Report Overview

  1. Visited public
    2025-03-29 13:20:49
    Tags
    Submit Tags
  2. URL

    github.com/Filinsl/Discord-unlock/archive/refs/heads/main.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.4

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
5

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132025-03-26
codeload.github.com623592007-10-092013-04-182025-03-26

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/Filinsl/Discord-unlock/zip/refs/heads/main

  2. IP

    140.82.121.9

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    1.2 MB (1193607 bytes)

  2. Hash

    902bd6adfb1c49d7d60fd7a7e5a5939e

    6571f525264e320ed6b7817a13eaa984c8efb44c

  1. Archive (15)

  2. FilenameMd5File type
    README.md
    05a80340998b2cb18cb6763cfa6f0247
    Unicode text, UTF-8 text, with very long lines (330), with CRLF line terminators
    WinDivert.dll
    b2014d33ee645112d5dc16fe9d9fcbff
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 9 sections
    WinDivert64.sys
    89ed5be7ea83c01d0de33d3519944aa5
    PE32+ executable (native) x86-64, for MS Windows, 8 sections
    cygwin1.dll
    c50b50303fae4afe7248307339a00d13
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 3 sections
    quic_initial_www_google_com.bin
    312526d39958d89b1f8ab67789ab985f
    data
    tls_clienthello_www_google_com.bin
    7ab7ad857c5b8794fbdf1091b494dc94
    data
    winws.exe
    8c624e64742bc19447d52f61edec52db
    PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 10 sections
    discord.bat
    82663f57e2450a1ba628bd8e83efc75f
    DOS batch file, ASCII text, with CRLF line terminators
    discord_youtube.bat
    a89d8f04f1496c76800977b9e4299580
    DOS batch file, ASCII text, with CRLF line terminators
    list-discord.txt
    b4abcea255c0b2f0ec20d04361f044e1
    ASCII text, with CRLF line terminators
    list-general.txt
    37cfe76221239055cb9650207fc9b2b0
    ASCII text, with CRLF line terminators
    service_discord.bat
    d80c153326de88845c64d40973a5b229
    DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
    service_discord_youtube.bat
    dac294121ac13ce679542dd6822552e2
    DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
    service_goodbye_discord.bat
    4a13bc918e1f51e9e8930c4bfd135964
    DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
    service_remove.bat
    3c028ba03ea8ee2b2c5ca1601cfa4dcb
    DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects WinDivert User-Mode packet capturing driver
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
GET github.com/Filinsl/Discord-unlock/archive/refs/heads/main.zip
140.82.121.4302 Found1.2 MB
GET codeload.github.com/Filinsl/Discord-unlock/zip/refs/heads/main
140.82.121.9200 OK1.2 MB