Report Overview

  1. Submitted URL

    github.com/massgravel/Microsoft-Activation-Scripts/archive/refs/heads/master.zip

  2. IP

    140.82.121.3

    ASN

    #36459 GITHUB

  3. Submitted

    2024-05-05 13:28:16

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
codeload.github.com623592007-10-092013-04-182024-05-03
github.com14232007-10-092016-07-132024-03-24

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/massgravel/Microsoft-Activation-Scripts/zip/refs/heads/master

  2. IP

    140.82.121.9

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    282 kB (281857 bytes)

  2. Hash

    c8589bb3d1f3c7bce924397a9749ade6

    240909809a214a0dca725bc8fcd144c8cd25f2eb

  1. Archive (15)

  2. FilenameMd5File type
    .gitattributes
    f9f25f50652fbf7e61039a620be51fa6
    ASCII text, with CRLF line terminators
    LICENSE
    5b4473596678d62d9d83096273422c8c
    ASCII text
    MAS_AIO-CRC32_E6A92062.cmd
    68b8cc3ce82ba30e7cee33f6b4118b65
    DOS batch file, ASCII text, with very long lines (311), with CRLF line terminators
    HWID_Activation.cmd
    28312c7daafde6aac9f829513715c69f
    DOS batch file, ASCII text, with very long lines (491), with CRLF line terminators
    KMS38_Activation.cmd
    421be375c0e33294cf4e0f75d97aa928
    DOS batch file, ASCII text, with very long lines (500), with CRLF line terminators
    Ohook_Activation_AIO.cmd
    80e83ad7099009ccbcd5c910340fa9a8
    DOS batch file, ASCII text, with CRLF line terminators
    Online_KMS_Activation.cmd
    f544459204fc215b9c01536ba254ed43
    DOS batch file, ASCII text, with CRLF line terminators
    ReadMe.txt
    b7fa33165116723bc2f83676fd62cc69
    ASCII text, with CRLF line terminators
    Change_Edition.cmd
    d20ea1f7448a12e835e3f40df0ff9afa
    DOS batch file, ASCII text, with CRLF line terminators
    Check-Activation-Status-vbs.cmd
    0abf0120716bafcf4d9301d5a70ef1cf
    ASCII text, with CRLF line terminators
    Check-Activation-Status-wmi.cmd
    fc7dfd4abbd167e7303301fa7f593cc2
    ASCII text, with very long lines (361), with CRLF line terminators
    Extract_OEM_Folder.cmd
    b1ec6d1e48d653d74d896910a2763402
    DOS batch file, ASCII text, with CRLF line terminators
    Troubleshoot.cmd
    ca4f211bed0fd63236e2cece5bca2e0d
    DOS batch file, ASCII text, with CRLF line terminators
    _ReadMe.html
    574e18c1f9b32a47f988ac91588901ba
    HTML document, ASCII text, with CRLF line terminators
    README.md
    d18efafe31ba6c70d9f96127b6aa765d
    HTML document, Unicode text, UTF-8 text

    Detections

    AnalyzerVerdictAlert
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/massgravel/Microsoft-Activation-Scripts/archive/refs/heads/master.zip
140.82.121.3302 Found0 B
codeload.github.com/massgravel/Microsoft-Activation-Scripts/zip/refs/heads/master
140.82.121.9200 OK282 kB