Report Overview

  1. Visited public
    2025-03-18 08:18:08
    Tags
  2. URL

    dl.freesoft-100.com/p/Binary.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    183.90.228.30

    #131965 Xserver Inc.

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
dl.freesoft-100.comunknown2006-06-262017-02-012025-03-07

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    dl.freesoft-100.com/p/Binary.zip

  2. IP

    183.90.228.30

  3. ASN

    #131965 Xserver Inc.

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    96 kB (96425 bytes)

  2. Hash

    45576ee0a1bcd3d75b06956e49ad4279

    c075482c4b5c0e0f8607f7959cce1f2b841fd256

  1. Archive (5)

  2. FilenameMd5File type
    CHANGELOG.txt
    8abe1702566a910ad6cba07618d50000
    ASCII text, with CRLF line terminators
    LICENSE.txt
    d32239bcb673463ab874e80d47fae504
    ASCII text
    NegativeScreen.exe
    9bd840c784c1c3a43cb3f0ee6ae3dc10
    PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
    NegativeScreenX86.exe
    d166e41810f2b1af283bbf2627b12e0a
    PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    README.md
    446ff26d4a92387ed27f57a5cccb957d
    ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
dl.freesoft-100.com/p/Binary.zip
183.90.228.30200 OK96 kB