Report Overview
Visitedpublic
2024-12-05 09:22:28
Tags
Submit Tags
URL
github.com/massgravel/Microsoft-Activation-Scripts/archive/refs/heads/master.zip
Finishing URL
about:privatebrowsing
IP / ASN
140.82.113.4
#36459 GITHUB
Title
about:privatebrowsing

Detections

urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0

Host Summary

HostRankRegisteredFirst SeenLast Seen
github.com
14232007-10-092016-07-132024-12-04
codeload.github.com
623592007-10-092013-04-182024-12-04

Related reports

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
codeload.github.com/massgravel/Microsoft-Activation-Scripts/zip/refs/heads/master
IP / ASN
140.82.114.9
#36459 GITHUB
File Overview
File TypeZip archive data, at least v1.0 to extract, compression method=store
Size326 kB (325721 bytes)
MD5bf0f1add95ef479d38db30554a4aede0
SHA1e05b44aee0a9df0edaa7de4ad24fa18ad407075f
Archive (14)
FilenameMD5File type
LICENSE1ebbd3e34237af26da5dc08a4e440464ASCII text
MAS_AIO.cmd4b888d91eff0c5f1c811ee82cbe07c06ASCII text, with very long lines (348), with CRLF line terminators
HWID_Activation.cmd7f4de013319c6b007ac9c8d99270d78eDOS batch file, ASCII text, with very long lines (376), with CRLF line terminators
KMS38_Activation.cmdc1717aa61f60eed6d710281505d221a2DOS batch file, ASCII text, with very long lines (500), with CRLF line terminators
Ohook_Activation_AIO.cmd1007b8d5559eb72788d5b5f4757ab916DOS batch file, ASCII text, with very long lines (452), with CRLF line terminators
Online_KMS_Activation.cmd3f026e268817d22d0bf9fdb5e2ba87d5DOS batch file, ASCII text, with very long lines (452), with CRLF line terminators
ReadMe.txtb7fa33165116723bc2f83676fd62cc69ASCII text, with CRLF line terminators
Change_Office_Edition.cmd5db8fc9d571c1e8e7890d2829f74884dDOS batch file, ASCII text, with very long lines (453), with CRLF line terminators
Change_Windows_Edition.cmda064240fd239d0feff23701b64c72c76DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators
Check_Activation_Status.cmd1ebf95a85eec40bab2045bd26658a345DOS batch file, ASCII text, with CRLF line terminators
Extract_OEM_Folder.cmd289b8a5cf999c446998f6dcfa0e99b78DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators
Troubleshoot.cmdcbb9db94307416d2731530fb8e949ac2DOS batch file, ASCII text, with very long lines (376), with CRLF line terminators
_ReadMe.html574e18c1f9b32a47f988ac91588901baHTML document, ASCII text, with CRLF line terminators
README.md91bd4543a129decbf70584309252ac8dUnicode text, UTF-8 text

Detections

AnalyzerVerdictAlert
VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize