Report Overview

  1. Submitted URL

    download.sysinternals.com/files/DiskMon.zip

  2. IP

    152.199.19.160

    ASN

    #15133 EDGECAST

  3. Submitted

    2024-05-02 13:58:23

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
download.sysinternals.com3172091998-04-122012-05-212024-04-19

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    download.sysinternals.com/files/DiskMon.zip

  2. IP

    152.199.19.160

  3. ASN

    #15133 EDGECAST

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    500 kB (500439 bytes)

  2. Hash

    502876c9d4745b9bbb1bc68c2bd7f1c6

    cf052d109dbf5ffe23939b5aa654172d4c6c6b60

  1. Archive (3)

  2. FilenameMd5File type
    Diskmon.exe
    b0aee4fa994c2eaffb454ed191dec1a0
    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
    Diskmon64.exe
    9c5fca10a71ea0b800a427ed4e2817c0
    PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
    Eula.txt
    8c24c4084cdc3b7e7f7a88444a012bfc
    Unicode text, UTF-8 (with BOM) text, with very long lines (518), with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
download.sysinternals.com/files/DiskMon.zip
152.199.19.160200 OK500 kB