Report Overview
Visitedpublic
2025-02-01 18:22:46
Tags
Submit Tags
URL
github.com/kkkgo/KMS_VL_ALL/archive/refs/heads/master.zip
Finishing URL
about:privatebrowsing
IP / ASN
140.82.121.3
#36459 GITHUB
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
github.com
14232007-10-092016-07-132025-01-29
codeload.github.com
623592007-10-092013-04-182025-01-29

Related reports

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
codeload.github.com/kkkgo/KMS_VL_ALL/zip/refs/heads/master
IP / ASN
140.82.121.10
#36459 GITHUB
File Overview
File TypeZip archive data, at least v1.0 to extract, compression method=store
Size180 kB (179845 bytes)
MD58a848b909d3c248599a1c7ff87e218f9
SHA125ab3cfee6ede8b191773e23c50b63098eedd0ac
Archive (19)
FilenameMD5File type
A64.dll698d2d01011110b0ba4aab62f92b9909PE32+ executable (DLL) (native) Aarch64, for MS Windows, 4 sections
SvcTrigger.xmlade0007995da8218a924eae18dd5ffa4XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
cleanosppx64.exe162ab955cb2f002a73c1530aa796477fPE32+ executable (console) x86-64, for MS Windows, 5 sections
cleanosppx86.exe5fd363d52d04ac200cd24f3bcc903200PE32 executable (console) Intel 80386, for MS Windows, 3 sections
x64.dll2914300a6e0cdf7ed242505958ac0bb5PE32+ executable (DLL) (native) x86-64, for MS Windows, 4 sections
x86.dll2a2bbc30d8e715c3c29e728989498469PE32 executable (DLL) (native) Intel 80386, for MS Windows, 4 sections
setupcomplete.cmd65bc53900c0b960220a5af59b3ab9eb6ASCII text
Activate.cmd27dbbeda34fa7260a3dc9f6fd1398fddASCII text
AutoRenewal-Setup.cmdb9590b32f11fa467938518bad08b66f0ASCII text
Check-Activation-Status-vbs.cmd48af8f351df5b7a7a341a4c1e0f0270aASCII text
Check-Activation-Status-wmic.cmdd2e352bab312e0adf78b32678ba5d3d0ASCII text, with very long lines (361)
README.mdb62afe023b7da83362b66405b866a937Unicode text, UTF-8 text
ReadMe.html56b89b9bdca3b00ffc5886477ce6f0dcHTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (596)
A64.dll698d2d01011110b0ba4aab62f92b9909PE32+ executable (DLL) (native) Aarch64, for MS Windows, 4 sections
SvcTrigger.xmlade0007995da8218a924eae18dd5ffa4XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
cleanosppx64.exe162ab955cb2f002a73c1530aa796477fPE32+ executable (console) x86-64, for MS Windows, 5 sections
cleanosppx86.exe5fd363d52d04ac200cd24f3bcc903200PE32 executable (console) Intel 80386, for MS Windows, 3 sections
x64.dll2914300a6e0cdf7ed242505958ac0bb5PE32+ executable (DLL) (native) x86-64, for MS Windows, 4 sections
x86.dll2a2bbc30d8e715c3c29e728989498469PE32 executable (DLL) (native) Intel 80386, for MS Windows, 4 sections

Detections

AnalyzerVerdictAlert
YARAhub by abuse.chmalware
Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
YARAhub by abuse.chmalware
Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
YARAhub by abuse.chmalware
Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
VirusTotalmalicious
ClamAVmalicious
Win.Trojan.Generic-10036804-0

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize