{"id":1257,"date":"2018-02-28T16:46:00","date_gmt":"2018-02-28T16:46:00","guid":{"rendered":"https:\/\/www.adlice.com\/?p=1257"},"modified":"2022-12-21T10:32:04","modified_gmt":"2022-12-21T10:32:04","slug":"kms-activators-analysis","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/de\/kms-activators-analysis\/","title":{"rendered":"KMS Activators, Are They Malware?"},"content":{"rendered":"\n<p><strong>Since a few weeks, new waves of infection related to the use of hacktools like Windows Loader or KMSPico caught our attention<\/strong> (KMS Activators). Since they are more used than before some malware authors now use them to disseminate infections.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">KMS ACTIVATORS: BYPASSING ACTIVATION<\/p>\n\n\n\n<p><strong>With the release of Windows 10, illegal <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/ff793438.aspx\">MAK<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/System_Locked_Pre-installation\">SLP<\/a> activations became really difficult to perform and thus, available hacktools now use KMS.<\/strong><\/p>\n\n\n\n<p>Key Management Service (KMS) is used to activate Microsoft products on clients using generic keys against a Volume Activation Service, hosted on a remote server. Legally owned volume licenses are installed on the server and activation is required typically every 180 days to keep the products activated on client machines.<br>For more information, please refer to the <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/ff793434.aspx\">Understanding KMS<\/a> article by Microsoft.<\/p>\n\n\n\n<p><strong>Hacktools using KMS activation emulate a fake KMS server on the local computer<\/strong> and trick Microsoft products to activate against it. Products activated this way have temporary valid license and when installing such hacktools, a task is often created to automatically renew it every 60 days.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">WHY NOT USING THEM?<\/p>\n\n\n\n<p><br>Aside for the ethical point of view and TOS breaking, <strong>using hacktools may put your computer at risk<\/strong>. Even if some of them are perfectly functional and malware-free, that\u2019s not a generality.<\/p>\n\n\n\n<p><strong>We have tested the first KMS activators returned by Google search<\/strong> engine and analyzed them. Here are the results :<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kms_mrf.jpg\"><img decoding=\"async\" width=\"1757\" height=\"503\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kms_mrf.jpg\" alt=\"\" class=\"wp-image-1260\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kms_mrf.jpg 1757w, https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kms_mrf-300x86.jpg 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kms_mrf-1024x293.jpg 1024w\" sizes=\"(max-width: 1757px) 100vw, 1757px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>&nbsp;<br>Most of them are <strong>highly detected on VirusTotal<\/strong>, and a lot of them have <strong>suspicious activity in sandbox<\/strong> analysis.<\/p>\n\n\n\n<p>&nbsp;<br><u>Sample #1 : DBDDA4670CF42B040BFD731DBFE95C7A<\/u><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Interesting characteristics<\/td><td>Suspicious\/Malicious activities<\/td><\/tr><tr><td>Check for debugger and virtual environment<br>Signed using an unrecognized root certificate<\/td><td>None (program crashed)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><u>Sample #2 &#8211; 692A9D1403CC1A08F5DFD036EF2FAF0F<\/u><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Interesting characteristics<\/td><td>Suspicious\/Malicious activities<\/td><\/tr><tr><td>Check for debugger<\/td><td>Install a backdoor allowing remote access<br>Browser redirections and adclickers<br>Monero cryptomining<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><u>Sample #3 &#8211; 3AC9A672C26DB75FB9CCD51BCF59A969<\/u><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Interesting characteristics<\/td><td>Suspicious\/Malicious activities<\/td><\/tr><tr><td>Check for debugger<\/td><td>Browser redirections and adclickers<br>Monero cryptomining<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><u>Sample #4 &#8211; 675B1EB266E3BC547981FB178D3AAF48<\/u><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Interesting characteristics<\/td><td>Suspicious\/Malicious activities<\/td><\/tr><tr><td>Check for debugger and virtual environment<\/td><td>Open a backdoor allowing remote access<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><u>Sample #5 &#8211; A02164371A50C5FF9FA2870EF6E8CFA3<\/u><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Interesting characteristics<\/td><td>Suspicious\/Malicious activities<\/td><\/tr><tr><td>Signed using an unrecognized root certificate<\/td><td>None<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><u>Sample #6 &#8211; A7728562C9D2D733CAC56F4EEA629AFB<\/u><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Interesting characteristics<\/td><td>Suspicious\/Malicious activities<\/td><\/tr><tr><td>Signed using an unrecognized root certificate<\/td><td>Change security-related services and parameters<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><u>Sample #7 &#8211; FB7569D1C2C1FA36A97FDC732F51A637<\/u><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Interesting characteristics<\/td><td>Suspicious\/Malicious activities<\/td><\/tr><tr><td>Check for debugger and virtual environment<br>Signed using an invalid certificate<\/td><td>Contact remote machine<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><u>Sample #8 &#8211; 1A5FC26D8596C2573C7A5E480FB94724<\/u><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Interesting characteristics<\/td><td>Suspicious\/Malicious activities<\/td><\/tr><tr><td>Check for virtual environment<br>Signed using an unrecognized root certificate<\/td><td>Contact remote machine<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><u>Sample #9 &#8211; 25C77D35B685B78017ED7830873E065A<\/u><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Interesting characteristics<\/td><td>Suspicious\/Malicious activities<\/td><\/tr><tr><td>Check for virtual environment<\/td><td>None<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">DETECTION &amp; REMOVAL<\/p>\n\n\n\n<p>In case you have installed one of these malware variants of KMSpico, and want to make sure they are not doing harmful actions to your machine, can you try to run a scan with <a rel=\"noreferrer noopener\" href=\"https:\/\/www.adlice.com\/roguekiller\/\" target=\"_blank\">RogueKiller Anti-Malware<\/a> and remove all detections. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"802\" height=\"532\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/10\/rk_results.jpg\" alt=\"\" class=\"wp-image-2145\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/10\/rk_results.jpg 802w, https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/10\/rk_results-300x199.jpg 300w\" sizes=\"(max-width: 802px) 100vw, 802px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">CONCLUSION<\/p>\n\n\n\n<p><br>Some worked as advertised, some crashed on startup or failed to successfully activate Windows. <strong>But some included malicious code<\/strong> that would have allowed attackers to access your computer system and data if you happened to run them.<\/p>\n\n\n\n<p>So, even if it is tempting to use such tools to save money, the financial loss resulting of identity or data theft <strong>could be much more expensive than the amount to be paid<\/strong> to buy a legal Microsoft license.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infections related to the use of hacktools like Windows Loader or KMSPico are rising. Learn how malware authors use them to spread cryptominers, ransomwares and ultimately take control of your newly installed operating system.<\/p>\n","protected":false},"author":1,"featured_media":1259,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[602,599,600,601],"class_list":["post-1257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analyse","tag-hacktool","tag-kms","tag-kmspico","tag-loader","category-54","description-off"],"views":26794,"yoast_score":76,"yoast_readable":60,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>KMS Activators, Should I Install ? Malware Analysis \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"New waves of infections are using Windows Loader or KMSPico (KMS Activators). So should I Install them ? Are they safe ? Malware Analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/kms-activators-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KMS Activators, Should I Install ? Malware Analysis \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"New waves of infections are using Windows Loader or KMSPico (KMS Activators). So should I Install them ? Are they safe ? Malware Analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/kms-activators-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-28T16:46:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:32:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1317\" \/>\n\t<meta property=\"og:image:height\" content=\"784\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"KMS Activators, Are They Malware?\",\"datePublished\":\"2018-02-28T16:46:00+00:00\",\"dateModified\":\"2022-12-21T10:32:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/\"},\"wordCount\":602,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg\",\"keywords\":[\"hacktool\",\"kms\",\"kmspico\",\"loader\"],\"articleSection\":[\"Analyse\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/\",\"url\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/\",\"name\":\"KMS Activators, Should I Install ? Malware Analysis \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg\",\"datePublished\":\"2018-02-28T16:46:00+00:00\",\"dateModified\":\"2022-12-21T10:32:04+00:00\",\"description\":\"New waves of infections are using Windows Loader or KMSPico (KMS Activators). So should I Install them ? Are they safe ? Malware Analysis.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/kms-activators-analysis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg\",\"width\":1317,\"height\":784},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/kms-activators-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KMS Activators, Are They Malware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/#website\",\"url\":\"https:\/\/www.adlice.com\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/de\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KMS Activators, Should I Install ? Malware Analysis \u2022 Adlice Software","description":"New waves of infections are using Windows Loader or KMSPico (KMS Activators). So should I Install them ? Are they safe ? Malware Analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/kms-activators-analysis\/","og_locale":"de_DE","og_type":"article","og_title":"KMS Activators, Should I Install ? Malware Analysis \u2022 Adlice Software","og_description":"New waves of infections are using Windows Loader or KMSPico (KMS Activators). So should I Install them ? Are they safe ? Malware Analysis.","og_url":"https:\/\/www.adlice.com\/kms-activators-analysis\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2018-02-28T16:46:00+00:00","article_modified_time":"2022-12-21T10:32:04+00:00","og_image":[{"width":1317,"height":784,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"Verfasst von":"tigzy","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/kms-activators-analysis\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/kms-activators-analysis\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"KMS Activators, Are They Malware?","datePublished":"2018-02-28T16:46:00+00:00","dateModified":"2022-12-21T10:32:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/kms-activators-analysis\/"},"wordCount":602,"publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/kms-activators-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg","keywords":["hacktool","kms","kmspico","loader"],"articleSection":["Analyse"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/kms-activators-analysis\/","url":"https:\/\/www.adlice.com\/kms-activators-analysis\/","name":"KMS Activators, Should I Install ? Malware Analysis \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/kms-activators-analysis\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/kms-activators-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg","datePublished":"2018-02-28T16:46:00+00:00","dateModified":"2022-12-21T10:32:04+00:00","description":"New waves of infections are using Windows Loader or KMSPico (KMS Activators). So should I Install them ? Are they safe ? Malware Analysis.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/kms-activators-analysis\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/kms-activators-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/kms-activators-analysis\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/02\/kmspico.jpg","width":1317,"height":784},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/kms-activators-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/de\/"},{"@type":"ListItem","position":2,"name":"KMS Activators, Are They Malware?"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/#website","url":"https:\/\/www.adlice.com\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/1257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/comments?post=1257"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/1257\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media\/1259"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media?parent=1257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/categories?post=1257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/tags?post=1257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}