File name:

H-Boost Ultra 3.9.bat.nerf

Full analysis: https://app.any.run/tasks/e6d49679-4c8c-40c7-830e-d09a960c34f2
Verdict: Malicious activity
Analysis date: January 11, 2025, 01:47:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pastebin
discord
ims-api
generic
Indicators:
MIME: text/plain
File info: Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
MD5:

801EA26D56261B4551A47CA5345119CF

SHA1:

718F9D527D065E9394304D3A2C8A5C547E386C2E

SHA256:

D9989CFBF38E33725A7352E1F897BB772A2C26477A108AE86DCA11E30C1B8B3C

SSDEEP:

768:d89A3Z3XVBEaaLkIQNobLn92wl5g9MNfDt5f8FhaAgF2mHu3mvdeZ8n7fCfqPQO/:hEVLF522EnrFu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6952)
      • powershell.exe (PID: 7104)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 6824)
  • SUSPICIOUS

    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 6548)
      • cmd.exe (PID: 6824)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 6548)
      • cmd.exe (PID: 6824)
      • powershell.exe (PID: 6952)
      • powershell.exe (PID: 7104)
      • cmd.exe (PID: 4244)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 6548)
      • cmd.exe (PID: 4244)
    • Executing commands from a ".bat" file

      • powershell.exe (PID: 6632)
    • Starts CMD.EXE for commands execution

      • powershell.exe (PID: 6632)
      • cmd.exe (PID: 6824)
    • The process executes Powershell scripts

      • cmd.exe (PID: 6824)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 7056)
      • powershell.exe (PID: 3988)
    • Application launched itself

      • powershell.exe (PID: 6952)
      • cmd.exe (PID: 6824)
      • powershell.exe (PID: 7104)
    • Uses WMIC.EXE to obtain operating system information

      • cmd.exe (PID: 2928)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6220)
      • cmd.exe (PID: 6824)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 6220)
    • Execution of CURL command

      • cmd.exe (PID: 6824)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 6300)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 6824)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • cmd.exe (PID: 6824)
  • INFO

    • The process uses the downloaded file

      • powershell.exe (PID: 6632)
      • powershell.exe (PID: 6952)
      • powershell.exe (PID: 7104)
    • Manual execution by a user

      • cmd.exe (PID: 6548)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 372)
    • Checks supported languages

      • mode.com (PID: 6928)
      • curl.exe (PID: 2456)
      • curl.exe (PID: 6512)
      • curl.exe (PID: 6528)
      • mode.com (PID: 3984)
      • mode.com (PID: 536)
      • mode.com (PID: 6636)
      • curl.exe (PID: 6756)
      • curl.exe (PID: 6800)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 6928)
      • mode.com (PID: 3984)
      • mode.com (PID: 6636)
      • mode.com (PID: 536)
    • Disables trace logs

      • powershell.exe (PID: 7056)
      • powershell.exe (PID: 3988)
      • powershell.exe (PID: 3796)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 2572)
      • WMIC.exe (PID: 6300)
    • Checks proxy server information

      • powershell.exe (PID: 7056)
      • powershell.exe (PID: 3988)
      • powershell.exe (PID: 3796)
    • Reads Internet Explorer settings

      • powershell.exe (PID: 7056)
      • powershell.exe (PID: 3988)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 3988)
      • powershell.exe (PID: 7056)
      • powershell.exe (PID: 3796)
    • Remote server returned an error (POWERSHELL)

      • powershell.exe (PID: 7056)
      • powershell.exe (PID: 3988)
      • powershell.exe (PID: 3796)
    • Execution of CURL command

      • cmd.exe (PID: 6032)
      • cmd.exe (PID: 6824)
    • Reads the computer name

      • curl.exe (PID: 6528)
      • curl.exe (PID: 6512)
      • curl.exe (PID: 2456)
      • curl.exe (PID: 6756)
      • curl.exe (PID: 6800)
    • Attempting to use instant messaging service

      • curl.exe (PID: 6528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

ims-api

(PID) Process(6824) cmd.exe
Discord-Webhook-Tokens (2)1264233519719252059/8Mvd8_Es0BMX8k3rcC8CdXf-Nlas9IsuhR_gqUSPG3naI6TF0Wut2DrIOnTjmYpbmCzr
1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
Discord-Info-Links
1264233519719252059/8Mvd8_Es0BMX8k3rcC8CdXf-Nlas9IsuhR_gqUSPG3naI6TF0Wut2DrIOnTjmYpbmCzr
Get Webhook Infohttps://discord.com/api/webhooks/1264233519719252059/8Mvd8_Es0BMX8k3rcC8CdXf-Nlas9IsuhR_gqUSPG3naI6TF0Wut2DrIOnTjmYpbmCzr
1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
Get Webhook Infohttps://discord.com/api/webhooks/1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
Discord-Webhook-Tokens (1)1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
Discord-Info-Links
1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
Get Webhook Infohttps://discord.com/api/webhooks/1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
No Malware configuration.

TRiD

.txt | Text - UTF-16 (LE) encoded (66.6)
.mp3 | MP3 audio (33.3)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
163
Monitored processes
44
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start openwith.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe conhost.exe no specs reg.exe no specs mode.com no specs powershell.exe no specs powershell.exe conhost.exe no specs powershell.exe no specs powershell.exe conhost.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs powershell.exe cmd.exe no specs wmic.exe no specs findstr.exe no specs cmd.exe no specs curl.exe reg.exe no specs reg.exe no specs reg.exe no specs curl.exe findstr.exe no specs cmd.exe no specs reg.exe no specs curl.exe mode.com no specs timeout.exe no specs cmd.exe no specs reg.exe no specs curl.exe mode.com no specs timeout.exe no specs cmd.exe no specs reg.exe no specs curl.exe mode.com no specs

Process information

PID
CMD
Path
Indicators
Parent process
372"C:\WINDOWS\System32\OpenWith.exe" "C:\Users\admin\Desktop\H-Boost Ultra 3.9.bat.nerf"C:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6548C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\H-Boost Ultra 3.9.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
6556\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6608Reg.exe add HKLM /F C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
6632powershell -NoProfile -Command start -verb runas "'C:\Users\admin\Desktop\H-BOOS~1.BAT'" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6640\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6824"C:\WINDOWS\System32\cmd.exe" /C "C:\Users\admin\Desktop\H-BOOS~1.BAT" C:\Windows\System32\cmd.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
ims-api
(PID) Process(6824) cmd.exe
Discord-Webhook-Tokens (2)1264233519719252059/8Mvd8_Es0BMX8k3rcC8CdXf-Nlas9IsuhR_gqUSPG3naI6TF0Wut2DrIOnTjmYpbmCzr
1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
Discord-Info-Links
1264233519719252059/8Mvd8_Es0BMX8k3rcC8CdXf-Nlas9IsuhR_gqUSPG3naI6TF0Wut2DrIOnTjmYpbmCzr
Get Webhook Infohttps://discord.com/api/webhooks/1264233519719252059/8Mvd8_Es0BMX8k3rcC8CdXf-Nlas9IsuhR_gqUSPG3naI6TF0Wut2DrIOnTjmYpbmCzr
1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
Get Webhook Infohttps://discord.com/api/webhooks/1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
(PID) Process(6824) cmd.exe
Discord-Webhook-Tokens (1)1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
Discord-Info-Links
1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
Get Webhook Infohttps://discord.com/api/webhooks/1264234031428665397/Q0GFImdkZStMhzBjzelEbTsF95p123bzsffWl-uEGn8tMgfdkQtZmM8wq0VcScPoVpdT
6832\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6908Reg.exe add HKLM /F C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
6928mode 64,14C:\Windows\System32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
DOS Device MODE Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mode.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
29 953
Read events
29 950
Write events
3
Delete events
0

Modification events

(PID) Process:(6632) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\WINDOWS\System32\cmd.exe.FriendlyAppName
Value:
Windows Command Processor
(PID) Process:(6632) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\WINDOWS\System32\cmd.exe.ApplicationCompany
Value:
Microsoft Corporation
(PID) Process:(6376) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CoreData
Operation:writeName:Serial
Value:
1268666339600782
Executable files
0
Suspicious files
4
Text files
14
Unknown types
0

Dropped files

PID
Process
Filename
Type
6632powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:75A6DDA4CB971F85673794AFB49725A4
SHA256:83DE78EA793CD20042F9780DB5990DFA15379AFEFCE1E9E608104E57E982F699
6632powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF139147.TMPbinary
MD5:D040F64E9E7A2BB91ABCA5613424598E
SHA256:D04E0A6940609BD6F3B561B0F6027F5CA4E8C5CF0FB0D0874B380A0374A8D670
6632powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_tkp00ntn.n1w.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7056powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rnqoidmt.4ll.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6632powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W497P7Z0DIGSTLC8GMF5.tempbinary
MD5:C94A707BB242646A17CC94847906770E
SHA256:BB43703EA4135BEE07E2DEB00544EA15DD64FE7E706B8FA5CBC66A97AF19B232
7104powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_r41fzvap.gmf.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6824cmd.exeC:\Users\admin\AppData\Local\Temp\temp.ps1text
MD5:894A2941A5B553651D1915CBC0C6D6CA
SHA256:DCD9E872A38958EF03EAE6833FF551215F09388F954CC1D8BB4525A78D32BDB3
6952powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_sxruv5lt.3xh.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6632powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qccjf3ve.o3y.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7056powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rwjaurcv.h5f.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
29
DNS requests
7
Threats
5

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
736
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3976
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7056
powershell.exe
140.82.121.3:443
github.com
GITHUB
US
shared
3988
powershell.exe
140.82.121.3:443
github.com
GITHUB
US
unknown
3796
powershell.exe
3.210.94.60:443
httpbin.org
AMAZON-AES
US
unknown
2456
curl.exe
104.20.4.235:443
pastebin.com
CLOUDFLARENET
shared

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
unknown
google.com
  • 142.250.184.238
unknown
github.com
  • 140.82.121.3
unknown
httpbin.org
  • 3.210.94.60
  • 50.19.58.113
unknown
pastebin.com
  • 104.20.4.235
  • 104.20.3.235
  • 172.67.19.24
unknown
discord.com
  • 162.159.128.233
  • 162.159.137.232
  • 162.159.138.232
  • 162.159.135.232
  • 162.159.136.232
unknown

Threats

PID
Process
Class
Message
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
No debug info