Submitted URL: https://www.vmware.com/go/getworkstation-win
Effective URL: https://download3.vmware.com/software/WKST-1750-WIN/VMware-workstation-full-17.5.0-22583795.exe
Submission: On November 29 via manual from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2a02:26f0:3500:1ac::2ef, located in Frankfurt am Main, Germany and belongs to AKAMAI-ASN1, NL. The main domain is download3.vmware.com. The Cisco Umbrella rank of the primary domain is 288742.
TLS certificate: Issued by DigiCert TLS RSA SHA256 2020 CA1 on March 25th 2023. Valid for: a year.
This is the only time download3.vmware.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Downloads These files were downloaded by the website

Size: 572 MB (599532520 bytes, 0% done)
Downloaded from: https://download3.vmware.com/software/WKST-1750-WIN/VMware-workstation-full-17.5.0-22583795.exe

Domain & IP information

IP Address AS Autonomous System
1 1 2a02:26f0:350... 20940 (AKAMAI-ASN1)
1 2a02:26f0:350... 20940 (AKAMAI-ASN1)
1 1
Apex Domain
Subdomains
Transfer
2 vmware.com
www.vmware.com — Cisco Umbrella Rank: 44156
download3.vmware.com — Cisco Umbrella Rank: 288742
2 KB
1 1
Domain Requested by
1 download3.vmware.com
1 www.vmware.com 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
*.vmware.com
DigiCert TLS RSA SHA256 2020 CA1
2023-03-25 -
2024-03-27
a year crt.sh

This page contains 1 frames:

Primary Page: https://download3.vmware.com/software/WKST-1750-WIN/VMware-workstation-full-17.5.0-22583795.exe
Frame ID: B8C503FE9A3B9E68AE9178C56EA43F0D
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

Detected technologies

Overall confidence: 100%
Detected patterns

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

2
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

5
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.


Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request VMware-workstation-full-17.5.0-22583795.exe
download3.vmware.com/software/WKST-1750-WIN/
Redirect Chain
  • https://www.vmware.com/go/getworkstation-win
  • https://download3.vmware.com/software/WKST-1750-WIN/VMware-workstation-full-17.5.0-22583795.exe
0
0
Document
General
Full URL
https://download3.vmware.com/software/WKST-1750-WIN/VMware-workstation-full-17.5.0-22583795.exe
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:3500:1ac::2ef Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
AkamaiNetStorage /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Accept-Ranges
bytes
Connection
keep-alive
Content-Length
599532520
Content-MD5
sJHZGDA066hBXZrjypvQ4w==
Content-Type
application/x-octet-stream
Date
Wed, 29 Nov 2023 02:11:18 GMT
ETag
"b091d9183034eba8415d9ae3ca9bd0e3:1697197073.38089"
Last-Modified
Fri, 13 Oct 2023 11:38:22 GMT
Server
AkamaiNetStorage
content-disposition
attachment; filename="VMware-workstation-full-17.5.0-22583795.exe"

Redirect headers

content-length
0
content-security-policy
frame-ancestors 'self' https://*.vmware.com;
content-type
text/html; charset=UTF-8
date
Wed, 29 Nov 2023 02:11:18 GMT
dc-pool-id
p3tx622k
location
https://download3.vmware.com/software/WKST-1750-WIN/VMware-workstation-full-17.5.0-22583795.exe
server
Apache
server-timing
cdn-cache; desc=MISS edge; dur=444 origin; dur=110 ak_p; desc="1701223878094_388276639_1368552252_55352_10777_6_8_255";dur=1
x-frame-options
DENY
x-powered-by
PHP/7.3.26

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

5 Cookies

Domain/Path Name / Value
www.vmware.com/ Name: AVI_COOKIE
Value: 02ff22dd16-71ca-41uTqpuRq-4A1eKEGcQP305rqanKnr6pxF2xyYxMI8ooyFEH2_IzO6mgbqjP0gW0KynxA
www.vmware.com/ Name: myvmware-www
Value: 02d02dc99a-4b61-4bJ3MtTQQFSdqj4zeO258vtsvDx90X7GE8pVQhH7ggzQZzbZ7jkXwHsxtUroKqE7QO3HA
.vmware.com/ Name: _abck
Value: D569A973A527E749E655AAD91B0B2A1A~-1~YAAQn6EkF2JBhPeLAQAAC1DYGAqAm3zv5AKUhG0+r52Lt5TsHHty8g9/eTMGklJL6DHY3El4iqn4qrlitMGPIOtvA9yMRpIdFyGuSY7wyGJyL13/wrP5G4l4V14emE/36R2m/YxN3HecmP5mO4ufcXqoHX41MqkERt5owL9qwyZNf6TW5sn1CyCwE0DsPwtR5MLAnJlS+vEBLVyNep4XsGzg9cIVYHnbWobGUznPmNd/KSkLX5BO1kNi5Ao4IG8OxGUvwAenO0gB7Vcha2XRJ72Cr1zKeQOLd6WO4iMDy+flBbsDe6k3oQdEFbdXhbh8/7gltibkyZ97OismSdxzbgb/wLL8OGKNTQwJJXa5GzPv4W6ZmhShKwOnwWc=~-1~-1~-1
.vmware.com/ Name: ak_bmsc
Value: F7953E55DAC506A68429B356057068AA~000000000000000000000000000000~YAAQn6EkF2NBhPeLAQAAC1DYGBUXZf/6nP4dx0bhqBsLtxECRgAn5vHQxf6gsAzNsRpIAJKIIc+DIBaWVUxH8YB7L9D8kw4fKEWKuoVFTbBijfeFbcbhY9hY6XbxhbO8PTdyY3gDcLVi0eBUiY1pLIEt9sNxge85B3k3bh5mjobbIGEK3vjn3sc2wxpAM/w/AKuljsx/5s4uiU+gyORzpQ4psNrT4pW4A+J8F53ZuaDG8+722Jvl2wtKwygfqyYzGnz2ewjebnYzaWFudLN62ZDzKIG7PYf7AI1juKZCI3lNKlhlQ5n5O6OeKSlbrx9d+w2bq+W20au5YLxv5E2262dnc7vYOQ8+Bvh8oua0brFRwpRCk9/srALa5mPOEaBJsLSArzFlvBF/DV4=
.vmware.com/ Name: bm_sz
Value: 40C38D9CE342D57B56B5CB8AA3E1CDD3~YAAQn6EkF2RBhPeLAQAAC1DYGBUdW3LpYMNnf/7K59mwiYUx4hXA5IuJF2G1slxuiB+r8g9kfa83fFZTdqmElwLOY+zz5l9jGw/oPfLJLlIyJ4hiqFsKvSxQ9lhi1xb2t0CT6kjcGxiv9qGKVC+LJUk9OlYUiDw1wD/cPYtLy1iRrRpCVJM4KtzGAd7GwgF0ntuw9hA5RCF3Ronz0NpD6/OdPsuMONBFL7+tXO+kwI7euWXwA54uDvdRT0KWbNFjqyKn+4re+uorvKOqZOyr69NA0cBBwAIqMfzi11NwPEG+NXw=~4403766~3225392

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

download3.vmware.com
www.vmware.com
2a02:26f0:3500:1ac::2ef
2a02:26f0:3500:894::2ef