| URL: | https://keygenninja.com/serial/clip_studio_paint_ex.html |
| Full analysis: | https://app.any.run/tasks/62b44064-19a0-47e3-b6c8-176ea0a0a15a |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | July 26, 2020, 04:52:37 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | A0C08C50AE9D7B9F89883536FE9AE25F |
| SHA1: | 56E3B12BB5FF84C968E08FEE50F4DC0577A970E0 |
| SHA256: | D4853C54FA6144485B0C798E3C6B7F1A125AD486E7A52ADC89EA36C384DECACD |
| SSDEEP: | 3:N8FVY3XmGJMQqYMwJ:24nmGC6 |
PID | CMD | Path | Indicators | Parent process |
|---|---|---|---|---|
| 252 | cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe" | C:\Windows\system32\cmd.exe | — | keygen-step-3.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
| 296 | keygen-step-3.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe | cmd.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
| 316 | ping 127.0.0.1 -n 3 | C:\Windows\system32\PING.EXE | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
| 392 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1024,10164603310083402665,7615873856838494495,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=5740082116867226794 --mojo-platform-channel-handle=2108 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 | ||||
| 564 | "C:\Users\admin\AppData\Local\Temp\is-0JA7O.tmp\Full Version.tmp" /SL5="$80234,296599,214528,C:\Users\admin\AppData\Local\Temp\RarSFX2\Full Version.exe" /SPAWNWND=$40232 /NOTIFYWND=$50290 | C:\Users\admin\AppData\Local\Temp\is-0JA7O.tmp\Full Version.tmp | Full Version.exe | |
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 1 Version: 51.52.0.0 | ||||
| 576 | ping 127.0.0.1 | C:\Windows\system32\PING.EXE | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
| 668 | cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\admin\AppData\Local\Temp\RarSFX2\setup.upx.exe" | C:\Windows\system32\cmd.exe | — | setup.upx.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
| 672 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1068 CREDAT:275457 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Internet Explorer Exit code: 4294967295 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) | ||||
| 692 | "C:\Windows\system32\sc.exe" description Telephone2 "Provides Telephony API (TAPI) support for programs that control telephony devices on the local computer and, through the LAN, on servers that are also running the service." | C:\Windows\system32\sc.exe | — | installersetup1.tmp |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
| 780 | keygen-pr.exe -p83fsase3Ge | C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe | cmd.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1320 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\ac5aa386-ed01-4001-a975-ac2d8762cfcc.tmp | — | |
MD5:— | SHA256:— | |||
| 1320 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp | — | |
MD5:— | SHA256:— | |||
| 1320 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOG.old | — | |
MD5:— | SHA256:— | |||
| 1320 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old | — | |
MD5:— | SHA256:— | |||
| 1320 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old | — | |
MD5:— | SHA256:— | |||
| 1320 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old | text | |
MD5:— | SHA256:— | |||
| 1320 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFd6cf3.TMP | text | |
MD5:— | SHA256:— | |||
| 1320 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\000001.dbtmp | — | |
MD5:— | SHA256:— | |||
| 1320 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RFd6d03.TMP | text | |
MD5:— | SHA256:— | |||
| 1320 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1924 | setup.upx.exe | GET | 200 | 45.32.114.117:80 | http://www.wfasdwedfs.com/index.php/api/fb?data=aHpyTUxwSW1cNTw0ZXFVTV1GTDlMRkxsT0RyTUxwSXZlSUVraFo0b2VxVVFdW1VyZTVVfUxtcmpMbEx2RmpubFw1PHlkNW9vVnFReWVsTDlMRk1lW0o4Z0xJe3hMbHpORlZNcFxxWX1dW016XFtRfUxtcmpMcGt5ZXBZOFRLRXlnRjhtZTU0aVs0PHJlNThvaFtFa2Y2UH1RV11mZWxMdkZqbmxdcU1zXVo4bmYzODRlVkw5TEZMekxsek5GVk1wZnA8d0xtcmpMcFk3XVZMdkZqbmxkSkl9Vko8d11ZRWtdNVhsUmxEbFBGTHZGam5sZFtRRmVWTDlMRkxsT0RyTUxwb31UNWt8ZTU0b1Vba3NmNlRsUmxEbFBWTHZGam5sZFtRUGU1Z3NlcFluTG1yakxtRGxPRHJNTHBvfWRaOH1nSkl2ZUZMOUxGTHpMbHpORlZNeVxwc1doW1FNZXBdeUxtcmpoenJNRlZNcGRbTX1nSGtuXUlRb2Zwb2tlSDg0ZVpNb2ZsTDlMRkwzXUdYe1B9RH1QR1B6UH1EfFBHUHtQbUR8UEdMelBtRHxQR0x6UG1EfFBHTHpQbUR8UEdMekxsek5GVG5sZVpJbWZ8TDlMSXZORlRuTUxtSHxSbkg4Um1qNVJtXUdSbWY2Um5VSUxsRE5GVG9nT0RyTUZWTX1oW1EzXVo0Wl1bTX1kWjx4TG1yakxvZ3NlcFV5ZzZQNlg0RHtXNk1LZnBZa2dKWXxMSFF2ZFpZeGdGTGpGam88T0RyTUxxRWtoWG94XXA7bFJsRGxMbHpORlZNfFxaOG5MbXJqTG1INVBtZjhMbHpORlZNNGRaVGxSbERsUGxMdkZqbmxncFl8ZjVveWVsTDlMRkx7TGxETmlWRE4= | SG | text | 24 b | malicious |
3340 | key.exe | POST | 200 | 172.67.192.106:80 | http://oldhorse.info/a.php | US | — | — | malicious |
3340 | key.exe | POST | — | 172.67.192.106:80 | http://www.oldhorse.info/ | US | — | — | malicious |
2140 | searzar.exe | GET | 200 | 2.16.107.43:80 | http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgObfHHgHlsa0R7fVL2Sj72S7g%3D%3D | unknown | der | 527 b | whitelisted |
2140 | searzar.exe | GET | 200 | 2.16.107.80:80 | http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D | unknown | der | 1.37 Kb | whitelisted |
3340 | key.exe | POST | — | 172.67.192.106:80 | http://www.oldhorse.info/ | US | — | — | malicious |
3340 | key.exe | POST | — | 172.67.192.106:80 | http://www.oldhorse.info/ | US | — | — | malicious |
3856 | id6.exe | POST | 200 | 194.54.83.254:80 | http://freekzvideo.cloud/business/receive | UA | — | — | malicious |
3704 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D | US | der | 1.47 Kb | whitelisted |
296 | keygen-step-3.exe | GET | 200 | 45.32.114.117:80 | http://www.wfasdwedfs.com/index.php/api/fb?data=aHpyTUxwSW1cNTw0ZXFVTV1GTDlMRkxsT0RyTUxwSXZlSUVraFo0b2VxVVFdW1VyZTVVfUxtcmpMbEx2RmpubFw1PHlkNW9vVnFReWVsTDlMRk1lW0o4Z0xJe3hMbHpORlZNcFxxWX1dW016XFtRfUxtcmpMcGt5ZXBZOFRLRXlnRjhtZTU0aVs0PHJlNThvaFtFa2Y2UH1RV11mZWxMdkZqbmxdcU1zXVo4bmYzODRlVkw5TEZMekxsek5GVk1wZnA8d0xtcmpMcFk3XVZMdkZqbmxkSkl9Vko8d11ZRWtdNVhsUmxEbFBGTHZGam5sZFtRRmVWTDlMRkxsT0RyTUxwb31UNWt8ZTU0b1Vba3NmNlRsUmxEbFBWTHZGam5sZFtRUGU1Z3NlcFluTG1yakxtRGxPRHJNTHBvfWRaOH1nSkl2ZUZMOUxGTHpMbHpORlZNeVxwc1doW1FNZXBdeUxtcmpoenJNRlZNcGRbTX1nSGtuXUlRb2Zwb2tlSDg0ZVpNb2ZsTDlMRkwzXUdYe1B9RH1QR1B6UH1EfFBHUHtQbUR8UEdMelBtRHxQR0x6UG1EfFBHTHpQbUR8UEdMekxsek5GVG5sZVpJbWZ8TDlMSXZORlRuTUxtSHxSbkg4Um1qNVJtXUdSbWY2Um5VSUxsRE5GVG9nT0RyTUZWTX1oW1EzXVo0Wl1bTX1kWjx4TG1yakxvZ3NlcFV5ZzZQNlg0RHtXNk1LZnBZa2dKWXxMSFF2ZFpZeGdGTGpGam88T0RyTUxxRWtoWG94XXA7bFJsRGxMbHpORlZNfFxaOG5MbXJqTG1INVBtZjVMbHpORlZNNGRaVGxSbERsUlZMdkZqbmxncFl8ZjVveWVsTDlMRkx7TGxETmlWRE4= | SG | text | 24 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3900 | chrome.exe | 216.58.207.35:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
3900 | chrome.exe | 104.27.188.209:443 | keygenninja.com | Cloudflare Inc | US | shared |
3900 | chrome.exe | 104.16.133.229:443 | cdnjs.cloudflare.com | Cloudflare Inc | US | suspicious |
3900 | chrome.exe | 216.58.206.14:443 | clients1.google.com | Google Inc. | US | whitelisted |
3900 | chrome.exe | 172.217.22.40:443 | www.googletagmanager.com | Google Inc. | US | whitelisted |
3900 | chrome.exe | 216.58.206.13:443 | accounts.google.com | Google Inc. | US | whitelisted |
3900 | chrome.exe | 172.217.22.14:443 | clients2.google.com | Google Inc. | US | whitelisted |
3900 | chrome.exe | 216.58.212.131:443 | www.google.de | Google Inc. | US | whitelisted |
3900 | chrome.exe | 104.27.159.253:443 | cracknet.net | Cloudflare Inc | US | suspicious |
3900 | chrome.exe | 104.27.172.22:443 | get.sharecontent.xyz | Cloudflare Inc | US | unknown |
Domain | IP | Reputation |
|---|---|---|
keygenninja.com |
| whitelisted |
clientservices.googleapis.com |
| whitelisted |
accounts.google.com |
| shared |
cdnjs.cloudflare.com |
| whitelisted |
www.googletagmanager.com |
| whitelisted |
clients1.google.com |
| whitelisted |
www.google-analytics.com |
| whitelisted |
stats.g.doubleclick.net |
| whitelisted |
www.google.com |
| malicious |
www.google.de |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3340 | key.exe | A Network Trojan was detected | MALWARE [PTsecurity] Trojan.Win32.Nebuler Checkin |
3340 | key.exe | A Network Trojan was detected | ET TROJAN Fareit/Pony Downloader Checkin 2 |
3340 | key.exe | A Network Trojan was detected | ET TROJAN Fareit/Pony Downloader Checkin 2 |
1048 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .cloud TLD |
3340 | key.exe | A Network Trojan was detected | ET TROJAN Fareit/Pony Downloader Checkin 2 |
3856 | id6.exe | A Network Trojan was detected | ET TROJAN Suspicious User-Agent (WindowsNT) With No Separating Space |
3856 | id6.exe | Potentially Bad Traffic | ET INFO HTTP Request to Suspicious *.cloud Domain |
1048 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
2140 | searzar.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |
2140 | searzar.exe | Potential Corporate Privacy Violation | POLICY [PTsecurity] IP Check Domain SSL certificate |
Process | Message |
|---|---|
id6.exe | 006 |
id6.exe | http://freekzvideo.cloud/business/receive |
chrome.exe | RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\Temp\1595739348463 directory exists )
|
ResourceAllocator.exe | 000010000110011001 |
ResourceAllocator.exe | 00001000010 |
ResourceAllocator.exe | 00001000011011 |
ResourceAllocator.exe | 00000 |
ResourceAllocator.exe | 000010000110001 |
ResourceAllocator.exe | 0000100000 |
ResourceAllocator.exe | 000010000110000 |