Report Overview

  1. Visited public
    2024-12-06 18:23:30
    Tags
  2. URL

    tmhacks22.ovh/dl/Paladins.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    172.67.204.251

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
tmhacks22.ovhunknown2024-02-032024-02-162024-12-06

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    tmhacks22.ovh/dl/Paladins.zip

  2. IP

    104.21.44.234

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    569 kB (569318 bytes)

  2. Hash

    af3b46de4ef2f235b256c94be45ecf65

    ee0f427af51d81267af0244aecb1f8af911d5550

  1. Archive (2)

  2. FilenameMd5File type
    READ ME.txt
    fe369dbcf41dd239148fa28fed333051
    ASCII text, with CRLF line terminators
    UnknownPaladins.exe
    3701d6bb2dd758377442dcff3470d9a1
    PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows, 4 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
tmhacks22.ovh/dl/Paladins.zip
104.21.44.234200 OK569 kB