Report Overview
- Visited public2025-04-14 17:18:32Tags
- URL
dl1a.gamedl.ru/download/yk709fk6i19kv3t45i04gcqkbhl5lje3/H1/ee09b80a7a270257396b30d9d1de73b5832fc259159952b595eb3e003c172395/1758933/RepoCheatV.zip
- Finishing URL
about:privatebrowsing
- IP / ASN
212.42.38.245
#50313 Teslatel LLC
Titleabout:privatebrowsing
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
dl1a.gamedl.ru | unknown | 2007-05-07 | 2018-07-07 | 2025-04-07 | 615 B | 914 kB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
dl1a.gamedl.ru/download/yk709fk6i19kv3t45i04gcqkbhl5lje3/H1/ee09b80a7a270257396b30d9d1de73b5832fc259159952b595eb3e003c172395/1758933/RepoCheatV.zip
IP
212.42.38.245
ASN
#50313 Teslatel LLC
File type
Zip archive data, at least v2.0 to extract, compression method=deflate
Size
913 kB (913392 bytes)
Hash
ec3563fe3056a8a3397c418d00845bed
a109e4f2de90f83d35cf01856070be3bbe87b1da
Archive (3)
Filename | Md5 | File type | |||
---|---|---|---|---|---|
bJAjO.dll | 01f4bd42c6c0c0eae3a818e70960e455
| PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | |||
injector.exe | 68c779dcf2e547db71887e98de7051f2
| PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | |||
libs.zip | 200221dc592ab09c3df03ebf868fa196 | Zip archive data, at least v2.0 to extract, compression method=store |
Detections
Analyzer | Verdict | Alert |
---|---|---|
VirusTotal | suspicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
dl1a.gamedl.ru/download/yk709fk6i19kv3t45i04gcqkbhl5lje3/H1/ee09b80a7a270257396b30d9d1de73b5832fc259159952b595eb3e003c172395/1758933/RepoCheatV.zip | ![]() | 200 OK | 913 kB | |||||||
Detections
HTTP Headers
| ||||||||||