Report Overview

  1. Visited public
    2025-04-29 22:04:24
    Tags
    Submit Tags
  2. URL

    www.sigmaxl.com/New/V10/Zips/ta-v5.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    74.208.236.146

    #8560 IONOS SE

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.sigmaxl.comunknown2002-05-252012-05-222023-11-06

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.sigmaxl.com/New/V10/Zips/TA-V5.zip

  2. IP

    74.208.236.146

  3. ASN

    #8560 IONOS SE

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    1.3 MB (1307438 bytes)

  2. Hash

    8d5e9f2886e7b3ea020251805089e5c3

    ad15025b6b24184cd0148e905bb4ccbe03033817

  1. Archive (3)

  2. FilenameMd5File type
    TurboActivate.dll
    68022800795a64d14188132028223cd3
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 6 sections
    TurboActivate.exe
    3b29bb58db307d7f28c4931550fb5892
    PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
    TurboActivate.x64.dll
    4843ff43de07dae467a483eed6ad6f9b
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
GET www.sigmaxl.com/New/V10/Zips/TA-V5.zip
74.208.236.146200 OK1.3 MB
GET www.sigmaxl.com/New/V10/Zips/ta-v5.zip
74.208.236.146301 Moved Permanently1.3 MB