Report Overview

  1. Submitted URL

    download.sysinternals.com/files/TCPView.zip

  2. IP

    152.199.19.160

    ASN

    #15133 EDGECAST

  3. Submitted

    2024-04-25 20:11:47

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
download.sysinternals.com3172091998-04-122012-05-212024-04-19

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    download.sysinternals.com/files/TCPView.zip

  2. IP

    152.199.19.160

  3. ASN

    #15133 EDGECAST

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    1.6 MB (1604604 bytes)

  2. Hash

    0db74b666d6dc61a26e4cb217bb05f24

    1da8cef179836761535b045a850ea8ccc423b4b5

  1. Archive (8)

  2. FilenameMd5File type
    tcpview.exe
    7ce89829f9fb955dc377529c461852fd
    PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
    tcpview64.exe
    e6a59b12c9ff25259178f5645b8749b1
    PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
    tcpview64a.exe
    2852e3ac78790dc513b6ff5b34a2a476
    PE32+ executable (GUI) Aarch64, for MS Windows, 6 sections
    tcpvcon.exe
    356ed0fc156993551a484964f99e65b8
    PE32 executable (console) Intel 80386, for MS Windows, 5 sections
    tcpvcon64.exe
    93d2aea4b5923f7b63a4ec2ef3dd9c68
    PE32+ executable (console) x86-64, for MS Windows, 7 sections
    tcpvcon64a.exe
    cadc6c6933708f6e8e0707d930882ae6
    PE32+ executable (console) Aarch64, for MS Windows, 6 sections
    tcpview.chm
    c2cdf24ac6324ceae9f1e0414a4486f2
    MS Windows HtmlHelp Data
    Eula.txt
    8c24c4084cdc3b7e7f7a88444a012bfc
    Unicode text, UTF-8 (with BOM) text, with very long lines (518), with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
download.sysinternals.com/files/TCPView.zip
152.199.19.160200 OK1.6 MB