Report Overview
Visitedpublic
2024-12-13 10:37:50
Tags
Submit Tags
URL
mytest.klyaksa.net/htm/download/MyTestX.zip
Finishing URL
about:privatebrowsing
IP / ASN
31.31.196.54
#197695 Domain names registrar REG.RU, Ltd
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
mytest.klyaksa.net
unknown2004-04-132012-12-272023-12-04

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
mytest.klyaksa.net/htm/download/MyTestX.zip
IP / ASN
31.31.196.54
#197695 Domain names registrar REG.RU, Ltd
File Overview
File TypeZip archive data, at least v1.0 to extract, compression method=store
Size9.6 MB (9625044 bytes)
MD59829b92ba36461a2b352bda9cb2b870d
SHA12518d816ac1b06bf2f2eb31e8af4128375871519
Archive (23)
FilenameMD5File type
help.chm0f52ce432546b59b0f1bbc26c4f5261dMS Windows HtmlHelp Data
language.txt359bfff73f74e24e6a25839bf1c9ec48Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
MyTestEditor.exeb0664f55d51ed27d69e52c29d99825f7PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
MyTestServer.exe1b8a13a9becbd5364079904a5a35580cPE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
MyTestStudent.exe12df47fe06cb6d59486e1f72928198b1PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
ReadMe.doca702ea0186ec53323833c063bd652fb9Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Author: bas, Template: Normal, Last Saved By: bas, Revision Number: 3, Name of Creating Application: Microsoft Office Word, Total Editing Time: 03:00, Create Time/Date: Thu Jun 16 09:50:00 2011, Last Saved Time/Date: Fri Nov 25 14:04:00 2011, Number of Pages: 1, Number of Words: 346, Number of Characters: 1973, Security: 0
DemoTest01.mtf495288cb72e83fa6f62567860b451664data
DemoTest02.mtfaf2d2476a29078a470b31bdecd03fd73data
DemoTest03.mtf8ad7688e11524b6e8b2370485d5ec7fbdata
GIA2010fi.mtfad1f27d955eafe587fa5a4a01178a1e5data
GIA2010inf.mtf108fc91f25410a37980a3a43100a1bd7data
GIA2010is.mtfde61312a16422997e9c413d92acddcaedata
GIA2010ma.mtfe5148f27091f43aa7d47657b38c8eb83data
GIA2010ob.mtf95d3355189ef310a5bec0dd6d9dbffacdata
GIA2010ru.mtf33ac14378393af42499c9453729381d0data
Readme.TXT2ab646c8d44c2469aa73a89ef3975b44Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
en_US.aff7476609662b4f33f131b3159622a1be4ASCII text
en_US.dica4150a48c55cbe2c74c4c2cbc37fa57cUnicode text, UTF-8 text
hunspelldll.dll29a6bae8a000a8b954787a3217e38774PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 7 sections
ru.aff98b2bb3698bd4feda52ee74ca3b15852ISO-8859 text
ru.diccf83969667690e74ba12ce4c7229ba79ISO-8859 text, with CRLF, LF line terminators
TemplateReport.htm0fe67ac94b529588f263f3ae67fed26eHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
New.txt59d6a87e98af380af00c22b89434bbdaISO-8859 text, with CRLF line terminators

Detections

AnalyzerVerdictAlert
VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize