Report Overview

  1. Submitted URL

    github.com/kkkgo/KMS_VL_ALL/archive/refs/heads/master.zip

  2. IP

    140.82.121.4

    ASN

    #36459 GITHUB

  3. Submitted

    2024-04-17 11:53:11

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    10

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
codeload.github.com623592007-10-092013-04-182024-04-16

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/kkkgo/KMS_VL_ALL/zip/refs/heads/master

  2. IP

    140.82.121.10

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    180 kB (179845 bytes)

  2. Hash

    8a848b909d3c248599a1c7ff87e218f9

    25ab3cfee6ede8b191773e23c50b63098eedd0ac

  1. Archive (19)

  2. FilenameMd5File type
    A64.dll
    698d2d01011110b0ba4aab62f92b9909
    PE32+ executable (DLL) (native) Aarch64, for MS Windows, 4 sections
    SvcTrigger.xml
    ade0007995da8218a924eae18dd5ffa4
    XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    cleanosppx64.exe
    162ab955cb2f002a73c1530aa796477f
    PE32+ executable (console) x86-64, for MS Windows, 5 sections
    cleanosppx86.exe
    5fd363d52d04ac200cd24f3bcc903200
    PE32 executable (console) Intel 80386, for MS Windows, 3 sections
    x64.dll
    2914300a6e0cdf7ed242505958ac0bb5
    PE32+ executable (DLL) (native) x86-64, for MS Windows, 4 sections
    x86.dll
    2a2bbc30d8e715c3c29e728989498469
    PE32 executable (DLL) (native) Intel 80386, for MS Windows, 4 sections
    setupcomplete.cmd
    65bc53900c0b960220a5af59b3ab9eb6
    ASCII text
    Activate.cmd
    27dbbeda34fa7260a3dc9f6fd1398fdd
    ASCII text
    AutoRenewal-Setup.cmd
    b9590b32f11fa467938518bad08b66f0
    ASCII text
    Check-Activation-Status-vbs.cmd
    48af8f351df5b7a7a341a4c1e0f0270a
    ASCII text
    Check-Activation-Status-wmic.cmd
    d2e352bab312e0adf78b32678ba5d3d0
    ASCII text, with very long lines (361)
    README.md
    b62afe023b7da83362b66405b866a937
    Unicode text, UTF-8 text
    ReadMe.html
    56b89b9bdca3b00ffc5886477ce6f0dc
    HTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (596)
    A64.dll
    698d2d01011110b0ba4aab62f92b9909
    PE32+ executable (DLL) (native) Aarch64, for MS Windows, 4 sections
    SvcTrigger.xml
    ade0007995da8218a924eae18dd5ffa4
    XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    cleanosppx64.exe
    162ab955cb2f002a73c1530aa796477f
    PE32+ executable (console) x86-64, for MS Windows, 5 sections
    cleanosppx86.exe
    5fd363d52d04ac200cd24f3bcc903200
    PE32 executable (console) Intel 80386, for MS Windows, 3 sections
    x64.dll
    2914300a6e0cdf7ed242505958ac0bb5
    PE32+ executable (DLL) (native) x86-64, for MS Windows, 4 sections
    x86.dll
    2a2bbc30d8e715c3c29e728989498469
    PE32 executable (DLL) (native) Intel 80386, for MS Windows, 4 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    YARAhub by abuse.chmalware
    Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/kkkgo/KMS_VL_ALL/archive/refs/heads/master.zip
140.82.121.4302 Found0 B
codeload.github.com/kkkgo/KMS_VL_ALL/zip/refs/heads/master
140.82.121.10200 OK180 kB