Report Overview

  1. Visited public
    2024-12-12 15:17:30
    Tags
  2. URL

    git.activated.win/massgrave/Microsoft-Activation-Scripts/archive/master.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    172.67.219.75

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
git.activated.winunknown2024-05-152024-10-082024-12-04

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    git.activated.win/massgrave/Microsoft-Activation-Scripts/archive/master.zip

  2. IP

    172.67.219.75

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    326 kB (325455 bytes)

  2. Hash

    7356f23a0fc11e310dbb4165c9257f14

    b35753159bd88cd1196c25c884986af8380c98b8

  1. Archive (14)

  2. FilenameMd5File type
    LICENSE
    1ebbd3e34237af26da5dc08a4e440464
    ASCII text
    MAS_AIO.cmd
    4b888d91eff0c5f1c811ee82cbe07c06
    ASCII text, with very long lines (348), with CRLF line terminators
    HWID_Activation.cmd
    7f4de013319c6b007ac9c8d99270d78e
    DOS batch file, ASCII text, with very long lines (376), with CRLF line terminators
    KMS38_Activation.cmd
    c1717aa61f60eed6d710281505d221a2
    DOS batch file, ASCII text, with very long lines (500), with CRLF line terminators
    Ohook_Activation_AIO.cmd
    1007b8d5559eb72788d5b5f4757ab916
    DOS batch file, ASCII text, with very long lines (452), with CRLF line terminators
    Online_KMS_Activation.cmd
    3f026e268817d22d0bf9fdb5e2ba87d5
    DOS batch file, ASCII text, with very long lines (452), with CRLF line terminators
    ReadMe.txt
    b7fa33165116723bc2f83676fd62cc69
    ASCII text, with CRLF line terminators
    Change_Office_Edition.cmd
    5db8fc9d571c1e8e7890d2829f74884d
    DOS batch file, ASCII text, with very long lines (453), with CRLF line terminators
    Change_Windows_Edition.cmd
    a064240fd239d0feff23701b64c72c76
    DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators
    Check_Activation_Status.cmd
    1ebf95a85eec40bab2045bd26658a345
    DOS batch file, ASCII text, with CRLF line terminators
    Extract_OEM_Folder.cmd
    289b8a5cf999c446998f6dcfa0e99b78
    DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators
    Troubleshoot.cmd
    cbb9db94307416d2731530fb8e949ac2
    DOS batch file, ASCII text, with very long lines (376), with CRLF line terminators
    _ReadMe.html
    574e18c1f9b32a47f988ac91588901ba
    HTML document, ASCII text, with CRLF line terminators
    README.md
    91bd4543a129decbf70584309252ac8d
    Unicode text, UTF-8 text

    Detections

    AnalyzerVerdictAlert
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
git.activated.win/massgrave/Microsoft-Activation-Scripts/archive/master.zip
172.67.219.75200 OK326 kB