Submitted URL: http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab
Effective URL: https://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab
Submission: On March 20 via manual from CA — Scanned from CA

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2600:141b:e800:c85::317f, located in Piscataway, United States and belongs to AKAMAI-ASN1, NL. The main domain is download.microsoft.com. The Cisco Umbrella rank of the primary domain is 8717.
TLS certificate: Issued by Microsoft Azure TLS Issuing CA 06 on November 30th 2023. Valid for: 6 months.
This is the only time download.microsoft.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Downloads These files were downloaded by the website

MIME: Microsoft Cabinet archive data, 39818 bytes, 22 files
Size: 47 KB (48426 bytes, 100% done)
Downloaded from: https://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab

Domain & IP information

IP Address AS Autonomous System
1 2 2600:141b:e80... 20940 (AKAMAI-ASN1)
1 1
Apex Domain
Subdomains
Transfer
2 microsoft.com
download.microsoft.com — Cisco Umbrella Rank: 8717
248 B
1 1
Domain Requested by
2 download.microsoft.com 1 redirects
1 1

This site contains no links.

Subject Issuer Validity Valid
akamai.download.microsoft.com
Microsoft Azure TLS Issuing CA 06
2023-11-30 -
2024-05-28
6 months crt.sh

This page contains 1 frames:

Primary Page: https://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab
Frame ID: 3AEC3C95FD7EBF77BD167DA9437B443E
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.


Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request wushowhide.diagcab
download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/
Redirect Chain
  • http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab
  • https://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab
0
0
Document
General
Full URL
https://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2600:141b:e800:c85::317f Piscataway, United States, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Kestrel /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36
accept-language
en-CA,en;q=0.9

Response headers

Accept-Ranges
bytes
Connection
keep-alive
Content-Disposition
attachment; filename=wushowhide.diagcab; filename*=UTF-8''wushowhide.diagcab
Content-Length
48426
Content-Type
application/octet-stream
Date
Wed, 20 Mar 2024 22:06:54 GMT
ETag
"0x8D93835125EE0D6"
Last-Modified
Fri, 25 Jun 2021 23:58:04 GMT
Server
Kestrel
X-Ms-ApiVersion
Distribute 1.2
X-Ms-Region
prod-eus-z1

Redirect headers

Connection
keep-alive
Content-Length
0
Date
Wed, 20 Mar 2024 22:06:53 GMT
Location
https://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab
Server
AkamaiGHost

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

download.microsoft.com
2600:141b:e800:c85::317f