IOC Report
http://walletconnect.pages.dev/

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 54
ASCII text, with very long lines (1572)
downloaded
Chrome Cache Entry: 55
ASCII text, with very long lines (40932)
dropped
Chrome Cache Entry: 56
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
Chrome Cache Entry: 57
HTML document, ASCII text, with very long lines (2146), with no line terminators
downloaded
Chrome Cache Entry: 58
JSON data
downloaded
Chrome Cache Entry: 59
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 60
ASCII text, with very long lines (40932)
downloaded
Chrome Cache Entry: 61
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
downloaded
Chrome Cache Entry: 62
ASCII text
downloaded
Chrome Cache Entry: 63
Web Open Font Format (Version 2), TrueType, length 48236, version 1.0
downloaded
Chrome Cache Entry: 64
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 65
ASCII text
dropped
Chrome Cache Entry: 66
PNG image data, 1459 x 238, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 67
PNG image data, 1459 x 238, 8-bit/color RGBA, non-interlaced
downloaded
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 --field-trial-handle=2224,i,9508480791233882240,2247238728823981549,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://walletconnect.pages.dev/"

URLs

Name
IP
Malicious
http://walletconnect.pages.dev/
malicious
https://walletconnect.pages.dev/static/js/1.d13695fc.chunk.js
188.114.96.3
malicious
https://walletconnect.pages.dev/static/media/walletconnect-banner.e1cb8d21.png
188.114.96.3
https://walletconnect.pages.dev/favicon.ico
188.114.96.3
https://walletconnect.pages.dev/static/js/main.9f8ab2d4.chunk.js
188.114.96.3
https://walletconnect.pages.dev/manifest.json
188.114.96.3
https://walletconnect.pages.dev/
https://walletconnect.pages.dev/blockies.min.js
188.114.96.3

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
www.google.com
172.217.16.132
walletconnect.pages.dev
188.114.97.3
fp2e7a.wpc.phicdn.net
192.229.221.95
198.187.3.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
142.250.186.68
unknown
United States
192.168.2.7
unknown
unknown
192.168.2.6
unknown
unknown
239.255.255.250
unknown
Reserved
188.114.97.3
walletconnect.pages.dev
European Union
188.114.96.3
unknown
European Union
172.217.16.132
www.google.com
United States

DOM / HTML

URL
Malicious
https://walletconnect.pages.dev/