Report Overview
Submitted URL
download.tenorshare.com/downloads/WhyNotWin11.exe?rnclid=11713657600022568501
IP
104.18.25.249
ASN
#13335 CLOUDFLARENET
Submitted
2024-04-27 00:09:38
Access
public
Website Title
about:privatebrowsing
Final URL
about:privatebrowsing
Tags
urlquery detections
No alerts detected
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
download.tenorshare.com | 275424 | 2010-08-24 | 2016-01-21 | 2024-04-09 | 531 B | 1.7 MB | 104.18.25.249 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
Scan Date | Severity | Indicator | Alert |
---|---|---|---|
2024-04-27 | medium | download.tenorshare.com/downloads/WhyNotWin11.exe?rnclid=11713657600022568501 | Identifies compiled AutoIT script (as EXE). |
OpenPhish
No alerts detected
PhishTank
No alerts detected
mnemonic secure dns
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
download.tenorshare.com/downloads/WhyNotWin11.exe?rnclid=11713657600022568501
IP
104.18.25.249
ASN
#13335 CLOUDFLARENET
File type
PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
Size
1.7 MB (1725328 bytes)
Hash
e5f4f4a03daba461f0e5c996449cf197
870531373a7e0959564446dbf58d58954c31c53c
Detections
Analyzer | Verdict | Alert |
---|---|---|
Public InfoSec YARA rules | malware | Identifies compiled AutoIT script (as EXE). |
VirusTotal | suspicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
download.tenorshare.com/downloads/WhyNotWin11.exe?rnclid=11713657600022568501 | 104.18.25.249 | 200 OK | 1.7 MB | ||||||||||
Detections
HTTP Headers
| |||||||||||||