Report Overview

  1. Submitted URL

    get-kmspico.com/wp-content/uploads/2023/10/windows-activator-txt.zip

  2. IP

    104.21.67.144

    ASN

    #13335 CLOUDFLARENET

  3. Submitted

    2024-05-07 07:38:03

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
get-kmspico.comunknown2021-03-112021-03-312024-04-09

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    get-kmspico.com/wp-content/uploads/2023/10/windows-activator-txt.zip

  2. IP

    104.21.67.144

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    1.0 kB (1012 bytes)

  2. Hash

    76f2773143b99621eb6d3e7fffd199ee

    d0c088792158c1325dfa52d2289e2f576ad0f322

  1. Archive (1)

  2. FilenameMd5File type
    windows activator txt.txt
    cb27f237c8cfdd93405095f0e117e519
    DOS batch file, ASCII text, with very long lines (371), with CRLF line terminators

    Detections

    AnalyzerVerdictAlert
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
get-kmspico.com/wp-content/uploads/2023/10/windows-activator-txt.zip
104.21.67.144200 OK1.0 kB