Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
git.activated.win | unknown | 2024-05-15 | 2024-10-08 | 2024-12-04 | 529 B | 327 kB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
git.activated.win/massgrave/Microsoft-Activation-Scripts/archive/master.zip
IP
172.67.219.75
ASN
#13335 CLOUDFLARENET
File type
Zip archive data, at least v1.0 to extract, compression method=store
Size
326 kB (325455 bytes)
Hash
7356f23a0fc11e310dbb4165c9257f14
b35753159bd88cd1196c25c884986af8380c98b8
Archive (14)
Filename | Md5 | File type |
---|---|---|
LICENSE | 1ebbd3e34237af26da5dc08a4e440464 | ASCII text |
MAS_AIO.cmd | 4b888d91eff0c5f1c811ee82cbe07c06 | ASCII text, with very long lines (348), with CRLF line terminators |
HWID_Activation.cmd | 7f4de013319c6b007ac9c8d99270d78e | DOS batch file, ASCII text, with very long lines (376), with CRLF line terminators |
KMS38_Activation.cmd | c1717aa61f60eed6d710281505d221a2 | DOS batch file, ASCII text, with very long lines (500), with CRLF line terminators |
Ohook_Activation_AIO.cmd | 1007b8d5559eb72788d5b5f4757ab916 | DOS batch file, ASCII text, with very long lines (452), with CRLF line terminators |
Online_KMS_Activation.cmd | 3f026e268817d22d0bf9fdb5e2ba87d5 | DOS batch file, ASCII text, with very long lines (452), with CRLF line terminators |
ReadMe.txt | b7fa33165116723bc2f83676fd62cc69 | ASCII text, with CRLF line terminators |
Change_Office_Edition.cmd | 5db8fc9d571c1e8e7890d2829f74884d | DOS batch file, ASCII text, with very long lines (453), with CRLF line terminators |
Change_Windows_Edition.cmd | a064240fd239d0feff23701b64c72c76 | DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators |
Check_Activation_Status.cmd | 1ebf95a85eec40bab2045bd26658a345 | DOS batch file, ASCII text, with CRLF line terminators |
Extract_OEM_Folder.cmd | 289b8a5cf999c446998f6dcfa0e99b78 | DOS batch file, ASCII text, with very long lines (348), with CRLF line terminators |
Troubleshoot.cmd | cbb9db94307416d2731530fb8e949ac2 | DOS batch file, ASCII text, with very long lines (376), with CRLF line terminators |
_ReadMe.html | 574e18c1f9b32a47f988ac91588901ba | HTML document, ASCII text, with CRLF line terminators |
README.md | 91bd4543a129decbf70584309252ac8d | Unicode text, UTF-8 text |
Detections
Analyzer | Verdict | Alert |
---|---|---|
VirusTotal | suspicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
git.activated.win/massgrave/Microsoft-Activation-Scripts/archive/master.zip | ![]() | 200 OK | 326 kB | |||||||
Detections
HTTP Headers
| ||||||||||