Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Chrome Cache Entry: 44
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 45
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 46
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=5], baseline, precision 8, 32x31, components 3
|
downloaded
|
||
Chrome Cache Entry: 47
|
ASCII text, with very long lines (13733), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 48
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=5], baseline, precision 8, 118x30, components 3
|
downloaded
|
||
Chrome Cache Entry: 49
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=5], baseline, precision 8, 1366x658, components 3
|
dropped
|
||
Chrome Cache Entry: 50
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=5], baseline, precision 8, 1366x658, components 3
|
downloaded
|
||
Chrome Cache Entry: 51
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=5], baseline, precision 8, 118x30, components 3
|
dropped
|
||
Chrome Cache Entry: 52
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=5], baseline, precision 8, 32x31, components 3
|
dropped
|
||
Chrome Cache Entry: 53
|
HTML document, ASCII text, with very long lines (840), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 54
|
HTML document, Unicode text, UTF-8 text
|
downloaded
|
||
Chrome Cache Entry: 55
|
ASCII text, with very long lines (13733), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 56
|
HTML document, Unicode text, UTF-8 text, with very long lines (14794)
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2328 --field-trial-handle=2180,i,1860438847508745620,7575500337284782035,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://reactivar-email002003.hstn.me/"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://reactivar-email002003.hstn.me/
|
|||
http://reactivar-email002003.hstn.me/favicon.ico
|
185.27.134.98
|
||
http://reactivar-email002003.hstn.me/background.jpg
|
185.27.134.98
|
||
http://reactivar-email002003.hstn.me/
|
185.27.134.98
|
||
http://reactivar-email002003.hstn.me/img.jpg
|
185.27.134.98
|
||
http://reactivar-email002003.hstn.me/llave.jpg
|
185.27.134.98
|
||
http://reactivar-email002003.hstn.me/?i=1
|
|||
http://reactivar-email002003.hstn.me/estilo.css
|
185.27.134.98
|
||
http://reactivar-email002003.hstn.me/aes.js
|
185.27.134.98
|
||
https://recommendanime.com
|
unknown
|
||
https://aeonfree.com/error/404/
|
188.114.96.3
|
||
https://apps.aeonfree.com/whois-lookup
|
unknown
|
||
https://s7.addthis.com/js/300/addthis_widget.js#pubid=ra-5d14339921d18137
|
unknown
|
||
https://rudrax.net
|
unknown
|
||
https://forum.aeonfree.com
|
unknown
|
||
https://apps.aeonfree.com
|
unknown
|
||
https://apps.aeonfree.com/random-password-generator
|
unknown
|
||
https://free-hosting.org
|
unknown
|
||
https://apps.aeonfree.com/minify
|
unknown
|
||
https://aeonfree.com/error/404
|
188.114.96.3
|
||
https://subtract.site
|
unknown
|
||
https://apps.aeonfree.com/what-is-my-ip
|
unknown
|
||
https://ifastnet.com/portal/aff.php?aff=25747
|
unknown
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
a.nel.cloudflare.com
|
35.190.80.1
|
||
aeonfree.com
|
188.114.96.3
|
||
reactivar-email002003.hstn.me
|
185.27.134.98
|
||
www.google.com
|
142.250.185.68
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.185.68
|
www.google.com
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
192.168.2.5
|
unknown
|
unknown
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
188.114.96.3
|
aeonfree.com
|
European Union
|
||
185.27.134.98
|
reactivar-email002003.hstn.me
|
United Kingdom
|
||
35.190.80.1
|
a.nel.cloudflare.com
|
United States
|
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
http://reactivar-email002003.hstn.me/?i=1
|