Report Overview
Visitedpublic
2025-06-22 21:17:16
Tags
Submit Tags
URL
c10.patreonusercontent.com/4/patreon-media/p/post/53115071/900e05e432a14c8b94091dd4ab9256ae/eyJhIjoxLCJwIjoxfQ==/1.zip?token-hash=xO2WEsGcUKrevYVfoLzS5ltqoMD3HPLd7_52qL1ZbZA=&token-time=1750896000
Finishing URL
about:privatebrowsing
IP / ASN

104.18.69.106
Title
about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
4
Host Summary
Host | Rank | Registered | First Seen | Last Seen | Sent | Received | IP | Fingerprints |
---|---|---|---|---|---|---|---|---|
c10.patreonusercontent.com 1 alert(s) on this Domain | 39060 | 2017-04-06 | 2017-08-23 | 2025-06-16 | 664 B | 2.5 MB | ![]() 104.18.69.106 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
No alerts detected
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
File detected
URL
c10.patreonusercontent.com/4/patreon-media/p/post/53115071/900e05e432a14c8b94091dd4ab9256ae/eyJhIjoxLCJwIjoxfQ==/1.zip?token-hash=xO2WEsGcUKrevYVfoLzS5ltqoMD3HPLd7_52qL1ZbZA=&token-time=1750896000
IP / ASN

104.18.69.106
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=store
Size2.5 MB (2516193 bytes)
MD59f2cea5dce457fe1cbe5f914a47a4fb1
SHA1e9734542648b4b150e6aafe5226002ad20299eaa
Archive (26)
Filename | MD5 | File type |
---|---|---|
changelog.txt | bb9e68355eb3a2a80fcc7283d2acd506 | ISO-8859 text, with CRLF line terminators |
FIFALiveEditor.DLL | 5cc946c7c8407986da036158791bf2bb | PE32+ executable (DLL) (console) x86-64, for MS Windows, 7 sections |
Launcher.exe | cd6b7b8abd800ff06c2f19dcd1df7baf | PE32+ executable (GUI) x86-64, for MS Windows, 6 sections |
launcher_config.ini | 8997926072a701c93088f9e5e3d7eb77 | ASCII text, with CRLF line terminators |
le_config.json | 7bfe6177edad90bbd8037430cd34bc2e | JSON text data |
LICENSE | ffa10f40b98be2c2bc9608f56827ed23 | ASCII text, with CRLF line terminators |
IdMap.json | 9b24f88e61bd27a4e714352dacfbbfb7 | JSON text data |
legacy_structure.txt | 8df36eea3e329aa07dc2ae70042a5a2d | ASCII text, with CRLF line terminators |
Injector.exe | c7e514ec03861cdc5d376d82ffa6eaeb | PE32+ executable (console) x86-64, for MS Windows, 6 sections |
README.txt | 23b26943cc6fa7f2ada874843640ff6e | ASCII text, with CRLF line terminators |
translate.json | 422c7d1180780b9be2d9e55ce63b65da | JSON text data |
translate.json | d100da9cc5e01c0b25077883baf45526 | JSON text data |
DOC.MD | e1bda6e4f37ed024b14fed3eacf97832 | ISO-8859 text, with CRLF line terminators |
live_editor.lua | 9a00386261931d44a6bad353586ef50b | ASCII text, with CRLF line terminators |
1ovr_99pot.lua | 5d6582cc7c9d7b83877f1f017c6867d1 | ASCII text, with CRLF line terminators |
99ovr_99pot.lua | 5969299b8c1b1e1243dedcaca6fe0e15 | ASCII text, with CRLF line terminators |
capture_newheads.lua | af2330dfca39620ffc4505663d4cf429 | ASCII text, with CRLF line terminators |
custom_headassetid_to_playerid.lua | 167d638f2bf641d23ef133374908eedd | ASCII text, with CRLF line terminators |
custom_tattoos_to_playerid.lua | e2743e3a22ba67f472b95a3d3f3331fc | ASCII text, with CRLF line terminators |
generate_minifaces.lua | 783b1b8c5fa397dea4d851dfc6863bbd | ASCII text, with CRLF line terminators |
is_retiring=0.lua | fc06e63332f89668d1e244419d900104 | ASCII text, with CRLF line terminators |
list_players.lua | a8a10b7d41327ebdfd337bfcc2aecefe | ASCII text, with CRLF line terminators |
medium_socklenghtcode.lua | 08f7982d5edac10399726e98875bb610 | ASCII text, with CRLF line terminators |
modifier=0.lua | e52d13eafc0e24437a262472c44cc9c9 | ASCII text, with CRLF line terminators |
untuck_shirts.lua | b1a95442c95c431463d7b575f296a932 | ASCII text, with CRLF line terminators |
main_test.lua | 4fcb0a146ce0b29205f6ff8983c694c2 | ASCII text, with CRLF line terminators |
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public InfoSec YARA rules | malware | Identifies compiled AutoIT script (as EXE). |
VirusTotal | malicious |
JavaScript (0)
No Javascripts found
No JavaScripts
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
GET c10.patreonusercontent.com/4/patreon-media/p/post/53115071/900e05e432a14c8b94091dd4ab9256ae/eyJhIjoxLCJwIjoxfQ==/1.zip?token-hash=xO2WEsGcUKrevYVfoLzS5ltqoMD3HPLd7_52qL1ZbZA=&token-time=1750896000 | ![]() | 200 OK | 2.5 MB | |||||||
URL c10.patreonusercontent.com/4/patreon-media/p/post/53115071/900e05e432a14c8b94091dd4ab9256ae/eyJhIjoxLCJwIjoxfQ==/1.zip?token-hash=xO2WEsGcUKrevYVfoLzS5ltqoMD3HPLd7_52qL1ZbZA=&token-time=1750896000 IP / ASN ![]() 104.18.69.106 Requested byN/A Resource Info File typeZip archive data, at least v2.0 to extract, compression method=store First Seen2025-06-22 Last Seen2025-06-22 Times Seen1 Size2.5 MB (2516193 bytes) MD59f2cea5dce457fe1cbe5f914a47a4fb1 SHA1e9734542648b4b150e6aafe5226002ad20299eaa SHA25606aa8f8ca2069764781cfaef781c5795f9300d13beed6628e8d9c49f3dd66b44 Certificate Info IssuerGoogle Trust Services Subjectpatreonusercontent.com Fingerprint1B:CA:C2:71:E8:D3:69:A5:A6:A6:92:1D:2B:48:46:32:34:09:BA:EE ValidityThu, 22 May 2025 07:09:36 GMT - Wed, 20 Aug 2025 08:09:25 GMT Detections
HTTP Headers
| ||||||||||