HackTool:Win32/Patcher
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 254 |
| Threat Level: | 10 % (Normal) |
| Infected Computers: | 209,424 |
| First Seen: | February 7, 2013 |
| Last Seen: | March 29, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Aliases
15 security vendors flagged this file as malicious.
| Antivirus Vendor | Detection |
|---|---|
| Fortinet | W32/Malware_fam.NB |
| Ikarus | possible-Threat.Patch.QBES |
| AhnLab-V3 | Malware/Win32.Suspicious |
| Sophos | Troj/QPatch-A |
| McAfee-GW-Edition | Heuristic.BehavesLike.Win32.Suspicious-PKR.K |
| AntiVir | TR/HostsMod |
| eSafe | Win32.HackTool.Patch |
| Avast | Win32:PUP-gen [PUP] |
| Symantec | Adware.Lop |
| F-Prot | W32/MalwareF.MVIA |
| McAfee | Generic.dx!tgm |
| Panda | Generic Malware |
| Ikarus | not-a-virus:RiskTool.Win32.Patcher |
| McAfee-GW-Edition | Heuristic.LooksLike.Win32.Suspicious.B |
| F-Prot | W32/Backdoor2.HMRI |
SpyHunter Detects & Remove HackTool:Win32/Patcher
File System Details
| # | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|---|
| 1. | winmm.dll | aa485b52bd986c416540c2ca0de1574b | 1,216 |
| 2. | z3x gsm x team.exe | b1823b2e249cb95614f3363dde4064d2 | 449 |
| 3. | 2.exe | f20ef033547809a625d43a859a015d40 | 320 |
| 4. | Z3X_Loader_24.3.exe | 1fa73c95c16d5a36c53ed37904f1fe3a | 312 |
| 5. | CST_patch.exe | dfdbf3e4c3e3b186b4fcea508c5a45a4 | 302 |
| 6. | z3x pro box samsung v28.2 by m.waqas qamar.exe | 450854c7adfd154757617c91c8eb2c6a | 220 |
| 7. | netewaf.dll | 97081546524693ba894ff166b3334913 | 103 |
| 8. | EASEUS Partition Master v9.2.2 [Patch].exe | 57991e8b4e98fa78d992935b89e0a3ab | 81 |
| 9. | Z3X FULL CERT GSM ANDROID.exe | 6bc0271991f6afc9ba6e5cf0fc827830 | 78 |
| 10. | Z3X Box 29.5 KeyGen by Cristian Pino.exe | ac9e71af6c6360b802e7a2787f842472 | 71 |
| 11. | Z3X Easy-JTag EMMC Odin By M.Waqas Qamar.exe | 6dd1a96d1fa572958da55b9b26865917 | 65 |
| 12. | Z3X Box 29.5 KeyGen.exe | 90dc3f6847b6cc0634532b84d80b01f2 | 28 |
| 13. | Z3X 29.5 LOADER.exe | 41b9d047c3e7f6ffd165ab5762541851 | 27 |
| 14. | Reflexorator v1.2 by ANON. (TAC).exe | 473f823139ac44cbddb963bef45e7d91 | 16 |
| 15. | antidote8vx_patcher.exe | 18116d4edefb89dc09e4b65a861bfb17 | 13 |
| 16. | CSTpatcher15.exe | 7733cf71943459afbdc206687d013ff0 | 10 |
| 17. | Nbt.exe | b1c6f0b2e02654e415a04f1cb968cd4d | 8 |
| 18. | UrT 4.exe | 8163275f3b4a12fbe7cab0964e6558ea | 7 |
| 19. | system.exe | 658cc07d556ec28441721d48aa054f9d | 4 |
| 20. | Wrar3reg.exe | 88203a4cae65575159d01619194664f6 | 3 |
| 21. | I3BSvr_ABC.exe | be18faf6979307b62837c1f035bdb276 | 2 |
| 22. | %SystemDrive%/windows/conhost.exe | 7c7bb14c7744966010821c56851eb38e | 1 |
Registry Details
Analysis Report
General information
| Family Name: | PUP.Patcher |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
de3196328c8cadc061bcb0fa7a9a0c07
SHA1:
c4ed54b54de9d6dc708af4deb8e7af3929188a63
File Size:
389.76 KB, 389764 bytes
|
|
MD5:
e0f6b769f187595d1454f5d3eb80ebd9
SHA1:
d135d647c7c46899f87e778e348961dcc5e17809
File Size:
86.02 KB, 86016 bytes
|
|
MD5:
236e6a8f47cfd6f159a9f51ea2a05617
SHA1:
d4546c3ed2be39c5b65e72088128a41b90da163b
SHA256:
DCD5041483064E3AD98914B94CFDCDFB411D257B7D80744F7AFC7074E0FD4DB2
File Size:
179.87 KB, 179872 bytes
|
|
MD5:
e0df4eb9b63da0c6adfef9e5c9f2a8e2
SHA1:
d929ece2248ac26a0ef23e024deb7dfcb3b77e9d
SHA256:
2AC2AF3C96A990BCF1A31FF54CB7C4B427ED7B5B8466A6CA346D46F17D22123D
File Size:
171.52 KB, 171520 bytes
|
|
MD5:
12b55074678f6b23900bf946a73804d0
SHA1:
f018c4fb7db8846f6848a79d992a5dc4b27f0614
SHA256:
DA2AC1081D67D4130EE62D1C9799641095AAAE5042D66C75EA437CCB9208B55A
File Size:
389.79 KB, 389794 bytes
|
Show More
|
MD5:
d84a789cc503a71906e1000d4faa00ef
SHA1:
5b8fc61f33924c26a1ee2ac371704eba1dbc1b06
SHA256:
FCFF79B2CECF4981AB145EC504F9365F7B55066864F6BF481BC2674330BE403D
File Size:
12.29 KB, 12288 bytes
|
|
MD5:
b2e9734615b83df72ba0c9e7bf284d5b
SHA1:
c3bce8170e5d4f6bd79f5ce7366419e576a5d76e
SHA256:
AA8050723DF89946EB9A4E88C6AA3BB0ACD3559F83183F3ECA29E710B7BE8BF2
File Size:
2.01 MB, 2014728 bytes
|
|
MD5:
5061d372663063902fee16b02ef1fe3c
SHA1:
92069d8bc4753cfcb8356bb1960ed5be0bbb457a
SHA256:
05023ED8A8585C9A9DB5ABF7DA10453E38DEB1CDF678E75E299E65DA24C2C041
File Size:
14.34 KB, 14336 bytes
|
|
MD5:
a06e3851ebecd31bc81ae18244bef7a0
SHA1:
0170d22d305b12ef46769f470a240e0e5206d4da
SHA256:
77C121EDBD5576AABC8BA7028C29407C2377CD4A8D6578FADA20F691E9610E60
File Size:
542.03 KB, 542032 bytes
|
|
MD5:
1fcc02eebbc384abb03394e4427a52f7
SHA1:
74d7cc29ca72273d5e8096146ea3b2511ca56da7
SHA256:
502ADC342F511612F86181BF0793541F82B9CC3AB94E633F36A8A529E3F400DF
File Size:
1.31 MB, 1307648 bytes
|
|
MD5:
726707744c1aeaebdf0c2a5d74821dbb
SHA1:
a6341c3aa7e5291a2a24e9697380485ac2c421c1
SHA256:
6365017F8F41072026F88BF362722B3FC32A28FDDB855370B484F27E0C032C90
File Size:
81.41 KB, 81408 bytes
|
|
MD5:
c6734351950d981bdb9b120e2b6168fb
SHA1:
ebe5e001193a20f7d0471f30ba817da2974c0839
SHA256:
A4C478721F17E79DB6CBEFB4DCEF4DA2C8178A0A2DB1572740AD6246EE694A24
File Size:
227.46 KB, 227456 bytes
|
|
MD5:
8888dce2b767b5c84d0e0a81e1c61d35
SHA1:
b216f3a9f2c39a3a4a310b05b647c9a3db9e4541
SHA256:
16A143583CA73662E5172FECB12F45300C28FA5BAFF55E90933FA5E1EAA8D472
File Size:
1.54 MB, 1542144 bytes
|
|
MD5:
16b4258332d36e3515ac5cfa1abe48ea
SHA1:
c729c484d0f1df005edfc0d394d2589606594f42
SHA256:
E4F0669504B92CEC4A6C5147CB052876C96E40C8516095430165ECB303D9076A
File Size:
111.61 KB, 111611 bytes
|
|
MD5:
64edf271468d12d3a6c3e03e7c36c268
SHA1:
ad84dfdf26af659db9267948696351ba8dfd079d
SHA256:
75252D89919C8F6AF68EF0633F2579C9D241DBD81454F255BD611FD0B33C67B8
File Size:
562.69 KB, 562688 bytes
|
|
MD5:
be4837d72dc2e3ee8480a61e1045267f
SHA1:
1f0092b274fc484b1bbb83f8f30e54459e6015c8
SHA256:
7AB9131EBC884EB0833A3629E8074C6AD662243080C4E3449866151EEBB6EFAC
File Size:
113.15 KB, 113152 bytes
|
|
MD5:
0545cbc7d5a65cc321f2fc8c5731bf40
SHA1:
1346f61f5c81e275f073cea13b8fad980de51d44
SHA256:
AFB3538C48A65C8C5CE0989810EC5F72F23BE78C20EA6E4DC9180F6B4F82267A
File Size:
433.15 KB, 433152 bytes
|
|
MD5:
7da06ba20a86c4bf7bc017bf0703b4b1
SHA1:
d6960df9c1a01d77052d4d4bcce83df0f96db498
SHA256:
FEAEEFD145861E7816F2FF98932A898BE5402C15F4ED69A1D9E0D6BF8F973697
File Size:
1.72 MB, 1721199 bytes
|
|
MD5:
5fc59c32c7659d8ec71177a6067a71bd
SHA1:
259b9061934d083ce59fe3f2debbc29abb57b5e8
SHA256:
1CECA7DD16F6FDDEC70F9463C674A837E9630F2FCB8B7C924742F9556C5813D7
File Size:
16.90 KB, 16896 bytes
|
|
MD5:
8983cd213426f419ba7436667fc2e9df
SHA1:
6fe3a02822c66a9ca65276cda033026ae6ca47cb
SHA256:
4DC7B48061CB7D6F083A0D293A07485F89D12BD21B2B7EFFF1B59938A09CFBE4
File Size:
389.79 KB, 389794 bytes
|
|
MD5:
75d829b7fbf4e3be3bc134777a6f672d
SHA1:
2026b932afba9613c56018f962d17a4c7c2d5ed7
SHA256:
A1D1E8418A43CC8C68A6D4A1CB9B79065742A0EADEF310207B075760E94E783C
File Size:
68.40 KB, 68399 bytes
|
|
MD5:
3d44818e435a57f9b03b032ee69d4181
SHA1:
f233387cbcd42cbd7d0dfe87e7a21b89a843d899
SHA256:
C31ADFBB98C64B2CCB0FF188104D702BC0B9E2E2BA8679921FBA2916339BEA3C
File Size:
298.19 KB, 298192 bytes
|
|
MD5:
c6e4ed3365b90053a9ae473959383fe6
SHA1:
1dcd3053053ad935443c6b1afc35c8bfd4ed309c
SHA256:
87F135AF140965F19BC019629162C7F76FD6F989E8C09AA554E7C3819AB0A2D2
File Size:
1.01 MB, 1012224 bytes
|
|
MD5:
f7ca5d556f63925821110b550446f7ca
SHA1:
8dc96c1eb56fc67c77e327c9e6d81379777b11ec
SHA256:
C6537BFF110DC3E5CF21B0CA0673D23D755AF2796B6BC61E71CB0331A1E50E2A
File Size:
248.47 KB, 248472 bytes
|
|
MD5:
795aab36d912dfaceff07071174e3c57
SHA1:
3649e4fbfb01bed60d34d4cde8266c097ea22b40
SHA256:
CA0C02A7FA5BB494DF9252D09D2D55339E55DCAECE526B77DC8F49027A4C9991
File Size:
180.22 KB, 180224 bytes
|
|
MD5:
4fbdfa89596efbbaca32c04f10fe1701
SHA1:
c13fb1e8a5ecbbf9f97a5f97edde26a730845a1d
SHA256:
B1F887192B8AD5360FFC56AD832BA0803EAFB5513D010E6AA4B10D502A6DD06E
File Size:
389.80 KB, 389804 bytes
|
|
MD5:
6f28112ce8ea0e439f7fb2f1b86877c6
SHA1:
8f8bde4ce198fc29ac907903950bbae11edb4c1d
SHA256:
14531AFEB7B89CE11FEF16DE7D1A3AB10623993CB6FC8EC12632456C889432F7
File Size:
1.11 MB, 1110528 bytes
|
|
MD5:
692df0f7602079cfce0c7bb7ec6f3772
SHA1:
1c1791f9664a367955b2ef831adc28ba403fbe30
SHA256:
92CE291436945CEE5E65DFEF95E91BBF46568C7DB9BF2AF285E2C8DEA9199FDB
File Size:
11.39 KB, 11394 bytes
|
|
MD5:
338b6827e7043114f3b412f7d02701d1
SHA1:
64340f25a2f8a15d2205507f032fabf5e3948c9f
SHA256:
791AAF1B565FD859B232B7068E6775C8CDF65F9A6D9CFF5D91E086B250E0C44E
File Size:
389.78 KB, 389781 bytes
|
|
MD5:
66a780d78fa36814245540a2d5a07375
SHA1:
31e7365451bc62fa2ef9960295380988c33d2cb1
SHA256:
9C7ACB3DBF6F631E73189DA3A53E5DEE694E0D38F2EA6D41F9B4E00CE23FE5D5
File Size:
704.97 KB, 704967 bytes
|
|
MD5:
240c2b3788b20d4b50a18ea206979899
SHA1:
c39c5528ea589e0f2613fdee795787c7a2073b26
SHA256:
2A8A437057A8E4847611668FD1553B1C47465763C60FEF39C997E58F13E482D5
File Size:
101.41 KB, 101408 bytes
|
|
MD5:
01822f2673d70ce287fa59816e0fc5a1
SHA1:
9c3cb69fd8fcd8a928f5c88db62f2b15360137a3
SHA256:
960BCAEBF02BA2BF7BBDADFADDBC6FCF3E6DEF5BC6B95931EA0DE69DDD413549
File Size:
389.78 KB, 389778 bytes
|
|
MD5:
333d15ad5d35d4545e9021eb7e4f3452
SHA1:
8207ffc011b738ef3d3b1a8a32e2100f579a4ddc
SHA256:
5AC93B1440C66430B4604843236CC50A68AC3E204385E87E019149CE7C79EE56
File Size:
718.34 KB, 718336 bytes
|
|
MD5:
8ad1f5be7224b74f3cfd15f35365094f
SHA1:
5ca5967e0d4a300762dc2475b1b42e9c688b405f
SHA256:
A6C1C58158C3DFF820B996B11A0EE5C122DC2DBF3146F271CEC32E78BAD2BAE1
File Size:
3.13 MB, 3129344 bytes
|
|
MD5:
1c9fea2ae5d510a487105bfe61c9ffe9
SHA1:
4eb53f791690458bd98fc288b43e59d2035c10e8
SHA256:
33331C9F1B7F73F8B9A24755FECB40509A9E52908F1DED2C448DF8BE0E88FC28
File Size:
389.79 KB, 389793 bytes
|
|
MD5:
b02be0e0148f316e22d37c7f16127e10
SHA1:
66a4367d18fa9e2d54d43878d1b995d262f5f511
SHA256:
31BFCBF9D3F0127C8D5BC3FA8302475928ADA55F0050E072DFDF326557F9F101
File Size:
389.79 KB, 389786 bytes
|
|
MD5:
1643e9501ad1d730776ad30da251e0bb
SHA1:
4f2e9d15dd7b489fc434859afdbeda2bea84e877
SHA256:
0E76C2DD546159D3EA984FD47245FEFDD45578E4C16670C18DEF31875EC6C93C
File Size:
1.54 MB, 1536411 bytes
|
|
MD5:
ce0e85d332f1d56d2c01e25b0409df90
SHA1:
6c78d0f5ad64bd7c8c165415c13a1c1a51623028
SHA256:
614D37613E3A247E9090F5E43B255505EFE1E4CCDDA8FC7178E21C5BBFEF2AB2
File Size:
153.60 KB, 153600 bytes
|
|
MD5:
c7ce20e029967eb8a1b48cd1f4905fa9
SHA1:
59ebf75f343c3240f4840fca7a7f9f772ecdbc92
SHA256:
7244D7A54D57D66528697FD433B0B2E12D504F07D2AEA6D1E71C1A5D33F6DC55
File Size:
1.48 MB, 1482752 bytes
|
|
MD5:
9ad3e684006dab7b60d77646309b9c23
SHA1:
5e162e5fac161da66dcbdc794ff59c56b52934b9
SHA256:
2267955C3E7BFF12A504FBAF266E1435FC98F91AB0FAF1700052B08FCF421366
File Size:
1.07 MB, 1069591 bytes
|
|
MD5:
402aef9fa4c9951abe7b4a5c80d0d556
SHA1:
0bc08144744b018918298356b5d3c4fbb7f5840e
SHA256:
758692AD67009ED550CB8ACEEE3352EBAD63A16AEF30908B3DA53E1B35C9899F
File Size:
200.32 KB, 200324 bytes
|
|
MD5:
2b24105b3aebc9d778d283c496dbf38a
SHA1:
3c8a2b229954b8bcfdb68242d38f85e8fd89f503
SHA256:
E9E9C0761E21D3E26A837682F8C3EED2420055DDF10AC1FCC7C6A9F2213121CF
File Size:
1.17 MB, 1166688 bytes
|
|
MD5:
a31b3fd4a26451ceecaf7d6990399948
SHA1:
6be5e39cb5cda57ea43520e1cfafd217144150ed
SHA256:
5C11BA6E2AC2BDF4869A6D1B62C30C1813653DE90C2A8A7C506A80FB3FDB22EE
File Size:
389.78 KB, 389778 bytes
|
|
MD5:
88b56a1ab51d58c4e499c245aad55e07
SHA1:
f5fe73df3c83f2c8351989c0c86edb2265e5a6c3
SHA256:
E500A148AD6A7FFAE2F11646BEC38F21E8EC2302EA5817B2FD888A589C56DA9E
File Size:
1.92 MB, 1921024 bytes
|
|
MD5:
f36696103cf0ad30c4d4ce82dde8855d
SHA1:
c37a734eb6e53f943a1e5e6d9dc2d01c4751883c
SHA256:
5DB06ACFC6EE327C37FC0221B06AF95AFB8FAC859F8F92E6C2932F0C2A4B1796
File Size:
103.94 KB, 103936 bytes
|
|
MD5:
efb6c543dec3b785de5a2e31477c317a
SHA1:
af355d3be04bee04636b7d0ef90e59cda5d2bff0
SHA256:
83D1882BDB8C84E1F7F7C61FFA94D00386307509C44A9C939A7ED581608CB1FF
File Size:
33.28 KB, 33280 bytes
|
|
MD5:
0057d61973eee2c333a9365926c19fd5
SHA1:
53e32919a619f1c228046be72fe0369e58b08b96
SHA256:
13E1FE2EA86DAC62935ECEB6FC8E7C1A52A66F830699FF1B1B03BB757C51A54A
File Size:
718.34 KB, 718336 bytes
|
|
MD5:
e73109a83803fe5fe655c965aed4b6ce
SHA1:
126eaa1e782a88cd2e16bbed0e79388069d97935
SHA256:
6BBCF9EB60DB55199F7C3D36D2090B6A210630589E85B86A95277AEAB509687B
File Size:
307.02 KB, 307024 bytes
|
|
MD5:
8184b14c25baaeddc270f7f13b248207
SHA1:
2e14ae67c012e1701b1d21a0703e4606996a3dd5
SHA256:
AF4A5EAE57BCF1FBFE3B3608C3B9BDAB0DD9E5FC862C072CCDE863A336B7E6CF
File Size:
3.14 MB, 3136000 bytes
|
|
MD5:
e32df3c6f8aee898d382677d6b2ae873
SHA1:
2af39cce0f9771f90e4a1602f5c31dd4c2e4e04a
SHA256:
16593AAB065B81A6A57E4A1ED8197AAFC40E1DC5587CECC916F80576EDEB9E3D
File Size:
389.78 KB, 389783 bytes
|
|
MD5:
2cb34d67291a6b12020a54930314deb6
SHA1:
c078293ca588194628e5a7e1e16f51ca025b12b0
SHA256:
AB65529778A47CA9AC6952077C1E7C7A0A32D3FA62464AF37216F190460369EE
File Size:
665.13 KB, 665127 bytes
|
|
MD5:
266aa97108ade4712883378d83553ce0
SHA1:
2998cf112b0dc116a451c644887a19309e9e8940
SHA256:
6AB2A44A479F875A2D3BDFAAE190280C92AFB71885792F94EA263279B0AB65FB
File Size:
389.80 KB, 389804 bytes
|
|
MD5:
ec29aad202da949f9c98c947748f2774
SHA1:
7f2d6838780cf9e55a5b6d32203b873b01b408f6
SHA256:
30A74EFC1C963735897E5616062FE571D81D78863416DD2C225DE853F5D91EA5
File Size:
827.39 KB, 827392 bytes
|
|
MD5:
e7fe5df97ce43a383c3327b983086c0e
SHA1:
9a8c29e72c8e2b12175ebcd49c509c99751fc3c3
SHA256:
A5E28983DD5F07102CA13C25462682BDE2F72D50B23FC80BB8E85D38D84D61F8
File Size:
111.62 KB, 111616 bytes
|
|
MD5:
d96d4b56058a36f7b8e9df148c173c2e
SHA1:
4b2487cc35dd931ba84af24079fd4c1c53fcdd24
SHA256:
031574C087112B585C6B517AC25D0069A9452C4F68FA7F2BA56D21204A62923A
File Size:
95.08 KB, 95080 bytes
|
|
MD5:
56abf62c5c232698c812ab8abc717cad
SHA1:
c2fb1ad7a1e838a234e6bfd9d9985f110301a32a
SHA256:
33CB542E0D27355BAFFFC80C58C31DE7B29E3CAFC292F2A62E39F6C00C3D126B
File Size:
215.65 KB, 215648 bytes
|
|
MD5:
fd01fbe07b36c00437a5ba8f7a6a3723
SHA1:
36cbb62cc129e9867343f56b582cb4f5400bc370
SHA256:
1D6318FF57356E3036A9A7E8DFC839DB2182068F1AF7E6A8CB008C09A730EBB6
File Size:
437.76 KB, 437760 bytes
|
|
MD5:
675fb2b67c2b7742337367fffbbc541b
SHA1:
14cbca663c096b42c95fab3f84f99257995977ef
SHA256:
37C0BC9D0FAC19298C76C5A94AB8A05BEB8096A07434F51CE159D7BEB759A0D3
File Size:
389.81 KB, 389812 bytes
|
|
MD5:
fb98492258cdbdcf24c9a69a47f2676e
SHA1:
bc9979682bf3070c36cf1d07369b33c3aee94294
SHA256:
02EFFFA91FC7A28216D5EDAA978B582F097BF79BF326A513481897A449B82C6D
File Size:
543.06 KB, 543056 bytes
|
|
MD5:
5f0e849a99c852d90ddb308d90cd6adf
SHA1:
d639bba9f4d80fe1048e5b3bd6313be779bac66a
SHA256:
462C9765A8609FA06578D9251F2C1A1F8505404088B9B6F0B26AEB1D6798C460
File Size:
390.14 KB, 390144 bytes
|
|
MD5:
74afd886275ec3d9125dcd3cee809724
SHA1:
9e93d93eb6de79b95e70378fab1f17506f112de6
SHA256:
058010FB37AAE5BB809A64B07DD626C02B6232105700B807EB6A55C4A805DD58
File Size:
394.05 KB, 394046 bytes
|
|
MD5:
55dfc3d416f87ac3b58a7888e92316bb
SHA1:
bd8533409abbdd38080ac0190e60294821fb3322
SHA256:
AC43C679B9ABF02F88302E76E6C7E080D58DCB03B57DBFE790878549F2B025BC
File Size:
716.14 KB, 716136 bytes
|
|
MD5:
62eb5332291676c6562f5fc5a76bd9e2
SHA1:
0a4a298f9ccdc82dd1d9a772d23864d668f99fa9
SHA256:
049FC03C81ACB28E9C8B541BF0C23413812ED9288CFEAD6D74DDF75784562E04
File Size:
389.79 KB, 389793 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is .NET application
- File is 32-bit executable
Show More
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
46 additional icons are not displayed above.
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version |
|
| Build Date |
|
| Comments |
|
| Company | EiTheL |
| Company Name |
|
| Description | EiThel Patcher |
| File Description |
Show More
|
| File Version |
Show More
|
| G P G Version | 1.06.0.0000 |
| Internal Name |
Show More
|
| Internet | http://www.amok.am |
| Legal Copyright |
|
| Legal Trademarks |
|
| Original Filename |
Show More
|
| Product Name |
Show More
|
| Product Version |
|
| Productname | PatchKeyboard |
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| DoomStorm | DoomStorm | Self Signed |
| Alawar Entertainment Inc | Symantec Class 3 SHA256 Code Signing CA | Self Signed |
| deepxw Software | deepxw Software | Hash Mismatch |
| deepxw Software | deepxw Software | Self Signed |
File Traits
- $Id: UPX
- .adata
- .aspack
- .NET
- .sdata
- .UPX
- 00 section
- 2+ executable sections
- ASPack v2.12
- Autoit
Show More
- big overlay
- CryptoObfus
- HighEntropy
- Installer Manifest
- NewLateBinding
- No Version Info
- packed
- RAR (In Overlay)
- RARinO
- Reactor
- Reflective
- RijndaelManaged
- SIM
- UPX
- upx
- UPX!
- UPX lock
- virut
- WinRAR SFX
- WRARSFX
- WriteProcessMemory
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 520 |
|---|---|
| Potentially Malicious Blocks: | 0 |
| Whitelisted Blocks: | 520 |
| Unknown Blocks: | 0 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Autoit
- Autorun.KA
- BadJoke.TH
- BadJoke.XA
- Chapak.HBX
Show More
- CobaltStrike.GI
- CobaltStrike.GIA
- Delf.AJ
- Delf.Q
- Delf.XA
- FakeInstaller.A
- Injector.XG
- Lotok.J
- MSILZilla.TC
- Nethief.B
- Patcher.B
- Philadelphia.A
- Philadelphia.B
- Rozena.XC
- Spy.Agent.KG
- Stealer.UHBD
- Stealer.UHBE
- Stealer.UHBF
- Stealer.UHBG
- Stealer.UHEA
- Stealer.UHG
- Stealer.UHN
- Stealer.UHO
- Stealer.UHV
- Stealer.UHY
- Stealer.UJC
- Trojan.Agent.Gen.VN
- Trojan.Filecoder.Gen.BM
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| \device\namedpipe\gmdasllogger | Generic Write,Read Attributes |
| c:\program files\common files\system\symsrv.dll | Generic Write,Read Attributes |
| c:\program files\common files\system\symsrv.dll.000 | Generic Write,Read Attributes |
| c:\program files\internet download manager | Synchronize,Write Attributes |
| c:\program files\internet download manager\__tmp_rar_sfx_access_check_2145640 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\program files\internet download manager\idman.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.1.regtrans-ms | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.2.regtrans-ms | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Show More
| c:\users\user\appdata\local\temp\4eb53f791690458bd98fc288b43e59d2035c10e8_0000389793 | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\6fe3a02822c66a9ca65276cda033026ae6ca47cb_0000389794 | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\9c3cb69fd8fcd8a928f5c88db62f2b15360137a3_0000389778 | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\acknowledge -brk-.fon | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\bassmod.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\bit1.fon | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\c13fb1e8a5ecbbf9f97a5f97edde26a730845a1d_0000389804 | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\c4ed54b54de9d6dc708af4deb8e7af3929188a63_0000389764.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\dup2patcher.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\f018c4fb7db8846f6848a79d992a5dc4b27f0614_0000389794 | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\gotham nights.ttf | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsd305b.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nseb8e6.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nseb8f7.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nseb8f7.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb8f7.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsj30cb.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsj30cb.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn25ba.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn25ba.tmp\execdos.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn25ba.tmp\execdos.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn25ba.tmp\nsisfile.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn25ba.tmp\nsisfile.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn25ba.tmp\registry.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn25ba.tmp\registry.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn25ba.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn25ba.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn2609.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn2609.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nst306c.tmp\execdos.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nst306c.tmp\nsisfile.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nst306c.tmp\registry.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nst306c.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsubacc.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsubacc.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsx3424.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsx3424.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsy25b9.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\rarsfx0 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_2144656 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_2925984 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\ebook converter bundle crack uret.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\ebook converter bundle crack uret.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\ebook_converter_bundle_patch_uret_v1.2.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\ebook_converter_bundle_patch_uret_v1.2.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\runpatcher.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\runpatcher.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\tcpipx86.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\tcpipx86.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\53f99c8554a4762c5199ddb27231004e_bfeb5820-9643-42ad-a79f-071dff4d8e64 | Generic Write,Read Attributes |
| c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\549b9b645cadfe6bb4bc69cf363c354c_bfeb5820-9643-42ad-a79f-071dff4d8e64 | Generic Write,Read Attributes |
| c:\users\user\downloads\bassmod.dll | Generic Write,Read Attributes |
| c:\users\user\downloads\igi.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\igi.exe | Synchronize,Write Attributes |
| c:\users\user\downloads\miponyportable.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\netsetmanportable.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\sqlserverpasswordchangerportable.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\windows\appcompat\programs\amcache.hve | Read Data,Read Control,Write Data |
| c:\windows\appcompat\programs\amcache.hve | Write Attributes |
| c:\windows\system.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\windows\system32\drivers\etc\hosts | Generic Write,Read Attributes |
| c:\windows\system32\kbdgr10.dll | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\windows\system32\kbdgr11.dll | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\windows\syswow64\kbdgr10.dll | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\windows\syswow64\kbdgr11.dll | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\cryptography\oid\encodingtype 0\cryptdllfindoidinfo\1.3.6.1.4.1.311.60.3.1!7::name | szOID_ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION | RegNtPreCreateKey |
Show More
| HKLM\software\wow6432node\microsoft\cryptography\oid\encodingtype 0\cryptdllfindoidinfo\1.3.6.1.4.1.311.60.3.2!7::name | szOID_ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\cryptography\oid\encodingtype 0\cryptdllfindoidinfo\1.3.6.1.4.1.311.60.3.3!7::name | szOID_ROOT_PROGRAM_NO_OCSP_FAILOVER_TO_CRL | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Zxyylxmy\AppData\Local\Temp\nsn25BA.tmp\registry.dll | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Zxyylxmy\AppData\Local\Temp\nsn25BA.tmp\registry.dll \??\C:\Users\Zxyylxmy\AppData\Local\Temp\nsn25BA.tmp\ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\control\keyboard layout\doskeybcodes::00020407 | gr | RegNtPreCreateKey |
| HKLM\system\controlset001\control\keyboard layout\doskeybcodes::00030407 | gr | RegNtPreCreateKey |
| HKLM\system\controlset001\control\keyboard layouts\00020407::layout file | KBDGR10.DLL | RegNtPreCreateKey |
| HKLM\system\controlset001\control\keyboard layouts\00020407::layout id | RegNtPreCreateKey | |
| HKLM\system\controlset001\control\keyboard layouts\00020407::layout text | Deutsch (Punkt) | RegNtPreCreateKey |
| HKLM\system\controlset001\control\keyboard layouts\00020407::layout display name | Deutsch (Punkt)-Tastatur | RegNtPreCreateKey |
| HKLM\system\controlset001\control\keyboard layouts\00030407::layout file | KBDGR11.DLL | RegNtPreCreateKey |
| HKLM\system\controlset001\control\keyboard layouts\00030407::layout id | RegNtPreCreateKey | |
| HKLM\system\controlset001\control\keyboard layouts\00030407::layout text | Deutsch (IBM, Punkt) | RegNtPreCreateKey |
| HKLM\system\controlset001\control\keyboard layouts\00030407::layout display name | Deutsch (IBM, Punkt)-Tastatur | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\explorer\advanced::hidden | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\policies\system::disabletaskmgr | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\policies\system::disableregistrytools | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::antivirusoverride | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::antivirusdisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::firewalldisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::firewalloverride | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::updatesdisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::uacdisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::antivirusoverride | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::antivirusdisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::firewalldisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::firewalloverride | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::updatesdisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::uacdisablenotify | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings::globaluseroffline | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows\currentversion\policies\system::enablelua | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\sharedaccess\parameters\firewallpolicy\standardprofile::enablefirewall | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\sharedaccess\parameters\firewallpolicy\standardprofile::donotallowexceptions | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\sharedaccess\parameters\firewallpolicy\standardprofile::disablenotifications | RegNtPreCreateKey | |
| HKCU\software\apcr\1214104697::1919251317 | | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::-456464662 | RegNtPreCreateKey | |
| HKCU\software\apcr\1214104697::1462786655 | RegNtPreCreateKey | |
| HKCU\software\apcr\1214104697::-912929324 | # | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::1006321993 | ƣ | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::-1369393986 | http://www.eri.edu.pk/images/logo.gif http://fourline.com.tr/i | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::549857331 | RegNtPreCreateKey | |
| HKCU\software\apcr::u1_0 | ⠺첖 | RegNtPreCreateKey |
| HKCU\software\apcr::u2_0 | ᖍ | RegNtPreCreateKey |
| HKCU\software\apcr::u3_0 | 権ă | RegNtPreCreateKey |
| HKCU\software\apcr::u4_0 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list::c:\users\user\downloads\1f0092b274fc484b1bbb83f8f30e54459e6015c8_0000113152 | c:\users\user\downloads\1f0092b274fc484b1bbb83f8f30e54459e6015c8_0000113152:*:enabled:@shell32.dll,-1 | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::1919251317 | ✝ | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::1006321993 | ö | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::-1369393986 | http://1000autohits.wz.cz/left.gif http://www.centreyoughourta | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::549857331 | RegNtPreCreateKey | |
| HKLM\software\wow6432node\dfx\11\registration\stat:: | 2 | RegNtPreCreateKey |
| HKLM\software\wow6432node\dfx\11\registration\serialnumber:: | RegNtPreCreateKey | |
| HKLM\software\wow6432node\dfx\11\registration\password:: | RegNtPreCreateKey | |
| HKLM\software\wow6432node\dfx\11\registration\regcount:: | 2 | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\windows nt\currentversion\windows::appinit_dlls | C:\PROGRA~1\COMMON~1\System\symsrv.dll | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows nt\currentversion\windows::loadappinit_dlls | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\windows nt\currentversion\windows::requiresignedappinit_dlls | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 큷뒓挒ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\tracing\rasapi32::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | 鲆 ȁ ਪˣ 鈯ˣ 遙̃ 豤̃ অˣ 炑̃ 龡^ 濖̃ 賬̃ 獖} 偫~ 엦1 ˣ 邯̃ 뫯ʃd ᵂċ ᵆċe ꙥЂ 엦1 ¶i ꙥr $ ֢v ꙥ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\software\microsoft\tip\aggregateresults::data | 鐄ȴ 鲱 虍 峟ʏ耀氅歿 䃇 픋˹耀뫹躧 픋˹➇ⵌ㭔 隞̃耀꧌ Ϛ ͂ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 췉ꥸ篚ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 銈篚ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old5af52 *1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old5af62 *1\??\C:\P | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Keyboard Access |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Anti Debug |
|
| User Data Access |
|
| Syscall Use |
Show More
98 additional items are not displayed above. |
| Process Terminate |
|
| Encryption Used |
|
| Other Suspicious |
|
| Network Winsock2 |
|
| Network Wininet |
|
| Network Winhttp |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
(NULL) C:\Users\Kfffbeyg\AppData\Local\Temp\c4ed54b54de9d6dc708af4deb8e7af3929188a63_0000389764.exe end
|
certutil -f -p "" -importPFX "C:\Users\Zxyylxmy\AppData\Local\Temp\nsn2609.tmp"
|
(NULL) C:\Users\Syzgyspr\AppData\Local\Temp\f018c4fb7db8846f6848a79d992a5dc4b27f0614_0000389794 end
|
(NULL) C:\Users\Foroefzr\AppData\Local\Temp\6fe3a02822c66a9ca65276cda033026ae6ca47cb_0000389794 end
|
(NULL) C:\Users\Buinxjno\AppData\Local\Temp\c13fb1e8a5ecbbf9f97a5f97edde26a730845a1d_0000389804 end
|
Show More
HTMLSqueezer.exe "c:\users\user\downloads\1c1791f9664a367955b2ef831adc28ba403fbe30_0000011394"
|
certutil -f -p "" -importPFX "C:\Users\Gahxlkug\AppData\Local\Temp\nsj30CB.tmp"
|
(NULL) C:\Users\Puouovle\AppData\Local\Temp\9c3cb69fd8fcd8a928f5c88db62f2b15360137a3_0000389778 end
|
(NULL) C:\Users\Zstxztdl\AppData\Local\Temp\4eb53f791690458bd98fc288b43e59d2035c10e8_0000389793 end
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\\dw20.exe dw20.exe -x -s 892
|
(NULL) C:\Users\Xcvtzvtk\AppData\Local\Temp\RarSFX0\eBook Converter Bundle Crack URET.exe
|
C:\WINDOWS\system32\cmd.exe /c SchTasks /create /SC MINUTE /TN MicrosoftServis /TR %TEMP%\Interface.exe /MO 35
|
(NULL) C:\Users\Xcvtzvtk\AppData\Local\Temp\RarSFX0\eBook_Converter_Bundle_Patch_URET_v1.2.exe
|
C:\WINDOWS\system32\schtasks.exe SchTasks /create /SC MINUTE /TN MicrosoftServis /TR C:\Users\Xcvtzvtk\AppData\Local\Temp\Interface.exe /MO 35
|
WriteConsole: Access is denied
|
(NULL) C:\Users\Rwcfeytd\AppData\Local\Temp\RarSFX0\runpatcher.exe
|
Tcpipx86.exe
|