Report Overview
Visitedpublic
2024-11-21 11:28:08
Tags
Submit Tags
URL
www.ezaudiorecorder.com/ezconverter/cvrtmate.exe
Finishing URL
about:privatebrowsing
IP / ASN
216.92.64.168
#7859 PAIR-NETWORKS
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
www.ezaudiorecorder.com
unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
high
216.92.64.168
Client IPET POLICY PE EXE or DLL Windows file download HTTP

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumwww.ezaudiorecorder.com/ezconverter/cvrtmate.exeScans presence of the found strings using the in-house brute force method

OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
www.ezaudiorecorder.com/ezconverter/cvrtmate.exe
IP / ASN
216.92.64.168
#7859 PAIR-NETWORKS
File Overview
File TypePE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
Size2.4 MB (2424743 bytes)
MD5ce6e0d93889e1ba70ac3322196f9e483
SHA1072711a4e756342155f7051211c6da6f47d007d5

Detections

AnalyzerVerdictAlert
YARAhub by abuse.chmalware
Scans presence of the found strings using the in-house brute force method

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize