Report Overview

  1. Submitted URL

    www.moddb.com/downloads/mirror/252055/130/15785c6463ae21592acb30dad396edef/?referer=https://www.google.com/

  2. IP

    104.26.12.171

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-05-10 20:32:12

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    7

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
fmt1.dl.dbolical.comunknown2013-05-242023-03-182024-04-17
normandy.cdn.mozilla.net35621998-01-312017-01-302024-05-09
classify-client.services.mozilla.com38241994-10-182019-01-092024-05-09
aus5.mozilla.org25481998-01-242015-10-272024-05-09
www.moddb.com1303872002-01-172012-05-262024-05-08

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    fmt1.dl.dbolical.com/dl/2023/06/20/FramerateVigilante_14.08.22.zip?st=YpTgIvCBfTrdLD8olxXREA==&e=1715376708

  2. IP

    103.24.123.147

  3. ASN

    #55651 DBOLICAL PTY LTD

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    794 kB (793605 bytes)

  2. Hash

    b3c2260cb49dfd69782dec51617f0005

    6a49b8a620a9de2512ae06c36a4e000e20a554e2

  1. Archive (12)

  2. FilenameMd5File type
    FramerateVigilante.III.asi
    041da5985eec166009ed02fd40889342
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    FramerateVigilante.ini
    7e44ad5ef8d674fe6d3fe788771d1b4c
    ASCII text, with CRLF line terminators
    Leiame (ou morra).txt
    3c31e2ea3071984114da91edd2e3b847
    ISO-8859 text, with CRLF line terminators
    Readme (or die).txt
    63a06d51c83bc5e12a5acde5ae5ca437
    Unicode text, UTF-8 text, with CRLF line terminators
    FramerateVigilante.ini
    18721aa7fe329003f7d28d8c09e01b63
    ASCII text, with CRLF line terminators
    FramerateVigilante.SA.asi
    d011d39e6a4283d4b6e5da89b4791037
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    Leiame (ou morra).txt
    b92fb3ffa59207b5b68366fe80835a9f
    ISO-8859 text, with CRLF line terminators
    Readme (or die).txt
    97563eda99d03db4f2ef62de91133ec4
    Unicode text, UTF-8 text, with CRLF line terminators
    FramerateVigilante.ini
    7e44ad5ef8d674fe6d3fe788771d1b4c
    ASCII text, with CRLF line terminators
    FramerateVigilante.VC.asi
    3edb5ebfd9d4a2f614eb72bba55cc331
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    Leiame (ou morra).txt
    5a2e5cac40e610ada6e95aea89ee281c
    ISO-8859 text, with CRLF line terminators
    Readme (or die).txt
    c18d93d76858992513dd009ad8bdd780
    Unicode text, UTF-8 text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (5)

URLIPResponseSize
fmt1.dl.dbolical.com/dl/2023/06/20/FramerateVigilante_14.08.22.zip?st=YpTgIvCBfTrdLD8olxXREA==&e=1715376708
103.24.123.147200 OK794 kB
normandy.cdn.mozilla.net/api/v1/
35.201.103.21 598 B
classify-client.services.mozilla.com/api/v1/classify_client/
34.98.75.36 64 B
aus5.mozilla.org/update/3/GMP/111.0a1/20240129201730/Linux_x86_64-gcc3/null/default/Linux%205.15.0-102-generic%20(GTK%203.24.37%2Clibpulse%20not-available)/default/default/update.xml
35.244.181.201 5.8 kB
www.moddb.com/downloads/mirror/252055/130/15785c6463ae21592acb30dad396edef/?referer=https://www.google.com/
172.67.70.78302 Found794 kB