File name:

KMSpico Portable.rar

Full analysis: https://app.any.run/tasks/97101698-7861-41f5-9a52-1fae7f1001b4
Verdict: Malicious activity
Analysis date: January 28, 2025, 12:04:16
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32, flags: Solid
MD5:

655F6DF21950B954EE19FDE43FB92746

SHA1:

4D328DA9C075209734B3FFA0BC951398CE0E30FC

SHA256:

4C847D066D178CD4F53EB66AA6E39968ED48616631BCD62FFD6B9CE813026526

SSDEEP:

98304:LXb4Nv7ohPtwOYiKLP/fNlWvPn7Z026CTjMm8sS3GxFrY64BytEXAIFPqPM3cA+n:u2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6388)
    • Executing a file with an untrusted certificate

      • KMSELDI.exe (PID: 7008)
      • KMSELDI.exe (PID: 6816)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6388)
    • Executable content was dropped or overwritten

      • KMSELDI.exe (PID: 7008)
  • INFO

    • Reads the machine GUID from the registry

      • KMSELDI.exe (PID: 7008)
    • Checks supported languages

      • KMSELDI.exe (PID: 7008)
    • Reads Environment values

      • KMSELDI.exe (PID: 7008)
    • Reads product name

      • KMSELDI.exe (PID: 7008)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6388)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

FileVersion: RAR v4
CompressedSize: 3448
UncompressedSize: 6776
OperatingSystem: Win32
ModifyDate: 2016:01:11 23:45:04
PackingMethod: Best Compression
ArchivedFileName: KMSpico Portable\ReadMe KMSpico Portable.txt
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe kmseldi.exe no specs kmseldi.exe rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1344C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6388"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\KMSpico Portable.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6816"C:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\KMSELDI.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\KMSELDI.exeWinRAR.exe
User:
admin
Company:
@ByELDI
Integrity Level:
MEDIUM
Description:
KMS GUI ELDI
Exit code:
3221226540
Version:
37.1.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6388.18671\kmspico portable\kmseldi.exe
c:\windows\system32\ntdll.dll
7008"C:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\KMSELDI.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\KMSELDI.exe
WinRAR.exe
User:
admin
Company:
@ByELDI
Integrity Level:
HIGH
Description:
KMS GUI ELDI
Exit code:
0
Version:
37.1.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6388.18671\kmspico portable\kmseldi.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
4 636
Read events
4 562
Write events
72
Delete events
2

Modification events

(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\KMSpico Portable.rar
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7008) KMSELDI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe
Operation:writeName:Debugger
Value:
C:\WINDOWS\SECOH-QAD.exe
(PID) Process:(7008) KMSELDI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AudioCompressionManager\DriverCache\msacm.msg711
Operation:writeName:fdwSupport
Value:
1
Executable files
7
Suspicious files
13
Text files
345
Unknown types
0

Dropped files

PID
Process
Filename
Type
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\Uninstall\Restore_Watermark.cmdtext
MD5:050833FF4D356EA0A04E197C18845796
SHA256:16B4C96DB1FA9BA2FDCFB91972D537A7346F1C80DAA164BFD9295D45F1C0B520
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\Uninstall\EnableSmartScreen.cmdtext
MD5:1306FC7DDF8FB649E1B3232FDEA0E7E8
SHA256:C46A27E951658BB62D27496245A307713413E22762BAB12EDA98D15F6A796B88
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\ReadMe KMSpico Portable.txttext
MD5:86AA9132AE3244852522D93639CCE650
SHA256:19869F8F354DBF31247A19BF6E5BE7819BA9FBFE4E921EE84D70B0F846BC79ED
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\Uninstall\Remove_ScheduleTask.cmdtext
MD5:E3D3654C244581D82ADAE2EE23D505F4
SHA256:8BDA0B92E45F9627C20A8C983C11D8FD8E844E632081ECA15E66E8F73D3BC551
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\RemoveWaterMark.cmdtext
MD5:CACDE0B1F51C3861BCBFF95CFC2BCFE2
SHA256:B991F07494E570A55EFA8F93108A277FF110A38A8E4BC9BD47E894E872063EC1
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\driver\UnInstallDriver.cmdtext
MD5:B0BB7A0E644CCEC9869AB46B5B1ADAFC
SHA256:D2613D339FF4FA9E8D49866E62385C7B562C6EAE14BD72D1567A8795C3157A21
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\cert\kmscert2010\Access\AccessVLRegWOW.regtext
MD5:50122EA723FFE7367AD811FC333594C2
SHA256:18B8099777C8956C4299DA79A44BF9CB3ADDE96B652A0C6D063BF6C9A925B0B8
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\Vestris.ResourceLib.dllexecutable
MD5:3D733144477CADCF77009EF614413630
SHA256:392D73617FD0A55218261572ECE2F50301E0CFA29B5ED24C3F692130AA406AF3
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\cert\kmscert2010\Access\AccessVLReg32.regtext
MD5:19506B075C7448CE328682DA3D1A57B0
SHA256:0BB62DF2FDAB1A42A2303729400C343D70090C1F18123357456922C7544131B8
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6388.18671\KMSpico Portable\KMSELDI.exeexecutable
MD5:F0280DE3880EF581BF14F9CC72EC1C16
SHA256:50EBFA1DD5B147E40244607D5D5BE25709EDF2CC66247A78BEB920C77AC514CC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
27
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5092
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6548
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6548
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
732
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
732
svchost.exe
52.191.219.104:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.160.20
  • 40.126.32.133
  • 20.190.160.17
  • 20.190.160.14
  • 40.126.32.74
  • 40.126.32.72
  • 20.190.160.22
  • 40.126.32.140
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 52.191.219.104
  • 51.124.78.146
whitelisted
0.pool.ntp.org
  • 176.9.44.212
  • 176.9.157.155
  • 94.130.184.193
  • 176.9.42.91
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
fd.api.iris.microsoft.com
  • 20.74.47.205
whitelisted

Threats

No threats detected
No debug info