PUP.HackAV

Threat Scorecard

Popularity Rank: 5,471
Threat Level: 10 % (Normal)
Infected Computers: 5,504
First Seen: June 26, 2021
Last Seen: February 6, 2026
OS(es) Affected: Windows

File System Details

PUP.HackAV may create the following file(s):
# File Name MD5 Detections
1. ashBase.dll 9e137e9ea95483b8b8bc57ec01f9310a 219
2. eav_nt32.exe 7f8fadc46d29d377844262b584bf259b 24
3. anti virus.exe 6360992b983566d568e76bcc60bfc0b9 2
More files

Analysis Report

General information

Family Name: PUP.HackAV
Signature status: No Signature

Known Samples

MD5: 9125484f1d7cbaa006e2f0f86d8b6cbc
SHA1: 2d27dd82c62d365dc1f6155153cd187fde10f870
SHA256: C6281260839A9A193DFCA38578CD3EC52F7693F3C8B6262F97C1E16EC74238A3
File Size: 303.12 KB, 303123 bytes
MD5: 222566267e4199ca360a7485d00b4580
SHA1: fa2c43270da44ad0cc4dd999c889ce4c7d607981
SHA256: A302336A4C2E8F9BA289B484BAB45A56A1E951E18F050E976440DC40A09F6909
File Size: 1.14 MB, 1144832 bytes
MD5: 0a0cd7ff77d9f0612489959f53855338
SHA1: 6f8f0557b42284eadfc58b499b4d6dad22d6f99f
SHA256: 0B636B605B8623DBF01F2CD819E03B4BDE36287670D2DB7E14B4F1900D4548BB
File Size: 57.34 KB, 57344 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is 64-bit executable
  • File is either console or GUI application
Show More
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments
  • This installation was built with Inno Setup: http://www.innosetup.com
  • ulisessoft.info
Company Name nsane productions
File Description
  • KRTitle Overlay Filter
  • Makes your NOD32 trial last forever.
  • NodLogin
File Version
  • NOD32 FiX v2.1
  • 10.6.0.0
  • 1.00
Internal Name KRTitle.ax
Legal Copyright
  • Created By Zhong Kai Ran
  • nsane productions
  • UlisesSoft
Original Filename KRTitle.ax
Product Name KRTitle Overlay Filter
Product Version
  • 3.3.11.3
  • 1.00

File Traits

  • Autoit
  • dll
  • HighEntropy
  • Inno
  • InnoSetup Installer
  • Installer Manifest
  • Installer Version
  • WriteProcessMemory
  • x64
  • x86

Block Information

Total Blocks: 13
Potentially Malicious Blocks: 0
Whitelisted Blocks: 13
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\a.bmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\a.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\aut627c.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\aut62fa.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\aut631b.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\aut634a.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\aut635b.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\b.bmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\b.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\logo.jpg Generic Read,Write Data,Write Attributes,Write extended,Append data
Show More
c:\users\user\appdata\local\temp\logo.jpg Generic Write,Read Attributes
c:\users\user\appdata\local\temp\mod004.us Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mod004.us Generic Write,Read Attributes
c:\users\user\appdata\local\temp\x.bmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\x.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~df34466c318c9bf8bf.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAddAtomEx
  • ntdll.dll!NtAllocateLocallyUniqueId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtDeviceIoControlFile
Show More
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtLockFile
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryObject
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryTimerResolution
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationObject
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnlockFile
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtYieldExecution
  • UNKNOWN
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\6f8f0557b42284eadfc58b499b4d6dad22d6f99f_0000057344.,LiQMAxHB

Trending

Most Viewed

Loading...