Report Overview

  1. Submitted URL

    bitbucket.org/WindowsAddict/microsoft-activation-scripts/get/master.zip

  2. IP

    104.192.141.1

    ASN

    #16509 AMAZON-02

  3. Submitted

    2024-04-20 08:15:25

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
bitbucket.org136571997-11-242012-05-212024-03-15

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    bitbucket.org/WindowsAddict/microsoft-activation-scripts/get/master.zip

  2. IP

    104.192.141.1

  3. ASN

    #16509 AMAZON-02

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    280 kB (279923 bytes)

  2. Hash

    148d1dc4e2f5acd645b9819f39f7ddfe

    f8831540857ab7caa46c3115a9ded8d17347097c

  1. Archive (15)

  2. FilenameMd5File type
    .gitattributes
    87eb06393a7628ea5ce171c620ecb45e
    ASCII text, with CRLF line terminators
    LICENSE
    5b4473596678d62d9d83096273422c8c
    ASCII text
    MAS_AIO-CRC32_60BA35A8.cmd
    bba5def9496b814d7c7a23129ebf6ed1
    DOS batch file, ASCII text, with very long lines (311), with CRLF line terminators
    HWID_Activation.cmd
    d844145d7f324fdbca98a28b8cd39578
    DOS batch file, ASCII text, with very long lines (491), with CRLF line terminators
    KMS38_Activation.cmd
    c49928ff9aaa450c3fc6b630b09f0a92
    DOS batch file, ASCII text, with very long lines (500), with CRLF line terminators
    Ohook_Activation_AIO.cmd
    8b76d7cdfc9b2c97d1c418ea1cb2f210
    DOS batch file, ASCII text, with CRLF line terminators
    Online_KMS_Activation.cmd
    89149a3b7ba6c26bc8fa631ca7ddf3cc
    DOS batch file, ASCII text, with CRLF line terminators
    ReadMe.txt
    b7fa33165116723bc2f83676fd62cc69
    ASCII text, with CRLF line terminators
    Change_Edition.cmd
    8ab2fc4907ae9ed56534a74b1b38fd8b
    DOS batch file, ASCII text, with CRLF line terminators
    Check-Activation-Status-vbs.cmd
    97b92adbe161d5a5731719e18585cff0
    ASCII text, with CRLF line terminators
    Check-Activation-Status-wmi.cmd
    fc7dfd4abbd167e7303301fa7f593cc2
    ASCII text, with very long lines (361), with CRLF line terminators
    Extract_OEM_Folder.cmd
    adac46b4b383003e3f21cea160ff0c42
    DOS batch file, ASCII text, with CRLF line terminators
    Troubleshoot.cmd
    52b5da76bca1b66aacf7d684008b67d6
    DOS batch file, ASCII text, with CRLF line terminators
    _ReadMe.html
    574e18c1f9b32a47f988ac91588901ba
    HTML document, ASCII text, with CRLF line terminators
    README.md
    19937469dc3bb11bf6555b4f5076527b
    HTML document, Unicode text, UTF-8 text

    Detections

    AnalyzerVerdictAlert
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
bitbucket.org/WindowsAddict/microsoft-activation-scripts/get/master.zip
104.192.141.1200 OK280 kB