JSUNPACK
A Generic JavaScript Unpacker
CAUTION: jsunpack was designed for security researchers and computer professionals
Enter a single URL (or paste JavaScript to decode):

Upload a PDF, pcap, HTML, or JavaScript file
Private? Help: privacy | uploads
Default Referer
Description

Submission permanent link 37140de77677c2384f68d345b2d2ffaf6f64bc19 (Received 2017-08-09 01:55:39, https://pokehuntr.com/assets/js/pokehuntr.js?version2445222 )

URLStatus
pokehuntr.com/assets/js/pokehuntr.js?version2445222 saved 288600 bytes 58becbba29cf91bf357d30b9240986beeb9d6bd4

a href='https:/www.google.com/maps/dir/Current status: (referer=pokehuntr.com/assets/js/pokehuntr.js?version2445222)failure: <urlopen error [Errno -3] Temporary failure in name resolution>

a class="id" href="https:/poketoolset.com/pokemon/ status: (referer=pokehuntr.com/assets/js/pokehuntr.js?version2445222)failure: <urlopen error [Errno -3] Temporary failure in name resolution>

/ status: (referer=pokehuntr.com/assets/js/pokehuntr.js?version2445222)failure: <urlopen error no host given>

(https?:/ status: (referer=pokehuntr.com/assets/js/pokehuntr.js?version2445222)failure: <urlopen error [Errno -3] Temporary failure in name resolution>

All Malicious or Suspicious Elements of Submission

suspicious: shellcode of length 9957/11103
malicious: shellcode URL=a class="id" href="https:/poketoolset.com/pokemon/
malicious: shellcode URL=a href='https:/www.google.com/maps/dir/Current
malicious: shellcode URL=https:/PokeHuntr.com/assets/img/icons
malicious: shellcode URL=https:/api.pokehuntr.com/api/
malicious: shellcode URL=https:/server.arcgisonline.com/ArcGIS/rest/services/WSMap/MapServer/tile/
malicious: shellcode URL=https:/
suspicious: shellcode of length 9960/13131
malicious: shellcode URL=(https?:
malicious: client download shellcode URL (non-executable) saved (9da1a99bd519bc1fdccd93c877386551dbf75420)
malicious: client download shellcode URL (non-executable) saved (d205cbd6783332a212c5ae92d73c77178c2d2f28)
malicious: client download shellcode URL (non-executable) saved (6b8e9ab8f363df658be25413ce6d3c3304e909ff)
pokehuntr.com/assets/js/pokehuntr.js?version2445222 malicious
[malicious:8] (ipaddr:104.25.218.28) pokehuntr.com/assets/js/pokehuntr.js?version2445222
     status: (referer=http:/www.ask.com/web?q=puppies)saved 288600 bytes 58becbba29cf91bf357d30b9240986beeb9d6bd4
     info: [decodingLevel=0] found JavaScript
     error: undefined variable jQuery
     error: undefined variable _0x4c38a9
     suspicious: shellcode of length 9957/11103
     malicious: shellcode URL=a class="id" href="https:/poketoolset.com/pokemon/
     malicious: shellcode URL=a href='https:/www.google.com/maps/dir/Current
     malicious: shellcode URL=https:/PokeHuntr.com/assets/img/icons
     malicious: shellcode URL=https:/api.pokehuntr.com/api/
     malicious: shellcode URL=https:/server.arcgisonline.com/ArcGIS/rest/services/WSMap/MapServer/tile/
     malicious: shellcode URL=https:/
     suspicious: shellcode of length 9960/13131
     malicious: shellcode URL=(https?:
     info: [1] no JavaScript
     info: file: saved pokehuntr.com/assets/js/pokehuntr.js?version2445222 to (58becbba29cf91bf357d30b9240986beeb9d6bd4)
     file: 58becbba29cf91bf357d30b9240986beeb9d6bd4: 288600 bytes
     file: fdb4b93310f79f326435380f9f0a7831fbb67649: 26435 bytes
     file: fd3233f1f70b3bc8c7f8c6e516ff24e6e7b03ac5: 9957 bytes
     file: 4664782e3b6abc09245a981c041f9a4a5260d102: 9960 bytes

Decoded Files
58be/cbba29cf91bf357d30b9240986beeb9d6bd4 from pokehuntr.com/assets/js/pokehuntr.js?version2445222 (288600 bytes, 28 hidden) download

fdb4/b93310f79f326435380f9f0a7831fbb67649 from pokehuntr.com/assets/js/pokehuntr.js?version2445222 (26435 bytes) download

fd32/33f1f70b3bc8c7f8c6e516ff24e6e7b03ac5 from pokehuntr.com/assets/js/pokehuntr.js?version2445222 (9957 bytes, 72 hidden) download

4664/782e3b6abc09245a981c041f9a4a5260d102 from pokehuntr.com/assets/js/pokehuntr.js?version2445222 (9960 bytes, 79 hidden) download


server.arcgisonline.com/ArcGIS/rest/services/WSMap/MapServer/tile/ malicious
[malicious:6] (ipaddr:23.210.111.137) (shellcode) server.arcgisonline.com/ArcGIS/rest/services/WSMap/MapServer/tile/
     status: (referer=pokehuntr.com/assets/js/pokehuntr.js?version2445222)saved 251 bytes 9da1a99bd519bc1fdccd93c877386551dbf75420
     malicious: client download shellcode URL (non-executable) saved (9da1a99bd519bc1fdccd93c877386551dbf75420)
     info: file: saved server.arcgisonline.com/ArcGIS/rest/services/WSMap/MapServer/tile/ to (9da1a99bd519bc1fdccd93c877386551dbf75420)
     file: 9da1a99bd519bc1fdccd93c877386551dbf75420: 251 bytes

Decoded Files
9da1/a99bd519bc1fdccd93c877386551dbf75420 from server.arcgisonline.com/ArcGIS/rest/services/WSMap/MapServer/tile/ (251 bytes) download


api.pokehuntr.com/api/ malicious
[malicious:6] (ipaddr:104.25.218.28) (shellcode) api.pokehuntr.com/api/
     status: (referer=pokehuntr.com/assets/js/pokehuntr.js?version2445222)saved 9 bytes d205cbd6783332a212c5ae92d73c77178c2d2f28
     malicious: client download shellcode URL (non-executable) saved (d205cbd6783332a212c5ae92d73c77178c2d2f28)
     info: file: saved api.pokehuntr.com/api/ to (d205cbd6783332a212c5ae92d73c77178c2d2f28)
     file: d205cbd6783332a212c5ae92d73c77178c2d2f28: 9 bytes

Decoded Files
d205/cbd6783332a212c5ae92d73c77178c2d2f28 from api.pokehuntr.com/api/ (9 bytes) download


PokeHuntr.com/assets/img/icons malicious
[malicious:6] (ipaddr:104.25.218.28) (shellcode) PokeHuntr.com/assets/img/icons
     status: (referer=pokehuntr.com/assets/js/pokehuntr.js?version2445222)saved 580 bytes 6b8e9ab8f363df658be25413ce6d3c3304e909ff
     malicious: client download shellcode URL (non-executable) saved (6b8e9ab8f363df658be25413ce6d3c3304e909ff)
     info: file: saved PokeHuntr.com/assets/img/icons to (6b8e9ab8f363df658be25413ce6d3c3304e909ff)
     file: 6b8e9ab8f363df658be25413ce6d3c3304e909ff: 580 bytes

Decoded Files
6b8e/9ab8f363df658be25413ce6d3c3304e909ff from PokeHuntr.com/assets/img/icons (580 bytes, 13 hidden) download