Report Overview

  1. Visited public
    2025-05-09 20:43:19
    Tags
  2. URL

    cdn.discordapp.com/attachments/1370498676702580879/1370501160674529451/GenP.v3.5.0-CGP.zip?ex=681fba2b&is=681e68ab&hm=ca93e8f7ec62a393e359ee424939923e8558aa987765fcab9b4ff58ed7c42461&

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    162.159.133.233

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
cdn.discordapp.com24742015-02-262015-08-242025-05-07

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    cdn.discordapp.com/attachments/1370498676702580879/1370501160674529451/GenP.v3.5.0-CGP.zip?ex=681fba2b&is=681e68ab&hm=ca93e8f7ec62a393e359ee424939923e8558aa987765fcab9b4ff58ed7c42461&

  2. IP

    162.159.133.233

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    746 kB (745545 bytes)

  2. Hash

    c6c5d8125aadedbd2dc78ed8ba237582

    f9b45604b3513e03d0d80de6498d4ba2cce7c2c3

  1. Archive (5)

  2. FilenameMd5File type
    config.ini
    3d6ace120bb21ef7661f9baa3a828ba0
    Generic INItialization configuration [TargetFiles]
    GenP 3.5.0.exe
    362a9b5ab6c70aff8c686fd35602e999
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    AdobeGenP-3.5.0.au3
    4607b85345742b5f6913a88802c138d7
    C source, ASCII text, with CRLF line terminators
    config.ini
    3d6ace120bb21ef7661f9baa3a828ba0
    Generic INItialization configuration [TargetFiles]
    Skull.ico
    c37b537e533890560fe52664a7f1c1a0
    MS Windows icon resource - 9 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel

    Detections

    AnalyzerVerdictAlert
    Public InfoSec YARA rulesmalware
    Identifies compiled AutoIT script (as EXE).
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
cdn.discordapp.com/attachments/1370498676702580879/1370501160674529451/GenP.v3.5.0-CGP.zip?ex=681fba2b&is=681e68ab&hm=ca93e8f7ec62a393e359ee424939923e8558aa987765fcab9b4ff58ed7c42461&
162.159.133.233200 OK746 kB