Report Overview

  1. Visited public
    2025-02-09 10:29:25
    Tags
  2. URL

    ftp.icm.edu.pl/pub/winsite/win95/netutil/flashsuite.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    193.219.28.2

    #8664 University of Warsaw

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
ftp.icm.edu.pl8988461995-01-012017-01-292025-02-07

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    ftp.icm.edu.pl/pub/winsite/win95/netutil/flashsuite.zip

  2. IP

    193.219.28.2

  3. ASN

    #8664 University of Warsaw

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    17 MB (17198803 bytes)

  2. Hash

    59074060fd5ce24cdf64ed89da6196c9

    c079c29d9acd4f51f06ecc42e8c87d0109ef0227

  1. Archive (2)

  2. FilenameMd5File type
    SWF Quicker Setup.exe
    63f138b88de986a8324e4c6f2856a5a4
    PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
    SWF Decompiler Setup.exe
    b6643309a0bd5f94e0a3484eaa2e291b
    PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Scans presence of the found strings using the in-house brute force method
    YARAhub by abuse.chmalware
    Scans presence of the found strings using the in-house brute force method

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
ftp.icm.edu.pl/pub/winsite/win95/netutil/flashsuite.zip
193.219.28.2200 OK17 MB