Report Overview

  1. Visited public
    2025-05-08 02:17:36
    Tags
  2. URL

    github.com/massgravel/Microsoft-Activation-Scripts/archive/refs/heads/master.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.4

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
3

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132025-05-07
codeload.github.com623592007-10-092013-04-182025-05-07

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    codeload.github.com/massgravel/Microsoft-Activation-Scripts/zip/refs/heads/master

  2. IP

    140.82.121.9

  3. ASN

    #36459 GITHUB

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    468 kB (468148 bytes)

  2. Hash

    d96d75926753d0261d2bc67631ed74e5

    d4212773b8294c5728b65577f358c5ced5f7d25a

  1. Archive (15)

  2. FilenameMd5File type
    LICENSE
    1ebbd3e34237af26da5dc08a4e440464
    ASCII text
    MAS_AIO.cmd
    98f65f29751a5dfc3c9c35c42eb708d7
    ASCII text, with very long lines (348), with CRLF line terminators
    HWID_Activation.cmd
    7f70b19ccdd960165369eeccbbf28070
    DOS batch file, ASCII text, with very long lines (376), with CRLF line terminators
    KMS38_Activation.cmd
    ed99e305be91ee80c843e76531911c2d
    DOS batch file, ASCII text, with very long lines (500), with CRLF line terminators
    Ohook_Activation_AIO.cmd
    6e407b8d41b4f26441b7e40cb41cefd3
    DOS batch file, ASCII text, with very long lines (452), with CRLF line terminators
    Online_KMS_Activation.cmd
    972bdf97a5a1725147e42b778161775b
    DOS batch file, ASCII text, with very long lines (452), with CRLF line terminators
    TSforge_Activation.cmd
    8840ba9d598b1d41db92835fe58c27d7
    DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators
    _ReadMe.txt
    e699451ed0dfe4ebdd499666dc411c3c
    ASCII text, with CRLF line terminators
    Change_Office_Edition.cmd
    8d756de50198942bebc327ffaeede659
    DOS batch file, ASCII text, with very long lines (453), with CRLF line terminators
    Change_Windows_Edition.cmd
    8e748466ecd4050672f5475d01e579b9
    DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators
    Check_Activation_Status.cmd
    8d85133114beeaf31f14e95f53e77f92
    DOS batch file, ASCII text, with very long lines (379), with CRLF line terminators
    Extract_OEM_Folder.cmd
    f99c87ced41939998a46262630918eb4
    DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators
    Troubleshoot.cmd
    c0de640715e5ed1055d29338f8a6c91a
    DOS batch file, ASCII text, with very long lines (376), with CRLF line terminators
    _ReadMe.html
    574e18c1f9b32a47f988ac91588901ba
    HTML document, ASCII text, with CRLF line terminators
    README.md
    4516b2851beda532f4ce4292d527b55b
    Unicode text, UTF-8 text

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects suspicious PowerShell code that downloads from web sites
    Public Nextron YARA rulesmalware
    Detects suspicious PowerShell code that downloads from web sites
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/massgravel/Microsoft-Activation-Scripts/archive/refs/heads/master.zip
140.82.121.3302 Found468 kB
codeload.github.com/massgravel/Microsoft-Activation-Scripts/zip/refs/heads/master
140.82.121.9200 OK468 kB