Main

related bits

0

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2025-06-10 10:55:41

expired found date

-

created at

2025-06-10 10:55:41

updated at

2026-03-01 03:57:24

Domain name statistics

length

22

crc

64850

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

1082078 (apponic.com)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

59199

mp size raw text

3012

mp inner links count

0

mp inner links status

20 (imported)

Open Graph

title

Ghost File Download

description

Ghost File Download - Add password for any format file and set the number of executions.

site name

apponic

author

updated

2026-02-25 13:52:30

raw text

Ghost File Download Windows Mac Android Top Downloads Latest Audio Business Communications Desktop Utilities Development Graphics Home & Education Network & Internet Scripts Security System Utilities Video Ghost File American Ghost encrypt Softwar Add password for any format file and set the number of executions. Windows Download 231 Downloads 0 Ratings Share Rate Ghost File Overview This is a novel software integrating encryption technology with decryption technology. The features of this software can be concluded as follow: (1) Base on The Encryption engine of microsoft,the software with mandatory encryption technology can be applied to all types of documents, and the encrypted document is stored in a special format. (2) With the correct password, the encrypted document will be directly executed without decrypting as Another File stored in the hard disk. Especially, Execution of the encrypted document does not depend...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

SEC and Crypto [en] (228)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

2288

text words

417

text unique words

237

text lines

125

text sentences

20

text paragraphs

1

text words per sentence

20

text matched phrases

7

text matched dictionaries

3

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap path

sitemap status

1 (priority 1 already searched, no matches found)

sitemap review version

0

sitemap urls count

0

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

-

sitemap process date

-

sitemap first import date

-

sitemap last import date

-