PUP.HackKMS.DH

Analysis Report

General information

Family Name: PUP.HackKMS.DH
Signature status: No Signature

Known Samples

MD5: b7076b9e23a91c523f20909e7194c2ae
SHA1: 40f3d7edb852eb361bba710b0329f937602d46bf
SHA256: 1182810D8BFE41D4819FC59A94D0862DA91FECD9E62BA39E70683787D8BDD870
File Size: 1.51 MB, 1510346 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
File Description KMS_VL_ALL Setup
Product Name KMS_VL_ALL

File Traits

  • dll
  • ntdll
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-dhd4l.tmp\40f3d7edb852eb361bba710b0329f937602d46bf_0001510346.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\1-sppextcomobjpatcher.bak Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\2-activate-local.bak Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\_isetup\_isdecmp.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-p63b6.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-p63b6.tmp\check-activation-status.bak Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\cleanospp.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\convert-c2r.bak Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\fart.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\innocallback.dll Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\is-p63b6.tmp\key.cmd Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\keyoff.cmd Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\kms_vl_all.bak Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\msvcr100.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\sppextcomobjhook.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\svctrigger.xml Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-p63b6.tmp\win32\key.cmd Synchronize,Write Data
c:\users\user\appdata\local\temp\is-p63b6.tmp\win32\svctrigger.xml Synchronize,Write Data
c:\users\user\appdata\local\temp\is-p63b6.tmp\x64\cleanospp.exe Synchronize,Write Data
c:\users\user\appdata\local\temp\is-p63b6.tmp\x64\msvcr100.dll Synchronize,Write Data
c:\users\user\appdata\local\temp\is-p63b6.tmp\x64\sppextcomobjhook.dll Synchronize,Write Data
c:\users\user\appdata\local\temp\is-p63b6.tmp\x86\keyoff.cmd Synchronize,Write Data

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation
Keyboard Access
  • GetKeyState

Shell Command Execution

"C:\Users\Pqxnebli\AppData\Local\Temp\is-DHD4L.tmp\40f3d7edb852eb361bba710b0329f937602d46bf_0001510346.tmp" /SL5="$60310,1092994,202752,c:\users\user\downloads\40f3d7edb852eb361bba710b0329f937602d46bf_0001510346"

Trending

Most Viewed

Loading...