Report Overview

  1. Visited public
    2025-05-13 17:57:09
    Tags
  2. URL

    dosign.it.com/verification/s.php?an=2

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    172.67.190.220

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
14

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
dosign.it.comunknown1992-10-232025-05-132025-05-13

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    dosign.it.com/verification/s.php?an=2

  2. IP

    172.67.190.220

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    2.3 MB (2314075 bytes)

  2. Hash

    6005bc33e2d5de87aab3227f752cc463

    47859cd3045ed12f320abbdb1904c1281afa25ed

  1. Archive (16)

  2. FilenameMd5File type
    api-ms-win-crt-convert-l1-1-0.dll
    4d44f878d747363c6a34bf3609bbd663
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    api-ms-win-crt-environment-l1-1-0.dll
    06581caa794c774d61ba8bbe9154c2d2
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    api-ms-win-crt-filesystem-l1-1-0.dll
    c03e51d51d33076f2417171435914902
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    api-ms-win-crt-heap-l1-1-0.dll
    ad849152885a1a91438cd1d141fa3802
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    api-ms-win-crt-locale-l1-1-0.dll
    fd956e443255c677f917d503f5c391d9
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    api-ms-win-crt-math-l1-1-0.dll
    ac091f3a6dfa5ca6a26ec73672679aab
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    api-ms-win-crt-multibyte-l1-1-0.dll
    5a791871b5ca66421f3420e773015470
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    api-ms-win-crt-runtime-l1-1-0.dll
    aa7af0b906336d221759d87da3ccdf66
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    api-ms-win-crt-stdio-l1-1-0.dll
    485d0124e2645488d4594ca726dbbc34
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    api-ms-win-crt-string-l1-1-0.dll
    f23a085644371e2622b380d589a5a9f7
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    api-ms-win-crt-time-l1-1-0.dll
    a66bde5881977305bddcd50893ff037b
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 3 sections
    curl.exe
    c2817422c50a8060aca9cc2ccbb0a2d0
    PE32 executable (console) Intel 80386, for MS Windows, 8 sections
    jp2launcher.exe
    d3c216ddb0d7d84bdd599e1b2bee320c
    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
    msvcp140.dll
    408e96b7ebb3cb972b90622391607ced
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    msvcp140d.dll
    dc739066c9d0ca961cba2f320cade28e
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections
    vcruntime140.dll
    1d4ff3cf64ab08c66ae9a4013c89a3ac
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    meth_stackstrings
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
dosign.it.com/verification/s.php?an=2
172.67.190.220200 OK2.3 MB