Report Overview

  1. Visited public
    2024-12-21 08:33:40
    Tags
    Submit Tags
  2. URL

    download.wdc.com/windlg/WinDlg_124.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    108.157.229.78

    #16509 AMAZON-02

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
download.wdc.com8584941992-05-152012-07-262024-12-20

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    download.wdc.com/windlg/WinDlg_124.zip

  2. IP

    143.204.55.66

  3. ASN

    #16509 AMAZON-02

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    923 kB (923401 bytes)

  2. Hash

    e700c77206c50bf205360e0e6d7a734d

    f3e14c5b1653dc5820fce5b79d2726b70a0bdb0f

  1. Archive (7)

  2. FilenameMd5File type
    WinDlg.exe
    7965a705310c1904d9c1fd385ed8c948
    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
    disk16.dll
    0b8697984988125a81ae3773d4772c1e
    MS-DOS executable, NE for MS Windows 3.x (4.0) (DLL or font)
    disk32.dll
    5de1eb9b2d43a4c8ed7fecd180b08ee0
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 4 sections
    help.htm
    6b561f6149537bc2fd07119e3d6a4c18
    HTML document, ISO-8859 text, with CRLF line terminators
    setup.exe
    7d951724ddff5f69c5be2216f9cb06c8
    PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
    smart.htm
    37054d4bb991a88facf071135b67e18f
    HTML document, Non-ISO extended-ASCII text, with CRLF line terminators
    WinDlg.txt
    39a59c1aa5ff6ff59f472bfdc83ec23e
    ASCII text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Scans presence of the found strings using the in-house brute force method
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
GET download.wdc.com/windlg/WinDlg_124.zip
143.204.55.66200 OK923 kB