayments.com/prepaiddigitalsolutions/Files/account.mypaymentvault.com/Files/BrandPackage/Logo/mypaymentvault-logo.jpg
13.107.246.63
http://kenwheeler.github.io/slick
unknown
https://cdnjs.cloudflare.com/ajax/libs/bootstrap-datepicker/1.7.1/js/bootstrap-datepicker.min.js
104.17.24.14
https://cdnjs.cloudflare.com/ajax/libs/bootstrap-datepicker/1.7.1/css/bootstrap-datepicker3.standalone.min.css
104.17.24.14
http://fontello.comhttp://fontello.com
unknown
http://kenwheeler.github.io
unknown
http://ocsp.thawte.com0
unknown
http://jscrollpane.kelvinluck.com/
unknown
http://fontello.com
unknown
https://tagassistant.google.com/
unknown
https://getbootstrap.com/)
unknown
http://jqueryvalidation.org/
unknown
https://cct.google/taggy/agent.js
unknown
https://cdn.highimpactpayments.com/prepaiddigitalsolutions/css/brandingpackages/be22e973-d2b9-444a-9dbd-e007690375ec/site-cms.min.css?v=638707962747495297
13.107.246.63
http://fontawesome.io/license
unknown
https://cdnjs.cloudflare.com/ajax/libs/bootstrap3-dialog/1.34.7/css/bootstrap-dialog.min.css
104.17.24.14
https://www.google.com/ads/ga-audiences
unknown
https://www.google.%/ads/ga-audiences
unknown
https://td.doubleclick.net
unknown
https://github.com/uxsolutions/bootstrap-datepicker)
unknown
https://www.merchant-center-analytics.goog
unknown
http://www.marksimonson.com
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://account.mypaymentvault.com/contactus
http://www.marksimonson.comCopyright
unknown
http://scripts.sil.org/OFL
unknown
https://adservice.google.com/pagead/regclk?
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stackpath.bootstrapcdn.com
104.18.10.207
cdnjs.cloudflare.com
104.17.24.14
maxcdn.bootstrapcdn.com
104.18.11.207
www.google.com
172.217.21.36
s-part-0035.t-0009.t-msedge.net
13.107.246.63
cdn.mxpnl.com
130.211.5.208
fp2e7a.wpc.phicdn.net
192.229.221.95
cdn.highimpactpayments.com
unknown
ajax.aspnetcdn.com
unknown
account.mypaymentvault.com
unknown

IPs

IP
Domain
Country
Malicious
104.17.24.14
cdnjs.cloudflare.com
United States
104.18.10.207
stackpath.bootstrapcdn.com
United States
192.168.2.5
unknown
unknown
104.18.11.207
maxcdn.bootstrapcdn.com
United States
130.211.5.208
cdn.mxpnl.com
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
35.186.235.23
unknown
United States
104.17.25.14
unknown
United States

DOM / HTML

URL
Malicious
https://account.mypaymentvault.com/contactus
https://account.mypaymentvault.com/contactus
https://account.mypaymentvault.com/contactus
https://account.mypaymentvault.com/contactus