Backdoor.DllInject.GUA
Table of Contents
Analysis Report
General information
| Family Name: | Backdoor.DllInject.GUA |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
3a0dff2ab0d517434c3bc4a4d47da763
SHA1:
9bedeed70c64e5fa00bab1f59e013a70ea162ca5
SHA256:
C48B2253CC0233932A08655A42B758EAC79EC8DF88C40A1FC2523399B5314951
File Size:
2.58 MB, 2582528 bytes
|
|
MD5:
415cb7938a9455430a01ebc247045c86
SHA1:
d89e03154e6320eff38fcf416efbb33d98b48dda
SHA256:
885591BCC30B8C7901C52A2C1EE7479BBF7F65643A40DBFD15D67DE6573FE448
File Size:
1.08 MB, 1078272 bytes
|
|
MD5:
69edbaa4e482f3da004d50ca51fdc2a1
SHA1:
3d407ceacf643b6a75f7aae9af075c63a6cdc324
SHA256:
D7B5D1FA0C6559D4552EB80EFD8D8AD020C97CDD7D37B99240BB1C8851104A78
File Size:
979.46 KB, 979456 bytes
|
|
MD5:
7c3d5ada5b3d9079d4f7381b31d01ca5
SHA1:
283be0bc578b396b62c5e87347bef203fd706a05
SHA256:
4B3ACB6E8A68A8F70B8596425BFFDF3A28D98131DBB3D4C4E5DEBA9706D47837
File Size:
2.81 MB, 2807296 bytes
|
|
MD5:
3d2cb42917db452811353b1cd467b564
SHA1:
9965b305bfdec2304d90a2d6fdefc60cc0d579a5
SHA256:
ADAC8F22FE866E389EA8813CB19973367BA8C3FCEEAD7187E62A0B777BFA36C9
File Size:
1.32 MB, 1324544 bytes
|
Show More
|
MD5:
0a4e2031dc389b9e49b32b1851c4795e
SHA1:
e190ced0dfe6063e71bb1871a5fed0b64417aed5
SHA256:
327524B17E80FE9C049A095FDCBF4739A838970911E907C623C0FE0875120490
File Size:
530.76 KB, 530759 bytes
|
|
MD5:
5705c9b7b052bf883b8f7a37acbe52dd
SHA1:
8f6ba0f8a7670357eddaeda13d5d073c61a834db
SHA256:
8F2B4E07A3569C9F88351BFEBE0AC749EEA3772AB655D03D8899E3FBBBA2B39F
File Size:
929.28 KB, 929280 bytes
|
|
MD5:
d0ab84c8109323fee7d99f15793b850a
SHA1:
abf20679bca4e12c2636c2f1daed1bc4f356e09d
SHA256:
E582D81E86744DE8F2067EED33839AB9B0E452F99190EC25EE5FB550F2656B78
File Size:
1.17 MB, 1174528 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
Show More
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name | HelpWare |
| File Description | MouseOptimizer |
| File Version | 0.1.3.0 |
| Internal Name | MouseOptimizer |
| Legal Copyright | � 2026 HelpWare |
| Original Filename | MouseOptimizer.exe |
| Product Name | MouseOptimizer |
| Product Version | 0.1.3.0 |
File Traits
- dll
- fptable
- GetConsoleWindow
- imgui
- No Version Info
- ntdll
- WriteProcessMemory
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 3,668 |
|---|---|
| Potentially Malicious Blocks: | 157 |
| Whitelisted Blocks: | 3,186 |
| Unknown Blocks: | 325 |
Visual Map
0
?
0
0
0
0
?
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
x
?
x
x
x
0
?
0
x
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
?
?
?
?
?
x
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
?
0
0
0
?
?
?
0
0
0
0
?
?
?
0
?
?
?
?
0
0
?
?
x
0
?
?
?
0
?
?
?
0
?
?
?
0
?
?
0
?
?
0
?
?
0
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
0
?
?
?
0
x
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
0
0
?
?
?
x
?
?
0
0
0
?
?
0
?
?
?
0
0
?
0
?
?
0
0
?
0
?
?
?
?
?
?
?
0
?
?
?
?
?
?
?
0
?
0
?
?
?
0
?
?
0
?
?
?
0
?
?
0
0
0
?
0
?
?
0
?
?
0
0
0
?
?
?
0
?
0
?
?
?
0
?
?
0
0
?
?
0
0
?
0
0
0
?
0
?
0
0
?
0
0
?
?
?
?
0
?
?
?
0
0
?
?
?
?
?
?
?
0
0
0
0
?
0
?
?
?
0
?
?
?
0
?
?
0
?
?
?
?
?
?
?
?
?
?
?
?
?
0
0
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
x
?
?
?
?
?
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
x
0
?
0
0
x
0
0
x
0
0
0
0
0
0
0
?
0
0
?
0
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
x
0
0
?
0
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
1
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
0
x
0
0
0
0
0
0
0
0
x
0
0
x
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
x
0
x
0
x
0
0
0
x
0
0
0
x
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
?
x
0
0
0
?
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
1
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
x
0
x
x
0
0
0
0
0
0
0
0
0
x
0
0
x
0
0
0
0
0
0
0
x
0
0
x
0
0
0
0
0
x
0
x
x
x
1
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
0
0
1
0
0
0
1
0
0
0
0
0
1
0
0
1
0
0
1
0
0
1
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
x
0
0
0
0
0
0
0
1
x
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
x
x
x
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
x
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
x
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
x
0
0
0
x
x
0
0
0
0
0
0
0
0
0
0
1
x
0
0
0
0
0
0
0
1
x
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
x
x
0
0
x
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
x
x
0
0
0
x
x
0
x
0
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- DllInject.GUA
- Gamehack.PS
- Trojan.Kryptik.Gen.BKO
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\downloads\.hwfreetb_rand.txt | Generic Write,Read Attributes |
| c:\users\user\downloads\p9rxrjp9gowb.exe | Generic Write,Read Attributes |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
36 additional items are not displayed above. |
| User Data Access |
|
| Anti Debug |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Service Control |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
c:\users\user\downloads\P9rXRjp9gOWb.exe "c:\users\user\downloads\P9rXRjp9gOWb.exe" --del-old "c:\users\user\downloads\e190ced0dfe6063e71bb1871a5fed0b64417aed5_0000530759" --mark-rand
|