Report Overview

  1. Submitted URL

    za30cod.ru/downloads/cod4x_client_21_1.zip

  2. IP

    104.21.53.173

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-04-24 12:15:50

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
za30cod.ruunknown2020-07-132021-06-242024-03-13

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    za30cod.ru/downloads/cod4x_client_21_1.zip

  2. IP

    172.67.215.210

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    4.4 MB (4416838 bytes)

  2. Hash

    b446fb4dc61f3d8ed334d368bb2f2cf4

    0fed0eb9177c25e2b4f1c5343cfe2aef6b5e99d3

  1. Archive (16)

  2. FilenameMd5File type
    cod4x_021.dll
    7382607103315f97153e18194ffc817c
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 11 sections
    cod4x_patchv2.ff
    ed49f2e5a8afef2929723e625d877e07
    data
    crashrpt1403.dll
    2b1dd01b53e7757db2348ac7639db1e3
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    crashrpt_lang.ini
    771da39b527e886a247a0c0a33ffb715
    Unicode text, UTF-16, little-endian text, with CRLF line terminators
    crashsender1403.exe
    950f5e4d09a0f2563629759f379e5c59
    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
    dbghelp.dll
    dee832103585ee41bd7f1a905f0726f7
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections
    install.cmd
    649cf8d45e4554661f54dec8c7662a63
    DOS batch file, ASCII text, with CRLF line terminators
    jcod4x_00.iwd
    e2450d8e8569b16905d3946670db9fa0
    Zip archive data, at least v1.0 to extract, compression method=store
    launcher.dll
    9b724669baef65fb269f215d6fc6e035
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 11 sections
    miles32.dll
    548f39629f991713624527757afc5284
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 6 sections
    mss32.dll
    4628c4b03fb5977c7f67615aa59c4117
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 11 sections
    msvcp100.dll
    bc83108b18756547013ed443b8cdb31b
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 4 sections
    msvcr100.dll
    0e37fbfa79d349d672456923ec5fbbe3
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 4 sections
    uninstall.cmd
    6675e7418ce9a989b1f1f4a75968a654
    DOS batch file, ASCII text, with CRLF line terminators
    RU-readme.txt
    c50fa335c8edb5b6b1e5d915749675eb
    Unicode text, UTF-8 text, with CRLF line terminators
    EN-readme.txt
    8e7757250ce817fc40198630f686a4ca
    ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    meth_get_eip
    YARAhub by abuse.chmalware
    meth_get_eip
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
za30cod.ru/downloads/cod4x_client_21_1.zip
172.67.215.210200 OK4.4 MB