Report Overview

  1. Visited public
    2025-04-14 13:36:43
    Tags
  2. URL

    www.sordum.org/files/easy-context-menu/ec_menu.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    68.66.216.9

    #55293 A2HOSTING

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.sordum.orgunknown2013-01-302013-02-022025-04-09

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    www.sordum.org/files/easy-context-menu/ec_menu.zip

  2. IP

    68.66.216.9

  3. ASN

    #55293 A2HOSTING

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    1.7 MB (1671796 bytes)

  2. Hash

    220ee69fb8dc2dec59afce58fe007263

    7ebf534b326f71e9710eb76e68369acad44a812e

  1. Archive (13)

  2. FilenameMd5File type
    EcMenu.exe
    fdea0366e834590a45a95bd697b4b1a3
    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
    EcMenu_x64.exe
    d4cae9981946b6e2fb1cf52eedd10261
    PE32+ executable (GUI) x86-64, for MS Windows, 5 sections
    EcMenu.ini
    95a5436447279b80d11e3456ba4788d1
    Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Items.ini
    788c708762fca4c7ce003dc8022a660c
    Unicode text, UTF-16, little-endian text, with CRLF line terminators
    NirCmd.chm
    66729efe2819e71c060af7fd49732c28
    MS Windows HtmlHelp Data
    nircmd_x64.exe
    80cce4afc880cde9f75dc4e8b497da80
    PE32+ executable (GUI) x86-64, for MS Windows, 5 sections
    nircmd_x86.exe
    ba2cf7d2d09ae9a29445704bd1b4f67b
    PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
    Readme.txt
    d1526bf12db4b795b35535aad8136572
    ASCII text, with CRLF line terminators
    SnippingTool.ico
    dbcf83361a0c5f09fa8b3014bbaae632
    MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
    SnippingTool.vbs
    198e2203276744b37ed3327009580034
    ASCII text, with CRLF line terminators
    StickyNotes.ico
    0b1299c03d6105c6cea70e1ea9856825
    MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
    StickyNotes.vbs
    6036af57c7a434a72c39d0e35be4c02c
    ASCII text, with CRLF line terminators
    Read_me.html
    833fe298f0a553a12e9bbb609937635f
    HTML document, Non-ISO extended-ASCII text, with very long lines (381), with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
www.sordum.org/files/easy-context-menu/ec_menu.zip
68.66.216.9200 OK1.7 MB