Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Chrome Cache Entry: 64
|
ASCII text, with very long lines (32030)
|
downloaded
|
||
Chrome Cache Entry: 65
|
PNG image data, 187 x 188, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 66
|
ASCII text, with very long lines (48664)
|
downloaded
|
||
Chrome Cache Entry: 67
|
ASCII text, with very long lines (32065)
|
downloaded
|
||
Chrome Cache Entry: 68
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 69
|
ASCII text, with very long lines (65325)
|
downloaded
|
||
Chrome Cache Entry: 70
|
ASCII text, with very long lines (60130)
|
dropped
|
||
Chrome Cache Entry: 71
|
PNG image data, 190 x 187, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 72
|
PNG image data, 26 x 26, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 73
|
ASCII text, with very long lines (11461)
|
downloaded
|
||
Chrome Cache Entry: 74
|
HTML document, ASCII text
|
downloaded
|
||
Chrome Cache Entry: 75
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 76
|
ASCII text, with very long lines (26500)
|
dropped
|
||
Chrome Cache Entry: 77
|
PNG image data, 1280 x 1280, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 78
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
downloaded
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (32012)
|
downloaded
|
||
Chrome Cache Entry: 80
|
PNG image data, 190 x 187, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 81
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 400x400, components
3
|
downloaded
|
||
Chrome Cache Entry: 82
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 400x400, components
3
|
dropped
|
||
Chrome Cache Entry: 83
|
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=709, bps=0, PhotometricIntepretation=RGB,
orientation=upper-left, width=1200], baseline, precision 8, 1200x646, components 3
|
downloaded
|
||
Chrome Cache Entry: 84
|
ASCII text, with very long lines (60130)
|
downloaded
|
||
Chrome Cache Entry: 85
|
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=709, bps=0, PhotometricIntepretation=RGB,
orientation=upper-left, width=1200], baseline, precision 8, 1200x646, components 3
|
dropped
|
||
Chrome Cache Entry: 86
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 87
|
PNG image data, 26 x 26, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 88
|
PNG image data, 1280 x 1280, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 89
|
PNG image data, 187 x 188, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 90
|
ASCII text, with very long lines (26500)
|
downloaded
|
||
Chrome Cache Entry: 91
|
ASCII text, with very long lines (19015)
|
downloaded
|
There are 19 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=2072,i,9318174922790436995,11561750414343662516,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://statesborozga.cfd/Proten/"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://statesborozga.cfd/Proten/
|
|||
https://statesborozga.cfd/Proten/images/outlook1.png
|
172.67.137.170
|
||
https://statesborozga.cfd/Proten/
|
|||
https://statesborozga.cfd/Proten/images/gmail.png
|
172.67.137.170
|
||
https://statesborozga.cfd/favicon.ico
|
172.67.137.170
|
||
https://statesborozga.cfd/Proten/css/hover.css
|
172.67.137.170
|
||
https://statesborozga.cfd/Proten/images/adobe.jpg
|
172.67.137.170
|
||
https://statesborozga.cfd/Proten/images/office3651.png
|
172.67.137.170
|
||
https://statesborozga.cfd/Proten/images/8.jpg
|
172.67.137.170
|
||
https://statesborozga.cfd/Proten/images/other1.png
|
172.67.137.170
|
||
http://ianlunn.github.io/Hover/)
|
unknown
|
||
https://ka-f.fontawesome.com
|
unknown
|
||
https://code.jquery.com/jquery-3.2.1.slim.min.js
|
151.101.130.137
|
||
https://code.jquery.com/jquery-3.1.1.min.js
|
151.101.130.137
|
||
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
|
104.18.10.207
|
||
https://code.jquery.com/jquery-3.3.1.js
|
unknown
|
||
https://fontawesome.com/license/free
|
unknown
|
||
https://fontawesome.com
|
unknown
|
||
https://kit.fontawesome.com
|
unknown
|
||
https://github.com/twbs/bootstrap/graphs/contributors)
|
unknown
|
||
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
|
104.17.24.14
|
||
https://login.microsoftonline.com/common/login
|
unknown
|
||
https://getbootstrap.com)
|
unknown
|
||
https://a.nel.cloudflare.com/report/v4?s=XNBO0AWxeY0lvRO8PAKfVPSrr85CDwEuJf4GPrDq6nJJmOAj2X11IvgYZuKQLs4Zq8w86UdDTsggHHx7V%2BJqNZd5i6zkq9RNbv1weLllln3w%2B9VRmfi%2Fwfa2YTc4zU1AefQFbA%3D%3D
|
35.190.80.1
|
||
http://ianlunn.co.uk/
|
unknown
|
||
https://github.com/twbs/bootstrap/blob/master/LICENSE)
|
unknown
|
||
https://github.com/IanLunn/Hover
|
unknown
|
||
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
|
104.18.10.207
|
||
http://opensource.org/licenses/MIT).
|
unknown
|
||
https://kit.fontawesome.com/585b051251.js
|
unknown
|
There are 19 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
statesborozga.cfd
|
172.67.137.170
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
a.nel.cloudflare.com
|
35.190.80.1
|
||
code.jquery.com
|
151.101.130.137
|
||
cdnjs.cloudflare.com
|
104.17.24.14
|
||
maxcdn.bootstrapcdn.com
|
104.18.10.207
|
||
www.google.com
|
142.250.9.99
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
||
ka-f.fontawesome.com
|
unknown
|
||
kit.fontawesome.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.137.170
|
statesborozga.cfd
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
104.17.24.14
|
cdnjs.cloudflare.com
|
United States
|
||
104.18.10.207
|
maxcdn.bootstrapcdn.com
|
United States
|
||
151.101.130.137
|
code.jquery.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
35.190.80.1
|
a.nel.cloudflare.com
|
United States
|
||
142.250.9.99
|
www.google.com
|
United States
|
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://statesborozga.cfd/Proten/
|