43:
225:
which would otherwise be returned by an activation server. If the software offers phone activation then the keygen could generate the correct activation code to finish activation. Another method that has been used is activation server emulation, which patches the program memory to "see" the keygen as the
224:
Many programs attempt to verify or validate licensing keys over the
Internet by establishing a session with a licensing application of the software publisher. Advanced keygens bypass this mechanism, and include additional features for key verification, for example by generating the validation data
169:. Keygens may be legitimately distributed by software manufacturers for licensing software in commercial environments where software has been licensed in bulk for an entire site or enterprise, or they may be developed and distributed illegitimately in circumstances of
196:, sampled loops or anything that the programmer desires. Chiptunes are often preferred due to their small size. Keygens can have artistic user interfaces or kept simple and display only a cracking group or cracker's logo.
472:
374:
A key changer or keychan is a variation of a keygen. A keychan is a small piece of software that changes the license key or serial number of a particular piece of proprietary software installed on a computer.
237:
A multi-keygen is a keygen that offers key generation for multiple software applications. Multi-keygens are sometimes released over singular keygens if a series of products requires the same
216:(DRM) mechanism, seeking to prevent unauthorized use of the software by issuing a code sequence that must be entered into the application when prompted or stored in its configuration.
531:
564:
465:
414:
432:
505:
615:
342:, its first known detection dates back to 16 July 2009. The following security threats were most often found on PCs that have been related to these tools:
300:. These key generators may or may not generate a valid key, but the embedded malware loaded invisibly at the same time may, for example, be a version of
208:
is a legal instrument that governs the usage and distribution of computer software. Often, such licenses are enforced by implementing in the software a
389:
527:
556:
335:
314:
may discover malware embedded in keygens; such software often also identifies unauthorized keygens which do not contain a payload as
126:
620:
418:
64:
590:
315:
440:
384:
107:
497:
605:
327:
79:
270:
213:
394:
253:
Unauthorized keygens that typically violate software licensing terms are written by programmers who engage in
86:
60:
53:
170:
347:
93:
166:
254:
75:
311:
209:
162:
258:
177:
205:
150:
266:
610:
331:
433:"Why product activation for software is becoming widespread – a knol by Dominic Haigh"
599:
158:
31:
17:
100:
301:
285:
242:
181:
154:
42:
305:
274:
238:
193:
318:, often labelling them with a name such as Win32/Keygen or Win32/Gendows.
185:
176:
Illegitimate key generators are typically programmed and distributed by
297:
189:
296:
Keygens, available through P2P networks or otherwise, can contain
281:
330:
is defined as HackTool.Win32.HackAV or not-a-virus:Keygen from
184:. These keygens often play music (taking from the tradition of
36:
27:
Computer program that can generate a product licensing key
466:"Microsoft Security Intelligence Report Volume 13, p14"
30:
For programs which generate cryptographic keys, see
67:. Unsourced material may be challenged and removed.
591:Business Software Alliance and Software Patents
528:"New CryptoLocker Spreads via Removable Drives"
498:"Cryptolocker 2.0 – new version, or copycat?"
8:
557:"HackTool:Win32/Keygen threat description"
127:Learn how and when to remove this message
460:
458:
390:Canadian Alliance Against Software Theft
406:
280:Keygens are available for download on
551:
549:
508:from the original on 22 November 2016
7:
534:from the original on 4 November 2016
65:adding citations to reliable sources
567:from the original on 18 August 2022
478:from the original on 19 August 2024
340:Microsoft Malware Protection Center
336:Microsoft Malware Protection Center
616:Copyright infringement of software
25:
530:. Trend Micro. 26 December 2013.
188:), which may include the genres
41:
561:Microsoft Security Intelligence
334:or as HackTool:Win32/Keygen by
52:needs additional citations for
1:
415:"What is Software licensing?"
326:A program designed to assist
316:potentially unwanted software
563:. Microsoft. 16 July 2009.
385:BSA (The Software Alliance)
637:
504:. ESET. 19 December 2013.
29:
577:Updated 15 September 2017
271:digital rights management
214:digital rights management
395:Free Software Foundation
249:Authors and distribution
621:Cryptographic software
171:copyright infringement
348:Blackhole exploit kit
322:HackTool.Win32.HackAV
155:product licensing key
18:HackTool.Win32.HackAV
173:or software piracy.
167:software application
61:improve this article
443:on 21 November 2011
338:. According to the
255:reverse engineering
229:activation server.
312:Antivirus software
298:malicious payloads
210:product activation
200:Software licensing
606:Software cracking
284:sites or through
259:software cracking
178:software crackers
153:that generates a
137:
136:
129:
111:
16:(Redirected from
628:
578:
576:
574:
572:
553:
544:
543:
541:
539:
524:
518:
517:
515:
513:
494:
488:
487:
485:
483:
477:
470:
462:
453:
452:
450:
448:
439:. Archived from
429:
423:
422:
417:. Archived from
411:
364:Win32/Obfuscator
288:(P2P) networks.
265:, to circumvent
220:Key verification
206:software license
151:computer program
132:
125:
121:
118:
112:
110:
69:
45:
37:
21:
636:
635:
631:
630:
629:
627:
626:
625:
596:
595:
587:
582:
581:
570:
568:
555:
554:
547:
537:
535:
526:
525:
521:
511:
509:
496:
495:
491:
481:
479:
475:
468:
464:
463:
456:
446:
444:
437:knol.google.com
431:
430:
426:
421:on 14 May 2011.
413:
412:
408:
403:
381:
372:
324:
294:
292:Malware keygens
269:of software or
267:copy protection
261:, often called
251:
241:for generating
235:
222:
202:
161:, necessary to
133:
122:
116:
113:
70:
68:
58:
46:
35:
28:
23:
22:
15:
12:
11:
5:
634:
632:
624:
623:
618:
613:
608:
598:
597:
594:
593:
586:
585:External links
583:
580:
579:
545:
519:
502:WeLiveSecurity
489:
454:
424:
405:
404:
402:
399:
398:
397:
392:
387:
380:
377:
371:
368:
367:
366:
361:
356:
351:
332:Kaspersky Labs
323:
320:
293:
290:
250:
247:
234:
231:
221:
218:
201:
198:
135:
134:
49:
47:
40:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
633:
622:
619:
617:
614:
612:
609:
607:
604:
603:
601:
592:
589:
588:
584:
566:
562:
558:
552:
550:
546:
533:
529:
523:
520:
507:
503:
499:
493:
490:
474:
467:
461:
459:
455:
442:
438:
434:
428:
425:
420:
416:
410:
407:
400:
396:
393:
391:
388:
386:
383:
382:
378:
376:
369:
365:
362:
360:
359:Win32/Dorkbot
357:
355:
354:Win32/Autorun
352:
350:
349:
345:
344:
343:
341:
337:
333:
329:
321:
319:
317:
313:
309:
307:
303:
299:
291:
289:
287:
283:
278:
276:
272:
268:
264:
260:
256:
248:
246:
244:
240:
232:
230:
228:
219:
217:
215:
211:
207:
199:
197:
195:
191:
187:
183:
179:
174:
172:
168:
165:for use of a
164:
160:
159:serial number
156:
152:
148:
144:
143:key generator
139:
131:
128:
120:
109:
106:
102:
99:
95:
92:
88:
85:
81:
78: –
77:
73:
72:Find sources:
66:
62:
56:
55:
50:This article
48:
44:
39:
38:
33:
32:Key generator
19:
569:. Retrieved
560:
536:. Retrieved
522:
510:. Retrieved
501:
492:
480:. Retrieved
445:. Retrieved
441:the original
436:
427:
419:the original
409:
373:
363:
358:
353:
346:
339:
325:
310:
302:CryptoLocker
295:
286:peer-to-peer
279:
262:
252:
243:product keys
236:
233:Multi-keygen
226:
223:
203:
175:
157:, such as a
146:
142:
140:
138:
123:
114:
104:
97:
90:
83:
71:
59:Please help
54:verification
51:
182:warez scene
600:Categories
538:18 January
512:18 January
447:11 January
401:References
306:ransomware
275:multimedia
87:newspapers
571:18 August
482:19 August
239:algorithm
194:chiptunes
186:cracktros
117:June 2014
565:Archived
532:Archived
506:Archived
473:Archived
379:See also
263:crackers
227:de facto
163:activate
76:"Keygen"
370:Keychan
328:hacking
190:dubstep
180:in the
149:) is a
147:key-gen
101:scholar
103:
96:
89:
82:
74:
611:Warez
476:(PDF)
469:(PDF)
282:warez
108:JSTOR
94:books
573:2022
540:2014
514:2014
484:2024
449:2022
273:for
257:and
80:news
308:).
245:.
212:or
63:by
602::
559:.
548:^
500:.
471:.
457:^
435:.
277:.
204:A
192:,
141:A
575:.
542:.
516:.
486:.
451:.
304:(
145:(
130:)
124:(
119:)
115:(
105:·
98:·
91:·
84:·
57:.
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.