Report Overview

  1. Visited public
    2025-05-03 18:31:00
    Tags
  2. URL

    download.sysinternals.com/files/Junction.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    13.107.246.53

    #8075 MICROSOFT-CORP-MSN-AS-BLOCK

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
download.sysinternals.com3172091998-04-122012-05-212025-04-27

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    download.sysinternals.com/files/Junction.zip

  2. IP

    13.107.246.53

  3. ASN

    #8075 MICROSOFT-CORP-MSN-AS-BLOCK

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    516 kB (516283 bytes)

  2. Hash

    7a51f6ce67a6abc43ebd0fb7f62fcc4d

    f8007a6db95ab2eeeea65347e0bd829c01eade6d

  1. Archive (4)

  2. FilenameMd5File type
    junction.exe
    d53e00822af1527611e5e5c5ce588678
    PE32 executable (console) Intel 80386, for MS Windows, 5 sections
    junction64.exe
    a87678bbf8f7752a85eca00ba3fc6775
    PE32+ executable (console) x86-64, for MS Windows, 6 sections
    junction64a.exe
    0c88089be1f6bbf632c74358a95b6ac4
    PE32+ executable (console) Aarch64, for MS Windows, 6 sections
    Eula.txt
    8c24c4084cdc3b7e7f7a88444a012bfc
    Unicode text, UTF-8 (with BOM) text, with very long lines (518), with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
download.sysinternals.com/files/Junction.zip
13.107.246.53200 OK516 kB