Report Overview
Submitted URL
bitbucket.org/WindowsAddict/microsoft-activation-scripts/get/master.zip
IP
104.192.141.1
ASN
#16509 AMAZON-02
Submitted
2024-04-23 17:37:17
Access
public
Website Title
about:privatebrowsing
Final URL
about:privatebrowsing
Tags
urlquery detections
No alerts detected
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
1
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
bitbucket.org | 13657 | 1997-11-24 | 2012-05-21 | 2024-03-15 | 525 B | 283 kB | 104.192.141.1 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
Files detected
URL
bitbucket.org/WindowsAddict/microsoft-activation-scripts/get/master.zip
IP
104.192.141.1
ASN
#16509 AMAZON-02
File type
Zip archive data, at least v1.0 to extract, compression method=store
Size
283 kB (282644 bytes)
Hash
53ea0111cbffafbd4a355fc3da0c30ec
524cc8d0e71d1ff568e45d20f831422b8d242aee
Archive (15)
Filename | Md5 | File type |
---|---|---|
.gitattributes | f9f25f50652fbf7e61039a620be51fa6 | ASCII text, with CRLF line terminators |
LICENSE | 5b4473596678d62d9d83096273422c8c | ASCII text |
MAS_AIO-CRC32_8B16F764.cmd | 85d6b9f9cffa62fd7eb22954568a7d9a | DOS batch file, ASCII text, with very long lines (311), with CRLF line terminators |
HWID_Activation.cmd | 756b500de53d9738c830df0c67701b37 | DOS batch file, ASCII text, with very long lines (491), with CRLF line terminators |
KMS38_Activation.cmd | f1ca3d11d0d50e90a5f2478d6a363a1e | DOS batch file, ASCII text, with very long lines (500), with CRLF line terminators |
Ohook_Activation_AIO.cmd | d9cd63d019dfd82f24e3273f93277d4b | DOS batch file, ASCII text, with CRLF line terminators |
Online_KMS_Activation.cmd | 7b5b2c6f5c97bea38e72f31879a9f69e | DOS batch file, ASCII text, with CRLF line terminators |
ReadMe.txt | b7fa33165116723bc2f83676fd62cc69 | ASCII text, with CRLF line terminators |
Change_Edition.cmd | d20ea1f7448a12e835e3f40df0ff9afa | DOS batch file, ASCII text, with CRLF line terminators |
Check-Activation-Status-vbs.cmd | 97b92adbe161d5a5731719e18585cff0 | ASCII text, with CRLF line terminators |
Check-Activation-Status-wmi.cmd | fc7dfd4abbd167e7303301fa7f593cc2 | ASCII text, with very long lines (361), with CRLF line terminators |
Extract_OEM_Folder.cmd | b1ec6d1e48d653d74d896910a2763402 | DOS batch file, ASCII text, with CRLF line terminators |
Troubleshoot.cmd | ca4f211bed0fd63236e2cece5bca2e0d | DOS batch file, ASCII text, with CRLF line terminators |
_ReadMe.html | 574e18c1f9b32a47f988ac91588901ba | HTML document, ASCII text, with CRLF line terminators |
README.md | d18efafe31ba6c70d9f96127b6aa765d | HTML document, Unicode text, UTF-8 text |
Detections
Analyzer | Verdict | Alert |
---|---|---|
VirusTotal | suspicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
bitbucket.org/WindowsAddict/microsoft-activation-scripts/get/master.zip | 104.192.141.1 | 200 OK | 283 kB | |||||||
Detections
HTTP Headers
| ||||||||||