Report Overview

  1. Visited public
    2024-10-26 10:55:45
    Tags
  2. URL

    github.com/massgravel/Microsoft-Activation-Scripts/archive/refs/heads/master.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.3

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com1423unknownNo dataNo data
codeload.github.com62359unknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/massgravel/Microsoft-Activation-Scripts/zip/refs/heads/master

  2. IP

    140.82.121.9

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    318 kB (317868 bytes)

  2. Hash

    3973cb0da65fc881008031ac388046b2

    24dd6e62125508a6db5d53e087bddd37451ed4b8

  1. Archive (14)

  2. FilenameMd5File type
    LICENSE
    1ebbd3e34237af26da5dc08a4e440464
    ASCII text
    MAS_AIO.cmd
    aa378fab3084f1bbb2bb73f96acfdb08
    ASCII text, with very long lines (376), with CRLF line terminators
    HWID_Activation.cmd
    cce194c4280f748a8b0e9ed41547376b
    DOS batch file, ASCII text, with very long lines (376), with CRLF line terminators
    KMS38_Activation.cmd
    9e088080efa90fcf81ea485c54ef18ff
    DOS batch file, ASCII text, with very long lines (500), with CRLF line terminators
    Ohook_Activation_AIO.cmd
    8d32c6aa965d15876377646233bb877a
    DOS batch file, ASCII text, with very long lines (461), with CRLF line terminators
    Online_KMS_Activation.cmd
    33109e7fb7edea915b4ed470a8d8b6c0
    DOS batch file, ASCII text, with very long lines (461), with CRLF line terminators
    ReadMe.txt
    b7fa33165116723bc2f83676fd62cc69
    ASCII text, with CRLF line terminators
    Change_Office_Edition.cmd
    6d178a37ef202b616df131f81d6ffac3
    DOS batch file, ASCII text, with very long lines (453), with CRLF line terminators
    Change_Windows_Edition.cmd
    38035cdb3a139188007ee389ea86f450
    DOS batch file, ASCII text, with very long lines (312), with CRLF line terminators
    Check_Activation_Status.cmd
    1ebf95a85eec40bab2045bd26658a345
    DOS batch file, ASCII text, with CRLF line terminators
    Extract_OEM_Folder.cmd
    7a7a1e02b59c63494c15487744d0781d
    DOS batch file, ASCII text, with CRLF line terminators
    Troubleshoot.cmd
    59cae5412898b564652af61c3ea68bb4
    DOS batch file, ASCII text, with very long lines (376), with CRLF line terminators
    _ReadMe.html
    574e18c1f9b32a47f988ac91588901ba
    HTML document, ASCII text, with CRLF line terminators
    README.md
    4119f4bcfb7b30eb2b5e3b7d7ddf1d11
    HTML document, Unicode text, UTF-8 text

    Detections

    AnalyzerVerdictAlert
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/massgravel/Microsoft-Activation-Scripts/archive/refs/heads/master.zip
140.82.121.4302 Found0 B
codeload.github.com/massgravel/Microsoft-Activation-Scripts/zip/refs/heads/master
140.82.121.9200 OK318 kB