IOC Report
https://rechrgerte.xyz/

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 50
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 51
ASCII text, with very long lines (615), with CRLF line terminators
downloaded
Chrome Cache Entry: 52
PNG image data, 250 x 177, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 53
HTML document, ASCII text
downloaded
Chrome Cache Entry: 54
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 55
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 56
PNG image data, 2612 x 2400, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 57
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 58
PNG image data, 2612 x 2400, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 59
ASCII text, with very long lines (11038)
downloaded
Chrome Cache Entry: 60
ASCII text, with very long lines (65447)
downloaded
Chrome Cache Entry: 61
Web Open Font Format (Version 2), TrueType, length 29284, version 1.0
downloaded
Chrome Cache Entry: 62
HTML document, Unicode text, UTF-8 text, with very long lines (1854), with CRLF line terminators
downloaded
Chrome Cache Entry: 63
ASCII text
downloaded
Chrome Cache Entry: 64
PNG image data, 250 x 177, 8-bit/color RGBA, non-interlaced
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 --field-trial-handle=2204,i,12884637908432575855,5725501927911304886,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://rechrgerte.xyz/"
malicious

URLs

Name
IP
Malicious
https://rechrgerte.xyz/
malicious
https://rechrgerte.xyz/
186.2.171.38
malicious
https://rechrgerte.xyz/webview/
https://rechrgerte.xyz/webview/css/style.css
186.2.171.38
https://rechrgerte.xyz/webview/css/animate.css
186.2.171.38
https://rechrgerte.xyz/webview/css/main2.css
186.2.171.38
https://rechrgerte.xyz/favicon.ico
186.2.171.38
https://rechrgerte.xyz/webview/fonts/weblight.woff2
186.2.171.38
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://rechrgerte.xyz/webview/css/main.css
186.2.171.38
http://opensource.org/licenses/MIT
unknown
https://animate.style/
unknown
https://rechrgerte.xyz/webview/media/logo.png
186.2.171.38
https://rechrgerte.xyz/webview
186.2.171.38
https://getbootstrap.com/)
unknown
https://rechrgerte.xyz/webview/media/nfc.png
186.2.171.38
https://rechrgerte.xyz/webview/js/jquery-3.7.0.min.js
186.2.171.38
https://github.com/nickpettit/glide
unknown
https://rechrgerte.xyz/webview/media/backimg.svg
186.2.171.38
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rechrgerte.xyz
186.2.171.38
malicious
bg.microsoft.map.fastly.net
199.232.210.172
www.google.com
142.250.186.100
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
186.2.171.38
rechrgerte.xyz
Belize
malicious
142.250.184.196
unknown
United States
239.255.255.250
unknown
Reserved
142.250.186.100
www.google.com
United States
192.168.2.4
unknown
unknown
192.168.2.6
unknown
unknown

DOM / HTML

URL
Malicious
https://rechrgerte.xyz/webview/