IOC Report
http://reactivar-email002003.hstn.me/

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 44
ASCII text
downloaded
Chrome Cache Entry: 45
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 46
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 32x31, components 3
downloaded
Chrome Cache Entry: 47
ASCII text, with very long lines (13733), with no line terminators
dropped
Chrome Cache Entry: 48
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 118x30, components 3
downloaded
Chrome Cache Entry: 49
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 1366x658, components 3
dropped
Chrome Cache Entry: 50
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 1366x658, components 3
downloaded
Chrome Cache Entry: 51
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 118x30, components 3
dropped
Chrome Cache Entry: 52
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 32x31, components 3
dropped
Chrome Cache Entry: 53
HTML document, ASCII text, with very long lines (840), with no line terminators
downloaded
Chrome Cache Entry: 54
HTML document, Unicode text, UTF-8 text
downloaded
Chrome Cache Entry: 55
ASCII text, with very long lines (13733), with no line terminators
downloaded
Chrome Cache Entry: 56
HTML document, Unicode text, UTF-8 text, with very long lines (14794)
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 --field-trial-handle=2180,i,1860438847508745620,7575500337284782035,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://reactivar-email002003.hstn.me/"

URLs

Name
IP
Malicious
http://reactivar-email002003.hstn.me/
malicious
http://reactivar-email002003.hstn.me/favicon.ico
185.27.134.98
malicious
http://reactivar-email002003.hstn.me/background.jpg
185.27.134.98
malicious
http://reactivar-email002003.hstn.me/
185.27.134.98
malicious
http://reactivar-email002003.hstn.me/img.jpg
185.27.134.98
malicious
http://reactivar-email002003.hstn.me/llave.jpg
185.27.134.98
malicious
http://reactivar-email002003.hstn.me/?i=1
malicious
http://reactivar-email002003.hstn.me/estilo.css
185.27.134.98
malicious
http://reactivar-email002003.hstn.me/aes.js
185.27.134.98
malicious
https://recommendanime.com
unknown
https://aeonfree.com/error/404/
188.114.96.3
https://apps.aeonfree.com/whois-lookup
unknown
https://s7.addthis.com/js/300/addthis_widget.js#pubid=ra-5d14339921d18137
unknown
https://rudrax.net
unknown
https://forum.aeonfree.com
unknown
https://apps.aeonfree.com
unknown
https://apps.aeonfree.com/random-password-generator
unknown
https://free-hosting.org
unknown
https://apps.aeonfree.com/minify
unknown
https://aeonfree.com/error/404
188.114.96.3
https://subtract.site
unknown
https://apps.aeonfree.com/what-is-my-ip
unknown
https://ifastnet.com/portal/aff.php?aff=25747
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
a.nel.cloudflare.com
35.190.80.1
aeonfree.com
188.114.96.3
reactivar-email002003.hstn.me
185.27.134.98
www.google.com
142.250.185.68
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
142.250.185.68
www.google.com
United States
192.168.2.4
unknown
unknown
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
188.114.96.3
aeonfree.com
European Union
185.27.134.98
reactivar-email002003.hstn.me
United Kingdom
35.190.80.1
a.nel.cloudflare.com
United States

DOM / HTML

URL
Malicious
http://reactivar-email002003.hstn.me/?i=1