PUP.DriverToolkit

Threat Scorecard

Popularity Rank: 4,371
Threat Level: 10 % (Normal)
Infected Computers: 138,632
First Seen: March 27, 2019
Last Seen: April 7, 2026
OS(es) Affected: Windows

SpyHunter Detects & Remove PUP.DriverToolkit

File System Details

PUP.DriverToolkit may create the following file(s):
# File Name MD5 Detections
1. DriverToolkit.exe b35bcdc8758f44bb092590d92a8e744c 88,770
2. DriverToolkitInstaller.exe b3df5478760ced4d30910eb8e8b594e2 235
More files

Analysis Report

General information

Family Name: PUP.DriverToolkit
Signature status: Hash Mismatch

Known Samples

MD5: f5c14b9ad6a9dcf7dc1eb764a6acfe2b
SHA1: f9c250d70f77fd3f90c0df48fb3eaa27abac09ab
SHA256: 676B5BE997C9E1CABFFDB8DE82B3E58729BFFF90CEA13475D63484A1F397B2A2
File Size: 2.46 MB, 2459530 bytes
MD5: fe22a63802f50519964016c03b0864fc
SHA1: 40b57467f18240994ae9d2d4052176eee355a17f
SHA256: CCF933D199087A469DAD4BE7B90091353EC427BDB0816BEC7F5580DE67305CDE
File Size: 2.46 MB, 2459531 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
Company Name Megaify Software
File Description DriverToolkit Setup
File Version 8.5.1
Product Name DriverToolkit
Product Version 8.5.1.0

Digital Signatures

Signer Root Status
Megaify Software Co.,Ltd. Symantec Class 3 SHA256 Code Signing CA Hash Mismatch
Megaify Software Co.,Ltd. Symantec Class 3 SHA256 Code Signing CA Hash Mismatch

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-55i76.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-62k0b.tmp\f9c250d70f77fd3f90c0df48fb3eaa27abac09ab_0002459530.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-83ul6.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-fbs47.tmp\40b57467f18240994ae9d2d4052176eee355a17f_0002459531.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation
Keyboard Access
  • GetKeyState
Process Manipulation Evasion
  • NtUnmapViewOfSection

Shell Command Execution

"C:\Users\Okpvlztc\AppData\Local\Temp\is-62K0B.tmp\f9c250d70f77fd3f90c0df48fb3eaa27abac09ab_0002459530.tmp" /SL5="$40040,2034499,136192,c:\users\user\downloads\f9c250d70f77fd3f90c0df48fb3eaa27abac09ab_0002459530"
"C:\Users\Pqkmpnpy\AppData\Local\Temp\is-FBS47.tmp\40b57467f18240994ae9d2d4052176eee355a17f_0002459531.tmp" /SL5="$1202BE,2034499,136192,c:\users\user\downloads\40b57467f18240994ae9d2d4052176eee355a17f_0002459531"

Trending

Most Viewed

Loading...