Report Overview
Visitedpublic
2025-05-13 17:30:07
Tags
Submit Tags
URL
git.activated.win/massgrave/Microsoft-Activation-Scripts/archive/master.zip
Finishing URL
about:privatebrowsing
IP / ASN
104.21.24.156
#13335 CLOUDFLARENET
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Host Summary

HostRankRegisteredFirst SeenLast Seen
git.activated.win
unknown2024-05-152024-10-082025-05-07

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
git.activated.win/massgrave/Microsoft-Activation-Scripts/archive/master.zip
IP / ASN
104.21.24.156
#13335 CLOUDFLARENET
File Overview
File TypeZip archive data, at least v1.0 to extract, compression method=store
Size468 kB (467868 bytes)
MD53e4de4f97b03da9f1c570faea8dd1c64
SHA10dea37d364035ed3fa1851b490c0df49fba4f2b1
Archive (15)
FilenameMD5File type
LICENSE1ebbd3e34237af26da5dc08a4e440464ASCII text
MAS_AIO.cmd98f65f29751a5dfc3c9c35c42eb708d7ASCII text, with very long lines (348), with CRLF line terminators
HWID_Activation.cmd7f70b19ccdd960165369eeccbbf28070DOS batch file, ASCII text, with very long lines (376), with CRLF line terminators
KMS38_Activation.cmded99e305be91ee80c843e76531911c2dDOS batch file, ASCII text, with very long lines (500), with CRLF line terminators
Ohook_Activation_AIO.cmd6e407b8d41b4f26441b7e40cb41cefd3DOS batch file, ASCII text, with very long lines (452), with CRLF line terminators
Online_KMS_Activation.cmd972bdf97a5a1725147e42b778161775bDOS batch file, ASCII text, with very long lines (452), with CRLF line terminators
TSforge_Activation.cmd8840ba9d598b1d41db92835fe58c27d7DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators
_ReadMe.txte699451ed0dfe4ebdd499666dc411c3cASCII text, with CRLF line terminators
Change_Office_Edition.cmd8d756de50198942bebc327ffaeede659DOS batch file, ASCII text, with very long lines (453), with CRLF line terminators
Change_Windows_Edition.cmd8e748466ecd4050672f5475d01e579b9DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators
Check_Activation_Status.cmd8d85133114beeaf31f14e95f53e77f92DOS batch file, ASCII text, with very long lines (379), with CRLF line terminators
Extract_OEM_Folder.cmdf99c87ced41939998a46262630918eb4DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators
Troubleshoot.cmdc0de640715e5ed1055d29338f8a6c91aDOS batch file, ASCII text, with very long lines (376), with CRLF line terminators
_ReadMe.html574e18c1f9b32a47f988ac91588901baHTML document, ASCII text, with CRLF line terminators
README.md4516b2851beda532f4ce4292d527b55bUnicode text, UTF-8 text

Detections

AnalyzerVerdictAlert
Public Nextron YARA rulesmalware
Detects suspicious PowerShell code that downloads from web sites
Public Nextron YARA rulesmalware
Detects suspicious PowerShell code that downloads from web sites
VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
GET git.activated.win/massgrave/Microsoft-Activation-Scripts/archive/master.zip
104.21.24.156200 OK468 kB