PUP.HackKMS.CB

Analysis Report

General information

Family Name: PUP.HackKMS.CB
Signature status: No Signature

Known Samples

MD5: e2c6062442c921589db6760fb8f8eefe
SHA1: 378f5b596c5731ecfca74326b23a18b9653b6efb
SHA256: F8C2EC9CA93DDBD3069CE5C974D54F57286814A6BCB80350926BB253EF4AE075
File Size: 3.03 MB, 3031040 bytes
MD5: f742621303931fd5143fc1de56acdb50
SHA1: 8ae77df00cc9cce52d034b187a2d308ce3c37b7b
SHA256: A1EA5C138C1BEF795D5F4CE46C91956AD81D1B994D04BAE7F5ACA3A69132BFB5
File Size: 1.84 MB, 1842688 bytes
MD5: bef176669df519c0677900f17ccb0ab8
SHA1: a1423d1e0e5418dc9eb5bda85cc7d8a37826c822
SHA256: BE231F5DCCDD232A0E8942C620739E6C9135F64A6E5771039E1E6BAC1A313C02
File Size: 6.43 MB, 6426112 bytes
MD5: 30e73d69f1a312e7bbaa367debc6ac7c
SHA1: db07bece6d4762a3feb6c3d16d9c61266b2d846e
SHA256: C6B809A272DA823980ADB68A7E2BC2D360B958425756C9CA22AC793F2B319F14
File Size: 2.37 MB, 2368512 bytes
MD5: 63b8156bd520a2472ff6c2e4f481cab7
SHA1: 26392265c5c4d01930adc1d1b2bbe700ca4ecad5
SHA256: 5A7F25256F373E04C71DF1830CEE7109D85DC596E78955A25DFDF8E9AB5DE790
File Size: 6.27 MB, 6273536 bytes
Show More
MD5: f2114527cf9fd077eca65daa1480e00e
SHA1: 66f3c05ff5bd5d1e0df913ec9b58aa70d1431861
SHA256: 9BE585AEEB975FD474A8E80D89E19F6939D73AD0A213D85E6FAEA97FF27A0F08
File Size: 7.08 MB, 7081984 bytes
MD5: e1a84cf4d6eaaa76b0a1c65f25322e29
SHA1: 373a93f7defc2dd511a788958f78ac26bd7c739e
SHA256: 65A1460F449FC453358F6F1FCEFC5724354BB65B5629759FBEA7E2609FC1441B
File Size: 2.37 MB, 2369536 bytes
MD5: add4acb6feecef1de7dc498156b98553
SHA1: e57131cff902e877abe436c9c924446e76704528
SHA256: CF5BEDDE025722483EF8A5223491365FC07223F373E60C6CD1221978EEF685CB
File Size: 2.95 MB, 2948608 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 64-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comment
  • Build Date: 02/12/2025 - 15:56:09 (free version)
  • Build Date: 06/09/2025 - 16:04:08
Company Name
  • Fantaisie Software
  • Language Pack Italia
Email languagepack.italia@gmail.com
File Description PureBasic Development Environment
Internal Name PureBasicIDE
Legal Copyright (c) 2025 Fantaisie Software
Original Filename PureBasic.exe
Product Name
  • LPIHub
  • PureBasic
Product Version
  • PureBasic 6.21 (Windows - x64)
  • PureBasic 6.20 (Windows - x64)
Special Build Free Version: Register your version at http://www.purebasic.com
Website https://languagepack.it/

File Traits

  • 2+ executable sections
  • HighEntropy
  • imgui
  • No Version Info
  • x64

Block Information

Total Blocks: 3,099
Potentially Malicious Blocks: 158
Whitelisted Blocks: 2,837
Unknown Blocks: 104

Visual Map

0 x x x x x x x x x x ? x x x x x ? x x ? x ? x x x x ? ? x x x x x ? x x x ? x ? x x x ? x x x x x x ? x x x x x x x ? x x x ? x x ? x x x x x ? ? x x x x x x x x x x ? ? x x x x x x x x x ? x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 x ? 0 ? x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 x 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 x 0 0 ? ? 0 0 0 ? 0 0 0 ? 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 x 0 0 0 0 0 0 0 ? 0 x x 0 0 0 0 0 0 0 0 0 x ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? 0 0 0 ? 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 x x x x x ? ? ? ? 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 1 0 0 0 0 0 x x x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 ? x ? 0 0 0 0 x ? 0 0 0 0 ? 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 ? 0 0 x ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 x x 0 0 0 0 x 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 ? ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • HackKMS.C
  • HackKMS.CB
  • HackKMS.JA

Files Modified

File Attributes
\device\namedpipe Generic Read,Write Attributes
\device\namedpipe Generic Write,Read Attributes
c:\users\user\appdata\roaming\purebasic\purebasic.prefs Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\roaming\purebasic\tools.prefs Generic Read,Write Data,Write Attributes,Write extended,Append data

Registry Modifications

Key::Value Data API Name
HKCU\26392265c5c4d01930adc1d1b2bbe700ca4ecad5_0006273536\shell\open\command:: "c:\users\user\downloads\26392265c5c4d01930adc1d1b2bbe700ca4ecad5_0006273536" "%1" /P "C:\Users\Ahzgmrdl\AppData\Roaming\PureBas RegNtPreCreateKey
HKCU\26392265c5c4d01930adc1d1b2bbe700ca4ecad5_0006273536\defaulticon:: c:\users\user\downloads\26392265c5c4d01930adc1d1b2bbe700ca4ecad5_0006273536,1 RegNtPreCreateKey
HKCU\.pb:: 26392265c5c4d01930adc1d1b2bbe700ca4ecad5_0006273536 RegNtPreCreateKey
HKCU\.pbi:: 26392265c5c4d01930adc1d1b2bbe700ca4ecad5_0006273536 RegNtPreCreateKey
HKCU\.pbp:: 26392265c5c4d01930adc1d1b2bbe700ca4ecad5_0006273536 RegNtPreCreateKey
HKCU\.pbf:: 26392265c5c4d01930adc1d1b2bbe700ca4ecad5_0006273536 RegNtPreCreateKey
HKCU\66f3c05ff5bd5d1e0df913ec9b58aa70d1431861_0007081984\shell\open\command:: "c:\users\user\downloads\66f3c05ff5bd5d1e0df913ec9b58aa70d1431861_0007081984" "%1" /P "C:\Users\Judkbjjd\AppData\Roaming\PureBas RegNtPreCreateKey
HKCU\66f3c05ff5bd5d1e0df913ec9b58aa70d1431861_0007081984\defaulticon:: c:\users\user\downloads\66f3c05ff5bd5d1e0df913ec9b58aa70d1431861_0007081984,1 RegNtPreCreateKey
HKCU\.pb:: 66f3c05ff5bd5d1e0df913ec9b58aa70d1431861_0007081984 RegNtPreCreateKey
HKCU\.pbi:: 66f3c05ff5bd5d1e0df913ec9b58aa70d1431861_0007081984 RegNtPreCreateKey
Show More
HKCU\.pbp:: 66f3c05ff5bd5d1e0df913ec9b58aa70d1431861_0007081984 RegNtPreCreateKey
HKCU\.pbf:: 66f3c05ff5bd5d1e0df913ec9b58aa70d1431861_0007081984 RegNtPreCreateKey

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAddAtomEx
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcConnectPortEx
  • ntdll.dll!NtAlpcQueryInformation
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateEvent
Show More
  • ntdll.dll!NtCreateKey
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateWaitCompletionPacket
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFindAtom
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenMutant
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenSymbolicLinkObject
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtPowerInformation
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDirectoryFile
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySymbolicLinkObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQueryTimerResolution
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReadVirtualMemory
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetTimer2
  • ntdll.dll!NtSetTimerResolution
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForMultipleObjects
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • ntdll.dll!NtYieldExecution
  • UNKNOWN
  • win32u.dll!NtGdiAnyLinkedFonts
  • win32u.dll!NtGdiBitBlt
  • win32u.dll!NtGdiCreateBitmap
  • win32u.dll!NtGdiCreateCompatibleDC
  • win32u.dll!NtGdiCreateDIBitmapInternal
  • win32u.dll!NtGdiCreateSolidBrush
  • win32u.dll!NtGdiDeleteObjectApp
  • win32u.dll!NtGdiDoPalette
  • win32u.dll!NtGdiExtGetObjectW
  • win32u.dll!NtGdiGetDCDword
  • win32u.dll!NtGdiGetDeviceCaps
  • win32u.dll!NtGdiGetRealizationInfo
  • win32u.dll!NtGdiGetTextMetricsW
  • win32u.dll!NtGdiHfontCreate
  • win32u.dll!NtGdiOpenDCW

39 additional items are not displayed above.

User Data Access
  • GetUserDefaultLocaleName
  • GetUserName
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
Network Winsock2
  • WSAStartup
Process Shell Execute
  • CreateProcess
Keyboard Access
  • GetKeyState

Shell Command Execution

"c:\users\user\downloads\Compilers\pbcompilerc.exe" /VERSION
"c:\users\user\downloads\Compilers\pbcompiler.exe" /STANDBY

Trending

Most Viewed

Loading...