IOC Report
https://pancake-swap-liquidity.pages.dev/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Aug 27 21:45:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Aug 27 21:45:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Aug 27 21:45:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Aug 27 21:45:26 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Aug 27 21:45:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 57
PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 58
PNG image data, 48 x 48, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 59
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 60
PNG image data, 320 x 224, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 61
PNG image data, 350 x 162, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 62
ASCII text
downloaded
Chrome Cache Entry: 63
PNG image data, 320 x 224, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 64
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 65
PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 66
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 67
PNG image data, 350 x 162, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 68
PNG image data, 48 x 48, 8-bit colormap, non-interlaced
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1956,i,10833788595056424208,14511305179055321857,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://pancake-swap-liquidity.pages.dev/"

URLs

Name
IP
Malicious
https://pancake-swap-liquidity.pages.dev/
malicious
https://pancake-swap-liquidity.pages.dev/info-strip-logo.png
188.114.96.3
malicious
https://pancake-swap-liquidity.pages.dev/56.png
188.114.96.3
malicious
https://pancake-swap-liquidity.pages.dev/ba2609255ff14686.css
188.114.96.3
malicious
https://pancake-swap-liquidity.pages.dev/
188.114.96.3
malicious
https://pancake-swap-liquidity.pages.dev/0399162c-e243-49b9-8e99-2c12a444953b.js
188.114.96.3
malicious
https://pancake-swap-liquidity.pages.dev/css2.css
188.114.96.3
malicious
https://pancake-swap-liquidity.pages.dev/0x0E09FaBB73Bd3Ade0a17ECC321fD13a19e81cE82.png
188.114.96.3
malicious
https://pancake-swap-liquidity.pages.dev/help.png
188.114.96.3
malicious
https://a.nel.cloudflare.com/report/v4?s=PPgrQcl7IShD8Tv8dOpUUOmMJ6RSzQ9TP0WCl94lYP%2BWSi1zatCldJLJ0DJAM4YM1ZoYKqYAt7S%2BKpZq%2F15Rz9rSTH0EmszrIEsaBFd4Qd3Qt%2B%2FUjyAnc7WX9MorrehhmMRGrgtrXSeE7hQe0i2u8vAE2Q%3D%3D
35.190.80.1

Domains

Name
IP
Malicious
a.nel.cloudflare.com
35.190.80.1
www.google.com
216.58.206.68
pancake-swap-liquidity.pages.dev
188.114.96.3
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
188.114.96.3
pancake-swap-liquidity.pages.dev
European Union
35.190.80.1
a.nel.cloudflare.com
United States
192.168.2.5
unknown
unknown
216.58.206.68
www.google.com
United States