| File name: | Fl_Studio_keygen_by_KeygenNinja.zip |
| Full analysis: | https://app.any.run/tasks/371be46f-4817-4a4c-8eac-9e491bc93296 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | February 11, 2021, 12:56:34 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract |
| MD5: | B8E1FF4717D44B9DCE6EC285380B906E |
| SHA1: | 20F35B68F2521CDB445278C52E2E1E7D06B5726B |
| SHA256: | 443251DADA6B299D6921D28AC949B955FDA03E834757E6CDC2A570BADC8DBF70 |
| SSDEEP: | 196608:w/2OFq4wxmF2MMglLNPTZXY0oKDT40bENkVmnGoek4n+Iysx9HX6:BcFoyXYQDThToGc4nrysvHX6 |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2021:02:11 15:47:21 |
| ZipCRC: | 0x2ae28954 |
| ZipCompressedSize: | 8963857 |
| ZipUncompressedSize: | 8963857 |
| ZipFileName: | Fl_Studio_keygen_by_KeygenNinja.zip |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 956 | \??\C:\Windows\system32\conhost.exe "-18403120821043115780-779267730508938222-12362349852004938504-15223331601138611207" | C:\Windows\system32\conhost.exe | — | csrss.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1044 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1720 CREDAT:275457 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 1080 | C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E} | C:\Windows\system32\DllHost.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1148 | consent.exe 872 384 0280AF38 | C:\Windows\system32\consent.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Consent UI for administrative applications Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1348 | "C:\Users\admin\AppData\Local\Temp\RarSFX2\key.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX2\key.exe | keygen-pr.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1392 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\herefoundation.rtf" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 1464 | \??\C:\Windows\system32\conhost.exe "1304359394-2092935961-1724508401406775279894192010783740917-1887479004-1747642508" | C:\Windows\system32\conhost.exe | — | csrss.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1556 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-1302019708-1500728564-335382590-10003_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-1302019708-1500728564-335382590-10003 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1" | C:\Windows\system32\SearchProtocolHost.exe | — | SearchIndexer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Windows Search Protocol Host Exit code: 0 Version: 7.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1584 | cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\admin\AppData\Local\Temp\6489A2274AE24900.exe" | C:\Windows\system32\cmd.exe | — | 6489A2274AE24900.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1592 | consent.exe 872 384 0285AAF8 | C:\Windows\system32\consent.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Consent UI for administrative applications Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2188) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2188) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2188) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2188) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Fl_Studio_keygen_by_KeygenNinja.zip | |||
| (PID) Process: | (2188) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2188) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2188) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2188) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2372) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2372) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2372 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2372.6472\KeygenNinja.nfo | text | |
MD5:— | SHA256:— | |||
| 2188 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIa2188.5788\Fl_Studio_keygen_by_KeygenNinja.zip | compressed | |
MD5:— | SHA256:— | |||
| 1700 | Fl_Studio_keygen_by_KeygenNinja.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen.bat | text | |
MD5:— | SHA256:— | |||
| 2508 | key.exe | C:\Users\admin\AppData\Local\Temp\tmpE964.tmp | — | |
MD5:— | SHA256:— | |||
| 2372 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2372.6472\Fl_Studio_keygen_by_KeygenNinja.exe | executable | |
MD5:— | SHA256:— | |||
| 2372 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2372.6472\FILE_ID.DIZ | text | |
MD5:— | SHA256:— | |||
| 1700 | Fl_Studio_keygen_by_KeygenNinja.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe | executable | |
MD5:— | SHA256:— | |||
| 3084 | 6489A2274AE24900.exe | C:\Users\admin\AppData\Local\Login Data1613048269452 | — | |
MD5:— | SHA256:— | |||
| 3084 | 6489A2274AE24900.exe | C:\Users\admin\AppData\Local\Cookies1613048269561 | — | |
MD5:— | SHA256:— | |||
| 2064 | md2_2efs.exe | C:\Users\admin\AppData\Local\Temp\RarSFX1\d | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1348 | key.exe | POST | 200 | 172.67.192.106:80 | http://oldhorse.info/a.php | US | — | — | malicious |
3584 | 6489A2274AE24900.exe | POST | 200 | 104.21.55.158:80 | http://bccb0fef593c34da.xyz/info_old/w | US | — | — | malicious |
3084 | 6489A2274AE24900.exe | POST | 200 | 104.21.55.158:80 | http://bccb0fef593c34da.xyz/info_old/w | US | — | — | malicious |
3584 | 6489A2274AE24900.exe | POST | 200 | 104.21.55.158:80 | http://bccb0fef593c34da.xyz/info_old/w | US | — | — | malicious |
1348 | key.exe | POST | — | 172.67.192.106:80 | http://www.oldhorse.info/ | US | — | — | malicious |
1348 | key.exe | POST | — | 172.67.192.106:80 | http://www.oldhorse.info/ | US | — | — | malicious |
1348 | key.exe | POST | — | 172.67.192.106:80 | http://www.oldhorse.info/ | US | — | — | malicious |
3176 | MiniThunderPlatform.exe | POST | 200 | 140.206.225.232:80 | http://140.206.225.232:80/ | CN | binary | 28 b | malicious |
3084 | 6489A2274AE24900.exe | GET | 200 | 104.21.55.158:80 | http://bccb0fef593c34da.xyz/info_old/r | US | text | 24 b | malicious |
3084 | 6489A2274AE24900.exe | POST | 200 | 104.21.55.158:80 | http://bccb0fef593c34da.xyz/info_old/a | US | text | 24 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 104.21.44.36:80 | kvaka.li | Cloudflare Inc | US | malicious |
2200 | Setup.exe | 104.21.55.158:80 | bccb0fef593c34da.xyz | Cloudflare Inc | US | malicious |
1348 | key.exe | 172.67.192.106:80 | oldhorse.info | — | US | malicious |
2064 | md2_2efs.exe | 101.36.107.74:80 | — | — | CN | malicious |
3584 | 6489A2274AE24900.exe | 104.21.55.158:80 | bccb0fef593c34da.xyz | Cloudflare Inc | US | malicious |
3084 | 6489A2274AE24900.exe | 104.21.55.158:80 | bccb0fef593c34da.xyz | Cloudflare Inc | US | malicious |
2064 | md2_2efs.exe | 88.99.66.31:443 | iplogger.org | Hetzner Online GmbH | DE | malicious |
3176 | MiniThunderPlatform.exe | 47.92.99.221:8000 | hub5pnc.hz.sandai.net | Hangzhou Alibaba Advertising Co.,Ltd. | CN | malicious |
3084 | 6489A2274AE24900.exe | 172.67.171.167:80 | bccb0fef593c34da.xyz | — | US | malicious |
3176 | MiniThunderPlatform.exe | 47.97.7.140:80 | pmap.hz.sandai.net | Hangzhou Alibaba Advertising Co.,Ltd. | CN | malicious |
Domain | IP | Reputation |
|---|---|---|
kvaka.li |
| malicious |
bccb0fef593c34da.xyz |
| malicious |
oldhorse.info |
| malicious |
www.oldhorse.info |
| malicious |
iplogger.org |
| shared |
BCCB0FEF593C34DA.xyz |
| malicious |
hub5pn.hz.sandai.net |
| unknown |
hub5pnc.hz.sandai.net |
| malicious |
hub5u.hz.sandai.net |
| unknown |
relay.phub.hz.sandai.net |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2672 | keygen-step-1.exe | A Network Trojan was detected | ET TROJAN Win32/AZORult V3.3 Client Checkin M2 |
2672 | keygen-step-1.exe | A Network Trojan was detected | AV TROJAN Azorult CnC Beacon |
2672 | keygen-step-1.exe | A Network Trojan was detected | STEALER [PTsecurity] AZORult v.3 |
2672 | keygen-step-1.exe | A Network Trojan was detected | STEALER [PTsecurity] AZORult |
2200 | Setup.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
2200 | Setup.exe | A Network Trojan was detected | STEALER [PTsecurity] Cooper |
2200 | Setup.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
2200 | Setup.exe | A Network Trojan was detected | STEALER [PTsecurity] Cooper |
2200 | Setup.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
2200 | Setup.exe | A Network Trojan was detected | STEALER [PTsecurity] Cooper |