Report Overview

  1. Submitted URL

    github.com/massgravel/Microsoft-Activation-Scripts/archive/refs/heads/master.zip

  2. IP

    140.82.121.3

    ASN

    #36459 GITHUB

  3. Submitted

    2024-04-23 17:37:24

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
codeload.github.com623592007-10-092013-04-182024-04-22

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


Files detected

  1. URL

    codeload.github.com/massgravel/Microsoft-Activation-Scripts/zip/refs/heads/master

  2. IP

    140.82.121.10

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    282 kB (281844 bytes)

  2. Hash

    c3071509af17da654bb28a68ab67e3e1

    15458ba7a48673d84d418b728563a15547d7c1f8

  1. Archive (15)

  2. FilenameMd5File type
    .gitattributes
    f9f25f50652fbf7e61039a620be51fa6
    ASCII text, with CRLF line terminators
    LICENSE
    5b4473596678d62d9d83096273422c8c
    ASCII text
    MAS_AIO-CRC32_8B16F764.cmd
    85d6b9f9cffa62fd7eb22954568a7d9a
    DOS batch file, ASCII text, with very long lines (311), with CRLF line terminators
    HWID_Activation.cmd
    756b500de53d9738c830df0c67701b37
    DOS batch file, ASCII text, with very long lines (491), with CRLF line terminators
    KMS38_Activation.cmd
    f1ca3d11d0d50e90a5f2478d6a363a1e
    DOS batch file, ASCII text, with very long lines (500), with CRLF line terminators
    Ohook_Activation_AIO.cmd
    d9cd63d019dfd82f24e3273f93277d4b
    DOS batch file, ASCII text, with CRLF line terminators
    Online_KMS_Activation.cmd
    7b5b2c6f5c97bea38e72f31879a9f69e
    DOS batch file, ASCII text, with CRLF line terminators
    ReadMe.txt
    b7fa33165116723bc2f83676fd62cc69
    ASCII text, with CRLF line terminators
    Change_Edition.cmd
    d20ea1f7448a12e835e3f40df0ff9afa
    DOS batch file, ASCII text, with CRLF line terminators
    Check-Activation-Status-vbs.cmd
    97b92adbe161d5a5731719e18585cff0
    ASCII text, with CRLF line terminators
    Check-Activation-Status-wmi.cmd
    fc7dfd4abbd167e7303301fa7f593cc2
    ASCII text, with very long lines (361), with CRLF line terminators
    Extract_OEM_Folder.cmd
    b1ec6d1e48d653d74d896910a2763402
    DOS batch file, ASCII text, with CRLF line terminators
    Troubleshoot.cmd
    ca4f211bed0fd63236e2cece5bca2e0d
    DOS batch file, ASCII text, with CRLF line terminators
    _ReadMe.html
    574e18c1f9b32a47f988ac91588901ba
    HTML document, ASCII text, with CRLF line terminators
    README.md
    d18efafe31ba6c70d9f96127b6aa765d
    HTML document, Unicode text, UTF-8 text

    Detections

    AnalyzerVerdictAlert
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/massgravel/Microsoft-Activation-Scripts/archive/refs/heads/master.zip
140.82.121.3302 Found0 B
codeload.github.com/massgravel/Microsoft-Activation-Scripts/zip/refs/heads/master
140.82.121.10200 OK282 kB