Report Overview
- Visited public2025-05-10 11:18:37Tags
- URL
cdn.discordapp.com/attachments/1189375800449978389/1370477417717825556/ScriptHookVDotNet-v3.7.0-nightly.24_1.zip?ex=68204cce&is=681efb4e&hm=8fa733b3d82653dd9a31aafda992449b9b8d2b54aa4d3aecb7ea04b5003c3e35&
- Finishing URL
about:privatebrowsing
- IP / ASN
162.159.135.233
#13335 CLOUDFLARENET
Titleabout:privatebrowsing
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
cdn.discordapp.com | 2474 | 2015-02-26 | 2015-08-24 | 2025-05-07 | 673 B | 2.6 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
cdn.discordapp.com/attachments/1189375800449978389/1370477417717825556/ScriptHookVDotNet-v3.7.0-nightly.24_1.zip?ex=68204cce&is=681efb4e&hm=8fa733b3d82653dd9a31aafda992449b9b8d2b54aa4d3aecb7ea04b5003c3e35&
IP
162.159.130.233
ASN
#13335 CLOUDFLARENET
File type
Zip archive data, at least v1.0 to extract, compression method=store
Size
2.6 MB (2615830 bytes)
Hash
8a4fc20a14c0618f09bc4b2cb0f8e23c
b2cf3f1722a76f2f7931d536a3f2caa56c0a59d0
Archive (13)
Filename | Md5 | File type | |||
---|---|---|---|---|---|
ScriptHookVDotNet3.xml | 4bcfe4b86a4aa15212ba1e56557d581c | XML 1.0 document, ASCII text, with CRLF line terminators | |||
ScriptHookVDotNet2.xml | 455e81237efdaf7e92881509fd22ff7f | XML 1.0 document, ASCII text, with CRLF line terminators | |||
THIRD-PARTY-NOTICES.txt | a2624fec9654ef4ffb9dee6d76e38fb3 | ASCII text, with CRLF line terminators | |||
LICENSE.txt | bc64a7f9ce2d707a96ed99b34c25e462 | ASCII text, with CRLF line terminators | |||
COPYRIGHT.txt | 3ad8d2cf3623875be98cee8e3da18696 | ASCII text, with CRLF line terminators | |||
README.txt | 067727655bd71d1f282eed03a2a3f9d0 | Unicode text, UTF-8 text, with very long lines (484), with CRLF line terminators | |||
ScriptHookVDotNet.asi | e8c2bfe340dcba1a5ec7b3d75caeb408 | PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows, 7 sections | |||
ScriptHookVDotNet.ini | f663b02011f0b6a0dfba44f499439576 | ASCII text, with CRLF line terminators | |||
ScriptHookVDotNet.pdb | 92d1c70b91cb638c57e934d538908fad | MSVC program database ver 7.00, 4096*377 bytes | |||
ScriptHookVDotNet2.dll | 34a361fffcf0e90f14b6c6697ba80615 | PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows, 3 sections | |||
ScriptHookVDotNet2.pdb | 0bc4b71051df952e0b89554a40dc89bb | MSVC program database ver 7.00, 512*2795 bytes | |||
ScriptHookVDotNet3.dll | 9c68ee327ba0a189f4900be5ca6d6f77
| PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows, 2 sections | |||
ScriptHookVDotNet3.pdb | b3bf74dcd44eef0c0cc57ed3ad36de11 | MSVC program database ver 7.00, 512*4163 bytes |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | Detect pe file that no import table |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |
---|---|---|---|---|
cdn.discordapp.com/attachments/1189375800449978389/1370477417717825556/ScriptHookVDotNet-v3.7.0-nightly.24_1.zip?ex=68204cce&is=681efb4e&hm=8fa733b3d82653dd9a31aafda992449b9b8d2b54aa4d3aecb7ea04b5003c3e35& | ![]() | 200 OK | 2.6 MB | |
HTTP Headers
| ||||