IOC Report
https://support1-4ec.pages.dev/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 22:07:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 22:07:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 22:07:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 22:07:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 19 22:07:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
assembler source, ASCII text, with very long lines (324), with CRLF line terminators
downloaded
Chrome Cache Entry: 101
HTML document, ASCII text, with very long lines (522)
downloaded
Chrome Cache Entry: 102
PNG image data, 166 x 92, 4-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 103
HTML document, ASCII text, with very long lines (522)
downloaded
Chrome Cache Entry: 104
PNG image data, 128 x 128, 1-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 105
PNG image data, 100 x 100, 1-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 106
GIF image data, version 89a, 193 x 71
dropped
Chrome Cache Entry: 107
HTML document, ASCII text, with very long lines (522)
downloaded
Chrome Cache Entry: 108
PNG image data, 1056 x 908, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 109
GIF image data, version 89a, 193 x 71
downloaded
Chrome Cache Entry: 110
PNG image data, 1920 x 4340, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 111
JSON data
dropped
Chrome Cache Entry: 112
PNG image data, 166 x 92, 4-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 113
PNG image data, 140 x 30, 1-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 76
Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 56 kbps, 44.1 kHz, Monaural
downloaded
Chrome Cache Entry: 77
PNG image data, 1920 x 4340, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 78
PNG image data, 13 x 13, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 79
HTML document, ASCII text, with very long lines (522)
dropped
Chrome Cache Entry: 80
ASCII text, with very long lines (2055), with no line terminators
downloaded
Chrome Cache Entry: 81
PNG image data, 31 x 30, 4-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 82
PNG image data, 12 x 12, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (820)
downloaded
Chrome Cache Entry: 84
PNG image data, 12 x 12, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 85
PNG image data, 100 x 100, 1-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 86
PNG image data, 520 x 520, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 87
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (2343)
downloaded
Chrome Cache Entry: 89
JSON data
downloaded
Chrome Cache Entry: 90
PNG image data, 1056 x 908, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 91
PNG image data, 13 x 13, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 92
PNG image data, 128 x 128, 1-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 93
PNG image data, 140 x 30, 1-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 94
PNG image data, 31 x 30, 4-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 95
HTML document, ASCII text, with very long lines (522)
dropped
Chrome Cache Entry: 96
Audio file with ID3 version 2.3.0, contains:\012- MPEG ADTS, layer III, v2, 64 kbps, 22.05 kHz, Monaural
downloaded
Chrome Cache Entry: 97
PNG image data, 520 x 520, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 98
ASCII text, with very long lines (2165)
downloaded
Chrome Cache Entry: 99
HTML document, ASCII text, with very long lines (522)
downloaded
There are 35 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2208,i,15553670279106334652,7301272308975114232,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://support1-4ec.pages.dev/"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5252 --field-trial-handle=2208,i,15553670279106334652,7301272308975114232,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://support1-4ec.pages.dev/
malicious
https://support1-4ec.pages.dev/
malicious
https://support1-4ec.pages.dev/set.png
172.66.44.177
https://ipwho.is/?lang=en
15.204.213.5
https://support1-4ec.pages.dev/re.gif
172.66.44.177
http://jquery.org/license
unknown
https://support1-4ec.pages.dev/mnc.png
172.66.44.177
https://support1-4ec.pages.dev/bx1.png
172.66.44.177
https://support1-4ec.pages.dev/vsc.png
172.66.44.177
http://sizzlejs.com/
unknown
https://tagassistant.google.com/
unknown
https://support1-4ec.pages.dev/webs.mp4
172.66.44.177
https://support1-4ec.pages.dev/dm.png
172.66.44.177
https://support1-4ec.pages.dev/cs.png
172.66.44.177
https://ampcid.google.com/v1/publisher:getClientId
unknown
https://support1-4ec.pages.dev/tapa.css
172.66.44.177
https://cct.google/taggy/agent.js
unknown
https://support1-4ec.pages.dev/w3.png
172.66.44.177
https://support1-4ec.pages.dev/w1.png
172.66.44.177
https://www.google.com
unknown
https://www.google.com/ads/ga-audiences
unknown
https://support1-4ec.pages.dev/bg.png
172.66.44.177
https://support1-4ec.pages.dev/nvidia.js
172.66.44.177
https://www.google.%/ads/ga-audiences
unknown
https://td.doubleclick.net
unknown
https://support1-4ec.pages.dev/jupiter.js
172.66.44.177
https://support1-4ec.pages.dev/bel.png
172.66.44.177
https://support1-4ec.pages.dev/ai2.mp3
172.66.44.177
https://stats.g.doubleclick.net/j/collect
unknown
https://code.jquery.com/jquery-1.4.4.min.js
151.101.66.137
https://support1-4ec.pages.dev/msmm.png
172.66.44.177
https://support1-4ec.pages.dev/pcm.png
172.66.44.177
https://ezgif.com/optimize
unknown
http://jquery.com/
unknown
https://support1-4ec.pages.dev/_Fm7-alert.mp3
172.66.44.177
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
ipwho.is
15.204.213.5
code.jquery.com
151.101.66.137
support1-4ec.pages.dev
172.66.44.177
www.google.com
74.125.138.106
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
74.125.138.106
www.google.com
United States
15.204.213.5
ipwho.is
United States
172.66.47.79
unknown
United States
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
172.66.44.177
support1-4ec.pages.dev
United States
151.101.66.137
code.jquery.com
United States

DOM / HTML

URL
Malicious
https://support1-4ec.pages.dev/
malicious
https://support1-4ec.pages.dev/
malicious
https://support1-4ec.pages.dev/
malicious
https://support1-4ec.pages.dev/
malicious
https://support1-4ec.pages.dev/
malicious