Windows 10 Permanent Activator Ultimate v1.9.exe

Windows 10 Permanent Activator Ultimate 2016

Product:
Windows 10 Permanent Activator Ultimate 2016

Version:
1.9.0.0

MD5:
a0ddf7bb4cc9c5c7cacae2fb89d77a2c

SHA-1:
e6ad324301695934b2d0bcc79651fb4e8a05c09b

SHA-256:
119cd562adace5d726c9f002c8dffbe5d4a249a8644f066090c96f5b4959ab48

Scanner detections:
7 / 68

Status:
Inconclusive  (not enough data for an accurate detection)

Analysis date:
11/24/2024 12:29:54 PM UTC  (today)

Scan engine
Detection
Engine version

IKARUS anti.virus
HackTool.MSIL.Skymmer
0.1.3.4

Kaspersky
not-a-virus:NetTool.Win64.RPCHook
14.0.0.-849

Malwarebytes
CrackTool.KMSPico
v2016.12.12.06

Microsoft Security Essentials
HackTool:Win32/AutoKMS
1.1.13303.0

Qihoo 360 Security
HEUR/QVM03.0.0000.Malware.Gen
1.0.0.1120

Quick Heal
Hacktool.Autokms
12.16.14.00

Rising Antivirus
Trojan.Generic-snsFEQ0EtLV (cloud)
23.00.65.161210

File size:
7.3 MB (7,658,496 bytes)

Product version:
1.9.0.0

Copyright:
Copyright © 2016

Original file name:
Windows 10 Permanent Activator Ultimate v1.9.exe

File type:
Executable application (Win64 EXE)

Language:
Language Neutral

File PE Metadata
Compilation timestamp:
12/11/2016 1:06:31 AM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
80.0

.NET CLR dependent:
Yes

Entry address:
0x735E6A

Entry point:
4D, 5A, 90, 00, 03, 00, 00, 00, 04, 00, 00, 00, FF, FF, 00, 00, B8, 00, 00, 00, 00, 00, 00, 00, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 80, 00, 00, 00, 0E, 1F, BA, 0E, 00, B4, 09, CD, 21, B8, 01, 4C, CD, 21, 54, 68, 69, 73, 20, 70, 72, 6F, 67, 72, 61, 6D, 20, 63, 61, 6E, 6E, 6F, 74, 20, 62, 65, 20, 72, 75, 6E, 20, 69, 6E, 20, 44, 4F, 53, 20, 6D, 6F, 64, 65, 2E, 0D, 0D, 0A, 24, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.8592  (probably packed)

Code size:
7.2 MB (7,553,024 bytes)

Windows Firewall Allowed Program
Name:
windows 10 permanent activator ultimate v1.9


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to n1nw8shg121.shr.prod.ams1.secureserver.net  (188.121.41.137:80)